SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire?
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
T1 (T-Carrier Level 1).
PPP (Point-to-Point Protocol)
Networked Basic Input/Output System
2. Which one of the following provides a fault-tolerant storage system containing five disks and a single controller that will function if a single disk fails?
Firewall
Secure Sockets Layer
A striped set array with parity
Network and Transport
3. LAN Means...
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
SMB (Server Message Block)
Local Area Network
4. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
netstat and ping
Metropolitan Area Network
A network map showing exactly how data moves through the network.
Internet Protocol
5. EMI means...
135-139
Routing Internet Protocol
A striped set array with parity
Electromagnetic Interference
6. What is on Port 22?
Secure Shell
Intrusion Detection System
SSH
Challenge Handshake Authentication Protocol
7. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per second)?
Any device on the network that can ask for access to resources
Manages printers on the network
802.11b
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
8. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
gateway.
PPP (Point-to-Point Protocol)
Verification
2
9. FQDN means...
L2TP (Layer 2 Tunneling Protocol)
Internetwork packet exchange
Fully Qualified Domain Name
the NIC (Network Interface Card) is bad.
10. Describe a star topology
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
CSU / DSU (Channel Service Unit / Data Service Unit)
NetBios
T1 (T-Carrier Level 1).
11. A valid MAC (Media Access Control) address is how many bytes long?
Two or more connected computers that can share resources
Network Access Control
WEP (Wired Equivalent Privacy)
6
12. On what Port is the SMTP Server?
Lightweight Directory Access Protocol
25
NFS (Network File System)
Proxy Server
13. How are physical and logical topologies different?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. What is CHAP?
It is an address assigned to a NIC (Network Interface Card).
2
Challenge Handshake Authentication Protocol
Routing Information Protocol
15. A star network that uses several cable types must use which hub type in order to accommodate all client machines?
In the LAN (Local Area Network)
Transmission Control Protocol
Hybrid hub
Router
16. WLAN Means...
23
Wireless LAN
Provides remote users with access to the network through modems and an IP connection
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
17. A client workstation can authenticate user names and passwords to which type of server?
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Implement VLANs (Virtual Local Area Network)
There will be no Internet access.
PDC (Primary Domain Controller)
18. What is on Port 389?
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
389
The users will not be affected by the change.
Dynamic Host Configuration Protocol
19. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses
DNS (Domain Name Service) server settings
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
1000BASE-LX and10 GBASE-LR
A. 18 -000 feet (5 -486.4 meters)
20. SSL Means...
The 'memo maker' that sends and receives paperless faxes over the network
Internet Protocol
Secure Sockets Layer
Hypertext transfer protocol
21. MPLS
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Wireless Access Point
Post Office Protocol
MultiProtocol Label Switching
22. WPA Means...
Authentication
Wireless Protected Access
A striped set array with parity
Any network device with an IP address
23. NetBEUI Means...
Global System for Mobile Communications
Networked Basic Input/Output System Extended User Interface
Transmission Control Protocol
WINS (Windows Internet Name Service)
24. A user complains that they can no longer access resources on the network. The user is unable to ping other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet. What is the problem?
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
SMTP Server
The analyzer is functioning properly.
Quality of Service
25. Telephony Server
Hypertext transfer protocol
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
26. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for
Point to Point Protocol
Metropolitan Area Network
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
27. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
72.16.16.1
Media Access Control
Proxy server
larger subnet masks.
28. What is on Port 25?
netstat
1000BASE-CX
SMTP Server
Global Positioning System
29. What is IPSEC? Why is it significant?
1433
Internet Protocol Security. This is the defacto standard for VPN security.
Bus
traceroute
30. What is LEAP?
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Router
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
31. Servers
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. What functionality does Kerberos provide?
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Network Address Translation
SQL Server
Authentication
33. Given the following output - which utility was used? Default Server: bigserver.datacenter.com Address: 4.12.18.1
48 bits.
nslookup
135-139
Wired Equivalent Privacy
34. List the drawbacks of a ring topology
ICMP (Internet Control Message Protocol)
Client - protocol - and adapter
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
cold site.
35. What is on Port 110?
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
POP3
Token passing
SUN RPC
36. On what Port is SQL Server?
Switches - bridges - and NICs (Network Interface Card)
1433
SQL Server
SMB (Server Message Block)
37. What is on Port 69?
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
TFTP (Trivial File Transfer Protocol)
40 bit - 128 bit - 64 bit
10 GBASE-LR
38. What is Broadcast Transmission?
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Internet Protocol Security. This is the defacto standard for VPN security.
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
39. GSM means...
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Global System for Mobile Communications
SSL (Secure Sockets Layer)
Industry Standards Organization
40. TDR means...
Time domain reflectometer
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
They are connected to a switch when trying to capture packets.
The amber light is flashing occasionally and the green light is lit steadily.
41. What is NAT?
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Internet Protocol
3389
Network Address Translator
42. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Presentation
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
RDP/ Terminal Services
Point-to-Point Tunneling Protocol
43. On what Port is Telnet?
23
Asynchronous Transfer Mode
File Transfer Protocol
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
44. DNS means...
Local Area Network
Domain Name Service OR Domain Name Server
PPTP (Point-to-Point Tunneling Protocol)
Data Link
45. HTTP Means...
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
A. 18 -000 feet (5 -486.4 meters)
69
Hypertext transfer protocol
46. TCP means...
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Media Access Control
Transmission Control Protocol
CSU / DSU (Channel Service Unit / Data Service Unit)
47. On what Port is SUN RPC?
111
Disk Operating System or Denial of Service
File Transfer Protocol
Switches - bridges - and NICs (Network Interface Card)
48. The Spanning-Tree Protocol allows for redundancy of what networking device?
Bridge
MT-RJ (Mechanical Transfer-Registered Jack)
Authentication
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
49. In a fully Meshed network - every node has a connection to every other node - 7+6+5+4+3+2+1=28 Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
Secure Shell
All workstations except Workstation 3 can communicate to each other.
CSU / DSU (Channel Service Unit / Data Service Unit)
In a locked room in an offsite location
50. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
MT-RJ (Mechanical Transfer-Registered Jack)
Wireless LAN
802.11b
An exact duplicate of the infrastructure is mirrored offsite.