Exam4Training

Microsoft 98-366 MTA Networking Fundamentals Online Training

Question #1

One advantage of dynamic routing is that it:

  • A . Automatically maintains routing tables.
  • B . Limits traffic derived from routing protocols.
  • C . Reduces broadcast traffic.
  • D . Automatically enables DHCP.

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Dynamic Routing, also called adaptive routing, describes the capability of a system, through which routes are characterized by their destination, to alter the path that the route takes through the system in response to a change in conditions. The adaptation is intended to allow as many routes as possible to remain valid (that is, have destinations that can be reached) in response to the change.

Question #2

Which of the following represents a Media Access Control (MAC) address?

  • A . GV:ZC:KK:DK:FZ:CA
  • B . 255.255.255.0
  • C . 05:35:AB:6E:Al:25
  • D . 127.0.0.1

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

The standard (IEEE 802) format for printing MAC-48 addresses in human-friendly form is six groups of two hexadecimal digits, separated by hyphens (-) or colons (:), in transmission order (e.g. 01-23-45-67-89-ab or 01:23:45:67:89:ab ).

Question #3

Connecting to a private network address from a public network requires:

  • A . Network address translation (NAT).
  • B . Dynamic Host Configuration Protocol (DHCP).
  • C . Network Access Protection (NAP).
  • D . Dynamic domain name system (DDNS).

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

The majority of NATs map multiple private hosts to one publicly exposed IP address. In a typical configuration, a local network uses one of the designated "private" IP address subnets (RFC 1918). A router on that network has a private address in that address space. The router is also connected to the Internet with a "public" address assigned by an Internet service provider.

Question #4

A network device that associates a Media Access Control (MAC) address with a port is a:

  • A . DSL modem
  • B . Hub
  • C . Router
  • D . Switch

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

A switch begins learning the local MAC addresses as soon as it is connected to other devices or to a network. This learning capability makes switches easy to use on a network.

The switch learning process works like this:

Question #4

A network device that associates a Media Access Control (MAC) address with a port is a:

  • A . DSL modem
  • B . Hub
  • C . Router
  • D . Switch

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

A switch begins learning the local MAC addresses as soon as it is connected to other devices or to a network. This learning capability makes switches easy to use on a network.

The switch learning process works like this:

Question #4

A network device that associates a Media Access Control (MAC) address with a port is a:

  • A . DSL modem
  • B . Hub
  • C . Router
  • D . Switch

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

A switch begins learning the local MAC addresses as soon as it is connected to other devices or to a network. This learning capability makes switches easy to use on a network.

The switch learning process works like this:

Question #7

A Layer 2 device that connects multiple computers within a network is a:

  • A . Repeater
  • B . Switch
  • C . Router
  • D . Packet

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Layer 2 switching uses the media access control address (MAC address) from the host’s network interface cards (NICs) to decide where to forward frames.

Question #8

A cable that meets the l000BaseT standard has a maximum length of:

  • A . 100 m
  • B . 250 m
  • C . 500 m
  • D . 1,000 m

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

When used for 10/100/1000BASE-T, the maximum allowed length of a Cat 6 cable is 100 meters or 328 feet.

Question #9

A router’s static route is set by the:

  • A . Adjacent network
  • B . Next upstream router
  • C . Network administrator
  • D . Routing protocol

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing protocol to forward traffic.

Question #10

Which setting is used to determine the Domain Name System (DNS) settings on a client computer?

  • A . TELNET
  • B . NSLOOKUP
  • C . PATHPING
  • D . NETSTAT

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

nslookup is a network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record.

Question #11

The default subnet mask for a Class B network is:

  • A . 0.0.0.255
  • B . 0.0.255.255
  • C . 255.0.0.0
  • D . 255.255.0.0

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Class A default subnet mask is 255.0.0.0. Class B default subnet mask is 255.255.0.0. Class C default subnet mask is 255.255.255.0.

Question #12

The default port used for SMTP is:

  • A . 23
  • B . 25
  • C . 80
  • D . 8080

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

SMTP by default uses TCP port 25.

Question #13

The ping tool is used to: (Choose two.)

  • A . Determine the network portion of a host address.
  • B . Self-test a host’s own network interface.
  • C . Determine whether a host is reachable.
  • D . Manage a host’s session when UDP is used.

Reveal Solution Hide Solution

Correct Answer: BC
BC

Explanation:

Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.

To have your PC ping itself, type ping 127.0.0.1.

Question #14

Which of the following are features of DHCP? (Choose two.)

  • A . IP address resolution to canonical names
  • B . Secure shell connections
  • C . Address reservation
  • D . Network file transfer
  • E . IP address exclusion

Reveal Solution Hide Solution

Correct Answer: CE
CE

Explanation:

The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services.

Some network devices need to use statically assigned IP addresses rather than addresses dynamically assigned through DHCP. For example, DHCP servers must have statically configured IP addresses. Also, some devices (such as legacy network printers) do not support DHCP. For the devices that need static IP assignments, the company creates an exclusion range from each IP address range.

Question #15

The command-line tool used to list a host’s active incoming connections is:

  • A . NETSTAT
  • B . IPCONFIG
  • C . NSLOOKUP
  • D . PING

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Used without parameters, netstat displays active TCP connections.

Note: Netstat displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols).

Question #16

A computer that has an IP address of 169.254.0.1 cannot access the network.

Which of the following services should you confirm is available?

  • A . WINS
  • B . DNS
  • C . DHCP
  • D . TFTP

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Question #16

A computer that has an IP address of 169.254.0.1 cannot access the network.

Which of the following services should you confirm is available?

  • A . WINS
  • B . DNS
  • C . DHCP
  • D . TFTP

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Question #18

Which network does the IP address 220.100.100.100 belong to?

  • A . 220.100.100.0/24
  • B . 220.100.100.1/24
  • C . 255.255.255.0/24
  • D . 255.255.255.1/24

Reveal Solution Hide Solution

Correct Answer: A
Question #19

Which subnet mask is valid?

  • A . 255.255.255.240
  • B . 255.255.255.228
  • C . 255.255.255.164
  • D . 255.255.255.245

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

These are valid:



Question #20

A service that resolves NetBIOS names to IP addresses is:

  • A . Domain Name Service (DNS).
  • B . Internet Service Provider (ISP).
  • C . Address Resolution Protocol (ARP).
  • D . Windows Internet Name Service (WINS).

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Windows Internet Name Service (WINS) is Microsoft’s implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer names. Effectively, WINS is to NetBIOS names what DNS is to domain names ― a central mapping of host names to network addresses.

Question #21

What type of DNS record maps host names to addresses?

  • A . Mail Exchanger (MX) DNS record
  • B . Service (SRV) DNS record
  • C . Host (A) DNS record
  • D . Canonical (CNAME) DNS record

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

An A or Address record (also known as a host record) links a domain to the physical IP address of a computer hosting that domain’s services.

Question #22

Teredo tunneling is a protocol that:

  • A . Translates Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6).
  • B . Allows IPv6 connectivity through IPv4 devices.
  • C . Provides VPN security.
  • D . Dynamically allocates IPv6 addresses.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Teredo alleviates this problem by encapsulating IPv6 packets within UDP/IPv4 datagrams, which most NATs can forward properly. Thus, IPv6-aware hosts behind NATs can be used as Teredo tunnel endpoints even when they don’t have a dedicated public IPv4 address.

Question #23

What is the default subnet mask for a Class C Internet network?

  • A . 255.255.255.252
  • B . 255.255.255.240
  • C . 255.255.255.192
  • D . 255.255.255.0

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Class A default subnet mask is 255.0.0.0. Class B default subnet mask is 255.255.0.0. Class C default subnet mask is 255.255.255.0.

Question #24

The default port used for telnet is: A. 23

B. 25

C. 80

D. 8080

Reveal Solution Hide Solution

Correct Answer: A

Explanation:

The telnet protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23, where a Telnet server application (telnetd) is listening.

Question #25

When a client’s DHCP-issued address expires, the client will:

  • A . Select a new address and request approval from the DHCP server.
  • B . Require manual configuration with a static IP address.
  • C . Attempt to obtain a new address by broadcasting.
  • D . Continue to use the address until it is notified to stop.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Rebinding would occur.

Rebinding

If the DHCP client is unable to communicate with the DHCP server from which it obtained its lease, and 87.5 percent of its lease time has expired, it will attempt to contact any available DHCP server by broadcasting DHCPRequest messages. Any DHCP server can respond with a DHCPAck message, renewing the lease, or a DHCPNak message, forcing the DHCP client to initialize and restart the lease process.

Note:

Renewing

IP addressing information is leased to a client, and the client is responsible for renewing the lease. By default, DHCP clients try to renew their lease when 50 percent of the lease time has expired. To renew its lease, a DHCP client sends a DHCPRequest message to the DHCP server from which it originally obtained the lease.

Reference: DHCP Client States in the Lease Process

Question #26

You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response.

Why do you receive a response on the second attempt but not on the first attempt?

  • A . PING is improperly configured.
  • B . The DNS is not resolving.
  • C . The DHCP server is offline.
  • D . NSLOOKUP is stopped.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

DNS is not working.

Question #27

A Media Access Control (MAC) address identifies a/an:

  • A . UPnP device.
  • B . Local broadcast domain.
  • C . Network interface card (NIC).
  • D . Local area network (LAN).

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment.

Question #28

Two companies want to share data by using the Internet.

Which type of network provides the solution?

  • A . Ethernet
  • B . Intranet
  • C . Extranet
  • D . Perimeter

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

An extranet is a computer network that allows controlled access from outside of an organization’s intranet. Extranets are used for specific use cases including business-to-business (B2B).

Question #29

VPNs are implemented to provide:

  • A . A secure connection within a private network.
  • B . A secure connection through public networks.
  • C . Additional encryption by using IPSec.
  • D . Additional security for selected computers.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

VPN is a network that is constructed by using public wires ― usually the Internet ― to connect to a private network, such as a company’s internal network.

There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

Question #30

If an 802.llg Internet connection has connectivity problems, what may be the cause?

  • A . A cordless phone
  • B . A cellular phone
  • C . Incandescent lights
  • D . Electromagnetic interference (EMI)

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Over the last 10 years 802.11 technology has made remarkable strides — getting faster, stronger and more scalable. But one problem still haunts Wi-Fi: reliability.

Nothing is more frustrating for network managers than users complaining about flaky Wi-Fi performance, spotty coverage and dropped connections. Dealing with a Wi-Fi environment that you can’t see and that is constantly changing is the problem. And radio frequency interference is the culprit.

Question #31

Which of these factors has the biggest impact on data transmission speed in a wireless network?

  • A . The access method used for the network
  • B . The transmission standard of the equipment used
  • C . The use of strong encryption for transmissions
  • D . The transmission wattage rating used on the NIC

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

The speed of a Wi-Fi wireless network connection depends on several factors. Like most kinds of computer networks, Wi-Fi supports varying levels of performance depending on which technology standards it supports. Each Wi-Fi standard is rated according to its maximum theoretical network bandwidth:

A Wi-Fi network connection operates at the highest possible speed that both devices (endpoints) can support. An 802.11g laptop connected to an 802.11n router, for example, will network at the lower speeds of ‘g’.

Question #32

Which of the following uses a tunneling protocol?

  • A . Internet
  • B . VPN
  • C . Extranet
  • D . VLAN

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Tunneling enables the encapsulation of a packet from one type of protocol within the datagram of a different protocol. For example, VPN uses PPTP to encapsulate IP packets over a public network, such as the Internet.

Question #33

A network that separates an organization’s private network from a public network is a/an: A. Firewall

B. Extranet

C. Perimeter

D. Internet

Reveal Solution Hide Solution

Correct Answer: C

Explanation:

A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.

Question #34

Which type of network is most vulnerable to intrusion?

  • A . Dial-up
  • B . Wireless
  • C . Broadband
  • D . Leased line

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior.

Question #35

Attenuation in a wireless network signal is a result of:

  • A . Number of wireless nodes connected.
  • B . Distance from the access point.
  • C . Interference from cellular phones.
  • D . Encryption of the signal.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Solid objects greatly attenuate (reduce) Wi-Fi radio signals, so clear line of sight is best.

Question #36

Which type of network covers the broadest area?

  • A . WAN
  • B . CAN
  • C . LAN
  • D . PAN

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines.

Question #37

In local area network (LAN) topologies, the primary media access methods are: (Choose two.)

  • A . Contention
  • B . Negotiation
  • C . Kerberos
  • D . Token passing

Reveal Solution Hide Solution

Correct Answer: AD
AD

Explanation:

Media contention occurs when two or more network devices have data to send at the same time. Because multiple devices cannot talk on the network simultaneously, some type of method must be used to allow one device access to the network media at a time. This is done in two main ways: carrier sense multiple access collision detect (CSMA/CD) and token passing.

Question #38

In a physical star topology, the central device is referred to as a:

  • A . Bridge
  • B . Server
  • C . segmenter
  • D . Hub

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

In local area networks with a star topology, each network host is connected to a central hub with a point-to­point connection.

Question #39

Which technology can you use to extend an internal network across shared or public networks?

  • A . VLAN
  • B . Microsoft ASP-NET
  • C . Microsoft .NET Framework
  • D . VPN

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

VPN is a network that is constructed by using public wires ― usually the Internet ― to connect to a private network, such as a company’s internal network.

Question #40

Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)

  • A . 802.1 If
  • B . 802.11g
  • C . 802.11k
  • D . 802.11m
  • E . 802.11n

Reveal Solution Hide Solution

Correct Answer: BE
BE

Explanation:

The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that use the same basic protocol. 802.11-1997 was the first wireless networking standard in the family, but 802.11b was the first widely accepted one, followed by 802.11a, 802.11g, 802.11n, and 802.11ac.

Question #41

What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point?

  • A . The access point will transmit, but the node will be unable to receive.
  • B . A connection will be established.
  • C . Both the node and the access point will be unable to transmit.
  • D . The node will transmit, but the access point will be unable to receive.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Question #41

What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point?

  • A . The access point will transmit, but the node will be unable to receive.
  • B . A connection will be established.
  • C . Both the node and the access point will be unable to transmit.
  • D . The node will transmit, but the access point will be unable to receive.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Question #43

Which technology provides the highest bit rate?

  • A . T1
  • B . El
  • C . DS3
  • D . ISDN

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

A DS3 line (sometimes also referred to as T3) is a dedicated, high bandwidth, fiber circuit with a speed of 45 Mbps.

Incorrect: Not A: T1, 1.544Mbps Not B: E1, 2.048Mbps Not D: SDN 30B+1D (all 64K) ~ E1: 1.930Mbps

Question #44

A VPN is a/an:

  • A . Encrypted connection across the Internet.
  • B . Virtual network within your local area network (LAN).
  • C . Communication tunnel between VLANs.
  • D . Personal network for your use only.

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

VPN is a network that is constructed by using public wires ― usually the Internet ― to connect to a private network, such as a company’s internal network.

There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

Question #45

Which of the following determines the media access method that is used in a network?

  • A . Number of hosts connected to the network
  • B . Number of domain servers on the segment
  • C . Maximum speed of the media
  • D . Topology and protocols

Reveal Solution Hide Solution

Correct Answer: D
Question #46

Which wireless authentication method provides the highest level of security?

  • A . Wired Equivalency Privacy (WEP)
  • B . IEEE 802.lln
  • C . WI-FI Protected Access (WPA)
  • D . IEEE 802.11a

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

WPA aims to provide stronger wireless data encryption than WEP.

Wi-Fi Protected Access (WPA) is a security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.

Question #47

The topology of a local area network (LAN) is defined by the:

  • A . Number of devices to connect.
  • B . Physical and logical characteristics.
  • C . Distance between workstations.
  • D . Type of cable being used.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network and may be depicted physically or logically.

Question #48

The maximum throughput of an 802.llg network is:

  • A . 2.4 GHz.
  • B . 54 GHz.
  • C . 2.4 Mbps
  • D . 54 Mbps.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

The 802.11g standard for wireless networking supports a maximum bandwidth of 54 Mbps.

Question #49

A node within a local area network (LAN) must have a network interface device and a:

  • A . Network account
  • B . Table of all network nodes
  • C . Host address
  • D . Resource to share

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

In network addressing, the host address, or the host ID portion of an IP address, is the portion of the address used to identify hosts (any device requiring a Network Interface Card, such as a PC or networked printer) on the network.

Question #50

Which of the following is a Layer 2 WAN protocol?

  • A . Point-to-Point Protocol (PPP)
  • B . Simple Network Management Protocol (SNMP)
  • C . Transmission Control Protocol (TCP)
  • D . Internet Protocol (IP)

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

WAN Protocols and Their Corresponding OSI Layers



Question #51

Which type of port is used to support VLAN traffic between two switches?

  • A . Virtual port
  • B . WAN port
  • C . Trunk port
  • D . LAN port

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Trunk links are required to pass VLAN information between switches.

Question #52

The protocol that maps IP addresses to a Media Access Control (MAC) address is:

  • A . Internet Message Access Protocol (IMAP).
  • B . Dynamic Host Configuration Protocol (DHCP).
  • C . Routing Information Protocol (RIP).
  • D . User Datagram Protocol (UDP).
  • E . Address Resolution Protocol (ARP).

Reveal Solution Hide Solution

Correct Answer: E
E

Explanation:

Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address (MAC address) that is recognized in the local network.

Question #53

A user reports that she cannot connect to network resources from a computer on the company network.

The user was able to connect to the network resources yesterday. You verify that the user’s computer is properly physically connected to the network. You discover that the computer’s IP address is 169.254.48.97.

You need to restore access to network resources.

What should you do next?

  • A . Flush the cache on the DNS server.
  • B . Reset the user’s password on the server.
  • C . Check your router’s current routing tables.
  • D . Verify that the DHCP service is available.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Question #53

A user reports that she cannot connect to network resources from a computer on the company network.

The user was able to connect to the network resources yesterday. You verify that the user’s computer is properly physically connected to the network. You discover that the computer’s IP address is 169.254.48.97.

You need to restore access to network resources.

What should you do next?

  • A . Flush the cache on the DNS server.
  • B . Reset the user’s password on the server.
  • C . Check your router’s current routing tables.
  • D . Verify that the DHCP service is available.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

Question #55

The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is:

  • A . corp
  • B . com
  • C . nwtraders
  • D . exchange
  • E . mail

Reveal Solution Hide Solution

Correct Answer: E
E

Explanation:

Hostnames are composed of series of labels concatenated with dots, as are all domain names. For example, let’s break mail.google.com into its component parts:

mail is the host or local hostname; and google.com is the domain or parent domain name.

Question #56

To which IP configuration does the CIDR notation 192.168.1.1/25 refer?

  • A . 192.168.1.1 255.255.255.64
  • B . 192.168.1.1 255.255.255.1
  • C . 192.168.1.1 255.255.255.32
  • D . 192.168.1.1 255.255.255.256
  • E . 192.168.1.1 255.255.255.128

Reveal Solution Hide Solution

Correct Answer: E
E

Explanation:

Reference: http://www.subnet-calculator.com/


Question #57

Which command is used to verify that a server is connected to the network?

  • A . IPCONFIG
  • B . ROUTE
  • C . PING
  • D . CHECK

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.

Question #58

Which of these represents the Internet Protocol version 6 (IPv6) loopback address?

  • A . 127.0.0.1
  • B . 192.168.0.1
  • C . FEC0:A8C0::AA01
  • D . ::1

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

The localhost (loopback) address, 0:0:0:0:0:0:0:1, and the IPv6 unspecified address, 0:0:0:0:0:0:0:0, are reduced to ::1 and ::, respectively.

Question #59

Which of these addresses is a multicast address?

  • A . 127.0.0.1
  • B . 169.254.0.1
  • C . 192.168.0.1
  • D . 224.0.0.1

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

The full range of multicast addresses is from 224.0.0.0 to 239.255.255.255.

Question #60

Which of the following uses pointer records and A records?

  • A . IDS
  • B . DNS Server
  • C . NAT Server
  • D . IPS

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

DNS records include:

* A Address record

* PTR Pointer record

Question #61

The ipconfig command will:

  • A . Configure routers
  • B . Display a client’s address
  • C . Display a client’s broadcast mode
  • D . Configure DHCP clients

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

ipconfig Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.

Question #62

One reason to incorporate VLANs in a network is to:

  • A . Increase the number of available IP addresses.
  • B . Increase the number of available Media Access Control (MAC) addresses.
  • C . Reduce the number of broadcast domains.
  • D . Reduce the number of nodes in a broadcast domain.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

VLANs provide the following advantages:

* VLANs enable logical grouping of end-stations that are physically dispersed on a network. …

* VLANs reduce the need to have routers deployed on a network to contain broadcast traffic. …

* Confinement of broadcast domains on a network significantly reduces traffic.

By confining the broadcast domains, end-stations on a VLAN are prevented from listening to or receiving broadcasts not intended for them. Moreover, if a router is not connected between the VLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs.

Question #63

Which of these is an application layer protocol?

  • A . TCP
  • B . FTP
  • C . IP
  • D . UDP

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

FTP is an application layer protocol.

Question #64

The top-level domain of www.adventureworks.com is:

  • A . www
  • B . adventureworks
  • C . adventureworks.com
  • D . com

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.

Question #65

At what layer in the OSI model are hardware addresses referenced?

  • A . Network
  • B . Application
  • C . Data link
  • D . Physical

Reveal Solution Hide Solution

Correct Answer: C
Question #66

You need to divide a network into three subnets.

Which device should you use?

  • A . Hub
  • B . Bridge
  • C . Router
  • D . Segmenter

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

You can use a router to divide your network into subnets.

Question #67

The type of connector used on a 100BaseT Ethernet cable is:

  • A . RJ-11
  • B . RJ-45.
  • C . TNC.
  • D . BNC.

Reveal Solution Hide Solution

Correct Answer: B
Question #68

In addition to switching, multilayer switches also:

  • A . Provide Layer 3 routing functions.
  • B . Interface with CAT3, CATS, CAT5e, and fiber optics.
  • C . Support 10 MB, 100 MB, and 1 GB local area network (LAN) ports.
  • D . Operate by using only Layer 1 and 2 protocols.

Reveal Solution Hide Solution

Correct Answer: A
Question #69

One reason to replace an unmanaged switch with a managed switch is to:

  • A . Manage the routing tables.
  • B . Support multiple VLANS.
  • C . Reduce collision domains.
  • D . Route between networks,

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.

The major difference between the packet switching operation of a router and that of a Layer 3 switch is the physical implementation. In general-purpose routers, packet switching takes place using software that runs on a microprocessor, whereas a Layer 3 switch performs this using dedicated application-specific integrated circuit (ASIC) hardware.

Question #70

To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a:

  • A . Crossover cable
  • B . Straight cable
  • C . Rollover cable
  • D . Coaxial cable

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together directly. Normal straight through cables were used to connect from a host network interface controller (a computer or similar device) to a network switch, hub or router.

Question #71

The function of a router is to:

  • A . Provide IP subnet masks for hosts.
  • B . Forward traffic to other networks.
  • C . Broadcast routing tables to clients.
  • D . Store tables for name resolution.

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP’s network. Routers are located at gateways, the places where two or more networks connect.

Question #72

If a router cannot determine the next hop for a packet, the router will:

  • A . Forward the packet to the default route.
  • B . Send the packet back to the packet’s source.
  • C . Broadcast the packet.
  • D . Store the packet in the memory buffer.

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

If there is no next hop, the packets are not policy routed.

A default route of a computer that is participating in computer networking is the packet forwarding rule (route) taking effect when no other route can be determined for a given Internet Protocol (IP) destination address.

Question #73

In which physical network topology is each computer connected to a central point?

  • A . Star
  • B . Mesh
  • C . Ring
  • D . Bus

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

In local area networks with a star topology, each network host is connected to a central hub with a point-to­point connection.

Question #74

Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)

  • A . Token ring
  • B . Ethernet
  • C . Dial-up
  • D . Leased line

Reveal Solution Hide Solution

Correct Answer: CD
CD

Explanation:

Token ring and Ethernet are used in LANs.

Question #75

A private network that allows members of an organization to exchange data is an:

  • A . Extranet
  • B . Ethernet
  • C . Intranet
  • D . Internet

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization. This term is used in contrast to extranet, a network between organizations, and instead refers to a network within an organization.

Question #76

Security is a concern on wireless networks due to:

  • A . The radio broadcast access method.
  • B . Spread spectrum issues.
  • C . Frequency modulation issues.
  • D . The potential for cross-talk.

Reveal Solution Hide Solution

Correct Answer: A
Question #77

A characteristic of the mesh topology is that it:

  • A . Uses a central hub.
  • B . Cannot use wired connections.
  • C . Uses redundant paths.
  • D . Cannot use wireless connections.

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Mesh network topology is one of the key network architectures in which devices are connected with many redundant interconnections between network nodes such as routers and switches. In a mesh topology, if any cable or node fails, there are many other ways for two nodes to communicate.

Question #78

To protect a network when it is connected to the Internet, you should use a:

  • A . Bridge
  • B . Firewall
  • C . Switch
  • D . Router

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings.

Question #79

One purpose of a perimeter network is to:

  • A . Make resources available to the intranet.
  • B . Link campus area networks (CANs).
  • C . Link local area networks (LANs).
  • D . Make resources available to the Internet.

Reveal Solution Hide Solution

Correct Answer: D
D

Explanation:

In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization’s local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.

Question #80

Which protocol can be used to encrypt packets on the Internet?

  • A . SNMP
  • B . HTTPS
  • C . TFTP
  • D . HTTP

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

HTTPS, which stands for Hypertext Transfer Protocol Secure, makes it more difficult for hackers, the NSA, and others to track users. The protocol makes sure the data isn’t being transmitted in plain-text format, which is much easier to eavesdrop on.

Question #81

The service that resolves fully qualified domain names (FQDN) to IP addresses is:

  • A . Windows Internet Name Service (WINS).
  • B . Domain Name Service (DNS).
  • C . Internet Service Provider (ISP).
  • D . Address Resolution Protocol (ARP).

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites.

Question #82

DRAG DROP

Order the layers of the OSI model:

Reveal Solution Hide Solution

Correct Answer:

Explanation:



Question #83

If a router is installed so that it separates a DHCP server from its clients, the clients will:

  • A . Immediately lose connectivity to all segments.
  • B . Be unable to obtain their leases from the server.
  • C . Immediately lose connectivity to the local segment.
  • D . Receive an immediate renewal of their lease.

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version