Microsoft 98-366 Network Fundamentals Exam Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

This question requires that you evaluate the underlined text to determine if it is correct. The process of replicating a zone file to multiple DNS servers is called zone replication, Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

Zone transfer

A computer that has an IP address of 169.254.0.1 cannot access the network. Which of the following services should you confirm is available?

DHCP

Which of the following uses pointer records and A records?

DNS Server

Which of these represents the Internet Protocol version 6 (IPv6) loopback address?

::1

VPNs are implemented to provide:

A secure connection through public networks.

What are two characteristics of fiber optic cable? (Choose two.)

A. Conducts electricity C. Supports splicing

In local area network (LAN) topologies, the primary media access methods are: (Choose two.)

A. Contention D. Token passing

Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)

A. Establishing network speed parameters B. Verifying the client's patch level

What are two characteristics of a mesh network topology? (Choose two.)

A. It is fault tolerant because of redundant connections. C. It works best for networks with a large number of nodes.

What are three characteristics of Ethernet network topology? (Choose three.)

A. It uses tokens to avoid collisions on the network. B. It can use coaxial, twisted pair, and fiber optic media. D. It is a non-switching protocol.

Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router? (Choose two.)

A. Network Policy and Access Services B. Routing and Remote Access Services

Connecting to a private network address from a public network requires:

A. Network address translation (NAT).

You work at a coffee shop. Your supervisor asks you to help set up a computer network. The network needs to have the following items: ✑ A public facing web server ✑ A Wi-Fi network for customers ✑ A private network for the point of sale terminals ✑ An office PC ✑ A file/print server ✑ A network printer You need to set up a perimeter network to protect the network. Which two items should you include in the perimeter network? (Choose two.)

A. Network printer B. Web server

Which protocol is a transport layer protocol?

ASCII

The protocol that maps IP addresses to a Media Access Control (MAC) address is:

Address Resolution Protocol (ARP).

This question requires that you evaluate the underlined text to determine if it is correct. The NTP value in a resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

TTL

You are setting up a network computer game. You need to open up ports on your firewall so your friends can join the network. Which command displays the ports that your computer is listening for?

nslookup

A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97. You need to restore access to network resources. What should you do next?

D. Verify that the DHCP service is available.

Which of the following represents a Media Access Control (MAC) address?

05:35:AB:6E:Al:25

A cable that meets the l000BaseT standard has a maximum length of:

100 m

This question requires that you evaluate the underlined text to determine if it is correct. When a client computer is unable to reach a DHCP server, it will automatically assign an IP address in the 10.0.0.0 -10.0.0.255 range. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

169.254.0.0-169.254.255.255

Which of these is a public address space?

172.16.0.0/12

Which of these addresses is a multicast address?

224.0.0.1

What is the maximum cable length for a single Cat5 UTP cable run?

328 feet/99.97 meters

What is the bit rate for a North American T3 circuit?

44.736 Mbit/s

The maximum throughput of an 802.llg network is:

54 Mbps.

Which of the following is a public IP address?

68.24.78.221

This question requires that you evaluate the underlined text to determine if it is correct. In a wireless network that requires an SSL certificate, WEP handles the SSL certificate. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

802.1X

Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)

B. 802.11g E. 802.11n

What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point?

B. A connection will be established,

A node within a local area network (LAN) must have which two of the following? (Choose two.)

B. Share name E. Table of all network nodes

A Layer 2 device that connects multiple computers within a network is a:

B. Switch

What are two differences between switches and hubs? (Choose two.)

B. Switches send data to all of the computers that are connected to them for efficiency. C. Switches are capable of sending and receiving data at the same time.

You ping a server by using a fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt?

B. The DNS is not resolving.

If a router is installed so that it separates a DHCP server from its clients, the clients will:

Be unable to obtain their leases from the server.

What happens when an 802.11a node broadcasts within the range of an 802.11g access point?

Both the node and the access point are unable to transmit.

How many bits are there in an Internet Protocol version 6 (IPv6) address?

C. 128

Which of the following are features of DHCP? (Choose two.)

C. Address reservation E. IP address exclusion

What is a similarity between Layer 2 and Layer 3 switches?

C. Both forward packets onto the network.

Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)

C. Dial-up D. Leased line

Which feature of Category 5e STP cable reduces external interference?

C. Length

What type of record does DNS use to find a mail service?

C. Mail Exchanger (MX) DNS record

What are three advantages of VLANs? (Choose three.)

C. They compartmentalize a network and isolate traffic. D. They are efficient because a single switch can implement only a single VLAN. E. They act as though they are on the same LAN regardless of physical location.

You are home for vacation, and a family member wants your help to purchase and install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement?

Cat5e

What is the minimum cabling requirement for a 100BaseTX network?

Category 3 UTP cable

To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a:

Crossover cable

An Action Center alert recommends that you enable Windows Firewall. After enabling the firewall, you can no longer access websites. Which two TCP ports should you add exceptions for on the firewall? (Choose two.)

D. Port 80 E. Port 443

At what layer in the OSI model are hardware addresses referenced?

Data link

Which metric does Routing Information Protocol (RJP) use to determine the least costly route?

Delay

The default gateway address identifies the:

Device that will connect the computer to a remote network.

The service that resolves fully qualified domain names (FQDN) to IP addresses is:

Domain Name Service (DNS).

Which of these is an application layer protocol?

FTP

To protect a network when it is connected to the Internet, you should use a:

Firewall

If a router cannot determine the next hop for a packet, the router will:

Forward the packet to the default route.

Which protocol can be used to encrypt packets on the Internet?

HTTPS

What type of DNS record maps host names to addresses?

Host (A) DNS record

One purpose of a perimeter network is to:

Make resources available to the Internet.

The command-line tool used to list a host's active incoming connections is:

NETSTAT

A router's static route is set by the:

Network administrator

This question requires that you evaluate the underlined text to determine if it is correct. Every router today is TCP/IP enabled, which is an industry-standard protocol that you use on the Internet and for local addressing. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

No change is needed

This question requires that you evaluate the underlined text to determine if it is correct. The loopback address of your computer is 127.0.0.1. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

No change is needed

A service that resolves NetBIOS names to IP addresses is:

Windows Internet Name Service (WINS).

Which type of network is most vulnerable to intrusion?

Wireless

This question requires that you evaluate the underlined text to determine if it is correct. WEP wireless encryption is the most susceptible to interception and decryption. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct

No change is needed

Which command is used to verify that a server is connected to the network?

PING

What is an example of a Layer 3 device that connects multiple computers and networks

Packet

The topology of a local area network (LAN) is defined by the:

Physical and logical characteristics.

Which of the following is a Layer 2 WAN protocol?

Point-to-Point Protocol (PPP)

This question requires that you evaluate the underlined text to determine if it is correct. According to the OSI model, encryption takes place on the transport layer. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

Presentation

In addition to switching, multilayer switches also:

Provide Layer 3 routing functions.

The type of connector used on a 100BaseT Ethernet cable is:

RJ-45

You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. Which cable type should you use?

STP Cat5e

You are helping a friend set up a public-facing web server for a home office. Your friend wants to protect the internal network from intrusion. What should you do?

Set the web server in a perimeter network.

Which of these cable types transmits data the greatest distance?

Single-mode fiber

In which physical network topology is each computer connected to a central point?

Star

One reason to replace an unmanaged switch with a managed switch is to:

Support multiple VLANS.

A network device that associates a Media Access Control (MAC) address with a port is a:

Switch

Which type of port is used to support VLAN traffic between two switches?

Trunk port

Which network device interconnects computers in a workgroup, is able to be remotely configured, and provides the best throughput?

Unmanaged switch

A characteristic of the mesh topology is that it:

Uses redundant paths

Which type of network covers the broadest area?

WAN


संबंधित स्टडी सेट्स

Anatomy Test 2 (Chapter 21 and 23)

View Set

Essential Cloud Infrastructure: Foundation

View Set

Install and configure SharePoint farms

View Set

Chapter 4 - Contract of Sales and Leases

View Set

CYBR2.TestOut Chap 5 MC Style Review (601) (39)

View Set

Major Muscles That Act at the Wrist

View Set

Chapter 9 Regional Economic Integration

View Set