SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. FQDN means...
Fully Qualified Domain Name
23
Institute of Electrical and Electronics Engineers
Public Key Infrastructure
2. Fault Tolerance
SQL Server
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Point to Point Protocol
Local Area Network
3. Which one of the following communication protocols does a UNIX system primarily rely on?
netstat
TCP / IP (Transmission Control Protocol / Internet Protocol)
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Dynamic Host Configuration Protocol
4. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)?
802.11
Network News Transfer Protocol
netstat and ping
The Internet router is blocking port 25.
5. How are physical and logical topologies different?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT...
69
raphical User Interface
Wireless Protected Access
larger subnet masks.
7. SSH Means...
nslookup
Reverse Address Resolution Protocol.
Secure Shell
Internet Information Services
8. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain Name Service) for security reasons. Users have lost the ability to access remote network shares named ournetworkshares and ourprivateshares. How can this be resolve
Network News Transfer Protocol
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Wireless Access Point
Metropolitan Area Network
9. Client Machine
Point to Point Protocol
1433
Any device on the network that can ask for access to resources
Wireless LAN
10. File Server
PPTP (Point-to-Point Tunneling Protocol)
Transmission Control Protocol/Internet Protocol
Stores and dispenses files
Wireless Fidelity
11. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
1000BASE-LX and10 GBASE-LR
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
Router
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
12. SSID Means...
Stores and dispenses files
Institute of Electrical and Electronics Engineers
Service Set Identifier
Application
13. Web Server
Transmission Control Protocol/Internet Protocol
802.11a.
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Global Positioning System
14. At which layer of the OSI (Open Systems Interconnect) model does UDP (User Datagram Protocol) reside?
Transport
In the LAN (Local Area Network)
Handles e-mail functions
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
15. What is EAP? What is it used for?
514
111
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Multiple Link Interface
16. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet - although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem?
ping
Media Access Unit - Media attachment Unit
Networked Basic Input/Output System
2
17. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
raphical User Interface
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Check the connection from the WAP (Wireless Access Point) to the network
A. 18 -000 feet (5 -486.4 meters)
18. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
443
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
550 meters (1 -804.46 feet)
An exact duplicate of the infrastructure is mirrored offsite.
19. What is OSPF?
Open Source Path First - this is a routing protocol
802.11a.
To decrease network congestion Answer: D
Proxy server
20. FDDI (Fiber Distributed Data Interface) operates at what speed?
100 Mbps (Megabits per second)
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Connect Workstation 6 and Workstation 2 using a barrel connector
File Transfer Protocol
21. DSL means...
Digital Subscriber Line
48 bits.
rlogin
Wireless Access Point
22. What is on Port 110?
MT-RJ (Mechanical Transfer-Registered Jack)
POP3
SSL (Secure Sockets Layer)
As a way to share resources and information
23. Which physical topology is used by a 10BASE2 network?
Bus
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Any device on the network that can ask for access to resources
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
24. On what Port is SQL Server?
Internet Information Services
80
Hypertext transfer protocol
1433
25. Which one of the following options is required for a client workstation to connect to a network resource?
The file has been opened by another user and is open for read only.
Client - protocol - and adapter
Remote Desktop Protocol
25
26. Which one of the following servers provides web caching services?
ping
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Proxy
172.192.4.256
27. What is PAP?
Password Authentication Protocol
Point to Point Protocol
Simple Network Management Protocol
Basic Rate Interface
28. DC means...
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Lightweight Directory Access Protocol
Direct Current
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
29. A user has set up filtering on an Internet router. The local SMTP (Simple Mail Transfer Protocol) server has stopped sending or receiving messages from the Internet. What is the cause of the problem?
Token passing
Provides remote users with access to the network through modems and an IP connection
Post Office Protocol
The Internet router is blocking port 25.
30. A star network that uses several cable types must use which hub type in order to accommodate all client machines?
3.1
Internet Information Services
Hybrid hub
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
31. Telephony Server
netstat
Manages network applications
Post Office Protocol 3
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
32. LED Means...
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
Light Emitting Diode
It is an address assigned to a NIC (Network Interface Card).
Exterior Gateway Protocol
33. Client-Server Networks
Secure Shell
Integrated Services digital Network
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Point-to-Point Protocol
34. What is Multicast Transmission?
802.2
Router
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
rlogin
35. ACL means...
Internet mail access protocol
In a locked room in an offsite location
Access Control List
ifconfig
36. Upon which devices can NAT (Network Address Translation) be used?
Firewall
Implement VLANs (Virtual Local Area Network)
CSU / DSU (Channel Service Unit / Data Service Unit)
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
37. SSL Means...
Global System for Mobile Communications
Manages printers on the network
Reverse Address Resolution Protocol.
Secure Sockets Layer
38. NTFS Means...
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Time domain reflectometer
bytes 1-3
New Technology File System
39. A firewall can be used to prevent which of the following?
Wireless LAN
Packets from entering and leaving a network
25
Post Office Protocol
40. NetBEUI Means...
nslookup
Authentication
Networked Basic Input/Output System Extended User Interface
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
41. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem?
128 bit addresses
135-139
Internet Protocol Security
A 2.4 GHz (Gigahertz) cordless telephone is in use.
42. WINS Means...
53
Windows Internet Name Service
Metropolitan Area Network
The analyzer is functioning properly.
43. List the drawbacks of a bus topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. PPTP Means...
Password Authentication Protocol
A long length of antenna extension cable
10
Point-to-Point Tunneling Protocol
45. MPLS
Internet Protocol Security
T1 (T-Carrier Level 1).
MultiProtocol Label Switching
Presentation
46. On what Port is FTP?
Bayonet-Neill-Concelman or British Naval Connector
20 & 21
ICMP (Internet Control Message Protocol)
Media Access Unit - Media attachment Unit
47. MAU means...
Network File System
Routing Information Protocol
Wireless Fidelity
Media Access Unit - Media attachment Unit
48. SNMP Means...
The Internet router is blocking port 25.
Port 20 must also be unblocked.
Simple Network Management Protocol
ifconfig
49. A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this?
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
They are connected to a switch when trying to capture packets.
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
DNS
50. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Bluetooth enabled cell phones
802.1x
10 GBASE-LR