SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
encapsulating the data payload.
Check the connection from the WAP (Wireless Access Point) to the network
Access Control List
Network Access Control
2. The Spanning-Tree Protocol allows for redundancy of what networking device?
100 Mbps (Megabits per second)
Bridge
1000BASE-LX and10 GBASE-LR
Check the connection from the WAP (Wireless Access Point) to the network
3. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain Name Service) for security reasons. Users have lost the ability to access remote network shares named ournetworkshares and ourprivateshares. How can this be resolve
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
The 'memo maker' that sends and receives paperless faxes over the network
4. Given the MAC address 00:B0:D0:5A:E1:B5 - what does 5A:E1:B5 identify?
The device ID (Identification)
Internetwork Packet Exchange/Sequenced Packet Exchange
Routing Internet Protocol
IMAP (Mail Client)
5. Physical Topology
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
IMAP (Mail Client)
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
110
6. What is OSPF?
Any network device with an IP address
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
802.11a.
Open Source Path First - this is a routing protocol
7. What is Unicast?
Handles e-mail functions
Internet Protocol Security
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
SMB (Server Message Block)
8. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
Local Area Network
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
There will be no Internet access.
The analyzer is functioning properly.
9. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
rp
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
6
Point-to-Point Protocol
10. PRI Means...
Lightweight Directory Access Protocol
Two or more connected computers that can share resources
Primary Rate Interface
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
11. Examples of valid WEP (Wired Equivalent Privacy) key lengths
40 bit - 128 bit - 64 bit
Networked Basic Input/Output System Extended User Interface
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
netstat and ping
12. What is on Port 80?
To decrease network congestion Answer: D
HTTP
BootP (Boot Protocol)
40 bit - 128 bit - 64 bit
13. To increase the number of available IP (Internet Protocol) addresses - IPv6 (Internet Protocol version 6) uses which one of the following options?
169.254.1.1
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Physical
128 bit addresses
14. URL Means...
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Uniform Resource Locator
Wireless LAN
VPN (Virtual Private Network)
15. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)?
L2TP (Layer 2 Tunneling Protocol)
Any network device with an IP address
cold site.
802.11
16. ISO Means...
Any network device with an IP address
An old microwave oven is being used in the break room which causes interference with the access point.
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Industry Standards Organization
17. Which one of the following is true concerning bridges and their forwarding decisions?
Application
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Easy to install - Inexpensive - Less actual cable required
802.2
18. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
80
Easy to install - Inexpensive - Less actual cable required
Verification
25
19. Fault Tolerance
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
The Internet router is blocking port 25.
111
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
20. BNC Means...
Bayonet-Neill-Concelman or British Naval Connector
Networked Basic Input/Output System Extended User Interface
Transmission Control Protocol
These are the FTP ports. Port 20 handles data and Port 21 provides control.
21. DNS means...
Physical
Domain Name Service OR Domain Name Server
Point-to-Point Protocol
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
22. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
PPP (Point-to-Point Protocol)
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
10
Institute of Electrical and Electronics Engineers
23. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
Bus
Network Time Protocol
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
6
24. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has a longer maximum distance than 100 meters (328 feet)?
Direct Current
PPP (Point-to-Point Protocol)
Manages printers on the network
100BASE-FX Answer: D
25. What is Broadcast Transmission?
ICMP (Internet Control Message Protocol)
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
the NIC (Network Interface Card) is bad.
PPTP (Point-to-Point Tunneling Protocol)
26. What is on Port 23?
128 bit addresses
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Digital Subscriber Line
Telnet
27. On what Port is SQL Server?
Point-to-Point Tunneling Protocol
1433
In the LAN (Local Area Network)
110
28. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer?
SSL (Secure Sockets Layer)
Network News Transfer Protocol
Initial installation cost may be higher - One central single point of failure (the hub or other device)
MAC (Media Access Control) address
29. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
Internet mail access protocol
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Internet connection
30. FQDN means...
MAC (Media Access Control) address
135-139
128 bit addresses
Fully Qualified Domain Name
31. IPX Means...
Trivial File Transfer Protocol
Internetwork packet exchange
1433
Port Address Translator
32. List the drawbacks of a star topology
2
PPP (Point-to-Point Protocol)
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Access Control List
33. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services?
Port 20 must also be unblocked.
netstat
22
Application
34. What part of an Ethernet MAC (Media Access Control) address designates the manufacturer of the NIC (Network Interface Card)?
bytes 1-3
raphical User Interface
69
File Transfer Protocol
35. Mail Server
1000BASE-LX and10 GBASE-LR
Network and Transport
Handles e-mail functions
TFTP (Trivial File Transfer Protocol)
36. Given the output: 1.pgw (129.6.80.254) * 4ms 3ms 2.129.6.1.245 (129.6.1.245) 4ms 3ms * 3.129.6.2.252 (129.6.2.252) 5ms 5ms 4ms Which of the following commands causes the results above?
traceroute
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
nslookup
Any device on the network that can ask for access to resources
37. What is on Port 443?
HTTPS/ SSL
Internet Protocol Security
Secure Shell
Local Area Network
38. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
The amber light is flashing occasionally and the green light is lit steadily.
Institute of Electrical and Electronics Engineers
169.254.1.1
The 'memo maker' that sends and receives paperless faxes over the network
39. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
Switches - bridges - and NICs (Network Interface Card)
Check the connection from the WAP (Wireless Access Point) to the network
Provides remote users with access to the network through modems and an IP connection
rp
40. What is on Port 143?
Periodically (randomly) blinking
550 meters (1 -804.46 feet)
User Datagram Protocol. This protocol is connectionless and routable.
IMAP (Mail Client)
41. What is on Port 53?
DNS
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Wireless LAN
Intrusion Detection System
42. A firewall can be used to prevent which of the following?
135-139
Packets from entering and leaving a network
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Network News Transfer Protocol
43. EMI means...
Electromagnetic Interference
Internet Control Message Protocol
Internet Protocol
Media Access Unit - Media attachment Unit
44. Which one of the following provides a fault-tolerant storage system containing five disks and a single controller that will function if a single disk fails?
A striped set array with parity
20 & 21
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
The amber light is flashing occasionally and the green light is lit steadily.
45. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
Time domain reflectometer
Client - protocol - and adapter
The file has been opened by another user and is open for read only.
53
46. What is BGMP?
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
2
Open Source Path First - this is a routing protocol
Remote Desktop Protocol
47. What is on Port 389?
Any network device with an IP address
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
550 meters (1 -804.46 feet)
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
48. Which of the following is used to translate NetBIOS (Network Basic Input / Output System) names
Post Office Protocol
WINS (Windows Internet Name Service)
An old microwave oven is being used in the break room which causes interference with the access point.
Network Interface Card
49. What is NAT?
Network Address Translator
Basic Rate Interface
2.4 GHz (Gigahertz).
A 2.4 GHz (Gigahertz) cordless telephone is in use.
50. Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures?
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
6
Gateway