SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which media access method is used for an IEEE (Institute of Electrical and Electronics Engineers) 802.5 network?
Handles e-mail functions
Networked Basic Input/Output System
22
Token passing
2. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
10 GBASE-LR
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Hypertext Markup Language
Select the most probable cause
3. PKI means...
WEP (Wired Equivalent Privacy)
netstat
Public Key Infrastructure
Asynchronous Transfer Mode
4. What is on Port 1433?
53
SQL Server
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
5. SSID Means...
Service Set Identifier
Network Address Translation
110
A. 18 -000 feet (5 -486.4 meters)
6. Each of the following wireless standards use a 2.4 GHz (Gigahertz) ISM (Industrial - Scientific - and Medical) band EXCEPT...
TFTP (Trivial File Transfer Protocol)
802.11a.
Public Key Infrastructure
Internet Protocol Security. This is the defacto standard for VPN security.
7. Which one of the following communication protocols does a UNIX system primarily rely on?
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
TCP / IP (Transmission Control Protocol / Internet Protocol)
An exact duplicate of the infrastructure is mirrored offsite.
Stores and dispenses files
8. Network
Wireless LAN
Two or more connected computers that can share resources
A long length of antenna extension cable
Address Resolution Protocol. Has no error control.
9. What is on Port 143?
3389
IMAP (Mail Client)
Any network device with an IP address
SQL Server
10. WLAN Means...
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
VPN (Virtual Private Network)
Wireless LAN
To decrease network congestion Answer: D
11. Which fiber connector looks similar to an RJ-45 (Registered Jack) connector and connects two strands of fiber?
2.4 GHz (Gigahertz).
MT-RJ (Mechanical Transfer-Registered Jack)
The Internet router is blocking port 25.
25
12. What is on Port 80?
HTTP
Global Positioning System
Any network device with an IP address
Media Access Control
13. Proxy Server
Port 20 must also be unblocked.
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Access Control List
Handles tasks in the place of other machines on the network
14. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
Uniform Resource Locator
389
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Check the connection from the WAP (Wireless Access Point) to the network
15. Application Server
Point to Point Tunneling Protocol
Manages network applications
Point-to-Point Tunneling Protocol
802.11a.
16. Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures?
Internet Protocol
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Gateway
Networked Basic Input/Output System
17. ISDN means...
Hybrid hub
Integrated Services digital Network
Time domain reflectometer
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
18. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)?
Network Address Translation
Intrusion Detection System
802.11
Extranet
19. What is OSPF?
Open Source Path First - this is a routing protocol
CSU / DSU (Channel Service Unit / Data Service Unit)
SSL (Secure Sockets Layer)
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
20. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
CSU / DSU (Channel Service Unit / Data Service Unit)
2.4 GHz (Gigahertz).
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Switches - bridges - and NICs (Network Interface Card)
21. Which of the following methods transfers files with the use of a UDP (User Datagram Protocol)?
Uniform Resource Locator
TFTP (Trivial File Transfer Protocol)
Alternating Current
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
22. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer?
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
MAC (Media Access Control) address
ICMP (Internet Control Message Protocol)
Network News Transfer Protocol
23. What is on Ports 135-139?
An exact duplicate of the infrastructure is mirrored offsite.
TFTP (Trivial File Transfer Protocol)
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
NetBios
24. A network has grown to include seventy 24 port Ethernet switches and has decreased in performance steadily as new switches are added. What adjustments can be made to the infrastructure to improve the performance?
A. 18 -000 feet (5 -486.4 meters)
Implement VLANs (Virtual Local Area Network)
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Digital Subscriber Line
25. What is PAT?
Port Address Translator
Stores and dispenses files
Access Control List
Remote Desktop Protocol
26. HTTPS means...
Hypertext transfer protocol over secure sockets layer.
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Proxy Server
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
27. PPP Means...
Implement VLANs (Virtual Local Area Network)
Application
Point-to-Point Protocol
Global System for Mobile Communications
28. On what Port is POP3?
10 GBASE-LR
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
110
192.168.96.254
29. On what Port is the Proxy Server?
Reverse Address Resolution Protocol.
8080
NetBios
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
30. MLI Means...
SSL (Secure Sockets Layer)
Multiple Link Interface
Central Processing unit
MAC (Media Access Control) address
31. RDP means...
TFTP (Trivial File Transfer Protocol)
Access Control List
Remote Desktop Protocol
rlogin
32. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets?
Transport
Transmission Control Protocol
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
netstat
33. SSH Means...
Secure Shell
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Data Link
Intrusion Detection System
34. FQDN means...
Wireless LAN
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Fully Qualified Domain Name
TFTP (Trivial File Transfer Protocol)
35. WEP Means...
Point-to-Point Protocol
Verification
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Wired Equivalent Privacy
36. Six workstations that are numbered 1-6 are installed sequentially in a physical ring topology. Workstation 1 fails. How can the network administrator remove Workstation 1 for service without moving the other workstations?
Network Interface Card
Connect Workstation 6 and Workstation 2 using a barrel connector
111
Industry Standards Organization
37. What functionality does Kerberos provide?
Hypertext Markup Language
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
Wireless Access Point
Authentication
38. A network administrator implements four VLANs (Virtual Local Area Network) on a switch. Which device will be required to pass traffic among the VLANs (Virtual Local Area Network)?
Challenge Handshake Authentication Protocol
8080
Router
SMTP Server
39. List the drawbacks of a star topology
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Connect Workstation 6 and Workstation 2 using a barrel connector
A 2.4 GHz (Gigahertz) cordless telephone is in use.
40. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
Light Emitting Diode
encapsulating the data payload.
Internet Service Provider
TCP / IP (Transmission Control Protocol / Internet Protocol)
41. List the drawbacks of a ring topology
Lightweight Directory Access Protocol
Access Control List
Stores and dispenses files
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
42. HTML means...
Hypertext Markup Language
User Datagram Protocol
Uniform Resource Locator
WINS (Windows Internet Name Service)
43. GPS means...
Global Positioning System
Basic Rate Interface
Internet Control Message Protocol
ping
44. On what Port is NetBios?
135-139
23
Wired Equivalent Privacy
Point to Point Protocol
45. ISO Means...
ICMP (Internet Control Message Protocol)
Industry Standards Organization
Peer-To-Peer and Client-Server
110
46. What part of an Ethernet MAC (Media Access Control) address designates the manufacturer of the NIC (Network Interface Card)?
All hosts can communicate.
20 & 21
bytes 1-3
Exterior Gateway Protocol
47. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics Engineers) 802.11b access point?
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Trivial File Transfer Protocol
netstat
Bluetooth enabled cell phones
48. BNC Means...
Bayonet-Neill-Concelman or British Naval Connector
Point-to-Point Tunneling Protocol
Network and Transport
Wired Equivalent Privacy
49. What is LEAP?
TFTP (Trivial File Transfer Protocol)
POP3
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
NetBios
50. What is DHCP? What is its key attribute?
HTTPS/ SSL
802.11i
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.