MTA Networking Fundamentals

Similar documents
Study Guide CompTIA A+ Certification, Domain 2 Networking

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (40)

SSVP SIP School VoIP Professional Certification

CONNECTING THE RASPBERRY PI TO A NETWORK

Computer Networks I Laboratory Exercise 1

Chapter 4 Connecting to the Internet through an ISP

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Domain 3.0 Networking... 1

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

Network Design. Yiannos Mylonas

Security Design.

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

Ten top problems network techs encounter

1 PC to WX64 direction connection with crossover cable or hub/switch

SSVVP SIP School VVoIP Professional Certification

Preparing the Computers for TCP/IP Networking

Lab Organizing CCENT Objectives by OSI Layer

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Networks. The two main network types are: Peer networks

9 Simple steps to secure your Wi-Fi Network.

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Access Point Configuration

Networked AV Systems Pretest

CCNA Discovery Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

Connecting to and Setting Up a Network

TestOut Network Pro English 4.0.x LESSON PLAN

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Chapter 1 Configuring Internet Connectivity

MFC7840W Windows Network Connection Repair Instructions

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Configuring Routers and Their Settings

Networking 4 Voice and Video over IP (VVoIP)

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

CCT vs. CCENT Skill Set Comparison

Network Topology Comparison

FD Wi-Fi Terminals. FD100 Ti /200 Ti /300 Ti Quick set-up Guide

Computer Networking. Definitions. Introduction

Interconnecting Cisco Networking Devices Part 2

BASIC ANALYSIS OF TCP/IP NETWORKS

Chapter 5. Data Communication And Internet Technology

City of Dublin Education & Training Board. Programme Module for. Front Line Technical Support Skills. Leading to. Level 6 FETAC 6N2056

1.3 Understand VLANs, Wired LANs, and Wireless LANs. 1.5 Understand Wide Area Network Connections

7. Configuring IPSec VPNs

Test Code: 8148 / Version 1

TECH BULLETIN NETGEN1 DOOR CONTROLLER WI-FI NETWORK CONFIG

Configuring Load Balancing

Wireless Local Area Networks (WLANs)

Exam Questions SY0-401

WISP 101. The DO s and DON T s of becoming a Wireless ISP

IEEE a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. Software Release v

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

CompTIA Network+ (Exam N10-005)

ENHWI-N n Wireless Router

MN-700 Base Station Configuration Guide

Security. TestOut Modules

Configuring Network Address Translation (NAT)

running operation mode painless TECHNICAL SPECIFICATION WAN/LAN: One 10/100 Fast Ethernet RJ-45 WPS (WiFi Protected Setup) WAN (Internet connection)

ZyAIR G-2000 Plus g Wireless 4-port Router Quick Start Guide

Configuring a WatchGuard SOHO to SOHO IPSec Tunnel

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Network Configuration Settings

Microsoft MTA Exam

Cisco Aironet Wireless Bridges FAQ

The next generation of knowledge and expertise Wireless Security Basics

Client Server Networks

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

Data Communication and Computer Network

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

N300 WiFi Range Extender WN2000RPT User Manual

Wireless Setup Guide

WUA Mbps Wireless USB Network Adapter

Important Notice. Safety Precautions. Limitation of Liability. R90 Series

Debugging Network Communications. 1 Check the Network Cabling

Chapter 2 Introduction

Local Area Networks (LANs) Blueprint (May 2012 Release)

Configuring Settings on the Cisco Unified Wireless IP Phone 7925G

Cisco Networking Professional-6Months Project Based Training

N300 Wireless Router WNR2000v4 User Manual

N150 and N300 Wireless Routers User Manual

RF550VPN and RF560VPN

Component 4: Introduction to Information and Computer Science

Mathatma Gandhi University

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Networking Technology Online Course Outline

Wireless LAN Concepts

AWG 2.0ac Ubee Equipment Reference Guide (Residential Only)

Securing end devices

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples

Design and Implementation Guide. Apple iphone Compatibility

Transcription:

98-366 - MTA Networking Fundamentals

1. This question requires that you evaluate the underlined text to determine if it is correct. In a wireless network that requires an SSL certificate, WEP handles the SSL certificate. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. 802.1X B. WPA2-PSK C. WPA-PSK D. No change is needed Answer: A 2. You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt? A. PING is improperly configured. B. The DNS is not resolving. C. The DHCP server is offline. D. NSLOOKUP is stopped. Answer: B 3. This question requires that you evaluate the underlined text to determine if it is correct. Dynamic routing is fault tolerant. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. Static routing B. Default route C. Least cost routing D. No change is needed Answer: D

4. DRAG DROP Match each protocol to its description. To answer, drag the appropriate protocol from the column on the left to its description on the right. Each protocol may be used once, more than once, or not at all. Each correct match is worth one point. Answer:

5. If a router cannot determine the next hop for a packet, the router will: A. Forward the packet to the default route. B. Send the packet back to the packet's source. C. Broadcast the packet. D. Store the packet in the memory buffer. Answer: A 6. Which of the following uses a tunneling protocol? A. Internet B. VPN C. Extranet D. VLAN Answer: B

7. Which of the following represents a Media Access Control (MAC) address? A. GV:ZC:KK:DK:FZ:CA B. 255.255.255.0 C. 05:35:AB:6E:Al:25 D. 127.0.0.1 Answer: C 8. The default port used for telnet is: A. 23 B. 25 C. 80 D. 8080 Answer: A 9. This question requires that you evaluate the underlined text to determine if it is correct. WEP wireless encryption is the most susceptible to interception and decryption. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct A. WPA-AES B. WPA2 C. WPA-PSK D. No change is needed Answer: D 10. DRAG DROP Match the VPN connection type to the corresponding definition. To answer, drag the appropriate VPN term from the column on the left to its definition on the right. Each term may be used once, more than once, or not at all. Each correct match is worth one point.

Answer: 11. HOTSPOT You are studying for finals in the student lounge. When your laptop is connected to the wireless network, access to the Internet is slow. When you plug your laptop into a wall jack, you can no longer access the Internet at all. You run the ipconfig /all command. The results are shown in the following image:

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

Answer: 12. Which feature of Category 5e STP cable reduces external interference? A. Crosstalk B. Shielding C. Length D. Twisting Answer: C

13. What are two characteristics of fiber optic cable? (Choose two.) A. Conducts electricity B. Requires metal conduit C. Supports splicing D. Requires a polish for end connectors Answer: A,C 14. HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point. Answer: 15. Security is a concern on wireless networks due to: A. The radio broadcast access method. B. Spread spectrum issues. C. Frequency modulation issues.

D. The potential for cross-talk. Answer: A 16. This question requires that you evaluate the underlined text to determine if it is correct. The loopback address of your computer is 127.0.0.1. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. 10.0.1.1 B. 169.254.0.5 C. 192168.1.1 D. No change is needed Answer: D 17. In which physical network topology is each computer connected to a central point? A. Star B. Mesh C. Ring D. Bus Answer: A 18. What are two characteristics of the CSMA/CD access method? (Choose two.) A. It checks to see if a collision has been detected. B. It does a round robin search for requests to transmit from all nodes on the network. C. It signals its intent to transmit on the network. D. It waits until the transmission medium is idle. Answer: B,C 19. Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.) A. Establishing network speed parameters

B. Verifying the client's patch level C. Negotiating algorithms to use D. Exchanging key information Answer: A,B

Powered by TCPDF (www.tcpdf.org) 98-366 Practice Exam Questions Demo Thank You for Trying Our Product * 100% Pass or Money Back All our products come with a 90-day Money Back Guarantee. * One year free update You can enjoy free update one year. 24x7 online support. * Trusted by Millions We currently serve more than 30,000,000 customers. * Shop Securely All transactions are protected by VeriSign! 100% Pass Your 98-366 Exam with Our Prep Materials Via below: