SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 802.11 security is defined in...
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
23
802.11i
This IP (Internet Protocol) address cannot be pinged remotely.
2. A firewall can be used to prevent which of the following?
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Packets from entering and leaving a network
ping
Basic Input/Output System
3. What is the minimum number of hard drives required to implement RAID 0 (Redundant Array of Independent Disks)?
Basic Input/Output System
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Proxy
2
4. Mail Server
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Transmission Control Protocol/Internet Protocol
135-139
Handles e-mail functions
5. TCP/IP Means;
Transmission Control Protocol/Internet Protocol
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Trivial File Transfer Protocol
The device ID (Identification)
6. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain Name Service) for security reasons. Users have lost the ability to access remote network shares named ournetworkshares and ourprivateshares. How can this be resolve
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
NFS (Network File System)
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
7. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
CSU / DSU (Channel Service Unit / Data Service Unit)
20 & 21
Check the connection from the WAP (Wireless Access Point) to the network
HTTPS/ SSL
8. On what Port is LDAP?
Extranet
CSU / DSU (Channel Service Unit / Data Service Unit)
Wireless Access Point
389
9. PRI Means...
Primary Rate Interface
Media Access Control
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
As a way to share resources and information
10. IDS means...
ICMP (Internet Control Message Protocol)
Network News Transfer Protocol
Application
Intrusion Detection System
11. Which one of the following security protocols creates a secure connection over the Internet?
40 bit - 128 bit - 64 bit
L2TP (Layer 2 Tunneling Protocol)
Service Set Identifier
Internetwork packet exchange
12. IIS Means...
Secure Shell
Post Office Protocol 3
Bayonet-Neill-Concelman or British Naval Connector
Internet Information Services
13. RDP means...
169.254.1.1
Remote Desktop Protocol
Basic Input/Output System
Client - protocol - and adapter
14. Host
10 GBASE-LR
Any network device with an IP address
Domain Name Service OR Domain Name Server
SSH
15. Logical Topology
A network map showing exactly how data moves through the network.
Token passing
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Post Office Protocol 3
16. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
An exact duplicate of the infrastructure is mirrored offsite.
Media Access Unit - Media attachment Unit
Hypertext Markup Language
Electromagnetic Interference
17. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall - FTP (File Transfer Protocol) still does not work. What is the
Port 20 must also be unblocked.
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
Wired Equivalent Privacy
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
18. Client Machine
Media Access Control
Any device on the network that can ask for access to resources
A striped set array with parity
Network and Transport
19. A workstation with a static IP (Internet Protocol) address can print and authenticate to a server - but cannot browse to www.comptia.org. What is the FIRST item to troubleshoot?
80
Transport
DNS (Domain Name Service) server settings
Wireless LAN
20. GUI means
raphical User Interface
In the LAN (Local Area Network)
Client - protocol - and adapter
RJ-11 (Registered Jack)
21. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
TCP / IP (Transmission Control Protocol / Internet Protocol)
Select the most probable cause
WINS (Windows Internet Name Service)
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
22. A company wants to have an intranet. Where would the intranet web server be located in the network?
In the LAN (Local Area Network)
3389
larger subnet masks.
25
23. Which protocol does a diskless workstation use to obtain a network address?
72.16.16.1
BootP (Boot Protocol)
Application
Internet Control Message Protocol
24. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
BootP (Boot Protocol)
ICMP (Internet Control Message Protocol)
Internet Protocol Security. This is the defacto standard for VPN security.
Proxy server
25. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
ICMP (Internet Control Message Protocol)
Remote Desktop Protocol
DNS
Data Link
26. On what Port is IMAP?
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
143
CSU / DSU (Channel Service Unit / Data Service Unit)
40 bit - 128 bit - 64 bit
27. LAN Means...
Local Area Network
1000BASE-CX
Presentation
TFTP (Trivial File Transfer Protocol)
28. PPP Means...
1000BASE-CX
Point-to-Point Protocol
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
29. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data Link layer?
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
802.2
A network map showing exactly how data moves through the network.
30. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation?
48 bits.
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Any network device with an IP address
rlogin
31. What is on Port 69?
SMB (Server Message Block)
TFTP (Trivial File Transfer Protocol)
WINS (Windows Internet Name Service)
111
32. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT...
The analyzer is functioning properly.
A. 18 -000 feet (5 -486.4 meters)
larger subnet masks.
Secure Shell
33. What is RARP?
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Reverse Address Resolution Protocol.
Select the most probable cause
All hosts can communicate.
34. Which of the following is used to translate NetBIOS (Network Basic Input / Output System) names
100BASE-FX Answer: D
WINS (Windows Internet Name Service)
Gateway
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
35. What is ARP? What are some of its attributes?
Application
Network File System
Address Resolution Protocol. Has no error control.
110
36. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets?
Transmission Control Protocol
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
netstat
Direct Current
37. TFTP Means...
Trivial File Transfer Protocol
Wired Equivalent Privacy
Firewall
Handles tasks in the place of other machines on the network
38. What is on Port 389?
POP3
Presentation
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Lightweight Directory Access Protocol
39. Which one of the following options is a security standard for 802.11?
WEP (Wired Equivalent Privacy)
25
Direct Current
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
40. At which layer of the OSI (Open Systems Interconnect) model does UDP (User Datagram Protocol) reside?
Transport
Manages printers on the network
72.16.16.1
New Technology File System
41. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet - although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem?
169.254.1.1
ping
SQL Server
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
42. Each of the following wireless standards use a 2.4 GHz (Gigahertz) ISM (Industrial - Scientific - and Medical) band EXCEPT...
Network Interface Card
802.11a.
111
These are the FTP ports. Port 20 handles data and Port 21 provides control.
43. On what Port is DNS?
53
Intrusion Detection System
550 meters (1 -804.46 feet)
Remote Desktop Protocol
44. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
2
1000BASE-CX
550 meters (1 -804.46 feet)
Any device on the network that can ask for access to resources
45. NetBEUI Means...
Handles e-mail functions
Networked Basic Input/Output System Extended User Interface
RDP/ Terminal Services
Post Office Protocol
46. BRI Means...
NetBios
802.11
Basic Rate Interface
An exact duplicate of the infrastructure is mirrored offsite.
47. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
Router
Internet Protocol
Fully Qualified Domain Name
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
48. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
10 GBASE-LR
Network News Transfer Protocol
Verification
Simple Network Management Protocol
49. A user connects to the companys intranet server via a VPN (Virtual Private Network) connection from a SOHO (Small Office / Home Office) using the broadband service. One day - the user cannot successfully connect to the VPN (Virtual Private Network) a
The users will not be affected by the change.
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
A. 18 -000 feet (5 -486.4 meters)
Server Message Block OR Small-to-Midsize Business
50. Which media access method is used for an IEEE (Institute of Electrical and Electronics Engineers) 802.5 network?
Token passing
Networked Basic Input/Output System Extended User Interface
netstat
the NIC (Network Interface Card) is bad.