SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
Basic Rate Interface
These are the FTP ports. Port 20 handles data and Port 21 provides control.
There will be no Internet access.
802.11
2. On what Port is TFTP?
Networked Basic Input/Output System
In the LAN (Local Area Network)
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
69
3. TCP means...
20 & 21
Transmission Control Protocol
Networked Basic Input/Output System Extended User Interface
Alternating Current
4. AC means...
Metropolitan Area Network
Alternating Current
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Network Interface Card
5. If a destination address is not in a bridges forwarding table - what will the bridge do?
The Internet router is blocking port 25.
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
Port 20 must also be unblocked.
Forward the packets to all ports except the one that originated the request
6. Which protocol is the fastest file transfer protocol?
TFTP (Trivial File Transfer Protocol)
netstat
Proxy
Any network device with an IP address
7. Client Machine
Handles e-mail functions
encapsulating the data payload.
NetBios
Any device on the network that can ask for access to resources
8. An employee needs to access the internal secure company web site from a hotel. The employee will need which of the following connections?
ping
Internet connection
POP3
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
9. Which of the following options allows for secure communication over the Internet?
VPN (Virtual Private Network)
All hosts can communicate.
802.1x
53
10. BIOS Means...
100 Mbps (Megabits per second)
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Address Resolution Protocol. Has no error control.
Basic Input/Output System
11. Upon which devices can NAT (Network Address Translation) be used?
10 GBASE-LR
3389
Firewall
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
12. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
Hypertext transfer protocol over secure sockets layer.
netstat and ping
802.11a.
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
13. Which of the following choices describes an RJ-45 (Registered Jack) connector?
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Internet Protocol
Gateway
An eight-position connector which uses UTP (Unshielded Twisted Pair).
14. How are physical and logical topologies different?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. Servers
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. A valid MAC (Media Access Control) address is how many bytes long?
Public Key Infrastructure
gateway.
Internetwork packet exchange
6
17. What is DHCP? What is its key attribute?
Lightweight Directory Access Protocol
48 bits.
TFTP (Trivial File Transfer Protocol)
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
18. CPU means...
TFTP (Trivial File Transfer Protocol)
MAC (Media Access Control) address
Central Processing unit
gateway.
19. What is on Port 25?
larger subnet masks.
SMTP Server
netstat
1433
20. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
Domain Name Service OR Domain Name Server
Internet connection
Password Authentication Protocol
1000BASE-CX
21. Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire?
Point to Point Tunneling Protocol
PPTP (Point-to-Point Tunneling Protocol)
PPP (Point-to-Point Protocol)
TFTP (Trivial File Transfer Protocol)
22. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
802.11b
Networked Basic Input/Output System
Fully Qualified Domain Name
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
23. DSL means...
Intrusion Detection System
TFTP (Trivial File Transfer Protocol)
Digital Subscriber Line
D. Switch and bridge
24. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a...
gateway.
MT-RJ (Mechanical Transfer-Registered Jack)
Address Resolution Protocol. Has no error control.
128 bit addresses
25. FQDN means...
Fully Qualified Domain Name
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
1000BASE-CX
Transmission Control Protocol
26. SSID Means...
Connect Workstation 6 and Workstation 2 using a barrel connector
Verification
TCP / IP (Transmission Control Protocol / Internet Protocol)
Service Set Identifier
27. A user connects to the companys intranet server via a VPN (Virtual Private Network) connection from a SOHO (Small Office / Home Office) using the broadband service. One day - the user cannot successfully connect to the VPN (Virtual Private Network) a
In a locked room in an offsite location
135-139
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
514
28. Fault Tolerance
802.2
bytes 1-3
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
29. What is on Port 80?
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
HTTP
Multipurpose Internet Mail Extension
Asynchronous Transfer Mode
30. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
72.16.16.1
encapsulating the data payload.
Asynchronous Transfer Mode
Network File System
31. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
CSU / DSU (Channel Service Unit / Data Service Unit)
Wireless Protected Access
Exterior Gateway Protocol
Verification
32. WINS Means...
Windows Internet Name Service
Proxy
MT-RJ (Mechanical Transfer-Registered Jack)
L2TP (Layer 2 Tunneling Protocol)
33. List the drawbacks of a star topology
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Network Address Translator
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
34. Which one of the following servers provides web caching services?
Proxy
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
NetBios
443
35. MLI Means...
Point to Point Tunneling Protocol
Multiple Link Interface
Media Access Control
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
36. What is a MAC (Media Access Control) address?
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
It is an address assigned to a NIC (Network Interface Card).
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Peer-To-Peer and Client-Server
37. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) copper cable standard?
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
1000BASE-CX
Network File System
Physical
38. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
HTTP
DNS
Server Message Block OR Small-to-Midsize Business
Verification
39. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
L2TP (Layer 2 Tunneling Protocol)
Proxy server
An exact duplicate of the infrastructure is mirrored offsite.
161 & 162
40. ATM Means...
Public Switched Telephone Network
Asynchronous Transfer Mode
25
10
41. Remote Access Server
MAC (Media Access Control) address
Presentation
Alternating Current
Provides remote users with access to the network through modems and an IP connection
42. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet Protocol) address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Alternating Current
100BASE-FX Answer: D
rp
43. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
The file has been opened by another user and is open for read only.
Global System for Mobile Communications
Post Office Protocol 3
69
44. What is on Port 8080?
169.254.1.1
Manages printers on the network
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Proxy Server
45. IIS Means...
Networked Basic Input/Output System
Disk Operating System or Denial of Service
Internet Information Services
Address Resolution Protocol. Has no error control.
46. HTML means...
Hypertext Markup Language
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Digital Subscriber Line
User Datagram Protocol. This protocol is connectionless and routable.
47. NNTP Means...
389
Handles e-mail functions
Network News Transfer Protocol
Direct Current
48. DOS means...
3389
Disk Operating System or Denial of Service
User Datagram Protocol
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
49. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
Media Access Control
CSU / DSU (Channel Service Unit / Data Service Unit)
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
169.254.1.1
50. WPA Means...
SMB (Server Message Block)
3389
Wireless Protected Access
10