98-366 Premium Bundle

98-366 Premium Bundle

MTA Networking Fundamentals Certification Exam

4.5 
(26025 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Microsoft 98-366 Free Practice Questions

Q1. HOTSPOT 

Identify the network cable type and connector in the following graphic: 

Use the drop-down menus to select the answer choice that answers each question. Each correct selection is worth one point. 

Answer:  

Q2. Which type of network is most vulnerable to intrusion? 

A. Dial-up 

B. Wireless 

C. Broadband 

D. Leased line 

Answer:

Q3. This question requires that you evaluate the underlined text to determine if it is correct. 

IPSec policies for two machines on a LAN can be modified by using the IPSec policy snap-in on Windows 7. 

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. 

A. Windows Firewall with Advanced Security snap-in 

B. LAN adapter properties 

C. Remote Access snap-in 

D. No change is needed 

Answer:

Q4. The query protocol used to locate resources on a network is: 

A. User Datagram Protocol (UDP). 

B. Lightweight Directory Access Protocol (LDAP), 

C. Tracert 

D. Telnet. 

Answer:

Q5. This question requires that you evaluate the underlined text to determine if it is correct. 

Each IPv4 address consists of a MAC address and data-link laver address. 

Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. 

A. Network ID and a host ID 

B. DNS record and a default route 

C. 64-bit binary number divided into octets 

D. No change is needed 

Answer:

Q6. Which of these addresses is a multicast address? 

A. 127.0.0.1 

B. 169.254.0.1 

C. 192.168.0.1 

D. 224.0.0.1 

Answer:

Q7. DRAG DROP 

Match the networking topologies to their corresponding characteristics. 

To answer, drag the appropriate topology from the column on the left to its characteristic on the right. Each topology may be used once, more than once, or not at all. Each correct match is worth one point. 

Answer:  

Q8. DRAG DROP 

Match the VPN connection type to the corresponding definition. 

To answer, drag the appropriate VPN term from the column on the left to its definition on the right. Each term may be used once, more than once, or not at all. Each correct match is worth one point. 

Answer:  

Q9. What are three characteristics of Ethernet network topology? (Choose three.) 

A. It uses tokens to avoid collisions on the network. 

B. It can use coaxial, twisted pair, and fiber optic media. 

C. It comprises the largest share of the networks in place today. 

D. It is a non-switching protocol. 

E. It can negotiate different transmission speeds. 

Answer: A,B,D 

Q10. Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.) 

A. Token ring 

B. Ethernet 

C. Dial-up 

D. Leased line 

Answer: C,D 

Q11. A node within a local area network (LAN) must have a network interface device and a: 

A. Network account 

B. Table of all network nodes 

C. Host address 

D. Resource to share 

Answer:

Q12. DRAG DROP 

Match the OSI layer to its corresponding description. 

To answer, drag the appropriate OSI layer from the column on the left to its description on the right. Each OSI layer may be used once, more than once, or not at all. Each correct match is worth one point. 

Answer:  

Q13. The default port used for SMTP is: 

A. 23 

B. 25 

C. 80 

D. 8080 

Answer:

Q14. The maximum throughput of an 802.llg network is: 

A. 2.4 GHz. 

B. 54 GHz. 

C. 2.4 Mbps 

D. 54 Mbps. 

Answer:

Q15. Which network device interconnects computers in a workgroup, is able to be remotely configured, and provides the best throughput? 

A. Unmanaged switch 

B. Hub 

C. Router 

D. Managed switch 

Answer:

START 98-366 EXAM