Microsoft 98-366
Get real exam questions for 98-366 MTA Networking Fundamentals. 100% Free.
98-366 Premium VCE File
Learn More
100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours
Q1. HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:  Q2. Which technology can you use to extend an internal network across shared or public networks? A. VLAN B. Microsoft ASP-NET C. Microsoft .NET Framework D. VPN View AnswerAnswer: D Q3. In addition to switching, mul
Q1. DRAG DROP Match each network type to its corresponding definition. To answer, drag the appropriate network type from the column on the left to its definition on the right. Each network type may be used once, more than once, or not at all. Each correct match is worth one point. View AnswerAnswer:  Q2. The topology of a local area network (LAN) is defined by the: A. Number of devices to c
Q1. You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. Which cable type should you use? A. STP Cat5e B. UTPCat5e C. Cat3 D. UTPCat6 View AnswerAnswer: A Q2. This question requires that you evaluate the underlined text to determine if it is cor
Q1. Which of these is an application layer protocol? A. TCP B. FTP C. IP D. UDP View AnswerAnswer: B Q2. Which of the following represents a Media Access Control (MAC) address? A. GV:ZC:KK:DK:FZ:CA B. 255.255.255.0 C. 05:35:AB:6E:Al:25 D. 127.0.0.1 View AnswerAnswer: C Q3. HOTSPOT You are configuring a wireless network with the Wireless Network Properties that are shown in the fo
Q1. HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:  Q2. What are three advantages of VLANs? (Choose three.) A. They can logically address packets by using IP. B. They require a router to connect to VLANs on another switch. C. They compartmentalize a network and isolate tr
Q1. HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:  Q2. The default gateway address identifies the: A. Device that will connect the computer to the local network. B. Device that will connect the computer to a remote network. C. Server that will provide name services for t
Q1. Which subnet mask is valid? A. 255.255.255.240 B. 255.255.255.228 C. 255.255.255.164 D. 255.255.255.245 View AnswerAnswer: A Q2. Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies? A. 802.11a B. 802.11b C. 802.11g D. 802.11n View AnswerAnswer: D Q3. Which of the following is a public IP address? A. 10.156.89.1Â
Q1. A characteristic of the mesh topology is that it: A. Uses a central hub. B. Cannot use wired connections. C. Uses redundant paths. D. Cannot use wireless connections. View AnswerAnswer: C Q2. HOTSPOT You are studying for finals in the student lounge. When your laptop is connected to the wireless network, access to the Internet is slow. When you plug your laptop into a wall jack, you
Q1. This question requires that you evaluate the underlined text to determine if it is correct. WEP wireless encryption is the most susceptible to interception and decryption. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct A. WPA-AES B. WPA2 C. WPA-PSK D. No ch
Q1. Which wireless authentication method provides the highest level of security? A. Wired Equivalency Privacy (WEP) B. IEEE 802.lln C. WI-FI Protected Access (WPA) D. IEEE 802.11a View AnswerAnswer: C Q2. A cable that meets the l000BaseT standard has a maximum length of: A. 100 m B. 250 m C. 500 m D. 1,000 m View AnswerAnswer: A Q3. In a physical star topology, the central device
Q1. The topology of a local area network (LAN) is defined by the: A. Number of devices to connect. B. Physical and logical characteristics. C. Distance between workstations. D. Type of cable being used. View AnswerAnswer: B Q2. Which of the following services masks internal IP addresses from outside the network? A. DHCP B. WINS C. NAT D. DNS View AnswerAnswer: C Q3. When a client&
Q1. HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:  Q2. A private network that allows members of an organization to exchange data is an: A. Extranet B. Ethernet C. Intranet D. Internet View AnswerAnswer: C Q3. At what layer in the OSI model are hardware addresses ref
Q1. DRAG DROP Order the layers of the OSI model: View AnswerAnswer:  Q2. You are helping a friend set up a public-facing web server for a home office. Your friend wants to protect the internal network from intrusion. What should you do? A. Set the web server in a perimeter network. B. Set the web server to block access on ports 80 and 443. C. Configure the firewall to block access on por
Q1. The maximum throughput of an 802.llg network is: A. 2.4 GHz. B. 54 GHz. C. 2.4 Mbps D. 54 Mbps. View AnswerAnswer: D Q2. This question requires that you evaluate the underlined text to determine if it is correct. A/anvirtual private network (VPN) protects a network's perimeter by monitoring traffic as it enters and leaves. Select the correct answer if the underlined text does no
Q1. Which command is used to verify that a server is connected to the network? A. IPCONFIG B. ROUTE C. PING D. CHECK View AnswerAnswer: C Q2. How many bits are there in an Internet Protocol version 6 (IPv6) address? A. 32 B. 64 C. 128 D. 256 View AnswerAnswer: C Q3. Teredo tunneling is a protocol that: A. Translates Internet Protocol version 4 (IPv4) to Internet Protocol version
Q1. This question requires that you evaluate the underlined text to determine if it is correct. According to the OSI model, encryption takes place on the transport layer. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. Presentation B. Network C. Application D. No ch
Q1. Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.) A. Token ring B. Ethernet C. Dial-up D. Leased line View AnswerAnswer: C,D Q2. To protect a network when it is connected to the Internet, you should use a: A. Bridge B. Firewall C. Switch D. Router View AnswerAnswer: B Q3. The ipconfig command will: A. Configure routers B. Displa
Q1. What is a similarity between Layer 2 and Layer 3 switches? A. Both provide a high level of security to the network. B. Both use logical addressing to forward transmissions. C. Both forward packets onto the network. D. Both allow the implementation of VLANs. View AnswerAnswer: C Q2. Which network does the IP address 220.100.100.100 belong to? A. 220.100.100.0/24 B. 220.100.100.1/24Â
Q1. Connecting to a private network address from a public network requires: A. Network address translation (NAT). B. Dynamic Host Configuration Protocol (DHCP). C. Network Access Protection (NAP). D. Dynamic domain name system (DDNS). View AnswerAnswer: A Q2. This question requires that you evaluate the underlined text to determine if it is correct. The process of replicating a zone file
Q1. The query protocol used to locate resources on a network is: A. User Datagram Protocol (UDP). B. Lightweight Directory Access Protocol (LDAP), C. Tracert D. Telnet. View AnswerAnswer: B Q2. A characteristic of the mesh topology is that it: A. Uses a central hub. B. Cannot use wired connections. C. Uses redundant paths. D. Cannot use wireless connections. View AnswerAnswer: C Q3