SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
TCP / IP (Transmission Control Protocol / Internet Protocol)
Internet Control Message Protocol
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
D. Switch and bridge
2. Proxy Server
Remote Desktop Protocol
SMB (Server Message Block)
Handles tasks in the place of other machines on the network
Token passing
3. List the drawbacks of a ring topology
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
The file has been opened by another user and is open for read only.
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Physical
4. MAN Means...
Bluetooth enabled cell phones
Metropolitan Area Network
Presentation
Electromagnetic Interference
5. PKI means...
802.11i
MAC (Media Access Control) address
Public Key Infrastructure
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
6. Company A has two networks - one on the west side of town and one on the east side. The network administrator wants to connect the two networks with a leased line but is concerned about limiting broadcast traffic. What can the administrator do to all
Put a router between the two network segments
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
72.16.16.1
Exterior Gateway Protocol
7. HTTPS means...
802.2
Hypertext transfer protocol over secure sockets layer.
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
8. What is on Port 110?
Light Emitting Diode
Address Resolution Protocol. Has no error control.
Gateway
POP3
9. On what Port is SUN RPC?
161 & 162
Post Office Protocol
111
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
10. WEP Means...
encapsulating the data payload.
Periodically (randomly) blinking
Wired Equivalent Privacy
Metropolitan Area Network
11. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
Stores and dispenses files
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
110
Client - protocol - and adapter
12. An administrator changes the lease time of the DHCP (Dynamic Host Configuration Protocol) scope from one week to one day. What affect will this have on the end users?
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Basic Rate Interface
192.168.96.254
The users will not be affected by the change.
13. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
SSL (Secure Sockets Layer)
Verification
802.1x
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
14. The 802.11 frequency band is...
Windows Internet Name Service
Internet Service Provider
Media Access Control
2.4 GHz (Gigahertz).
15. TDR means...
Integrated Services digital Network
80
User Datagram Protocol
Time domain reflectometer
16. Application Server
These are the FTP ports. Port 20 handles data and Port 21 provides control.
1000BASE-CX
Manages network applications
There will be no Internet access.
17. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services?
Application
CSU / DSU (Channel Service Unit / Data Service Unit)
Exterior Gateway Protocol
111
18. WAP Means...
802.1x
Transmission Control Protocol
Wireless Access Point
Client - protocol - and adapter
19. Which media access method is used for an IEEE (Institute of Electrical and Electronics Engineers) 802.5 network?
Token passing
netstat
Primary Rate Interface
Internet Protocol
20. What is on Port 80?
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
25
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
HTTP
21. WPA Means...
10
1000BASE-CX
Wireless Protected Access
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
22. Remote Access Server
802.11
Provides remote users with access to the network through modems and an IP connection
Forward the packets to all ports except the one that originated the request
72.16.16.1
23. NAT Means...
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Network Address Translation
Secure Shell
Put a router between the two network segments
24. What is L2TP? What is significant about this protocol?
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Domain Name Service OR Domain Name Server
Stores and dispenses files
Port 20 must also be unblocked.
25. All of the following options transmit data over a modem EXCEPT...
T1 (T-Carrier Level 1).
L2TP (Layer 2 Tunneling Protocol)
Proxy server
RJ-11 (Registered Jack)
26. NNTP Means...
Network News Transfer Protocol
Periodically (randomly) blinking
Port 20 must also be unblocked.
IMAP (Mail Client)
27. Which of the following options allows for secure communication over the Internet?
VPN (Virtual Private Network)
RDP/ Terminal Services
3389
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
28. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation?
rlogin
Router
550 meters (1 -804.46 feet)
rp
29. PPTP Means...
Point-to-Point Tunneling Protocol
135-139
Check the connection from the WAP (Wireless Access Point) to the network
The device ID (Identification)
30. Which UNIX service provides interoperability with Windows file and print sharing?
80
Connect Workstation 6 and Workstation 2 using a barrel connector
SMB (Server Message Block)
Any network device with an IP address
31. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Internet Protocol Security
encapsulating the data payload.
IMAP (Mail Client)
32. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has a longer maximum distance than 100 meters (328 feet)?
Routing Internet Protocol
100BASE-FX Answer: D
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Fully Qualified Domain Name
33. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a...
Reverse Address Resolution Protocol.
traceroute
Internet Control Message Protocol
gateway.
34. What functionality does Kerberos provide?
Challenge Handshake Authentication Protocol
PDC (Primary Domain Controller)
Authentication
Direct Current
35. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
A network map showing exactly how data moves through the network.
Proxy server
PPTP (Point-to-Point Tunneling Protocol)
Switches - bridges - and NICs (Network Interface Card)
36. What is on Port 69?
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Trivial File Transfer Protocol
As a way to share resources and information
TFTP (Trivial File Transfer Protocol)
37. Client-Server Networks
Metropolitan Area Network
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
netstat
Digital Subscriber Line
38. ICMP means...
Network and Transport
Any network device with an IP address
TFTP (Trivial File Transfer Protocol)
Internet Control Message Protocol
39. HTTP Means...
RDP/ Terminal Services
Hypertext transfer protocol
Basic Rate Interface
User Datagram Protocol
40. GUI means
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
cold site.
raphical User Interface
Network Interface Card
41. Fault Tolerance
Bluetooth enabled cell phones
25
Stores and dispenses files
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
42. ISDN means...
Integrated Services digital Network
Routing Internet Protocol
389
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
43. All of the following are true statements about private IP (Internet Protocol) addressing EXCEPT...
Local Area Network
Address Resolution Protocol. Has no error control.
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
Disk Operating System or Denial of Service
44. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)?
802.11
Institute of Electrical and Electronics Engineers
All hosts can communicate.
Light Emitting Diode
45. BNC Means...
128 bit addresses
User Datagram Protocol
Open Source Path First - this is a routing protocol
Bayonet-Neill-Concelman or British Naval Connector
46. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
Media Access Control
Hypertext transfer protocol
1000BASE-CX
802.2
47. What is TCP?
Transmission Control Protocol
Proxy Server
Extranet
SUN RPC
48. On what Port is HTTPS/ SSL?
Primary Rate Interface
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
443
Electromagnetic Interference
49. What is on Port 22?
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Internet Protocol
SSH
Point to Point Tunneling Protocol
50. Which of the following is used to translate NetBIOS (Network Basic Input / Output System) names
WINS (Windows Internet Name Service)
Transport
All workstations except Workstation 3 can communicate to each other.
802.2