SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WEP Means...
Application
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
rp
Wired Equivalent Privacy
2. Which of the following methods transfers files with the use of a UDP (User Datagram Protocol)?
TFTP (Trivial File Transfer Protocol)
Internet Protocol
The analyzer is functioning properly.
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
3. When one connection to a host fails in a full mesh network - it means...
Internet mail access protocol
550 meters (1 -804.46 feet)
All hosts can communicate.
TFTP (Trivial File Transfer Protocol)
4. ICMP means...
10 GBASE-LR
Authentication
VPN (Virtual Private Network)
Internet Control Message Protocol
5. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Presentation
10 GBASE-LR
Institute of Electrical and Electronics Engineers
To decrease network congestion Answer: D
6. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
Extranet
802.1x
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
7. DOS means...
20 & 21
Disk Operating System or Denial of Service
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
8. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation?
Internetwork Packet Exchange/Sequenced Packet Exchange
rlogin
netstat and ping
Telnet
9. A workstation with a static IP (Internet Protocol) address can print and authenticate to a server - but cannot browse to www.comptia.org. What is the FIRST item to troubleshoot?
rp
traceroute
Simple Network Management Protocol
DNS (Domain Name Service) server settings
10. IMAP Means...
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
100 Mbps (Megabits per second)
Internet mail access protocol
Bayonet-Neill-Concelman or British Naval Connector
11. In which OSI (Open Systems Interconnect) layer does a bridge operate?
Easy to install - Inexpensive - Less actual cable required
Select the most probable cause
bytes 1-3
Data Link
12. On what Port is HTTPS/ SSL?
Post Office Protocol
Domain Name Service OR Domain Name Server
443
1433
13. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
T1 (T-Carrier Level 1).
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
14. On what Port is the Proxy Server?
Post Office Protocol
Manages network applications
8080
Basic Rate Interface
15. PSTN Means...
Public Switched Telephone Network
6
Plain Old Telephone Service
1
16. IEEE means...
VPN (Virtual Private Network)
Institute of Electrical and Electronics Engineers
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Internet Information Services
17. Disk mirroring is also known as RAID ___...
Internet Protocol
1
169.254.1.1
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
18. Which of the following choices describes an RJ-45 (Registered Jack) connector?
Select the most probable cause
RJ-11 (Registered Jack)
ping
An eight-position connector which uses UTP (Unshielded Twisted Pair).
19. POP Means...
514
Challenge Handshake Authentication Protocol
Post Office Protocol
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
20. TCP/IP Means;
53
Transmission Control Protocol/Internet Protocol
Networked Basic Input/Output System Extended User Interface
Network Access Control
21. What is on Port 53?
DNS
20 & 21
Implement VLANs (Virtual Local Area Network)
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
22. Describe a star topology
An old microwave oven is being used in the break room which causes interference with the access point.
10 GBASE-LR
passing a username and password in plaintext.
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
23. Which of the following are classified as Layer 2 devices?
Two or more connected computers that can share resources
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Point-to-Point Protocol
Switches - bridges - and NICs (Network Interface Card)
24. All of the following are true statements about private IP (Internet Protocol) addressing EXCEPT...
172.192.4.256
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
Token passing
Proxy
25. What is Unicast?
Application
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
26. A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators company policy is to reserve the highest IP (Intern
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Telnet
72.16.16.1
192.168.96.254
27. 802.11 security is defined in...
802.11i
L2TP (Layer 2 Tunneling Protocol)
Internet Protocol Security. This is the defacto standard for VPN security.
3.1
28. SSID Means...
They are connected to a switch when trying to capture packets.
PPTP (Point-to-Point Tunneling Protocol)
Plain Old Telephone Service
Service Set Identifier
29. ISO Means...
Industry Standards Organization
TCP / IP (Transmission Control Protocol / Internet Protocol)
SSL (Secure Sockets Layer)
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
30. What is ARP? What are some of its attributes?
Quality of Service
Address Resolution Protocol. Has no error control.
Public Key Infrastructure
MultiProtocol Label Switching
31. A new intranet web server has been installed for a company. The clients access the intranet server by its DNS (Domain Name Service) name. To automatically change the clients to connect to the new server - an administrator modifies the DNS (Domain Nam
Point-to-Point Tunneling Protocol
Exterior Gateway Protocol
WINS (Windows Internet Name Service)
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
32. On what Port is NetBios?
WINS (Windows Internet Name Service)
Point-to-Point Tunneling Protocol
135-139
Any device on the network that can ask for access to resources
33. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
A. 18 -000 feet (5 -486.4 meters)
SUN RPC
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Proxy Server
34. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
Application
They are connected to a switch when trying to capture packets.
35. NetBIOS Means...
Provides remote users with access to the network through modems and an IP connection
Media Access Control
192.168.96.254
Networked Basic Input/Output System
36. Fax Server
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. Which physical topology is used by a 10BASE2 network?
An old microwave oven is being used in the break room which causes interference with the access point.
Bus
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
traceroute
38. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
100BASE-FX Answer: D
69
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Institute of Electrical and Electronics Engineers
39. MPLS
MultiProtocol Label Switching
Simple Network Management Protocol
Secure Sockets Layer
Global System for Mobile Communications
40. Name the seven most common physical topologies
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
TFTP (Trivial File Transfer Protocol)
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
41. Which protocol is used for error reporting in concert with the IP protocol?
Transport
RJ-11 (Registered Jack)
traceroute
ICMP (Internet Control Message Protocol)
42. GSM means...
2.4 GHz (Gigahertz).
Global System for Mobile Communications
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Port 20 must also be unblocked.
43. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
Uniform Resource Locator
550 meters (1 -804.46 feet)
These are the FTP ports. Port 20 handles data and Port 21 provides control.
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
44. Print Server
Alternating Current
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Manages printers on the network
RJ-11 (Registered Jack)
45. Which of the following options allows for secure communication over the Internet?
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
VPN (Virtual Private Network)
NFS (Network File System)
PPTP (Point-to-Point Tunneling Protocol)
46. Servers
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
Address Resolution Protocol. Has no error control.
ICMP (Internet Control Message Protocol)
Network and Transport
Wireless LAN
48. MLI Means...
nslookup
Routing Information Protocol
Multiple Link Interface
netstat
49. List the drawbacks of a ring topology
Implement VLANs (Virtual Local Area Network)
ifconfig
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Network Interface Card
50. DC means...
Direct Current
Port 20 must also be unblocked.
IMAP (Mail Client)
Token passing