New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Microsoft 98-366 Networking Fundamentals Exam Practice Test

Demo: 26 questions
Total 176 questions

Networking Fundamentals Questions and Answers

Question 1

You are home for vacation, and a family member wants your help to purchase and install network cable for a home office.

The cable needs to support at least 300 Mbps.

What is the least expensive option that meets this requirement?

Options:

A.

Cat3

B.

CAT5

C.

Cat5e

D.

Cat6

Question 2

This question requires that you evaluate the underlined text to determine if it is correct.

A "secondary zone" is the first DNS zone to which all updates for the records that belong to that zone are written.

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

Options:

A.

Primary zone

B.

Stub zone

C.

Conditional forwarding zone

D.

No change is needed.

Question 3

Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router? (Choose two.)

Options:

A.

Network Policy and Access Services

B.

Routing and Remote Access Services

C.

Remote Administration

D.

DirectAccess

Question 4

Which of these is a public address space?

Options:

A.

192.168.0.0/16

B.

197.16.0.0/12

C.

10.0.0.0/8

D.

172.16.0.0/12

Question 5

This question requires that you evaluate the underlined text to determine if it is correct.

The four IEEE standards, 802.11a, b, g, and n, are collectively known as "mobile ad hoc" networks.

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

Options:

A.

WiMAX

B.

Bluetooth

C.

WiFi

D.

No change is needed

Question 6

Which IEEE 802.11 Wi-Fi networking standard requires dual antennas so it can run in all of its supported frequencies?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 7

This question requires that you evaluate the underlined text to determine if it is correct.

An Address Resolution Protocol (ARP) table is used to associate IP addresses with "host names".

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

Options:

A.

MAC addresses

B.

HomeGroup membership

C.

Preferred routers

D.

No change is needed

Question 8

You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response.

Why do you receive a response on the second attempt but not on the first attempt?

Options:

A.

PING is improperly configured.

B.

The DNS is not resolving.

C.

The DHCP server is offline.

D.

NSLOOKUP is stopped.

Question 9

A Layer 2 device that connects multiple computers within a network is a:

Options:

A.

Repeater

B.

Switch

C.

Router

D.

Packet

Question 10

Which type of network is most vulnerable to intrusion?

Options:

A.

Dial-up

B.

Wireless

C.

Broadband

D.

Leased line

Question 11

Which of the following services masks internal IP addresses from outside the network?

Options:

A.

DHCP

B.

WINS

C.

NAT

D.

DNS

Question 12

In local area network (LAN) topologies, the primary media access methods are: (Choose two.)

Options:

A.

Contention

B.

Negotiation

C.

Kerberos

D.

Token passing

Question 13

Which DNS record type specifies the host that is the authority for a given domain?

Options:

A.

NS

B.

MX

C.

CNAME

D.

SOA

Question 14

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.

Options:

Question 15

You are helping a friend set up a public-facing web server for a home office.

Your friend wants to protect the internal network from intrusion.

What should you do?

Options:

A.

Set the web server in a perimeter network.

B.

Set the web server to block access on ports 80 and 443.

C.

Configure the firewall to block access on ports 80 and 443.

D.

Set the IP address of the web server to be within the LAN.

Question 16

What is a similarity between Layer 2 and Layer 3 switches?

Options:

A.

Both provide a high level of security to the network.

B.

Both use logical addressing to forward transmissions.

C.

Both forward packets onto the network.

D.

Both allow the implementation of VLANs.

Question 17

The top-level domain of www.adventureworks.com is:

Options:

A.

www

B.

adventureworks

C.

adventureworks.com

D.

com

Question 18

This question requires that you evaluate the underlined text to determine if it is correct.

In a wireless network that requires an SSL certificate, "WEP" handles the SSL certificate.

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

Options:

A.

802.1X

B.

WPA2-PSK

C.

WPA-PSK

D.

No change is needed

Question 19

This question requires that you evaluate the underlined text to determine if it is correct.

According to the OSI model, encryption takes place on the "transport layer".

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.

Options:

A.

Presentation

B.

Network

C.

Application

D.

No change is needed

Question 20

Match each protocol to its description.

To answer, drag the appropriate protocol from the column on the left to its description on the right. Each protocol may be used once, more than once, or not at all. Each correct match is worth one point.

Options:

Question 21

What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point?

Options:

A.

The access point will transmit, but the node will be unable to receive.

B.

A connection will be established,

C.

Both the node and the access point will be unable to transmit.

D.

The node will transmit, but the access point will be unable to receive.

Question 22

What are two advantages of using star topology rather than ring topology in a computer lab workgroup? (Choose two.)

Options:

A.

Failure of a central connectivity device does not bring down the entire network.

B.

A central connection point allows for flexibility and scalability.

C.

Data travels on redundant paths, so one cable cannot stop its transmission.

D.

A cable problem within the group affects two nodes, at most.

Question 23

In a physical star topology, the central device is referred to as a:

Options:

A.

Bridge

B.

Server

C.

segmenter

D.

Hub

Question 24

Which wireless authentication method provides the highest level of security?

Options:

A.

Wired Equivalency Privacy (WEP)

B.

IEEE 802.lln

C.

WI-FI Protected Access (WPA)

D.

IEEE 802.11a

Question 25

Your home computer is having problems accessing the Internet.

You suspect that your Internet router's DHCP service is not functioning, so you check your computer's IP address.

Which address indicates that your router's DHCP service is NOT functioning?

Options:

A.

169.254.1.15

B.

172.16.1.15

C.

192.168.1.15

D.

10.19.1.15

Question 26

Which of these factors has the biggest impact on data transmission speed in a wireless network?

Options:

A.

The access method used for the network

B.

The transmission standard of the equipment used

C.

The use of strong encryption for transmissions

D.

The transmission wattage rating used on the NIC

Demo: 26 questions
Total 176 questions