SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A firewall can be used to prevent which of the following?
Packets from entering and leaving a network
Presentation
Application
514
2. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
Lightweight Directory Access Protocol
Network News Transfer Protocol
10
Forward the packets to all ports except the one that originated the request
3. Which UNIX service provides interoperability with Windows file and print sharing?
443
There will be no Internet access.
SMB (Server Message Block)
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
4. What is PPP?
Routing Internet Protocol
Point to Point Protocol
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
ICMP (Internet Control Message Protocol)
5. Logical Topology
Post Office Protocol
A striped set array with parity
A network map showing exactly how data moves through the network.
Bayonet-Neill-Concelman or British Naval Connector
6. SMB Means...
Network Access Control
Server Message Block OR Small-to-Midsize Business
ping
BootP (Boot Protocol)
7. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
CSU / DSU (Channel Service Unit / Data Service Unit)
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Network Time Protocol
Check the connection from the WAP (Wireless Access Point) to the network
8. AC means...
Alternating Current
netstat
Verification
rlogin
9. Which one of the following communication protocols does a UNIX system primarily rely on?
TCP / IP (Transmission Control Protocol / Internet Protocol)
Sys Log (Unix) or Event Manager (Windows)
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
10. A technician just installed a new NIC (Network Interface Card) in a computer and attached a cable to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioning correctly and the network is up - which of the following will
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Network and Transport
The amber light is flashing occasionally and the green light is lit steadily.
Forward the packets to all ports except the one that originated the request
11. Which of the following methods transfers files with the use of a UDP (User Datagram Protocol)?
TFTP (Trivial File Transfer Protocol)
Access Control List
172.192.4.256
20 & 21
12. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
172.192.4.256
802.1x
ifconfig
DNS
13. IPSEC means...
Internet Protocol Security
CSU / DSU (Channel Service Unit / Data Service Unit)
Internetwork packet exchange
New Technology File System
14. Which one of the following choices is the MOST secure place to store tape backups?
Hypertext Markup Language
In a locked room in an offsite location
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Wireless Protected Access
15. A user connects to the companys intranet server via a VPN (Virtual Private Network) connection from a SOHO (Small Office / Home Office) using the broadband service. One day - the user cannot successfully connect to the VPN (Virtual Private Network) a
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
802.11i
netstat and ping
16. Six workstations that are numbered 1-6 are installed sequentially in a physical ring topology. Workstation 1 fails. How can the network administrator remove Workstation 1 for service without moving the other workstations?
Secure Sockets Layer
Password Authentication Protocol
Fully Qualified Domain Name
Connect Workstation 6 and Workstation 2 using a barrel connector
17. What is LEAP?
VPN (Virtual Private Network)
Hybrid hub
The device ID (Identification)
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
18. While reviewing network traffic statistics - technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?
Extranet
20 & 21
143
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
19. MAC Means...
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Transmission Control Protocol
Authentication
Media Access Control
20. LAN Means...
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Check the connection from the WAP (Wireless Access Point) to the network
Local Area Network
SMB (Server Message Block)
21. File Server
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Manages network applications
Stores and dispenses files
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
22. NetBIOS Means...
Plain Old Telephone Service
Networked Basic Input/Output System
TFTP (Trivial File Transfer Protocol)
NFS (Network File System)
23. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Internet Protocol Security. This is the defacto standard for VPN security.
Quality of Service
24. What is on Port 8080?
SMTP Server
Proxy Server
Bus
Internetwork packet exchange
25. The 802.11 frequency band is...
Routing Internet Protocol
2.4 GHz (Gigahertz).
Wireless LAN
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
26. Physical Topology
VPN (Virtual Private Network)
Secure Shell
Client - protocol - and adapter
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
27. Which protocol is the fastest file transfer protocol?
Port Address Translator
TFTP (Trivial File Transfer Protocol)
389
It is an address assigned to a NIC (Network Interface Card).
28. What is IP?
Bayonet-Neill-Concelman or British Naval Connector
Internet Protocol
Primary Rate Interface
Asynchronous Transfer Mode
29. IP means...
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Network Address Translation
514
Internet Protocol
30. What is on Port 23?
Telnet
Hypertext Markup Language
135-139
Point-to-Point Protocol
31. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
TFTP (Trivial File Transfer Protocol)
169.254.1.1
23
BootP (Boot Protocol)
32. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
Switches - bridges - and NICs (Network Interface Card)
550 meters (1 -804.46 feet)
Transport
Local Area Network
33. A small office network with ten computers uses a cable modem and router to connect to the Internet and distribute services to clients. After several weeks of use - the routers collision LED (Light Emitting Diode) has begun to stay on permanently. Wha
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Port 20 must also be unblocked.
Wired Equivalent Privacy
Industry Standards Organization
34. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) copper cable standard?
Remote Desktop Protocol
DNS
Uniform Resource Locator
1000BASE-CX
35. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data Link layer?
802.2
Provides remote users with access to the network through modems and an IP connection
To decrease network congestion Answer: D
Firewall
36. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
22
25
Fully Qualified Domain Name
An exact duplicate of the infrastructure is mirrored offsite.
37. UDP Means...
Wireless Fidelity
143
User Datagram Protocol
Dynamic Host Configuration Protocol
38. RDP means...
Remote Desktop Protocol
Institute of Electrical and Electronics Engineers
SMTP Server
Firewall
39. Which protocol could be used by a VPN (Virtual Private Network)?
Point to Point Protocol
PPTP (Point-to-Point Tunneling Protocol)
Public Switched Telephone Network
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
40. Client-Server Networks
Router
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Service Set Identifier
Proxy server
41. Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures?
Gateway
Plain Old Telephone Service
Hypertext transfer protocol
File Transfer Protocol
42. ISO Means...
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
Wireless Protected Access
110
Industry Standards Organization
43. ICMP means...
Domain Name Service OR Domain Name Server
Internet Control Message Protocol
Challenge Handshake Authentication Protocol
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
44. Network
Two or more connected computers that can share resources
MultiProtocol Label Switching
Routing Information Protocol
3389
45. This is not a valid IP (Internet Protocol) addresses
TCP / IP (Transmission Control Protocol / Internet Protocol)
User Datagram Protocol. This protocol is connectionless and routable.
Easy to install - Inexpensive - Less actual cable required
172.192.4.256
46. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Presentation
Bayonet-Neill-Concelman or British Naval Connector
Central Processing unit
RDP/ Terminal Services
47. HTTP Means...
Hypertext transfer protocol
172.192.4.256
Bayonet-Neill-Concelman or British Naval Connector
Handles tasks in the place of other machines on the network
48. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
netstat and ping
Windows Internet Name Service
Proxy server
Point to Point Protocol
49. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
TFTP (Trivial File Transfer Protocol)
Media Access Control
10 GBASE-LR
50. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
A. 18 -000 feet (5 -486.4 meters)
169.254.1.1
The analyzer is functioning properly.
Put a router between the two network segments