microsoft 98-366 online test

Networking Fundamentals

What students need to know about the 98-366 exam

  • Total 204 Questions & Answers
  • Passing score: 700

Question 1

This question requires that you evaluate the underlined text to determine if it is correct.
Plain old telephone service (POTS), most ISDN lines, and switched T1 lines are all examples of "Message Switching".
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the
underlined text makes the statement correct.

  • A. Circuit Switching
  • B. Packet Switching
  • C. FDDI Switching
  • D. No change is needed
Answer:

A

Explanation:
* Examples of circuit-switched networks
Public switched telephone network (PSTN) ISDN B-channel
* You can get a circuit-switched T1, while frames clouds on T1s are usually packet-switched.

Discussions

Question 2

The query protocol used to locate resources on a network is:

  • A. User Datagram Protocol (UDP).
  • B. Lightweight Directory Access Protocol (LDAP)
  • C. Tracert
  • D. Telnet.
Answer:

B

Explanation:
The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for
accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory
services play an important role in developing intranet and Internet applications by allowing the sharing of information about
users, systems, networks, services, and applications throughout the network.

Discussions

Question 3

HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is
worth one point.
Hot Area:

Answer:

Explanation:
* No. IPv6 addresses are 128 bit in length. * No.No.
IPv6 addresses are written in eight groups of four hexadecimal digits separated by colons, such as
2001:0db8:85a3:0000:0000:8a2e:0370:7334.

Discussions

Question 4

A network device that associates a Media Access Control (MAC) address with a port is a:

  • A. DSL modem
  • B. Hub
  • C. Router
  • D. Switch
Answer:

D

Explanation:
A switch begins learning the local MAC addresses as soon as it is connected to other devices or to a network. This learning
capability makes switches easy to use on a network.
The switch learning process works like this:
1.As a PC or other networked device sends a frame to another device through the switch, the switch captures the source
MAC address of the frame and the interface that received it.
2.The switch confirms or adds the MAC address and the port to the lookup table.

Discussions

Question 5

When a client's DHCP-issued address expires, the client will:

  • A. Select a new address and request approval from the DHCP server.
  • B. Require manual configuration with a static IP address.
  • C. Attempt to obtain a new address by broadcasting.
  • D. Continue to use the address until it is notified to stop.
Answer:

C

Explanation:
Rebinding would occur.
Rebinding
If the DHCP client is unable to communicate with the DHCP server from which it obtained its lease, and 87.5 percent of its
lease time has expired, it will attempt to contact any available DHCP server by broadcasting DHCPRequest messages. Any
DHCP server can respond with a DHCPAck message, renewing the lease, or a DHCPNak message, forcing the DHCP client
to initialize and restart the lease process.
Note:
Renewing
IP addressing information is leased to a client, and the client is responsible for renewing the lease. By default, DHCP clients
try to renew their lease when 50 percent of the lease time has expired. To renew its lease, a DHCP client sends a
DHCPRequest message to the DHCP server from which it originally obtained the lease.
Reference: DHCP Client States in the Lease Process

Discussions

Question 6

This question requires that you evaluate the underlined text to determine if it is correct.
All session data is "encrypted between all machines" while using telnet.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the
underlined text makes the statement correct.

  • A. Not encrypted
  • B. Encrypted between any Windows machines
  • C. Encrypted only to any non-Windows machines
  • D. No change is needed
Answer:

A

Explanation:
Telnet, by default, does not encrypt any data sent over the connection (including passwords), and so it is often practical to
eavesdrop on the communications and use the password later for malicious purposes; anybody who has access to a router,
switch, hub or gateway located on the network between the two hosts where Telnet is being used can intercept the packets
passing by and obtain login, password and whatever else is typed with a packet analyzer.

Discussions

Question 7

This question requires that you evaluate the underlined text to determine if it is correct.
In a wireless network that requires an SSL certificate, "WEP" handles the SSL certificate.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the
underlined text makes the statement correct.

  • A. 802.1X
  • B. WPA2-PSK
  • C. WPA-PSK
  • D. No change is needed
Answer:

A

Explanation:
802.1x
This deployment scenario requires server certificates for each NPS server that performs 802.1X authentication.

Discussions

Question 8

In local area network (LAN) topologies, the primary media access methods are: (Choose two.)

  • A. Contention
  • B. Negotiation
  • C. Kerberos
  • D. Token passing
Answer:

A D

Explanation:
Media contention occurs when two or more network devices have data to send at the same time. Because multiple devices
cannot talk on the network simultaneously, some type of method must be used to allow one device access to the network
media at a time. This is done in two main ways: carrier sense multiple access collision detect (CSMA/CD) and token passing.

Discussions

Question 9

What is the maximum cable length for a single Cat5 UTP cable run?

  • A. 285 feet/86.87 meters
  • B. 328 feet/99.97 meters
  • C. 432 feet/131.67 meters
  • D. 600 feet/182.88 meters
Answer:

B

Explanation:
Cat5/5e/6 Ethernet Copper Cabling has a Maximum Segment Length of 100 Meters.

Discussions

Question 10

What are two characteristics of the CSMA/CD access method? (Choose two.)

  • A. It checks to see if a collision has been detected.
  • B. It does a round robin search for requests to transmit from all nodes on the network.
  • C. It signals its intent to transmit on the network.
  • D. It waits until the transmission medium is idle.
Answer:

A D

Explanation:
Main procedure for the CSMA/CD:
1. Is my frame ready for transmission? If yes, it goes on to the next point. 2. Is medium idle? If not, wait until it becomes
ready 3. Start transmitting.
4. Did a collision occur? If so, go to collision detected procedure.
5. Reset retransmission counters and end frame transmission.
Note:
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) is a media access control method used most notably in
local area networking using early Ethernet technology. It uses a carrier sensing scheme in which a transmitting data station
detects other signals while transmitting a frame, and stops transmitting that frame, transmits a jam signal, and then waits for
a random time interval before trying to resend the frame.

Discussions
To page 2