SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet Protocol) address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
SMTP Server
MAC (Media Access Control) address
Transmission Control Protocol
rp
2. What is on Port 69?
PDC (Primary Domain Controller)
Media Access Control
TFTP (Trivial File Transfer Protocol)
Verification
3. NIC means...
Address Resolution Protocol. Has no error control.
Wireless Protected Access
Network Interface Card
Proxy
4. Proxy Server
Internet Information Services
1
Asynchronous Transfer Mode
Handles tasks in the place of other machines on the network
5. What is Broadcast Transmission?
This IP (Internet Protocol) address cannot be pinged remotely.
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Light Emitting Diode
Exterior Gateway Protocol
6. Which one of the following devices connects a network segment to a public telephone network?
CSU / DSU (Channel Service Unit / Data Service Unit)
Internet Protocol Security
Presentation
It is an address assigned to a NIC (Network Interface Card).
7. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
A 2.4 GHz (Gigahertz) cordless telephone is in use.
In the LAN (Local Area Network)
encapsulating the data payload.
8. HTML means...
The Internet router is blocking port 25.
Hypertext Markup Language
Sys Log (Unix) or Event Manager (Windows)
User Datagram Protocol
9. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
Wireless Fidelity
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
SQL Server
Internet Protocol Security. This is the defacto standard for VPN security.
10. DC means...
Direct Current
Multiple Link Interface
Domain Name Service OR Domain Name Server
MT-RJ (Mechanical Transfer-Registered Jack)
11. Which one of the following options is required for a client workstation to connect to a network resource?
L2TP (Layer 2 Tunneling Protocol)
ICMP (Internet Control Message Protocol)
Forward the packets to all ports except the one that originated the request
Client - protocol - and adapter
12. Remote Access Server
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
172.192.4.256
53
Provides remote users with access to the network through modems and an IP connection
13. All of the following Novell NetWare operating systems support NDS (NetWare Directory Services) natively EXCEPT...
Digital Subscriber Line
L2TP (Layer 2 Tunneling Protocol)
Gateway
3.1
14. Which of the following options allows for secure communication over the Internet?
Multipurpose Internet Mail Extension
Wired Equivalent Privacy
SQL Server
VPN (Virtual Private Network)
15. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
MAC (Media Access Control) address
2
Firewall
802.1x
16. A workstation with a static IP (Internet Protocol) address can print and authenticate to a server - but cannot browse to www.comptia.org. What is the FIRST item to troubleshoot?
550 meters (1 -804.46 feet)
RJ-11 (Registered Jack)
Stores and dispenses files
DNS (Domain Name Service) server settings
17. HTTP Means...
Hypertext transfer protocol
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Internet Service Provider
Service Set Identifier
18. WPA Means...
Port 20 must also be unblocked.
ping
Implement VLANs (Virtual Local Area Network)
Wireless Protected Access
19. What is PAP?
TCP / IP (Transmission Control Protocol / Internet Protocol)
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Password Authentication Protocol
An eight-position connector which uses UTP (Unshielded Twisted Pair).
20. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data Link layer?
802.2
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
These are the FTP ports. Port 20 handles data and Port 21 provides control.
25
21. PAP (Password Authentication Protocol) secures PPP (Point-to-Point Protocol) sessions by...
23
passing a username and password in plaintext.
POP3
169.254.1.1
22. What is DHCP? What is its key attribute?
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Bluetooth enabled cell phones
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
The 'memo maker' that sends and receives paperless faxes over the network
23. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics Engineers) 802.11b access point?
RJ-11 (Registered Jack)
Router
Bluetooth enabled cell phones
Electromagnetic Interference
24. PPTP Means...
Electromagnetic Interference
Point-to-Point Tunneling Protocol
Wireless LAN
Global Positioning System
25. What is a MAC (Media Access Control) address?
It is an address assigned to a NIC (Network Interface Card).
RJ-11 (Registered Jack)
Presentation
514
26. A network administrator is troubleshooting a wireless LAN (Local Area Network) that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs (Wireless Access Point) from different companies within rang
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Post Office Protocol 3
netstat
1000BASE-CX
27. Which one of the following is true concerning bridges and their forwarding decisions?
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Select the most probable cause
traceroute
An old microwave oven is being used in the break room which causes interference with the access point.
28. What is on Ports 161 and 162?
Port 161 is SNMP and Port 162 is the SNMP Manager
Light Emitting Diode
SQL Server
PDC (Primary Domain Controller)
29. WAP Means...
53
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
Switches - bridges - and NICs (Network Interface Card)
Wireless Access Point
30. What is EAP? What is it used for?
514
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Address Resolution Protocol. Has no error control.
Primary Rate Interface
31. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services?
Application
514
53
Handles e-mail functions
32. Given the MAC address 00:B0:D0:5A:E1:B5 - what does 5A:E1:B5 identify?
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
72.16.16.1
rlogin
The device ID (Identification)
33. List the drawbacks of a ring topology
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
A. 18 -000 feet (5 -486.4 meters)
ICMP (Internet Control Message Protocol)
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
34. ISO Means...
Industry Standards Organization
Periodically (randomly) blinking
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Transmission Control Protocol/Internet Protocol
35. LED Means...
Light Emitting Diode
Forward the packets to all ports except the one that originated the request
Fully Qualified Domain Name
Firewall
36. What is the minimum number of hard drives required to implement RAID 0 (Redundant Array of Independent Disks)?
143
Peer-To-Peer and Client-Server
Hybrid hub
2
37. TCP means...
Extranet
Transmission Control Protocol
Plain Old Telephone Service
169.254.1.1
38. IPX Means...
The 'memo maker' that sends and receives paperless faxes over the network
Internetwork packet exchange
Forward the packets to all ports except the one that originated the request
Network Access Control
39. A new intranet web server has been installed for a company. The clients access the intranet server by its DNS (Domain Name Service) name. To automatically change the clients to connect to the new server - an administrator modifies the DNS (Domain Nam
550 meters (1 -804.46 feet)
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Network Time Protocol
In the LAN (Local Area Network)
40. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
Alternating Current
encapsulating the data payload.
10 GBASE-LR
41. Client-Server Networks
Direct Current
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Electromagnetic Interference
netstat and ping
42. ATM Means...
Port 161 is SNMP and Port 162 is the SNMP Manager
Basic Rate Interface
Asynchronous Transfer Mode
Internet Protocol
43. Which protocol is the fastest file transfer protocol?
As a way to share resources and information
SSL (Secure Sockets Layer)
Internet Information Services
TFTP (Trivial File Transfer Protocol)
44. What is on Port 80?
raphical User Interface
An old microwave oven is being used in the break room which causes interference with the access point.
cold site.
HTTP
45. What is on Port 23?
Telnet
Two or more connected computers that can share resources
443
ICMP (Internet Control Message Protocol)
46. IDS means...
CSU / DSU (Channel Service Unit / Data Service Unit)
Time domain reflectometer
Internetwork packet exchange
Intrusion Detection System
47. List the drawbacks of a bus topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. Which protocol could be used by a VPN (Virtual Private Network)?
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Transport
Time domain reflectometer
PPTP (Point-to-Point Tunneling Protocol)
49. Which protocol is used for error reporting in concert with the IP protocol?
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
ICMP (Internet Control Message Protocol)
Bridge
RJ-11 (Registered Jack)
50. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
rp
Select the most probable cause
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
192.168.96.254