98-366 Exam - MTA Networking Fundamentals

certleader.com

Q1. This question requires that you evaluate the underlined text to determine if it is correct. 

The loopback address of your computer is 127.0.0.1. 

Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. 

A. 10.0.1.1 

B. 169.254.0.5 

C. 192168.1.1 

D. No change is needed 

Answer:

Q2. This question requires that you evaluate the underlined text to determine if it is correct. 

IPv4 multicast addresses range from 192.168.0.0 to 192.168.255.255. 

Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct. 

A. 127.0.0.0 to 127.255.255.255 

B. 172.16.0.0 to 172.31.255.255 

C. 224.0.0.0 to 239.255.255.255 

D. No change is needed 

Answer:

Q3. A node within a local area network (LAN) must have a network interface device and a: 

A. Network account 

B. Table of all network nodes 

C. Host address 

D. Resource to share 

Answer:

Q4. HOTSPOT 

For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. 

Answer:  

Q5. DRAG DROP 

Match the VPN connection type to the corresponding definition. 

To answer, drag the appropriate VPN term from the column on the left to its definition on the right. Each term may be used once, more than once, or not at all. Each correct match is worth one point. 

Answer:  

Q6. The default subnet mask for a Class B network is: 

A. 0.0.0.255 

B. 0.0.255.255 

C. 255.0.0.0 

D. 255.255.0.0 

Answer:

Q7. Which command is used to verify that a server is connected to the network? 

A. IPCONFIG 

B. ROUTE 

C. PING 

D. CHECK 

Answer:

Q8. DRAG DROP 

Match each set of characteristics to the corresponding 802.11 standard. 

To answer, drag the appropriate set of characteristics from the column on the left to its 

802.11 standard on the right. Each set may be used once, more than once, or not at all. Each correct match is worth one point. 

Answer:  

Q9. What are two characteristics of the CSMA/CD access method? (Choose two.) 

A. It checks to see if a collision has been detected. 

B. It does a round robin search for requests to transmit from all nodes on the network. 

C. It signals its intent to transmit on the network. 

D. It waits until the transmission medium is idle. 

Answer: B,C 

Q10. This question requires that you evaluate the underlined text to determine if it is correct. 

According to the OSI model, encryption takes place on the transport layer. 

Select the correct answer if the underlined text does not make the statement correct. Select 

'No change is needed" if the underlined text makes the statement correct. 

A. Presentation 

B. Network 

C. Application 

D. No change is needed 

Answer: