SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. TCP means...
Transmission Control Protocol
Internet Protocol
CSU / DSU (Channel Service Unit / Data Service Unit)
nslookup
2. Which one of the following servers provides web caching services?
Stores and dispenses files
Institute of Electrical and Electronics Engineers
Proxy
cold site.
3. NTP means...
Network Time Protocol
Open Source Path First - this is a routing protocol
They are connected to a switch when trying to capture packets.
Secure Sockets Layer
4. While reviewing network traffic statistics - technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
110
Bridge
Transport
5. On what Port is SUN RPC?
Stores and dispenses files
Handles tasks in the place of other machines on the network
Port Address Translator
111
6. GUI means
6
raphical User Interface
Telnet
550 meters (1 -804.46 feet)
7. HTML means...
Network Interface Card
Hypertext Markup Language
Time domain reflectometer
Gateway
8. A computer that is working on a network is unplugged and then plugged into another switch with a new cable. The link LED (Light Emitting Diode) on the NIC (Network Interface Card) does not come on. All of the following could be the source of the prob
the NIC (Network Interface Card) is bad.
Local Area Network
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Wired Equivalent Privacy
9. Which command generated the following output? Active Connections Proto Local Address Foreign Address State TCP CompA:3006 192.168.0.2:Microsoft Established TCP CompA:3021 192.168.0.246:HTTP Established
Stores and dispenses files
Service Set Identifier
Digital Subscriber Line
netstat
10. What is IPSEC? Why is it significant?
TCP / IP (Transmission Control Protocol / Internet Protocol)
Network Address Translator
Internet Protocol Security. This is the defacto standard for VPN security.
All workstations except Workstation 3 can communicate to each other.
11. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
Reverse Address Resolution Protocol.
A. 18 -000 feet (5 -486.4 meters)
The analyzer is functioning properly.
Telnet
12. IP means...
Internet Protocol
It is an address assigned to a NIC (Network Interface Card).
Network Address Translation
169.254.1.1
13. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Implement VLANs (Virtual Local Area Network)
443
netstat and ping
14. TFTP Means...
Trivial File Transfer Protocol
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Dynamic Host Configuration Protocol
15. IPX/SPX means...
Network Address Translator
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Internetwork Packet Exchange/Sequenced Packet Exchange
rp
16. FDDI (Fiber Distributed Data Interface) operates at what speed?
Connect Workstation 6 and Workstation 2 using a barrel connector
ICMP (Internet Control Message Protocol)
100 Mbps (Megabits per second)
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
17. Which of the following is used to translate NetBIOS (Network Basic Input / Output System) names
135-139
Reverse Address Resolution Protocol.
1
WINS (Windows Internet Name Service)
18. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) copper cable standard?
In the LAN (Local Area Network)
1000BASE-CX
Plain Old Telephone Service
Basic Input/Output System
19. A network administrator is troubleshooting a wireless LAN (Local Area Network) that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs (Wireless Access Point) from different companies within rang
514
An old microwave oven is being used in the break room which causes interference with the access point.
Application
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
20. What is a MAC (Media Access Control) address?
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
MultiProtocol Label Switching
It is an address assigned to a NIC (Network Interface Card).
Secure Shell
21. A star network that uses several cable types must use which hub type in order to accommodate all client machines?
Hybrid hub
Authentication
Application
Public Key Infrastructure
22. Which one of the following security protocols creates a secure connection over the Internet?
Bluetooth enabled cell phones
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Access Control List
L2TP (Layer 2 Tunneling Protocol)
23. PKI means...
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
Two or more connected computers that can share resources
Public Key Infrastructure
Bridge
24. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
The file has been opened by another user and is open for read only.
NetBios
3.1
An exact duplicate of the infrastructure is mirrored offsite.
25. What is on Ports 161 and 162?
Application
MAC (Media Access Control) address
L2TP (Layer 2 Tunneling Protocol)
Port 161 is SNMP and Port 162 is the SNMP Manager
26. UDP Means...
In a locked room in an offsite location
User Datagram Protocol
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
27. On what Port is HTTPS/ SSL?
Hybrid hub
443
Hypertext transfer protocol over secure sockets layer.
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
28. Name the seven most common physical topologies
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Internet Protocol Security
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Remote Desktop Protocol
29. LAN Local Area Network
PPTP (Point-to-Point Tunneling Protocol)
HTTP
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
30. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
Application
Global System for Mobile Communications
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Network Access Control
31. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain Name Service) for security reasons. Users have lost the ability to access remote network shares named ournetworkshares and ourprivateshares. How can this be resolve
A striped set array with parity
Trivial File Transfer Protocol
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
A long length of antenna extension cable
32. What are the two main network types?
Wireless LAN
20 & 21
Peer-To-Peer and Client-Server
PPTP (Point-to-Point Tunneling Protocol)
33. What is on Port 3389?
SMTP Server
RDP/ Terminal Services
802.1x
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
34. List the drawbacks of a bus topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. What is on Ports 20 and 21?
Bluetooth enabled cell phones
These are the FTP ports. Port 20 handles data and Port 21 provides control.
DNS (Domain Name Service) server settings
Public Key Infrastructure
36. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets?
PPP (Point-to-Point Protocol)
netstat
Proxy
Exterior Gateway Protocol
37. A network technician is troubleshooting a remote home users computer that is behind a SOHO (Small Office / Home Office) router running NAT (Network Address Translation). The technician wants to ping the IP (Internet Protocol) address of the remote us
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
This IP (Internet Protocol) address cannot be pinged remotely.
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
38. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses
Data Link
Internet Service Provider
Network Address Translation
1000BASE-LX and10 GBASE-LR
39. On what Port is FTP?
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Exterior Gateway Protocol
1000BASE-CX
20 & 21
40. Telephony Server
Secure Sockets Layer
Network File System
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
Stores and dispenses files
41. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
All workstations except Workstation 3 can communicate to each other.
The Internet router is blocking port 25.
Select the most probable cause
42. Describe a star topology
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
Global System for Mobile Communications
43. NAT Means...
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
802.11a.
Network Address Translation
Telnet
44. Which one of the following is a purpose for subnetting?
Hypertext Markup Language
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
To decrease network congestion Answer: D
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
45. SMB Means...
As a way to share resources and information
Server Message Block OR Small-to-Midsize Business
6
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
46. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
Internet mail access protocol
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
47. To increase the number of available IP (Internet Protocol) addresses - IPv6 (Internet Protocol version 6) uses which one of the following options?
128 bit addresses
1
SSH
File Transfer Protocol
48. What is UDP? What are some of its attributes?
User Datagram Protocol. This protocol is connectionless and routable.
In the LAN (Local Area Network)
Server Message Block OR Small-to-Midsize Business
Windows Internet Name Service
49. Which one of the following is true concerning bridges and their forwarding decisions?
2
100 Mbps (Megabits per second)
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Asynchronous Transfer Mode
50. Which of the following choices describes an RJ-45 (Registered Jack) connector?
Provides remote users with access to the network through modems and an IP connection
Transmission Control Protocol
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Implement VLANs (Virtual Local Area Network)