SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A user complains that they can no longer access resources on the network. The user is unable to ping other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet. What is the problem?
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
100BASE-FX Answer: D
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
2. Disk mirroring is also known as RAID ___...
Media Access Control
1
10 GBASE-LR
Network and Transport
3. SSH Means...
Secure Shell
RDP/ Terminal Services
Gateway
SQL Server
4. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses
1000BASE-LX and10 GBASE-LR
Secure Shell
Wireless Access Point
The users will not be affected by the change.
5. Which of the following connectors will be required for a RAS (Remote Access Service) server accepting four incoming dial-up connections to connect to the PSTN (Public Switched Telephone Network)?
RJ-11 (Registered Jack)
69
Digital Subscriber Line
Routing Information Protocol
6. On what Port is SNMP?
161 & 162
192.168.96.254
Address Resolution Protocol. Has no error control.
Access Control List
7. Physical Topology
encapsulating the data payload.
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
All workstations except Workstation 3 can communicate to each other.
8. What is on Port 514?
Point to Point Protocol
100 Mbps (Megabits per second)
Sys Log (Unix) or Event Manager (Windows)
Transport
9. Given the following output - which utility was used? Default Server: bigserver.datacenter.com Address: 4.12.18.1
nslookup
Institute of Electrical and Electronics Engineers
Application
Digital Subscriber Line
10. A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators company policy is to reserve the highest IP (Intern
L2TP (Layer 2 Tunneling Protocol)
nslookup
192.168.96.254
3.1
11. Which protocol does a diskless workstation use to obtain a network address?
Wireless LAN
BootP (Boot Protocol)
cold site.
CSU / DSU (Channel Service Unit / Data Service Unit)
12. Which one of the following options is a security standard for 802.11?
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Direct Current
WEP (Wired Equivalent Privacy)
encapsulating the data payload.
13. A new intranet web server has been installed for a company. The clients access the intranet server by its DNS (Domain Name Service) name. To automatically change the clients to connect to the new server - an administrator modifies the DNS (Domain Nam
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
A network map showing exactly how data moves through the network.
Service Set Identifier
Wireless Protected Access
14. NTP means...
All hosts can communicate.
Time domain reflectometer
User Datagram Protocol. This protocol is connectionless and routable.
Network Time Protocol
15. Fault Tolerance
Data Link
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
rp
16. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
Lightweight Directory Access Protocol
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
passing a username and password in plaintext.
Check the connection from the WAP (Wireless Access Point) to the network
17. TDR means...
Time domain reflectometer
Plain Old Telephone Service
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
1433
18. Describe a bus topology
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Point to Point Tunneling Protocol
Electromagnetic Interference
20 & 21
19. Which one of the following communication protocols does a UNIX system primarily rely on?
Internet Service Provider
Post Office Protocol
SMB (Server Message Block)
TCP / IP (Transmission Control Protocol / Internet Protocol)
20. What is PPTP?
Wireless Protected Access
Point to Point Tunneling Protocol
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Local Area Network
21. How are physical and logical topologies different?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. POP Means...
Handles tasks in the place of other machines on the network
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Post Office Protocol
Wireless LAN
23. WAP Means...
ICMP (Internet Control Message Protocol)
25
Wireless Access Point
69
24. Around noon - 802.11b wireless users near the break room have intermittent - random connections. What is the problem?
An old microwave oven is being used in the break room which causes interference with the access point.
HTTPS/ SSL
RJ-11 (Registered Jack)
Routing Information Protocol
25. What is IPSEC? Why is it significant?
The amber light is flashing occasionally and the green light is lit steadily.
Internet Protocol Security. This is the defacto standard for VPN security.
This IP (Internet Protocol) address cannot be pinged remotely.
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
26. IDS means...
Intrusion Detection System
Two or more connected computers that can share resources
Media Access Control
Bus
27. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for
encapsulating the data payload.
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
110
28. What is Unicast?
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
User Datagram Protocol. This protocol is connectionless and routable.
rp
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
29. In which OSI (Open Systems Interconnect) layer does a bridge operate?
Data Link
Uniform Resource Locator
Domain Name Service OR Domain Name Server
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
30. Which of the following choices describes an RJ-45 (Registered Jack) connector?
An eight-position connector which uses UTP (Unshielded Twisted Pair).
TCP / IP (Transmission Control Protocol / Internet Protocol)
Network Interface Card
rlogin
31. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
550 meters (1 -804.46 feet)
The file has been opened by another user and is open for read only.
CSU / DSU (Channel Service Unit / Data Service Unit)
Institute of Electrical and Electronics Engineers
32. What is EAP? What is it used for?
550 meters (1 -804.46 feet)
Routing Internet Protocol
Networked Basic Input/Output System
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
33. IMAP Means...
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
802.11b
Internet mail access protocol
Address Resolution Protocol. Has no error control.
34. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
A. 18 -000 feet (5 -486.4 meters)
Point-to-Point Protocol
raphical User Interface
35. If a destination address is not in a bridges forwarding table - what will the bridge do?
Handles e-mail functions
Networked Basic Input/Output System Extended User Interface
Forward the packets to all ports except the one that originated the request
Transmission Control Protocol
36. What is on Port 23?
Proxy
T1 (T-Carrier Level 1).
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Telnet
37. WLAN Means...
Connect Workstation 6 and Workstation 2 using a barrel connector
Network News Transfer Protocol
MAC (Media Access Control) address
Wireless LAN
38. All of the following Novell NetWare operating systems support NDS (NetWare Directory Services) natively EXCEPT...
PPP (Point-to-Point Protocol)
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
NetBios
3.1
39. A small office network with ten computers uses a cable modem and router to connect to the Internet and distribute services to clients. After several weeks of use - the routers collision LED (Light Emitting Diode) has begun to stay on permanently. Wha
Internet Protocol
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Fully Qualified Domain Name
MAC (Media Access Control) address
40. Which one of the following is a purpose for subnetting?
TFTP (Trivial File Transfer Protocol)
To decrease network congestion Answer: D
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Direct Current
41. ATM Means...
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Asynchronous Transfer Mode
netstat
42. A valid MAC (Media Access Control) address is how many bytes long?
Basic Rate Interface
6
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Digital Subscriber Line
43. What is on Port 80?
netstat
SMTP Server
MultiProtocol Label Switching
HTTP
44. What is RIP?
Light Emitting Diode
Digital Subscriber Line
Asynchronous Transfer Mode
Routing Internet Protocol
45. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
PPP (Point-to-Point Protocol)
Stores and dispenses files
traceroute
CSU / DSU (Channel Service Unit / Data Service Unit)
46. Company A has two networks - one on the west side of town and one on the east side. The network administrator wants to connect the two networks with a leased line but is concerned about limiting broadcast traffic. What can the administrator do to all
Telnet
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Put a router between the two network segments
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
47. Describe a star topology
Access Control List
1
PPTP (Point-to-Point Tunneling Protocol)
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
48. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?
Wireless Access Point
192.168.96.254
443
A long length of antenna extension cable
49. All of the following options transmit data over a modem EXCEPT...
Quality of Service
T1 (T-Carrier Level 1).
It is an address assigned to a NIC (Network Interface Card).
Post Office Protocol 3
50. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer?
MAC (Media Access Control) address
passing a username and password in plaintext.
Handles tasks in the place of other machines on the network
Peer-To-Peer and Client-Server