SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Client-Server Networks
IMAP (Mail Client)
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
100BASE-FX Answer: D
2. A company wants to have an intranet. Where would the intranet web server be located in the network?
Transmission Control Protocol/Internet Protocol
Presentation
In the LAN (Local Area Network)
Internet connection
3. What is IP?
1
Integrated Services digital Network
rp
Internet Protocol
4. MAN Means...
Media Access Unit - Media attachment Unit
Metropolitan Area Network
Client - protocol - and adapter
Routing Internet Protocol
5. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a...
gateway.
PPTP (Point-to-Point Tunneling Protocol)
MT-RJ (Mechanical Transfer-Registered Jack)
Direct Current
6. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
Peer-To-Peer and Client-Server
Select the most probable cause
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Secure Sockets Layer
7. All of the following options transmit data over a modem EXCEPT...
T1 (T-Carrier Level 1).
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
10 GBASE-LR
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
8. What functionality does Kerberos provide?
Internet Control Message Protocol
Bus
Hypertext Markup Language
Authentication
9. List the drawbacks of a star topology
Public Switched Telephone Network
Time domain reflectometer
Initial installation cost may be higher - One central single point of failure (the hub or other device)
File Transfer Protocol
10. DSL means...
1433
Industry Standards Organization
TCP / IP (Transmission Control Protocol / Internet Protocol)
Digital Subscriber Line
11. Which one of the following choices is the MOST secure place to store tape backups?
In a locked room in an offsite location
ICMP (Internet Control Message Protocol)
ifconfig
100 Mbps (Megabits per second)
12. What is on Port 1433?
SQL Server
The Internet router is blocking port 25.
Any device on the network that can ask for access to resources
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
13. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses
Media Access Unit - Media attachment Unit
Proxy Server
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
1000BASE-LX and10 GBASE-LR
14. What is PPP?
MAC (Media Access Control) address
Point to Point Protocol
File Transfer Protocol
Simple Network Management Protocol
15. PSTN Means...
Public Switched Telephone Network
SMTP Server
Institute of Electrical and Electronics Engineers
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
16. A facility designed to receive computer equipment during a disaster recovery is known as a...
cold site.
Internet Service Provider
Trivial File Transfer Protocol
Point to Point Tunneling Protocol
17. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Lightweight Directory Access Protocol
VPN (Virtual Private Network)
Presentation
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
18. ATM Means...
Asynchronous Transfer Mode
Internetwork Packet Exchange/Sequenced Packet Exchange
SMB (Server Message Block)
Transmission Control Protocol/Internet Protocol
19. Which of the following are classified as Layer 2 devices?
Switches - bridges - and NICs (Network Interface Card)
Data Link
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Light Emitting Diode
20. On what Port is TFTP?
IMAP (Mail Client)
69
Proxy Server
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
21. GUI means
raphical User Interface
Authentication
Port Address Translator
Sys Log (Unix) or Event Manager (Windows)
22. IEEE means...
Institute of Electrical and Electronics Engineers
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Network Interface Card
550 meters (1 -804.46 feet)
23. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation?
Lightweight Directory Access Protocol
rlogin
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Wireless Fidelity
24. Which one of the following devices connects a network segment to a public telephone network?
Routing Internet Protocol
ICMP (Internet Control Message Protocol)
CSU / DSU (Channel Service Unit / Data Service Unit)
PPP (Point-to-Point Protocol)
25. The Spanning-Tree Protocol allows for redundancy of what networking device?
Wireless LAN
Network File System
Bridge
WEP (Wired Equivalent Privacy)
26. NTFS Means...
SMB (Server Message Block)
Global System for Mobile Communications
New Technology File System
Wireless Access Point
27. Which protocol is used for error reporting in concert with the IP protocol?
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Router
CSU / DSU (Channel Service Unit / Data Service Unit)
ICMP (Internet Control Message Protocol)
28. A computer that is working on a network is unplugged and then plugged into another switch with a new cable. The link LED (Light Emitting Diode) on the NIC (Network Interface Card) does not come on. All of the following could be the source of the prob
the NIC (Network Interface Card) is bad.
Two or more connected computers that can share resources
Open Source Path First - this is a routing protocol
Internet Service Provider
29. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
Address Resolution Protocol. Has no error control.
Verification
MAC (Media Access Control) address
Physical
30. What is on Port 389?
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
All workstations except Workstation 3 can communicate to each other.
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Port 20 must also be unblocked.
31. NAT Means...
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Network Address Translation
Dynamic Host Configuration Protocol
TFTP (Trivial File Transfer Protocol)
32. On what Port is the Proxy Server?
Internet Control Message Protocol
Point-to-Point Tunneling Protocol
8080
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
33. The 802.11 frequency band is...
The analyzer is functioning properly.
2.4 GHz (Gigahertz).
100 Mbps (Megabits per second)
SSL (Secure Sockets Layer)
34. HTTPS means...
Hypertext transfer protocol over secure sockets layer.
raphical User Interface
514
Verification
35. MIME means...
Internet Protocol
Periodically (randomly) blinking
Proxy Server
Multipurpose Internet Mail Extension
36. Network
Two or more connected computers that can share resources
WEP (Wired Equivalent Privacy)
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
37. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Industry Standards Organization
Lightweight Directory Access Protocol
Multipurpose Internet Mail Extension
38. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
CSU / DSU (Channel Service Unit / Data Service Unit)
Lightweight Directory Access Protocol
25
Application
39. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
Internetwork packet exchange
An exact duplicate of the infrastructure is mirrored offsite.
Firewall
Client - protocol - and adapter
40. This is not an IP (Internet Protocol) addresses.
Proxy server
Reverse Address Resolution Protocol.
1
72.16.16.1
41. Describe a bus topology
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
10 GBASE-LR
8080
Telnet
42. A user has set up filtering on an Internet router. The local SMTP (Simple Mail Transfer Protocol) server has stopped sending or receiving messages from the Internet. What is the cause of the problem?
Industry Standards Organization
The Internet router is blocking port 25.
143
389
43. Disk mirroring is also known as RAID ___...
Initial installation cost may be higher - One central single point of failure (the hub or other device)
1
Open Source Path First - this is a routing protocol
Service Set Identifier
44. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
CSU / DSU (Channel Service Unit / Data Service Unit)
Check the connection from the WAP (Wireless Access Point) to the network
Proxy server
Integrated Services digital Network
45. Fax Server
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. What is RARP?
Open Source Path First - this is a routing protocol
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Reverse Address Resolution Protocol.
47. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
10 GBASE-LR
The file has been opened by another user and is open for read only.
SSL (Secure Sockets Layer)
Light Emitting Diode
48. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
Routing Internet Protocol
The file has been opened by another user and is open for read only.
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Switches - bridges - and NICs (Network Interface Card)
49. To increase the number of available IP (Internet Protocol) addresses - IPv6 (Internet Protocol version 6) uses which one of the following options?
Dynamic Host Configuration Protocol
Challenge Handshake Authentication Protocol
10 GBASE-LR
128 bit addresses
50. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
802.11b
10 GBASE-LR
This IP (Internet Protocol) address cannot be pinged remotely.
Fully Qualified Domain Name