SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A firewall can be used to prevent which of the following?
Packets from entering and leaving a network
550 meters (1 -804.46 feet)
Forward the packets to all ports except the one that originated the request
80
2. SSID Means...
Handles e-mail functions
802.11b
Global System for Mobile Communications
Service Set Identifier
3. Wi-Fi Means...
Wireless Fidelity
3389
Network File System
MAC (Media Access Control) address
4. What is on Port 80?
HTTP
As a way to share resources and information
Quality of Service
Reverse Address Resolution Protocol.
5. DOS means...
Disk Operating System or Denial of Service
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Wireless Access Point
Wireless Fidelity
6. PPP Means...
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Point-to-Point Protocol
1000BASE-LX and10 GBASE-LR
NetBios
7. CPU means...
RJ-11 (Registered Jack)
CSU / DSU (Channel Service Unit / Data Service Unit)
Central Processing unit
Dynamic Host Configuration Protocol
8. Remote Access Server
Secure Sockets Layer
Provides remote users with access to the network through modems and an IP connection
New Technology File System
Industry Standards Organization
9. LED Means...
Light Emitting Diode
Wireless LAN
Application
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
10. On what Port is NetBios?
Gateway
111
135-139
Internetwork Packet Exchange/Sequenced Packet Exchange
11. What are the two main network types?
cold site.
Peer-To-Peer and Client-Server
In the LAN (Local Area Network)
RJ-11 (Registered Jack)
12. Which one of the following security protocols creates a secure connection over the Internet?
Lightweight Directory Access Protocol
RJ-11 (Registered Jack)
Proxy Server
L2TP (Layer 2 Tunneling Protocol)
13. A company wants to have an intranet. Where would the intranet web server be located in the network?
In the LAN (Local Area Network)
Asynchronous Transfer Mode
Select the most probable cause
Application
14. What is BGMP?
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
389
53
15. ATM Means...
Two or more connected computers that can share resources
Asynchronous Transfer Mode
In the LAN (Local Area Network)
Internet Protocol Security
16. IMAP Means...
1000BASE-CX
Hypertext transfer protocol
Internet mail access protocol
RJ-11 (Registered Jack)
17. Around noon - 802.11b wireless users near the break room have intermittent - random connections. What is the problem?
Post Office Protocol
File Transfer Protocol
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
An old microwave oven is being used in the break room which causes interference with the access point.
18. Which UNIX service provides interoperability with Windows file and print sharing?
TFTP (Trivial File Transfer Protocol)
SMB (Server Message Block)
Forward the packets to all ports except the one that originated the request
An eight-position connector which uses UTP (Unshielded Twisted Pair).
19. Workstations
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. Which one of the following devices connects a network segment to a public telephone network?
Disk Operating System or Denial of Service
BootP (Boot Protocol)
Industry Standards Organization
CSU / DSU (Channel Service Unit / Data Service Unit)
21. DC means...
Direct Current
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
The Internet router is blocking port 25.
Transmission Control Protocol/Internet Protocol
22. What is on Port 514?
Internet Protocol Security
Primary Rate Interface
Sys Log (Unix) or Event Manager (Windows)
172.192.4.256
23. What is OSPF?
Hypertext Markup Language
Fully Qualified Domain Name
Open Source Path First - this is a routing protocol
1000BASE-LX and10 GBASE-LR
24. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
72.16.16.1
10 GBASE-LR
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Packets from entering and leaving a network
25. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
CSU / DSU (Channel Service Unit / Data Service Unit)
Multiple Link Interface
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
DNS (Domain Name Service) server settings
26. IEEE means...
Institute of Electrical and Electronics Engineers
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Internet mail access protocol
Plain Old Telephone Service
27. What is LEAP?
1000BASE-LX and10 GBASE-LR
48 bits.
Time domain reflectometer
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
28. Which command will produce the following output? ethoLink encap : Ethernet HWaddr: 00:80:C8:D6:74:43 inet adder : 4.150.6.3 Bcast : 4.255.255.255 Mask: 255.0.0.0
25
ifconfig
Networked Basic Input/Output System
raphical User Interface
29. HTML means...
WEP (Wired Equivalent Privacy)
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
20 & 21
Hypertext Markup Language
30. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. FDDI (Fiber Distributed Data Interface) operates at what speed?
SSH
100 Mbps (Megabits per second)
MultiProtocol Label Switching
Application
32. A technician just installed a new NIC (Network Interface Card) in a computer and attached a cable to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioning correctly and the network is up - which of the following will
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Internet Protocol Security
An eight-position connector which uses UTP (Unshielded Twisted Pair).
The amber light is flashing occasionally and the green light is lit steadily.
33. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
Network Time Protocol
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Wireless LAN
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
34. Given the following output - which utility was used? Default Server: bigserver.datacenter.com Address: 4.12.18.1
nslookup
Authentication
Service Set Identifier
192.168.96.254
35. TCP/IP Means;
Network File System
Port Address Translator
Transmission Control Protocol/Internet Protocol
cold site.
36. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation?
TCP / IP (Transmission Control Protocol / Internet Protocol)
rlogin
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
2.4 GHz (Gigahertz).
37. Which protocol is the fastest file transfer protocol?
DNS
Authentication
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
TFTP (Trivial File Transfer Protocol)
38. A Windows 2000 work station has a TCP / IP (Transmission Control Protocol / Internet Protocol) address of 169.254.12.1. Which statement describes the state of the computers TCP / IP (Transmission Control Protocol / Internet Protocol) configuration?
Internet Protocol Security. This is the defacto standard for VPN security.
Wireless LAN
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Integrated Services digital Network
39. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
2.4 GHz (Gigahertz).
802.1x
CSU / DSU (Channel Service Unit / Data Service Unit)
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
40. Which protocol is used for error reporting in concert with the IP protocol?
Multipurpose Internet Mail Extension
ICMP (Internet Control Message Protocol)
Transmission Control Protocol
53
41. Which one of the following servers provides web caching services?
3.1
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Proxy
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
42. A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this?
Metropolitan Area Network
Forward the packets to all ports except the one that originated the request
They are connected to a switch when trying to capture packets.
To decrease network congestion Answer: D
43. Which of the following choices describes an RJ-45 (Registered Jack) connector?
Network Access Control
3389
Internet mail access protocol
An eight-position connector which uses UTP (Unshielded Twisted Pair).
44. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established?
Media Access Control
169.254.1.1
25
Internetwork packet exchange
45. An employee needs to access the internal secure company web site from a hotel. The employee will need which of the following connections?
Internet connection
Connect Workstation 6 and Workstation 2 using a barrel connector
1433
100 Mbps (Megabits per second)
46. On what Port is IMAP?
Initial installation cost may be higher - One central single point of failure (the hub or other device)
143
Networked Basic Input/Output System Extended User Interface
Proxy Server
47. Client-Server Networks
Simple Network Management Protocol
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
SMTP Server
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
48. Mail Server
Network Interface Card
Multiple Link Interface
SMB (Server Message Block)
Handles e-mail functions
49. HTTPS means...
Stores and dispenses files
Hypertext transfer protocol over secure sockets layer.
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
50. WINS Means...
Windows Internet Name Service
3389
192.168.96.254
Challenge Handshake Authentication Protocol