Act now and download your Microsoft 98-366 test today! Do not waste time for the worthless Microsoft 98-366 tutorials. Download Replace Microsoft MTA Networking Fundamentals exam with real questions and answers and begin to learn Microsoft 98-366 with a classic professional.
Q41. You are setting up a network computer game.
You need to open up ports on your firewall so your friends can join the network.
Which command displays the ports that your computer is listening for?
A. nslookup
B. nbtstat
C. ping
D. netstat
Answer: A
Q42. The function of a router is to:
A. Provide IP subnet masks for hosts.
B. Forward traffic to other networks.
C. Broadcast routing tables to clients.
D. Store tables for name resolution.
Answer: B
Q43. Which of the following is a Layer 2 WAN protocol?
A. Point-to-Point Protocol (PPP)
B. Simple Network Management Protocol (SNMP)
C. Transmission Control Protocol (TCP)
D. Internet Protocol (IP)
Answer: A
Q44. DRAG DROP
Match each IP address to its corresponding IPv4 address class.
To answer, drag the appropriate IP address from the column on the left to its IPv4 address class on the right. Each IP address may be used once, more than once, or not at all. Each correct match is worth one point.
Answer:
Q45. Which type of port is used to support VLAN traffic between two switches?
A. Virtual port
B. WAN port
C. Trunk port
D. LAN port
Answer: C
Q46. A node within a local area network (LAN) must have which two of the following? (Choose two.)
A. Username and password
B. Share name
C. NIC
D. IP address
E. Table of all network nodes
Answer: B,E
Q47. DRAG DROP
Match each network type to its corresponding definition.
To answer, drag the appropriate network type from the column on the left to its definition on the right. Each network type may be used once, more than once, or not at all. Each correct match is worth one point.
Answer:
Q48. This question requires that you evaluate the underlined text to determine if it is correct.
WEP wireless encryption is the most susceptible to interception and decryption.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct
A. WPA-AES
B. WPA2
C. WPA-PSK
D. No change is needed
Answer: D
Q49. Attenuation in a wireless network signal is a result of:
A. Number of wireless nodes connected.
B. Distance from the access point.
C. Interference from cellular phones.
D. Encryption of the signal.
Answer: B
Q50. Which technology can you use to extend an internal network across shared or public networks?
A. VLAN
B. Microsoft ASP-NET
C. Microsoft .NET Framework
D. VPN
Answer: D