SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which one of the following servers provides web caching services?
Proxy
Networked Basic Input/Output System
Select the most probable cause
25
2. Describe a star topology
Basic Rate Interface
RDP/ Terminal Services
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
3. Name the seven most common physical topologies
A network map showing exactly how data moves through the network.
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Router
Extranet
4. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
Wireless Access Point
Forward the packets to all ports except the one that originated the request
Wireless Fidelity
Extranet
5. SSL Means...
nslookup
Client - protocol - and adapter
Secure Sockets Layer
Challenge Handshake Authentication Protocol
6. On what Port is FTP?
20 & 21
Light Emitting Diode
Internet Protocol Security. This is the defacto standard for VPN security.
Simple Network Management Protocol
7. On what Port is the SMTP Server?
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
25
T1 (T-Carrier Level 1).
23
8. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?
6
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
There will be no Internet access.
A long length of antenna extension cable
9. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets?
Domain Name Service OR Domain Name Server
Data Link
In a locked room in an offsite location
netstat
10. In which OSI (Open Systems Interconnect) layer does a bridge operate?
25
Handles tasks in the place of other machines on the network
Data Link
L2TP (Layer 2 Tunneling Protocol)
11. Wi-Fi Means...
Internet Protocol
Wireless Fidelity
An eight-position connector which uses UTP (Unshielded Twisted Pair).
CSU / DSU (Channel Service Unit / Data Service Unit)
12. What part of an Ethernet MAC (Media Access Control) address designates the manufacturer of the NIC (Network Interface Card)?
SMTP Server
bytes 1-3
It is an address assigned to a NIC (Network Interface Card).
The analyzer is functioning properly.
13. On what Port is NetBios?
Bluetooth enabled cell phones
Disk Operating System or Denial of Service
135-139
SMTP Server
14. PKI means...
Public Key Infrastructure
PDC (Primary Domain Controller)
Wireless Protected Access
Direct Current
15. TFTP Means...
netstat
Post Office Protocol
Trivial File Transfer Protocol
Point-to-Point Protocol
16. Proxy Server
Handles tasks in the place of other machines on the network
This IP (Internet Protocol) address cannot be pinged remotely.
L2TP (Layer 2 Tunneling Protocol)
Networked Basic Input/Output System
17. Which one of the following choices is the MOST secure place to store tape backups?
72.16.16.1
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
It is an address assigned to a NIC (Network Interface Card).
In a locked room in an offsite location
18. What is BGMP?
Verification
Gateway
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
19. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
POP3
22
There will be no Internet access.
10
20. All of the following options transmit data over a modem EXCEPT...
T1 (T-Carrier Level 1).
Internet Control Message Protocol
WEP (Wired Equivalent Privacy)
POP3
21. Which command generated the following output? Active Connections Proto Local Address Foreign Address State TCP CompA:3006 192.168.0.2:Microsoft Established TCP CompA:3021 192.168.0.246:HTTP Established
Network Time Protocol
SSH
netstat
MAC (Media Access Control) address
22. On what Port is the Proxy Server?
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
8080
172.192.4.256
Challenge Handshake Authentication Protocol
23. TDR means...
The Internet router is blocking port 25.
WINS (Windows Internet Name Service)
Time domain reflectometer
The 'memo maker' that sends and receives paperless faxes over the network
24. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
There will be no Internet access.
ping
25. FTP Means
File Transfer Protocol
L2TP (Layer 2 Tunneling Protocol)
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Networked Basic Input/Output System
26. A small office network with ten computers uses a cable modem and router to connect to the Internet and distribute services to clients. After several weeks of use - the routers collision LED (Light Emitting Diode) has begun to stay on permanently. Wha
Wireless Protected Access
69
Bluetooth enabled cell phones
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
27. POTS means...
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Plain Old Telephone Service
A 2.4 GHz (Gigahertz) cordless telephone is in use.
These are the FTP ports. Port 20 handles data and Port 21 provides control.
28. An employee needs to access the internal secure company web site from a hotel. The employee will need which of the following connections?
Internet connection
Point-to-Point Tunneling Protocol
Hybrid hub
Easy to install - Inexpensive - Less actual cable required
29. On what Port is TFTP?
Implement VLANs (Virtual Local Area Network)
Bus
69
Domain Name Service OR Domain Name Server
30. Each of the following wireless standards use a 2.4 GHz (Gigahertz) ISM (Industrial - Scientific - and Medical) band EXCEPT...
135-139
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
802.11a.
cold site.
31. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
Check the connection from the WAP (Wireless Access Point) to the network
10 GBASE-LR
IMAP (Mail Client)
User Datagram Protocol
32. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
169.254.1.1
Challenge Handshake Authentication Protocol
Gateway
Bridge
33. Which command will produce the following output? ethoLink encap : Ethernet HWaddr: 00:80:C8:D6:74:43 inet adder : 4.150.6.3 Bcast : 4.255.255.255 Mask: 255.0.0.0
ifconfig
Transmission Control Protocol/Internet Protocol
1000BASE-LX and10 GBASE-LR
Transmission Control Protocol
34. PRI Means...
Primary Rate Interface
550 meters (1 -804.46 feet)
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
TFTP (Trivial File Transfer Protocol)
35. IDS means...
Intrusion Detection System
RJ-11 (Registered Jack)
Hybrid hub
WEP (Wired Equivalent Privacy)
36. Which one of the following is a purpose for subnetting?
128 bit addresses
100 Mbps (Megabits per second)
RDP/ Terminal Services
To decrease network congestion Answer: D
37. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet - although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem?
Internet Protocol
Password Authentication Protocol
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
ping
38. When one connection to a host fails in a full mesh network - it means...
All hosts can communicate.
Manages network applications
Networked Basic Input/Output System
larger subnet masks.
39. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
Central Processing unit
traceroute
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
A 2.4 GHz (Gigahertz) cordless telephone is in use.
40. What is L2TP? What is significant about this protocol?
Sys Log (Unix) or Event Manager (Windows)
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
100 Mbps (Megabits per second)
41. Web Server
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Quality of Service
Primary Rate Interface
Address Resolution Protocol. Has no error control.
42. BNC Means...
Bayonet-Neill-Concelman or British Naval Connector
WINS (Windows Internet Name Service)
ICMP (Internet Control Message Protocol)
443
43. On what Port is POP3?
Local Area Network
Multipurpose Internet Mail Extension
20 & 21
110
44. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from th
169.254.1.1
CSU / DSU (Channel Service Unit / Data Service Unit)
The analyzer is functioning properly.
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
45. An administrator changes the lease time of the DHCP (Dynamic Host Configuration Protocol) scope from one week to one day. What affect will this have on the end users?
A long length of antenna extension cable
The users will not be affected by the change.
Secure Shell
Two or more connected computers that can share resources
46. On what Port is RDP?
53
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
3389
The file has been opened by another user and is open for read only.
47. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation?
Point-to-Point Tunneling Protocol
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
rlogin
Switches - bridges - and NICs (Network Interface Card)
48. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
Periodically (randomly) blinking
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Verification
Network and Transport
49. What is on Port 8080?
The 'memo maker' that sends and receives paperless faxes over the network
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Proxy Server
Bayonet-Neill-Concelman or British Naval Connector
50. What is on Port 143?
Lightweight Directory Access Protocol
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
172.192.4.256
IMAP (Mail Client)