SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is RARP?
Reverse Address Resolution Protocol.
TFTP (Trivial File Transfer Protocol)
Forward the packets to all ports except the one that originated the request
10 GBASE-LR
2. A valid MAC (Media Access Control) address is how many bytes long?
72.16.16.1
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Domain Name Service OR Domain Name Server
6
3. On what Port is SNMP?
SSH
CSU / DSU (Channel Service Unit / Data Service Unit)
MAC (Media Access Control) address
161 & 162
4. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
netstat
169.254.1.1
Integrated Services digital Network
Gateway
5. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
Internet Protocol Security. This is the defacto standard for VPN security.
In a locked room in an offsite location
Manages printers on the network
Select the most probable cause
6. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
550 meters (1 -804.46 feet)
1000BASE-CX
Presentation
Metropolitan Area Network
7. Which one of the following servers provides web caching services?
Point-to-Point Tunneling Protocol
Manages network applications
Public Switched Telephone Network
Proxy
8. HTML means...
Verification
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
Hypertext Markup Language
Electromagnetic Interference
9. What is on Port 110?
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
These are the FTP ports. Port 20 handles data and Port 21 provides control.
POP3
135-139
10. A client workstation can authenticate user names and passwords to which type of server?
Application
PDC (Primary Domain Controller)
128 bit addresses
2.4 GHz (Gigahertz).
11. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Peer-To-Peer and Client-Server
A. 18 -000 feet (5 -486.4 meters)
Internet connection
12. While reviewing network traffic statistics - technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
Multiple Link Interface
Select the most probable cause
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
13. NTP means...
Public Switched Telephone Network
Network Time Protocol
514
Exterior Gateway Protocol
14. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
Internet Control Message Protocol
10 GBASE-LR
Network Interface Card
Remote Desktop Protocol
15. ACL means...
Access Control List
Post Office Protocol 3
Router
Wireless Fidelity
16. What are the two main network types?
Client - protocol - and adapter
Internet Control Message Protocol
Intrusion Detection System
Peer-To-Peer and Client-Server
17. A company wants to have an intranet. Where would the intranet web server be located in the network?
Fully Qualified Domain Name
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
143
In the LAN (Local Area Network)
18. Which of the following options allows for secure communication over the Internet?
MT-RJ (Mechanical Transfer-Registered Jack)
VPN (Virtual Private Network)
POP3
128 bit addresses
19. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
ICMP (Internet Control Message Protocol)
Point to Point Tunneling Protocol
69
Institute of Electrical and Electronics Engineers
20. TCP means...
Network News Transfer Protocol
Basic Rate Interface
802.11a.
Transmission Control Protocol
21. DNS means...
Hypertext transfer protocol over secure sockets layer.
Put a router between the two network segments
Domain Name Service OR Domain Name Server
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
22. What is Unicast?
WEP (Wired Equivalent Privacy)
69
encapsulating the data payload.
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
23. DHCP means...
Application
Dynamic Host Configuration Protocol
Domain Name Service OR Domain Name Server
An old microwave oven is being used in the break room which causes interference with the access point.
24. Wi-Fi Means...
Wireless Fidelity
cold site.
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
53
25. An Ethernet MAC (Media Access Control) address consists of...
192.168.96.254
Transmission Control Protocol
It is an address assigned to a NIC (Network Interface Card).
48 bits.
26. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets?
Connect Workstation 6 and Workstation 2 using a barrel connector
Network Address Translation
Manages network applications
netstat
27. IMAP Means...
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Internet mail access protocol
Open Source Path First - this is a routing protocol
53
28. A small office network with ten computers uses a cable modem and router to connect to the Internet and distribute services to clients. After several weeks of use - the routers collision LED (Light Emitting Diode) has begun to stay on permanently. Wha
IMAP (Mail Client)
Metropolitan Area Network
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
100 Mbps (Megabits per second)
29. What is IPSEC? Why is it significant?
Internet Service Provider
The users will not be affected by the change.
Internet Protocol Security. This is the defacto standard for VPN security.
Gateway
30. A network administrator is troubleshooting a wireless LAN (Local Area Network) that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs (Wireless Access Point) from different companies within rang
802.11i
22
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
10 GBASE-LR
31. Client-Server Networks
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
The amber light is flashing occasionally and the green light is lit steadily.
Network Address Translator
Client - protocol - and adapter
32. 802.11 security is defined in...
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
802.11i
WEP (Wired Equivalent Privacy)
cold site.
33. On what Port is POP3?
110
389
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
SSH
34. What is UDP? What are some of its attributes?
Internet Protocol
User Datagram Protocol. This protocol is connectionless and routable.
1
ifconfig
35. Host
IMAP (Mail Client)
Fully Qualified Domain Name
Port 161 is SNMP and Port 162 is the SNMP Manager
Any network device with an IP address
36. Telephony Server
Wireless Access Point
Forward the packets to all ports except the one that originated the request
Verification
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
37. IDS means...
Network Address Translation
New Technology File System
Intrusion Detection System
172.192.4.256
38. TCP/IP Means;
Transmission Control Protocol/Internet Protocol
Hypertext transfer protocol over secure sockets layer.
TFTP (Trivial File Transfer Protocol)
Wireless LAN
39. FTP Means
Internet Information Services
802.11
Forward the packets to all ports except the one that originated the request
File Transfer Protocol
40. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Presentation
Application
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Multipurpose Internet Mail Extension
41. Which protocol is the fastest file transfer protocol?
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
MT-RJ (Mechanical Transfer-Registered Jack)
CSU / DSU (Channel Service Unit / Data Service Unit)
TFTP (Trivial File Transfer Protocol)
42. At which layer of the OSI (Open Systems Interconnect) model does UDP (User Datagram Protocol) reside?
Transport
Network Time Protocol
T1 (T-Carrier Level 1).
Hybrid hub
43. What is PAP?
Password Authentication Protocol
Wired Equivalent Privacy
Firewall
All hosts can communicate.
44. NetBIOS Means...
Networked Basic Input/Output System
Authentication
Alternating Current
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
45. A network administrator implements four VLANs (Virtual Local Area Network) on a switch. Which device will be required to pass traffic among the VLANs (Virtual Local Area Network)?
20 & 21
Router
2
A 2.4 GHz (Gigahertz) cordless telephone is in use.
46. NAC means...
Network Access Control
ping
Sys Log (Unix) or Event Manager (Windows)
192.168.96.254
47. In which OSI (Open Systems Interconnect) layer does a bridge operate?
Transport
SMTP Server
Data Link
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
48. On what Port is IMAP?
143
SMB (Server Message Block)
Asynchronous Transfer Mode
Bluetooth enabled cell phones
49. Given the output: 1.pgw (129.6.80.254) * 4ms 3ms 2.129.6.1.245 (129.6.1.245) 4ms 3ms * 3.129.6.2.252 (129.6.2.252) 5ms 5ms 4ms Which of the following commands causes the results above?
traceroute
Institute of Electrical and Electronics Engineers
Networked Basic Input/Output System
An exact duplicate of the infrastructure is mirrored offsite.
50. Disk mirroring is also known as RAID ___...
Lightweight Directory Access Protocol
Multipurpose Internet Mail Extension
1
As a way to share resources and information