aiotestking uk

98-366 Exam Questions - Online Test


98-366 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. HOTSPOT 

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. 

Answer:  

Q2. A private network that allows members of an organization to exchange data is an: 

A. Extranet 

B. Ethernet 

C. Intranet 

D. Internet 

Answer:

Q3. At what layer in the OSI model are hardware addresses referenced? 

A. Network 

B. Application 

C. Data link 

D. Physical 

Answer:

Q4. Which type of network is most vulnerable to intrusion? 

A. Dial-up 

B. Wireless 

C. Broadband 

D. Leased line 

Answer:

Q5. Security is a concern on wireless networks due to: 

A. The radio broadcast access method. 

B. Spread spectrum issues. 

C. Frequency modulation issues. 

D. The potential for cross-talk. 

Answer:

Q6. One advantage of dynamic routing is that it: 

A. Automatically maintains routing tables. 

B. Limits traffic derived from routing protocols. 

C. Reduces broadcast traffic. 

D. Automatically enables DHCP. 

Answer:

Q7. Which technology provides the highest bit rate? 

A. T1 

B. El 

C. DS3 

D. ISDN 

Answer:

Q8. A university has network links between various locations. Where would a T3 connection be appropriate? 

A. Server to network in the main campus server room 

B. Main campus to a large satellite campus 

C. Computer lab PC to lab printer 

D. Library laptop PC to Internet 

Answer:

Q9. DRAG DROP 

Match each set of characteristics to the corresponding 802.11 standard. 

To answer, drag the appropriate set of characteristics from the column on the left to its 

802.11 standard on the right. Each set may be used once, more than once, or not at all. Each correct match is worth one point. 

Answer:  

Q10. VPNs are implemented to provide: 

A. A secure connection within a private network. 

B. A secure connection through public networks. 

C. Additional encryption by using IPSec. 

D. Additional security for selected computers. 

Answer: