SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Client - protocol - and adapter
Intrusion Detection System
2. Which of the following connectors will be required for a RAS (Remote Access Service) server accepting four incoming dial-up connections to connect to the PSTN (Public Switched Telephone Network)?
Wireless Access Point
Internet Information Services
RJ-11 (Registered Jack)
raphical User Interface
3. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Dynamic Host Configuration Protocol
Check the connection from the WAP (Wireless Access Point) to the network
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
4. IPX Means...
VPN (Virtual Private Network)
Internetwork packet exchange
Remote Desktop Protocol
ICMP (Internet Control Message Protocol)
5. Physical Topology
Transmission Control Protocol/Internet Protocol
Network News Transfer Protocol
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
ifconfig
6. Which one of the following security protocols creates a secure connection over the Internet?
Hybrid hub
Multipurpose Internet Mail Extension
L2TP (Layer 2 Tunneling Protocol)
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
7. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Gateway
rp
Authentication
8. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT...
Reverse Address Resolution Protocol.
802.11a.
larger subnet masks.
Internet Information Services
9. WPA Means...
Firewall
53
Wireless Protected Access
8080
10. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
Peer-To-Peer and Client-Server
TFTP (Trivial File Transfer Protocol)
Wireless Access Point
ICMP (Internet Control Message Protocol)
11. BNC Means...
Lightweight Directory Access Protocol
Bayonet-Neill-Concelman or British Naval Connector
Open Source Path First - this is a routing protocol
Put a router between the two network segments
12. A small office network with ten computers uses a cable modem and router to connect to the Internet and distribute services to clients. After several weeks of use - the routers collision LED (Light Emitting Diode) has begun to stay on permanently. Wha
Wireless LAN
Transmission Control Protocol
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Internet Protocol Security. This is the defacto standard for VPN security.
13. What is NAT?
Network Address Translator
The analyzer is functioning properly.
10 GBASE-LR
Global Positioning System
14. A firewall can be used to prevent which of the following?
Transmission Control Protocol
PDC (Primary Domain Controller)
Packets from entering and leaving a network
Application
15. Each of the following wireless standards use a 2.4 GHz (Gigahertz) ISM (Industrial - Scientific - and Medical) band EXCEPT...
A. 18 -000 feet (5 -486.4 meters)
1000BASE-CX
53
802.11a.
16. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet Protocol) address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
550 meters (1 -804.46 feet)
rp
A network map showing exactly how data moves through the network.
Port Address Translator
17. What is QoS?
Physical
Primary Rate Interface
A network map showing exactly how data moves through the network.
Quality of Service
18. What is the minimum number of hard drives required to implement RAID 0 (Redundant Array of Independent Disks)?
Wireless LAN
2
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Internet Service Provider
19. PPTP Means...
53
3389
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
Point-to-Point Tunneling Protocol
20. This is not a valid IP (Internet Protocol) addresses
172.192.4.256
MAC (Media Access Control) address
Electromagnetic Interference
40 bit - 128 bit - 64 bit
21. SNMP Means...
CSU / DSU (Channel Service Unit / Data Service Unit)
Simple Network Management Protocol
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Public Switched Telephone Network
22. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
Packets from entering and leaving a network
48 bits.
Network and Transport
netstat
23. List the benefits of a bus topology
Easy to install - Inexpensive - Less actual cable required
172.192.4.256
1433
Point to Point Tunneling Protocol
24. Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures?
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
25
100 Mbps (Megabits per second)
Gateway
25. A valid MAC (Media Access Control) address is how many bytes long?
6
2.4 GHz (Gigahertz).
L2TP (Layer 2 Tunneling Protocol)
Two or more connected computers that can share resources
26. What is on Port 80?
SMB (Server Message Block)
HTTP
Presentation
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
27. What is on Port 3389?
100 Mbps (Megabits per second)
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
RDP/ Terminal Services
Port 161 is SNMP and Port 162 is the SNMP Manager
28. Name the seven most common physical topologies
Service Set Identifier
User Datagram Protocol. This protocol is connectionless and routable.
Two or more connected computers that can share resources
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
29. What is CHAP?
The device ID (Identification)
L2TP (Layer 2 Tunneling Protocol)
Network and Transport
Challenge Handshake Authentication Protocol
30. SMB Means...
Bluetooth enabled cell phones
Fully Qualified Domain Name
Server Message Block OR Small-to-Midsize Business
Presentation
31. Print Server
Address Resolution Protocol. Has no error control.
ICMP (Internet Control Message Protocol)
Manages printers on the network
All hosts can communicate.
32. Telephony Server
Open Source Path First - this is a routing protocol
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
Port 20 must also be unblocked.
Digital Subscriber Line
33. Which one of the following servers provides web caching services?
D. Switch and bridge
Proxy
143
Multipurpose Internet Mail Extension
34. BIOS Means...
Telnet
Reverse Address Resolution Protocol.
Basic Input/Output System
raphical User Interface
35. What is LEAP?
10 GBASE-LR
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Address Resolution Protocol. Has no error control.
PDC (Primary Domain Controller)
36. RIP Means...
Routing Information Protocol
802.1x
Wireless Fidelity
Telnet
37. A user would like to implement a secure ordering system on a web server. Which of the following protocols is installed?
802.11i
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Port 161 is SNMP and Port 162 is the SNMP Manager
SSL (Secure Sockets Layer)
38. A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators company policy is to reserve the highest IP (Intern
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
443
PDC (Primary Domain Controller)
192.168.96.254
39. What is TCP?
Transmission Control Protocol
Server Message Block OR Small-to-Midsize Business
Public Key Infrastructure
802.11b
40. Which one of the following devices connects a network segment to a public telephone network?
passing a username and password in plaintext.
CSU / DSU (Channel Service Unit / Data Service Unit)
Routing Information Protocol
Simple Network Management Protocol
41. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
The file has been opened by another user and is open for read only.
Dynamic Host Configuration Protocol
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
42. DC means...
Manages network applications
Network News Transfer Protocol
Direct Current
SMB (Server Message Block)
43. What is OSPF?
rlogin
Fully Qualified Domain Name
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Open Source Path First - this is a routing protocol
44. Which UNIX service provides interoperability with Windows file and print sharing?
SMB (Server Message Block)
Public Key Infrastructure
SQL Server
rp
45. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
There will be no Internet access.
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
RJ-11 (Registered Jack)
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
46. Six workstations that are numbered 1-6 are installed sequentially in a physical ring topology. Workstation 1 fails. How can the network administrator remove Workstation 1 for service without moving the other workstations?
Dynamic Host Configuration Protocol
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
This IP (Internet Protocol) address cannot be pinged remotely.
Connect Workstation 6 and Workstation 2 using a barrel connector
47. What is on Port 389?
Provides remote users with access to the network through modems and an IP connection
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Password Authentication Protocol
48. Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire?
SUN RPC
PPP (Point-to-Point Protocol)
Stores and dispenses files
User Datagram Protocol
49. What is DHCP? What is its key attribute?
the NIC (Network Interface Card) is bad.
1000BASE-LX and10 GBASE-LR
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Select the most probable cause
50. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
Internet mail access protocol
TCP / IP (Transmission Control Protocol / Internet Protocol)
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Networked Basic Input/Output System