MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366
Exam A QUESTION 1 You need to divide a network into three subnets. Which Device should you use? A. Router B. Hub C. Segmenter D. Bridge Correct Answer: A /Reference: QUESTION 2 Connecting to a private Network address from a public network requires: A. Dynamic Host Configuration Protocol(DHCP). B. Network Access Protection (NAP). C. dynamic domain name system (DDNS). D. network address translation (NAT). /Reference: QUESTION 3 One reason to incorporate VLANs in a network is to: A. reduce the number of broadcast domains. B. increase the number of available Media Access Control (MAC) addresses. C. increase the number of available IP addresses. D. reduce the number of nodes in a broadcast domain. /Reference: QUESTION 4 Which type of port is used to support VLAN traffic between two switches? A. LAN port B. Trunk port C. Virtual port
D. WAN port /Reference: QUESTION 5 What is the minimum cabling requirement for a 100BaseTx network? A. Category 3 UTP cable B. Category 5 UTP cable C. Category 6 UTP cable D. Multimode fiber cable /Reference: QUESTION 6 A router's static route is set by the: A. next upstream router. B. routing protocol. C. adjacent network. D. network administrator. /Reference: QUESTION 7 What type of record does DNS use to find a mail service? http://www.gratisexam.com/ A. Host (A) DNS record B. Canonical (CNAME) DNS record C. Service (SRV) DNS record D. Mail Exchanger (MX) DNS record
/Reference: QUESTION 8 How many bits are there in an Internet Protocol version 6 (IPv6) address? A. 32 B. 64 C. 128 D. 256 Correct Answer: C /Reference: QUESTION 9 A service that resolves NetBIOS names to IP addresses is: A. Internet Service Provider (ISP). B. Domain Name Service (DNS). C. Windows Internet Name Service (WINS). D. Address Resolution Protocol (ARP). Correct Answer: C /Reference: QUESTION 10 In which OSI layer does routing occur? A. Physical B. Network C. Data Link D. Transport /Reference: QUESTION 11 Which of the following is a public IP address? A. 10.156.89.1
B. 68.24.78.221 C. 172.16.152.48 D. 192.168.25.101 /Reference: QUESTION 12 The query protocol used to locate resources on a network is: A. Tracert B. Telnet. C. Lightweight Directory Access Protocol (LDAP). D. User Datagram Protocol (UDP). Correct Answer: C /Reference: QUESTION 13 Which protocol can be used to encrypt packets on the Internet? A. HTTP B. SNMP C. HTTPS D. TFTP Correct Answer: C /Reference: QUESTION 14 The service that resolves fully qualified domain name (FQDN) to IP addresses is: A. Internet Service Provider (ISP). B. Domain Name Service (DNS). C. Address Resolution Protocol (ARP). D. Windows Internet Name Service (WINS). /Reference:
QUESTION 15 The protocol maps IP addresses to a Media Access Control (MAC) address is: A. Internet Message Access Protocol (IMAP). B. Address Resolution Protocol (ARP). C. Dynamic Host Configuration Protocol (DHCP). D. User Datagram Protocol (UDP). E. Routing Information Protocol (RIP). /Reference: QUESTION 16 The default gateway address identifies the: A. server that will provide name services for the computer. B. device that will connect the computer to a remote network. C. device that will connect the computer to the local network. D. server that will authenticate the user of the computer. /Reference: QUESTION 17 A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97. You need to restore access to the network. What should you do next? A. Verify that the DHCP service is available. B. Reset the user's password on the server. C. Flush the cache on the DNS server. D. Check your router's current routing tables. Correct Answer: A /Reference: QUESTION 18 Which of these addresses is a multicast address?
A. 127.0.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 224.0.0.1 /Reference: QUESTION 19 Which of the following services masks internal IP addresses from outside the network? A. DHCP B. NAT C. WINS D. DNS /Reference: QUESTION 20 If a router is installed so that it separates DHCP server from its clients, the clients will: A. immediately lose connectivity to all segments. B. receive an immediate renew of their lease. C. be unable to obtain their leases from the server. D. immediately lose connectivity to the local segment. Correct Answer: A /Reference: QUESTION 21 tracert is used to: A. report the shortest rout between different networks. B. manage routing tables dynamically. C. manage session-oriented connections between nodes. D. report the route taken by packets across an IP network.
/Reference: QUESTION 22 A node within a local area network (LAN) must have a network interface and a: A. resource to share. B. host address. C. network account. D. table of all network nodes. /Reference: QUESTION 23 One purpose of a perimeter network is to: A. make resource available to the intranet. B. link campus area networks (CANs). C. link local are networks (LANs). D. make resources available to the Internet. /Reference: QUESTION 24 Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.) A. Leased line B. Ethernet C. Dial-up D. Token ring Correct Answer: AC /Reference: QUESTION 25 In which physical network topology is each computer connected to a central point? A. Mesh B. Ring C. Bus D. Star
/Reference: QUESTION 26 A private network that allows members of an organization to exchange data is an: A. Internet. B. extranet. C. Ethernet. D. intranet. /Reference: QUESTION 27 A characteristic of the mesh topology is that it: A. users redundant paths. B. cannot use wireless connections. C. uses a central hub. D. cannot use wired connections. Correct Answer: A /Reference: QUESTION 28 To protect a network when it is connected to the Internet, you should use a: A. router. B. firewall. C. switch. D. bridge. /Reference: QUESTION 29 Security is a concern on wireless networks due to:
A. the radio broadcast access method. B. the potential for cross-talk. C. spread spectrum issues. D. frequency modulation issues. Correct Answer: A /Reference: QUESTION 30 Which of these factors has the biggest impact on data transmission speed in a wireless network? A. The transmission standard of the equipment used B. The transmission wattage rating used on the NIC C. the use of strong encryption for transmissions D. The access method used for the network Correct Answer: C /Reference: QUESTION 31 VPNs are implemented to provide: A. a secure connection within a private network. B. additional security for selected computers. C. additional encryption by using IPSec. D. a secure connection through public networks. /Reference: QUESTION 32 Which wireless authentication method provides the highest level of security? A. IEEE 802.11a B. IEEE 802.11n C. Wired Equivalent Privacy (WEP) D. Wi-Fi Protected Access (WPA) /Reference:
QUESTION 33 The maximum throughput of an 802.11g network is: A. 2.4 GHz. B. 54 GHz. C. 2.4 Mbps. D. 54 Mbps. /Reference: QUESTION 34 A cable that meets the 1000BaseT standard has a maximum length of: A. 100 m. B. 250 m. C. 500 m. D. 1,000 m. Correct Answer: A /Reference: QUESTION 35 Order the layers of the OSI model. A. B. C. D. Correct Answer: /Reference: Layer 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link
Layer 1 Physical http://www.gratisexam.com/