2024 Microsoft Official New Released 98-366 Q&As
100% Free Download! 100% Pass Guaranteed!
https://www.certleader.com/98-366-dumps.html
Q1. HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:  Q2. To which IP configuration does the CIDR notation 192.168.1.1/25 refer? A. 192.168.1.1 255.255.255.64 B. 192.168.1.1 255.255.255.1 C. 192.168.1.1 255.255.255.32 D. 192.168.1.1 255.255.255.256 E. 192.168.1.1 255.255.
Q1. One purpose of a perimeter network is to: A. Make resources available to the intranet. B. Link campus area networks (CANs). C. Link local area networks (LANs). D. Make resources available to the Internet. View AnswerAnswer: D Q2. HOTSPOT You are an intern for Contoso Ltd. Your supervisor asks you to configure the security zones for three new PCs so that they are able to connect to tw
Q1. This question requires that you evaluate the underlined text to determine if it is correct. The NTP value in a resource record indicates a length of time that other DNS servers use to determine how long to cache information for a record before expiring and discarding it. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'
Q1. Which of the following represents a Media Access Control (MAC) address? A. GV:ZC:KK:DK:FZ:CA B. 255.255.255.0 C. 05:35:AB:6E:Al:25 D. 127.0.0.1 View AnswerAnswer: C Q2. You are helping a friend set up a public-facing web server for a home office. Your friend wants to protect the internal network from intrusion. What should you do? A. Set the web server in a perimeter network. B. S
Q1. HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:  Q2. Two companies want to share data by using the Internet. Which type of network provides the solution? A. Ethernet B. Intranet C. Extranet D. Perimeter View AnswerAnswer: C Q3. This question requires that you eva
Q1. Which of the following is a public IP address? A. 10.156.89.1 B. 68.24.78.221 C. 172.16.152.48 D. 192.168.25.101 View AnswerAnswer: B Q2. A Media Access Control (MAC) address identifies a/an: A. UPnP device. B. Local broadcast domain. C. Network interface card (NIC). D. Local area network (LAN). View AnswerAnswer: C Q3. How many bits are there in an Internet Protocol version 6
Q1. This question requires that you evaluate the underlined text to determine if it is correct. WEP wireless encryption is the most susceptible to interception and decryption. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct A. WPA-AES B. WPA2 C. WPA-PSK D. No ch
Q1. What is the default subnet mask for a Class C Internet network? A. 255.255.255.252 B. 255.255.255.240 C. 255.255.255.192 D. 255.255.255.0 View AnswerAnswer: D Q2. If a router cannot determine the next hop for a packet, the router will: A. Forward the packet to the default route. B. Send the packet back to the packet's source. C. Broadcast the packet. D. Store the packet in the
Q1. DRAG DROP Order the layers of the OSI model: View AnswerAnswer:  Q2. Which of the following uses a tunneling protocol? A. Internet B. VPN C. Extranet D. VLAN View AnswerAnswer: B Q3. HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. View AnswerAnswer:  Q4. What is the minimum cabl
Q1. The service that resolves fully qualified domain names (FQDN) to IP addresses is: A. Windows Internet Name Service (WINS). B. Domain Name Service (DNS). C. Internet Service Provider (ISP). D. Address Resolution Protocol (ARP). View AnswerAnswer: B Q2. Which command is used to verify that a server is connected to the network? A. IPCONFIG B. ROUTE C. PING D. CHECK View AnswerAnswer
Q1. The ipconfig command will: A. Configure routers B. Display a client's address C. Display a client's broadcast mode D. Configure DHCP clients View AnswerAnswer: B Q2. Which wireless authentication method provides the highest level of security? A. Wired Equivalency Privacy (WEP) B. IEEE 802.lln C. WI-FI Protected Access (WPA) D. IEEE 802.11a View AnswerAnswer: C Q3. What
Q1. Which subnet mask is valid? A. 255.255.255.240 B. 255.255.255.228 C. 255.255.255.164 D. 255.255.255.245 View AnswerAnswer: A Q2. Which of these factors has the biggest impact on data transmission speed in a wireless network? A. The access method used for the network B. The transmission standard of the equipment used C. The use of strong encryption for transmissions D. The transmis
Q1. Which two are published IEEE 802.11 wireless transmission standards? (Choose two.) A. 802.1 If B. 802.11g C. 802.11k D. 802.11m E. 802.11n View AnswerAnswer: B,E Q2. This question requires that you evaluate the underlined text to determine if it is correct. A secondary zone is the first DNS zone to which all updates for the records that belong to that zone are written. Select the c
Q1. Which protocol is responsible for automatically assigning IP addresses? A. HTTP B. DHCP C. DNS D. WINS View AnswerAnswer: A Q2. A university has network links between various locations. Where would a T3 connection be appropriate? A. Server to network in the main campus server room B. Main campus to a large satellite campus C. Computer lab PC to lab printer D. Library laptop PC to I
Q1. A node within a local area network (LAN) must have which two of the following? (Choose two.) A. Username and password B. Share name C. NIC D. IP address E. Table of all network nodes View AnswerAnswer: B,E Q2. The default port used for SMTP is: A. 23 B. 25 C. 80 D. 8080 View AnswerAnswer: B Q3. HOTSPOT For each of the following statements, select Yes if the statement is true
Q1. HOTSPOT You are an intern for Contoso Ltd. Your supervisor asks you to configure the security zones for three new PCs so that they are able to connect to two web servers. The servers connect to the three new PCs as shown in the following image: Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point. View AnswerAnswer: Â
Q1. This question requires that you evaluate the underlined text to determine if it is correct. The loopback address of your computer is 127.0.0.1. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. 10.0.1.1 B. 169.254.0.5 C. 192168.1.1 D. No change is needed View Answ
Q1. HOTSPOT You are studying for finals in the student lounge. When your laptop is connected to the wireless network, access to the Internet is slow. When you plug your laptop into a wall jack, you can no longer access the Internet at all. You run the ipconfig /all command. The results are shown in the following image: Use the drop-down menus to select the answer choice that completes each stat
Q1. The default gateway address identifies the: A. Device that will connect the computer to the local network. B. Device that will connect the computer to a remote network. C. Server that will provide name services for the computer. D. Server that will authenticate the user of the computer. View AnswerAnswer: B Q2. What are three characteristics of Ethernet network topology? (Choose three
Q1. This question requires that you evaluate the underlined text to determine if it is correct. The four IEEE standards, 802.11a, b, g, and n, are collectively known as mobile ad hoc networks. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. WiMAX B. Bluetooth C. WiFiÂ