Microsoft 98-366 exam braindumps at Ucertify tend to be updated timely to give you the most real practice materials developed by Ucertify?¡¥s certified professors. Ucertify includes a big team associated with certification exam experts. These people always preserve in touch together with the changes in the particular Microsoft Microsoft real exam papers. There must be a few changes in the particular 98-366 exam syllabus every year. So all of us should update the particular Microsoft 98-366 exam demos timely in order to supply our consumers the most recent preparatory materials.
Q91. HOTSPOT
Identify the network cable type and connector in the following graphic:
Use the drop-down menus to select the answer choice that answers each question. Each correct selection is worth one point.
Answer:
Q92. The command-line tool used to list a host's active incoming connections is:
A. NETSTAT
B. IPCONFIG
C. NSLOOKUP
D. PING
Answer: A
Q93. This question requires that you evaluate the underlined text to determine if it is correct.
All session data is encrypted between all machines while using telnet.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Not encrypted
B. Encrypted between any Windows machines
C. Encrypted only to any non-Windows machines
D. No change is needed
Answer: A
Q94. DRAG DROP
Match each protocol to its description.
To answer, drag the appropriate protocol from the column on the left to its description on the right. Each protocol may be used once, more than once, or not at all. Each correct match is worth one point.
Answer:
Q95. You work at a coffee shop. Your supervisor asks you to help set up a computer network.
The network needs to have the following items:
A public facing web server
A Wi-Fi network for customers
A private network for the point of sale terminals
An office PC
A file/print server
A network printer
You need to set up a perimeter network to protect the network.
Which two items should you include in the perimeter network? (Choose two.)
A. Network printer
B. Web server
C. File server
D. Wi-Fi network
E. Point of sale terminals
Answer: A,B
Q96. This question requires that you evaluate the underlined text to determine if it is correct.
Plain old telephone service (POTS), most ISDN lines, and switched T1 lines are all examples of Message Switching.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct.
A. Circuit Switching
B. Packet Switching
C. FDDI Switching
D. No change is needed
Answer: A
Q97. What are two advantages of using star topology rather than ring topology in a computer lab workgroup? (Choose two.)
A. Failure of a central connectivity device does not bring down the entire network.
B. A central connection point allows for flexibility and scalability.
C. Data travels on redundant paths, so one cable cannot stop its transmission.
D. A cable problem within the group affects two nodes, at most.
Answer: B,D
Q98. What are two differences between switches and hubs? (Choose two.)
A. Switches are slower than hubs because of the extra addressing functions that switches perform.
B. Switches send data to all of the computers that are connected to them for efficiency.
C. Switches are capable of sending and receiving data at the same time.
D. Switches identify the intended destination of the data that they receive.
Answer: B,C
Q99. Which protocol can be used to encrypt packets on the Internet?
A. SNMP
B. HTTPS
C. TFTP
D. HTTP
Answer: B
Q100. To protect a network when it is connected to the Internet, you should use a:
A. Bridge
B. Firewall
C. Switch
D. Router
Answer: B