SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NetBEUI Means...
To decrease network congestion Answer: D
443
Fully Qualified Domain Name
Networked Basic Input/Output System Extended User Interface
2. Which of the following are classified as Layer 2 devices?
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Switches - bridges - and NICs (Network Interface Card)
Easy to install - Inexpensive - Less actual cable required
Internet connection
3. What is BGMP?
25
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
4. DHCP means...
Dynamic Host Configuration Protocol
Institute of Electrical and Electronics Engineers
Local Area Network
Application
5. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
Handles tasks in the place of other machines on the network
Internet Protocol Security. This is the defacto standard for VPN security.
An exact duplicate of the infrastructure is mirrored offsite.
A. 18 -000 feet (5 -486.4 meters)
6. A network technician is troubleshooting a remote home users computer that is behind a SOHO (Small Office / Home Office) router running NAT (Network Address Translation). The technician wants to ping the IP (Internet Protocol) address of the remote us
This IP (Internet Protocol) address cannot be pinged remotely.
Transport
Peer-To-Peer and Client-Server
550 meters (1 -804.46 feet)
7. Given the MAC address 00:B0:D0:5A:E1:B5 - what does 5A:E1:B5 identify?
Transmission Control Protocol
Network and Transport
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
The device ID (Identification)
8. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer?
MAC (Media Access Control) address
Port 161 is SNMP and Port 162 is the SNMP Manager
10 GBASE-LR
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
9. Given the output: 1.pgw (129.6.80.254) * 4ms 3ms 2.129.6.1.245 (129.6.1.245) 4ms 3ms * 3.129.6.2.252 (129.6.2.252) 5ms 5ms 4ms Which of the following commands causes the results above?
traceroute
Central Processing unit
TCP / IP (Transmission Control Protocol / Internet Protocol)
DNS
10. NTFS Means...
New Technology File System
CSU / DSU (Channel Service Unit / Data Service Unit)
netstat
Routing Information Protocol
11. MPLS
Public Key Infrastructure
User Datagram Protocol. This protocol is connectionless and routable.
MultiProtocol Label Switching
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
12. A user complains that they can no longer access resources on the network. The user is unable to ping other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet. What is the problem?
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Post Office Protocol 3
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Intrusion Detection System
13. Which one of the following security protocols creates a secure connection over the Internet?
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
L2TP (Layer 2 Tunneling Protocol)
TFTP (Trivial File Transfer Protocol)
14. WPA Means...
Wireless Protected Access
Integrated Services digital Network
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
All hosts can communicate.
15. What is RARP?
Routing Internet Protocol
ifconfig
An old microwave oven is being used in the break room which causes interference with the access point.
Reverse Address Resolution Protocol.
16. PKI means...
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
TFTP (Trivial File Transfer Protocol)
143
Public Key Infrastructure
17. ISDN means...
bytes 1-3
The amber light is flashing occasionally and the green light is lit steadily.
Integrated Services digital Network
User Datagram Protocol. This protocol is connectionless and routable.
18. Which two devices both operate at the same layer of the OSI (Open Systems Interconnect) model?
802.11
MT-RJ (Mechanical Transfer-Registered Jack)
Handles tasks in the place of other machines on the network
D. Switch and bridge
19. What is LEAP?
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
802.11b
20. What is on Port 389?
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Manages printers on the network
Provides remote users with access to the network through modems and an IP connection
21. On what Port is the SMTP Server?
25
CSU / DSU (Channel Service Unit / Data Service Unit)
Proxy Server
Put a router between the two network segments
22. SSID Means...
23
802.1x
Service Set Identifier
Client - protocol - and adapter
23. A Windows 2000 work station has a TCP / IP (Transmission Control Protocol / Internet Protocol) address of 169.254.12.1. Which statement describes the state of the computers TCP / IP (Transmission Control Protocol / Internet Protocol) configuration?
PDC (Primary Domain Controller)
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Transport
802.1x
24. Fault Tolerance
Periodically (randomly) blinking
25
Stores and dispenses files
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
25. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Proxy server
26. A network administrator implements four VLANs (Virtual Local Area Network) on a switch. Which device will be required to pass traffic among the VLANs (Virtual Local Area Network)?
Domain Name Service OR Domain Name Server
Internet connection
389
Router
27. What functionality does Kerberos provide?
An old microwave oven is being used in the break room which causes interference with the access point.
SUN RPC
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Authentication
28. A firewall can be used to prevent which of the following?
Handles tasks in the place of other machines on the network
File Transfer Protocol
Packets from entering and leaving a network
161 & 162
29. All of the following options transmit data over a modem EXCEPT...
The amber light is flashing occasionally and the green light is lit steadily.
T1 (T-Carrier Level 1).
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
RDP/ Terminal Services
30. How are physical and logical topologies different?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this?
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
They are connected to a switch when trying to capture packets.
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Network and Transport
32. A client workstation can authenticate user names and passwords to which type of server?
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
PDC (Primary Domain Controller)
172.192.4.256
POP3
33. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per second)?
Port Address Translator
RJ-11 (Registered Jack)
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
802.11b
34. What is DHCP? What is its key attribute?
Media Access Control
Switches - bridges - and NICs (Network Interface Card)
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Windows Internet Name Service
35. What is on Port 443?
rlogin
Sys Log (Unix) or Event Manager (Windows)
HTTPS/ SSL
Put a router between the two network segments
36. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain Name Service) for security reasons. Users have lost the ability to access remote network shares named ournetworkshares and ourprivateshares. How can this be resolve
Networked Basic Input/Output System Extended User Interface
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
TFTP (Trivial File Transfer Protocol)
37. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
New Technology File System
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
PPTP (Point-to-Point Tunneling Protocol)
Put a router between the two network segments
38. On what Port is SUN RPC?
111
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Switches - bridges - and NICs (Network Interface Card)
rp
39. GSM means...
Media Access Control
Global System for Mobile Communications
The device ID (Identification)
Hypertext transfer protocol over secure sockets layer.
40. Describe a star topology
RJ-11 (Registered Jack)
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
NetBios
41. ACL means...
Packets from entering and leaving a network
Access Control List
It is an address assigned to a NIC (Network Interface Card).
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
42. Servers
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. What is TCP?
All hosts can communicate.
Transmission Control Protocol
ICMP (Internet Control Message Protocol)
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
44. TFTP Means...
Trivial File Transfer Protocol
Network and Transport
8080
Integrated Services digital Network
45. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet - although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem?
Lightweight Directory Access Protocol
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
ping
SUN RPC
46. Fax Server
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. WEP Means...
TFTP (Trivial File Transfer Protocol)
802.11i
20 & 21
Wired Equivalent Privacy
48. What is Multicast Transmission?
Internetwork Packet Exchange/Sequenced Packet Exchange
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Port 20 must also be unblocked.
Bridge
49. URL Means...
1
Uniform Resource Locator
2.4 GHz (Gigahertz).
NetBios
50. What is on Port 3389?
The Internet router is blocking port 25.
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
RDP/ Terminal Services
NFS (Network File System)