SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which one of the following is a purpose for subnetting?
A network map showing exactly how data moves through the network.
encapsulating the data payload.
TCP / IP (Transmission Control Protocol / Internet Protocol)
To decrease network congestion Answer: D
2. A firewall can be used to prevent which of the following?
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Any network device with an IP address
Packets from entering and leaving a network
69
3. What is LEAP?
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
SSL (Secure Sockets Layer)
The Internet router is blocking port 25.
443
4. UDP Means...
Post Office Protocol
Two or more connected computers that can share resources
Lightweight Directory Access Protocol
User Datagram Protocol
5. WINS Means...
Windows Internet Name Service
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
135-139
passing a username and password in plaintext.
6. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from th
Internet Protocol Security. This is the defacto standard for VPN security.
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
The analyzer is functioning properly.
Internet mail access protocol
7. Which UNIX service provides interoperability with Windows file and print sharing?
MAC (Media Access Control) address
SMB (Server Message Block)
Select the most probable cause
SUN RPC
8. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
40 bit - 128 bit - 64 bit
Routing Internet Protocol
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
There will be no Internet access.
9. Client-Server Networks
Public Key Infrastructure
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
TFTP (Trivial File Transfer Protocol)
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
10. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per second)?
ICMP (Internet Control Message Protocol)
20 & 21
SMB (Server Message Block)
802.11b
11. List the benefits of a bus topology
Easy to install - Inexpensive - Less actual cable required
110
The 'memo maker' that sends and receives paperless faxes over the network
These are the FTP ports. Port 20 handles data and Port 21 provides control.
12. GUI means
raphical User Interface
Public Switched Telephone Network
Provides remote users with access to the network through modems and an IP connection
Hybrid hub
13. ISO Means...
MAC (Media Access Control) address
Industry Standards Organization
SSL (Secure Sockets Layer)
Institute of Electrical and Electronics Engineers
14. IPX Means...
8080
This IP (Internet Protocol) address cannot be pinged remotely.
Internetwork packet exchange
Point to Point Protocol
15. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem?
rlogin
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Time domain reflectometer
Point to Point Tunneling Protocol
16. On what Port is IMAP?
Secure Sockets Layer
143
File Transfer Protocol
netstat and ping
17. Web Server
Integrated Services digital Network
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
1433
Asynchronous Transfer Mode
18. What is OSPF?
1000BASE-LX and10 GBASE-LR
Manages network applications
Open Source Path First - this is a routing protocol
Internet Control Message Protocol
19. On what Port is Sys Log/ Event Manager?
514
Check the connection from the WAP (Wireless Access Point) to the network
Hypertext Markup Language
BootP (Boot Protocol)
20. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
Presentation
All workstations except Workstation 3 can communicate to each other.
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
These are the FTP ports. Port 20 handles data and Port 21 provides control.
21. What is the minimum number of hard drives required to implement RAID 0 (Redundant Array of Independent Disks)?
2
Firewall
161 & 162
Routing Information Protocol
22. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses
1000BASE-LX and10 GBASE-LR
143
To decrease network congestion Answer: D
Physical
23. Given the MAC address 00:B0:D0:5A:E1:B5 - what does 5A:E1:B5 identify?
443
Routing Information Protocol
User Datagram Protocol
The device ID (Identification)
24. Which protocol does a diskless workstation use to obtain a network address?
BootP (Boot Protocol)
MT-RJ (Mechanical Transfer-Registered Jack)
SMTP Server
20 & 21
25. If a destination address is not in a bridges forwarding table - what will the bridge do?
WINS (Windows Internet Name Service)
The Internet router is blocking port 25.
Forward the packets to all ports except the one that originated the request
Trivial File Transfer Protocol
26. NFS Means...
netstat
161 & 162
135-139
Network File System
27. What is a MAC (Media Access Control) address?
Windows Internet Name Service
It is an address assigned to a NIC (Network Interface Card).
larger subnet masks.
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
28. On what Port is SUN RPC?
WEP (Wired Equivalent Privacy)
Internet Protocol
Network and Transport
111
29. Fault Tolerance
Media Access Control
Primary Rate Interface
TFTP (Trivial File Transfer Protocol)
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
30. What is on Port 23?
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Internet Protocol Security. This is the defacto standard for VPN security.
Secure Sockets Layer
Telnet
31. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
Fully Qualified Domain Name
TFTP (Trivial File Transfer Protocol)
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
nslookup
32. BNC Means...
Bayonet-Neill-Concelman or British Naval Connector
T1 (T-Carrier Level 1).
Wireless LAN
SMTP Server
33. What is L2TP? What is significant about this protocol?
Access Control List
Authentication
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
1000BASE-CX
34. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
Application
CSU / DSU (Channel Service Unit / Data Service Unit)
New Technology File System
443
35. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
Check the connection from the WAP (Wireless Access Point) to the network
Wireless LAN
Manages printers on the network
Remote Desktop Protocol
36. LED Means...
Light Emitting Diode
SMTP Server
Wired Equivalent Privacy
To decrease network congestion Answer: D
37. What part of an Ethernet MAC (Media Access Control) address designates the manufacturer of the NIC (Network Interface Card)?
bytes 1-3
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
nslookup
Internet connection
38. WLAN Means...
A striped set array with parity
Wireless LAN
Reverse Address Resolution Protocol.
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
39. What is on Ports 20 and 21?
1433
These are the FTP ports. Port 20 handles data and Port 21 provides control.
POP3
Address Resolution Protocol. Has no error control.
40. HTTP Means...
Any device on the network that can ask for access to resources
550 meters (1 -804.46 feet)
802.11a.
Hypertext transfer protocol
41. What is IPSEC? Why is it significant?
Transport
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
192.168.96.254
Internet Protocol Security. This is the defacto standard for VPN security.
42. AC means...
Alternating Current
Telnet
WEP (Wired Equivalent Privacy)
Secure Sockets Layer
43. What is on Port 1433?
Intrusion Detection System
Simple Network Management Protocol
BootP (Boot Protocol)
SQL Server
44. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer?
A long length of antenna extension cable
Connect Workstation 6 and Workstation 2 using a barrel connector
802.11b
MAC (Media Access Control) address
45. NIC means...
rp
Network Interface Card
A. 18 -000 feet (5 -486.4 meters)
48 bits.
46. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. What is on Ports 161 and 162?
550 meters (1 -804.46 feet)
Password Authentication Protocol
Port 161 is SNMP and Port 162 is the SNMP Manager
40 bit - 128 bit - 64 bit
48. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
802.11i
SUN RPC
CSU / DSU (Channel Service Unit / Data Service Unit)
D. Switch and bridge
49. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
User Datagram Protocol. This protocol is connectionless and routable.
Bayonet-Neill-Concelman or British Naval Connector
NFS (Network File System)
The file has been opened by another user and is open for read only.
50. In which OSI (Open Systems Interconnect) layer does a bridge operate?
The file has been opened by another user and is open for read only.
Data Link
Password Authentication Protocol
Multipurpose Internet Mail Extension