Microsoft Pass4sures 98-366 v2019-03-20 by David 104q
Microsoft Pass4sures 98-366 v2019-03-20 by David 104q
Microsoft Pass4sures 98-366 v2019-03-20 by David 104q
104q
Number: 98-366
Passing Score: 800
Time Limit: 120 min
98-366
Website: https://vceplus.com
VCE to PDF Converter: https://vceplus.com/vce-to-pdf/
Facebook: https://www.facebook.com/VCE.For.All.VN/
Twitter : https://twitter.com/VCE_Plus
https://vceplus.com/
Networking Fundamentals
Exam A
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 1
One advantage of dynamic routing is that it:
https://vceplus.com/
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Dynamic Routing, also called adaptive routing, describes the capability of a system, through which routes are characterized by their destination, to alter the path
that the route takes through the system in response to a change in conditions. The adaptation is intended to allow as many routes as possible to remain valid (that
is, have destinations that can be reached) in response to the change.
QUESTION 2
Which of the following represents a Media Access Control (MAC) address?
A. GV:ZC:KK:DK:FZ:CA
B. 255.255.255.0
C. 05:35:AB:6E:Al:25
D. 127.0.0.1
Correct Answer: C
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Section: (none)
Explanation
Explanation/Reference:
The standard (IEEE 802) format for printing MAC-48 addresses in human-friendly form is six groups of two hexadecimal digits, separated by hyphens (-) or colons
(:), in transmission order (e.g. 01-23-45-67-89-ab or 01:23:45:67:89:ab ).
QUESTION 3
Connecting to a private network address from a public network requires:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
The majority of NATs map multiple private hosts to one publicly exposed IP address. In a typical configuration, a local network uses one of the designated "private"
IP address subnets (RFC 1918). A router on that network has a private address in that address space. The router is also connected to the Internet with a "public"
address assigned by an Internet service provider.
QUESTION 4
A network device that associates a Media Access Control (MAC) address with a port is a:
A. DSL modem
B. Hub
C. Router
D. Switch
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
A switch begins learning the local MAC addresses as soon as it is connected to other devices or to a network. This learning capability makes switches easy to use
on a network.
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
The switch learning process works like this:
1.As a PC or other networked device sends a frame to another device through the switch, the switch captures the source MAC address of the frame and the
interface that received it.
2.The switch confirms or adds the MAC address and the port to the lookup table.
QUESTION 5
A Layer 2 device that connects multiple computers within a network is a:
A. Repeater
B. Switch
C. Router
D. Packet
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Layer 2 switching uses the media access control address (MAC address) from the host's network interface cards (NICs) to decide where to forward frames.
QUESTION 6
A cable that meets the l000BaseT standard has a maximum length of:
A. 100 m
B. 250 m
C. 500 m
D. 1,000 m
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
When used for 10/100/1000BASE-T, the maximum allowed length of a Cat 6 cable is 100 meters or 328 feet.
QUESTION 7
A router's static route is set by the:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. Adjacent network
B. Next upstream router
C. Network administrator
D. Routing protocol
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from a dynamic routing protocol to
forward traffic.
QUESTION 8
Which setting is used to determine the Domain Name System (DNS) settings on a client computer?
A. TELNET
B. NSLOOKUP
C. PATHPING
D. NETSTAT
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
nslookup is a network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS) to obtain
domain name or IP address mapping or for any other specific DNS record.
QUESTION 9
The default subnet mask for a Class B network is:
A. 0.0.0.255
B. 0.0.255.255
C. 255.0.0.0
D. 255.255.0.0
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Class A default subnet mask is 255.0.0.0.
Class B default subnet mask is 255.255.0.0.
Class C default subnet mask is 255.255.255.0.
QUESTION 10
The default port used for SMTP is:
A. 23
B. 25
C. 80
D. 8080
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
SMTP by default uses TCP port 25.
QUESTION 11
The ping tool is used to: (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip
time for messages sent from the originating host to a destination computer.
QUESTION 12
Which of the following are features of DHCP? (Choose two.)
A. IP address resolution to canonical names
B. Secure shell connections
C. Address reservation
D. Network file transfer
E. IP address exclusion
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
* The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet Protocol (IP) networks for dynamically distributing
network configuration parameters, such as IP addresses for interfaces and services.
* Some network devices need to use statically assigned IP addresses rather than addresses dynamically assigned through DHCP. For example, DHCP
servers must have statically configured IP addresses. Also, some devices (such as legacy network printers) do not support DHCP. For the devices that need
static IP assignments, the company creates an exclusion range from each IP address range.
QUESTION 13
The command-line tool used to list a host's active incoming connections is:
A. NETSTAT
B. IPCONFIG
C. NSLOOKUP
D. PING
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Used without parameters, netstat displays active TCP connections.
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Note: Netstat displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP,
TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols).
QUESTION 14
A computer that has an IP address of 169.254.0.1 cannot access the network.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
169.254.0.1 is an APIPA address. An APIPA address is used when the DHCP server is not available.
QUESTION 15
Which network does the IP address 220.100.100.100 belong to?
A. 220.100.100.0/24
B. 220.100.100.1/24
C. 255.255.255.0/24
D. 255.255.255.1/24
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
Which subnet mask is valid?
A. 255.255.255.240
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
B. 255.255.255.228
C. 255.255.255.164
D. 255.255.255.245
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
These are valid:
QUESTION 17
A service that resolves NetBIOS names to IP addresses is:
https://vceplus.com/
Correct Answer: D
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Section: (none)
Explanation
Explanation/Reference:
Windows Internet Name Service (WINS) is Microsoft's implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer
names. Effectively, WINS is to NetBIOS names what DNS is to domain names — a central mapping of host names to network addresses.
QUESTION 18
What type of DNS record maps host names to addresses?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
An A or Address record (also known as a host record) links a domain to the physical IP address of a computer hosting that domain's services.
QUESTION 19
Teredo tunneling is a protocol that:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Teredo alleviates this problem by encapsulating IPv6 packets within UDP/IPv4 datagrams, which most NATs can forward properly. Thus, IPv6-aware hosts behind
NATs can be used as Teredo tunnel endpoints even when they don't have a dedicated public IPv4 address.
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 20
What is the default subnet mask for a Class C Internet network?
A. 255.255.255.252
B. 255.255.255.240
C. 255.255.255.192
D. 255.255.255.0
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Class A default subnet mask is 255.0.0.0.
Class B default subnet mask is 255.255.0.0.
Class C default subnet mask is 255.255.255.0.
QUESTION 21
The default port used for telnet is:
A. 23
B. 25
C. 80
D. 8080
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
The telnet protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23, where a Telnet server application (telnetd) is
listening.
QUESTION 22
When a client's DHCP-issued address expires, the client will:
A. Select a new address and request approval from the DHCP server.
B. Require manual configuration with a static IP address.
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
C. Attempt to obtain a new address by broadcasting.
D. Continue to use the address until it is notified to stop.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Rebinding would occur.
Rebinding
If the DHCP client is unable to communicate with the DHCP server from which it obtained its lease, and 87.5 percent of its lease time has expired, it will attempt to
contact any available DHCP server by broadcasting DHCPRequest messages. Any DHCP server can respond with a DHCPAck message, renewing the lease, or a
DHCPNak message, forcing the DHCP client to initialize and restart the lease process.
Note:
Renewing
IP addressing information is leased to a client, and the client is responsible for renewing the lease. By default, DHCP clients try to renew their lease when 50
percent of the lease time has expired. To renew its lease, a DHCP client sends a DHCPRequest message to the DHCP server from which it originally obtained the
lease.
QUESTION 23
You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive
a response.
Why do you receive a response on the second attempt but not on the first attempt?
Correct Answer: B
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
DNS is not working.
QUESTION 24
A Media Access Control (MAC) address identifies a/an:
A. UPnP device.
B. Local broadcast domain.
C. Network interface card (NIC).
D. Local area network (LAN).
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment.
QUESTION 25
Two companies want to share data by using the Internet.
A. Ethernet
B. Intranet
C. Extranet
D. Perimeter
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
An extranet is a computer network that allows controlled access from outside of an organization's intranet. Extranets are used for specific use cases including
business-to-business (B2B).
QUESTION 26
VPNs are implemented to provide:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. A secure connection within a private network.
B. A secure connection through public networks.
C. Additional encryption by using IPSec.
D. Additional security for selected computers.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.
There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other
security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
QUESTION 27
If an 802.llg Internet connection has connectivity problems, what may be the cause?
A. A cordless phone
B. A cellular phone
C. Incandescent lights
D. Electromagnetic interference (EMI)
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Over the last 10 years 802.11 technology has made remarkable strides -- getting faster, stronger and more scalable. But one problem still haunts Wi-Fi: reliability.
Nothing is more frustrating for network managers than users complaining about flaky Wi-Fi performance, spotty coverage and dropped connections. Dealing with a
Wi-Fi environment that you can't see and that is constantly changing is the problem. And radio frequency interference is the culprit.
QUESTION 28
Which of these factors has the biggest impact on data transmission speed in a wireless network?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
D. The transmission wattage rating used on the NIC
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
The speed of a Wi-Fi wireless network connection depends on several factors.
Like most kinds of computer networks, Wi-Fi supports varying levels of performance depending on which technology standards it supports. Each Wi-Fi standard is
rated according to its maximum theoretical network bandwidth:
A Wi-Fi network connection operates at the highest possible speed that both devices (endpoints) can support. An 802.11g laptop connected to an 802.11n router,
for example, will network at the lower speeds of 'g'.
QUESTION 29
Which of the following uses a tunneling protocol?
A. Internet
B. VPN
C. Extranet
D. VLAN
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Tunneling enables the encapsulation of a packet from one type of protocol within the datagram of a different protocol. For example, VPN uses PPTP to
encapsulate IP packets over a public network, such as the Internet.
QUESTION 30
A network that separates an organization's private network from a public network is a/an:
A. Firewall
B. Extranet
C. Perimeter
D. Internet
Correct Answer: C
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Section: (none)
Explanation
Explanation/Reference:
A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a
network.
QUESTION 31
Which type of network is most vulnerable to intrusion?
A. Dial-up
B. Wireless
C. Broadband
D. Leased line
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior.
QUESTION 32
Attenuation in a wireless network signal is a result of:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Solid objects greatly attenuate (reduce) Wi-Fi radio signals, so clear line of sight is best.
QUESTION 33
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Which type of network covers the broadest area?
A. WAN
B. CAN
C. LAN
D. PAN
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or
international boundaries) using leased telecommunication lines.
QUESTION 34
In local area network (LAN) topologies, the primary media access methods are: (Choose two.)
A. Contention B.
Negotiation
C. Kerberos
D. Token passing
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Media contention occurs when two or more network devices have data to send at the same time. Because multiple devices cannot talk on the network
simultaneously, some type of method must be used to allow one device access to the network media at a time. This is done in two main ways: carrier sense
multiple access collision detect (CSMA/CD) and token passing.
QUESTION 35
In a physical star topology, the central device is referred to as a:
A. Bridge
B. Server
C. segmenter
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
D. Hub
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.
QUESTION 36
Which technology can you use to extend an internal network across shared or public networks?
A. VLAN
B. Microsoft ASP-NET
C. Microsoft .NET Framework
D. VPN
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.
QUESTION 37
Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)
A. 802.1 If
B. 802.11g
C. 802.11k
D. 802.11m
E. 802.11n
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that use the same basic protocol. 802.11-1997 was the first wireless
networking standard in the family, but 802.11b was the first widely accepted one, followed by 802.11a, 802.11g, 802.11n, and 802.11ac.
QUESTION 38
What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point?
A. The access point will transmit, but the node will be unable to receive.
B. A connection will be established.
C. Both the node and the access point will be unable to transmit.
D. The node will transmit, but the access point will be unable to receive.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
802.11g hardware is fully backward compatible with 802.11b hardware.
QUESTION 39
Which technology provides the highest bit rate?
A. T1
B. El
C. DS3
D. ISDN
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
A DS3 line (sometimes also referred to as T3) is a dedicated, high bandwidth, fiber circuit with a speed of 45 Mbps.
Incorrect:
Not A: T1, 1.544Mbps
Not B: E1, 2.048Mbps
Not D: SDN 30B+1D (all 64K) ~ E1: 1.930Mbps
QUESTION 40
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A VPN is a/an:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.
There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other
security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
QUESTION 41
Which of the following determines the media access method that is used in a network?
A. Number of hosts connected to the network B.
Number of domain servers on the segment
C. Maximum speed of the media
D. Topology and protocols
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
Which wireless authentication method provides the highest level of security?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
WPA aims to provide stronger wireless data encryption than WEP.
Wi-Fi Protected Access (WPA) is a security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.
QUESTION 43
The topology of a local area network (LAN) is defined by the:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network and
may be depicted physically or logically.
QUESTION 44
The maximum throughput of an 802.llg network is:
A. 2.4 GHz.
B. 54 GHz.
C. 2.4 MbpsD. 54 Mbps.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
The 802.11g standard for wireless networking supports a maximum bandwidth of 54 Mbps.
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 45
A node within a local area network (LAN) must have a network interface device and a:
A. Network account
B. Table of all network nodes
C. Host address
D. Resource to share
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
In network addressing, the host address, or the host ID portion of an IP address, is the portion of the address used to identify hosts (any device requiring a Network
Interface Card, such as a PC or networked printer) on the network.
QUESTION 46
Which of the following is a Layer 2 WAN protocol?
A. Point-to-Point Protocol (PPP)
B. Simple Network Management Protocol (SNMP)
C. Transmission Control Protocol (TCP)
D. Internet Protocol (IP)
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
WAN Protocols and Their Corresponding OSI Layers
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
QUESTION 47
Which type of port is used to support VLAN traffic between two switches?
A. Virtual port
B. WAN port
C. Trunk port
D. LAN port
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Trunk links are required to pass VLAN information between switches.
QUESTION 48
The protocol that maps IP addresses to a Media Access Control (MAC) address is:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address (MAC address) that is
recognized in the local network.
QUESTION 49
A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources
yesterday.
You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
169.254.48.97 is an APIPA address. An APIPA address is used when the DHCP server is not available.
QUESTION 50
The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is:
A. corp
B. com
C. nwtraders
D. exchange
E. mail
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Hostnames are composed of series of labels concatenated with dots, as are all domain names. For example, let's break mail.google.com into its component parts:
QUESTION 51
To which IP configuration does the CIDR notation 192.168.1.1/25 refer?
A. 192.168.1.1 255.255.255.64
B. 192.168.1.1 255.255.255.1
C. 192.168.1.1 255.255.255.32
D. 192.168.1.1 255.255.255.256
E. 192.168.1.1 255.255.255.128
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Reference: http://www.subnet-calculator.com/
QUESTION 52
Which command is used to verify that a server is connected to the network?
A. IPCONFIG
B. ROUTEC. PING
D. CHECK
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip
time for messages sent from the originating host to a destination computer.
QUESTION 53
Which of these represents the Internet Protocol version 6 (IPv6) loopback address?
A. 127.0.0.1
B. 192.168.0.1
C. FEC0:A8C0::AA01
D. ::1
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
The localhost (loopback) address, 0:0:0:0:0:0:0:1, and the IPv6 unspecified address, 0:0:0:0:0:0:0:0, are reduced to ::1 and ::, respectively.
QUESTION 54
Which of these addresses is a multicast address?
A. 127.0.0.1
B. 169.254.0.1
C. 192.168.0.1
D. 224.0.0.1
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
The full range of multicast addresses is from 224.0.0.0 to 239.255.255.255.
QUESTION 55
Which of the following uses pointer records and A records?
A. IDS
B. DNS Server
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
C. NAT Server
D. IPS
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
DNS records include:
*A
Address record
* PTR
Pointer record
QUESTION 56
The ipconfig command will:
A. Configure routers
B. Display a client's address
C. Display a client's broadcast mode
D. Configure DHCP clients
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
ipconfig
Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.
Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.
QUESTION 57
One reason to incorporate VLANs in a network is to:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
VLANs provide the following advantages:
* VLANs enable logical grouping of end-stations that are physically dispersed on a network. ...
* VLANs reduce the need to have routers deployed on a network to contain broadcast traffic. ...
* Confinement of broadcast domains on a network significantly reduces traffic.
By confining the broadcast domains, end-stations on a VLAN are prevented from listening to or receiving broadcasts not intended for them. Moreover, if a router is
not connected between the VLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs.
QUESTION 58
Which of these is an application layer protocol?
A. TCP
B. FTP
C. IP
D. UDP
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
FTP is an application layer protocol.
QUESTION 59
The top-level domain of www.adventureworks.com is:
A. www
B. adventureworks
C. adventureworks.com
D. com
Correct Answer: D
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet.
QUESTION 60
At what layer in the OSI model are hardware addresses referenced?
A. Network
B. Application
C. Data link
D. Physical
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 61
You need to divide a network into three subnets.
A. Hub
B. Bridge
C. Router
D. Segmenter
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
You can use a router to divide your network into subnets.
QUESTION 62
The type of connector used on a 100BaseT Ethernet cable is:
A. RJ-11
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
B. RJ-45.
C. TNC.
D. BNC.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 63
In addition to switching, multilayer switches also:
https://vceplus.com/
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 64
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
One reason to replace an unmanaged switch with a managed switch is to:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI
layers.
The major difference between the packet switching operation of a router and that of a Layer 3 switch is the physical implementation. In general-purpose routers,
packet switching takes place using software that runs on a microprocessor, whereas a Layer 3 switch performs this using dedicated application-specific integrated
circuit (ASIC) hardware.
QUESTION 65
To directly connect the Ethernet network interface cards (NICs) of two computers, you should use a:
A. Crossover cable
B. Straight cable
C. Rollover cable
D. Coaxial cable
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices together directly. Normal straight through cables were used to connect
from a host network interface controller (a computer or similar device) to a network switch, hub or router.
QUESTION 66
The function of a router is to:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. Provide IP subnet masks for hosts.
B. Forward traffic to other networks.
C. Broadcast routing tables to clients.
D. Store tables for name resolution.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its
ISP's network. Routers are located at gateways, the places where two or more networks connect.
QUESTION 67
If a router cannot determine the next hop for a packet, the router will:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
If there is no next hop, the packets are not policy routed.
A default route of a computer that is participating in computer networking is the packet forwarding rule (route) taking effect when no other route can be determined
for a given Internet Protocol (IP) destination address.
QUESTION 68
In which physical network topology is each computer connected to a central point?
A. Star
B. Mesh
C. Ring
D. Bus
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.
QUESTION 69
Which two of the following are connectivity options for wide area networks (WANs)? (Choose two.)
A. Token ring
B. Ethernet
C. Dial-up
D. Leased line
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Token ring and Ethernet are used in LANs.
QUESTION 70
A private network that allows members of an organization to exchange data is an:
A. Extranet
B. Ethernet
C. Intranet
D. Internet
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization.
This term is used in contrast to extranet, a network between organizations, and instead refers to a network within an organization.
QUESTION 71
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Security is a concern on wireless networks due to:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 72
A characteristic of the mesh topology is that it:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Mesh network topology is one of the key network architectures in which devices are connected with many redundant interconnections between network nodes such
as routers and switches. In a mesh topology, if any cable or node fails, there are many other ways for two nodes to communicate.
QUESTION 73
To protect a network when it is connected to the Internet, you should use a:
A. Bridge
B. Firewall
C. Switch
D. Router
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your
computer, depending on your firewall settings.
QUESTION 74
One purpose of a perimeter network is to:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an
organization's external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an
organization's local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.
QUESTION 75
Which protocol can be used to encrypt packets on the Internet?
A. SNMP
B. HTTPS
C. TFTP
D. HTTP
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
HTTPS, which stands for Hypertext Transfer Protocol Secure, makes it more difficult for hackers, the NSA, and others to track users. The protocol makes sure the
data isn't being transmitted in plain-text format, which is much easier to eavesdrop on.
QUESTION 76
The service that resolves fully qualified domain names (FQDN) to IP addresses is:
A. Windows Internet Name Service (WINS).
B. Domain Name Service (DNS).
C. Internet Service Provider (ISP).
D. Address Resolution Protocol (ARP).
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP
addresses of Web servers hosting those sites.
QUESTION 77
If a router is installed so that it separates a DHCP server from its clients, the clients will:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 78
Which of the following services masks internal IP addresses from outside the network?
A. DHCP
B. WINS
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
C. NAT
D. DNS
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
The majority of NATs map multiple private hosts to one publicly exposed IP address. In a typical configuration, a local network uses one of the designated "private"
IP address subnets (RFC 1918). A router on that network has a private address in that address space. The router is also connected to the Internet with a "public"
address assigned by an Internet service provider.
QUESTION 79
The query protocol used to locate resources on a network is:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed
directory information services over an Internet Protocol (IP) network.
Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks,
services, and applications throughout the network.
QUESTION 80
Tracert is used to:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
In computing, traceroute (treacert) is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet
Protocol (IP) network.
QUESTION 81
In which OSI layer does routing occur?
A. Transport
B. Network
C. Data Link
D. Physical
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
In the seven-layer OSI model of computer networking, the network layer is layer 3. The network layer is responsible for packet forwarding including routing through
intermediate routers.
QUESTION 82
What type of record does DNS use to find a mail service?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email
messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a
domain name specifies how email should be routed with the Simple Mail Transfer Protocol (SMTP).
QUESTION 83
The default gateway address identifies the:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A default gateway is the node on the computer network that the network software uses when an IP address does not match any other routes in the routing table.
In home computing configurations, an ISP often provides a physical device which both connects local hardware to the Internet and serves as a gateway.
QUESTION 84
How many bits are there in an Internet Protocol version 6 (IPv6) address?
A. 32
B. 64
C. 128
D. 256
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
IPv6 uses a 128-bit address, allowing 2**128, or approximately 3.4×10**38 addresses, or more than 7.9×10**28 times as many as IPv4, which uses 32-bit
addresses
QUESTION 85
Which of the following is a public IP address?
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. 10.156.89.1
B. 68.24.78.221
C. 172.16.152.48
D. 192.168.25.101
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Incorrect:
The private address space specified in RFC 1918 is defined by the following three address blocks:
not D: 192.168.0.0/16
The 192.168.0.0/16 private network can be interpreted either as a block of 256 class C network IDs or as a 16-bit assignable address space (16 host bits) that can
be used for any subnetting scheme within the private organization. The 192.168.0.0/16 private network allows the following range of valid IP addresses:
192.168.0.1 to 192.168.255.254.
Not A:
10.0.0.0/8
The 10.0.0.0/8 private network is a class A network ID that allows the following range of valid IP addresses: 10.0.0.1 to 10.255.255.254. The 10.0.0.0/8 private
network has 24 host bits that can be used for any subnetting scheme within the private organization.
Not C:
172.16.0.0/12
The 172.16.0.0/12 private network can be interpreted either as a block of 16 class B network IDs or as a 20-bit assignable address space (20 host bits) that can be
used for any subnetting scheme within the private organization. The 172.16.0.0/12 private network allows the following range of valid IP addresses: 172.16.0.1 to
172.31.255.254.
QUESTION 86
What is the minimum cabling requirement for a 100BaseTX network?
Correct Answer: B
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Section: (none)
Explanation
Explanation/Reference:
100BASE-TX is the predominant form of Fast Ethernet, and runs over two wire-pairs inside a category 5 or above cable.
100BASE-TX and 1000BASE-T were both designed to require a minimum of Category 5 cable and also specify a maximum cable length of 100 meters. Category 5
cable has since been deprecated and new installations use Category 5e.
QUESTION 87
Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)
A. Establishing network speed parameters
B. Verifying the client's patch level
C. Negotiating algorithms to use
D. Exchanging key information
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Internet Key Exchange (IKE) negotiates the IPSec security associations (SAs). This process requires that the IPSec systems first authenticate themselves to each
other and establish ISAKMP (IKE) shared keys.
In phase 1 of this process, IKE creates an authenticated, secure channel between the two IKE peers, called the IKE security association. The Diffie-Hellman key
agreement is always performed in this phase.
In phase 2, IKE negotiates the IPSec security associations and generates the required key material for IPSec. The sender offers one or more transform sets that
are used to specify an allowed combination of transforms with their respective settings. The sender also indicates the data flow to which the transform set is to be
applied. The sender must offer at least one transform set. The receiver then sends back a single transform set, which indicates the mutually agreed-upon
transforms and algorithms for this particular IPSec session.
QUESTION 88
This question requires that you evaluate the underlined text to determine if it is correct.
The process of replicating a zone file to multiple DNS servers is called "zone replication".
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement
correct.
A. Zone transfer
B. Zone synchronizationC. Start of authority
D. No change is needed
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
DNS zone transfer, also sometimes known by the inducing DNS query type AXFR, is a type of DNS transaction. It is one of the many mechanisms available for
administrators to replicate DNS databases across a set of DNS servers
QUESTION 89
Which DNS record type specifies the host that is the authority for a given domain?
A. NS
B. MX
C. CNAME
D. SOA
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
The start of authority (SOA) resource record indicates the name of origin for the zone and contains the name of the server that is the primary source for information
about the zone. It also indicates other basic properties of the zone.
QUESTION 90
This question requires that you evaluate the underlined text to determine if it is correct.
All session data is "encrypted between all machines" while using telnet.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement
correct.
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A. Not encrypted
B. Encrypted between any Windows machines
C. Encrypted only to any non-Windows machines
D. No change is needed
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Telnet, by default, does not encrypt any data sent over the connection (including passwords), and so it is often practical to eavesdrop on the communications and
use the password later for malicious purposes; anybody who has access to a router, switch, hub or gateway located on the network between the two hosts where
Telnet is being used can intercept the packets passing by and obtain login, password and whatever else is typed with a packet analyzer.
QUESTION 91
Which protocol is a transport layer protocol?
A. FTP
B. IP
C. UDP
D. ASCII
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Transport layer protocols include: UDP, TCP
QUESTION 92
This question requires that you evaluate the underlined text to determine if it is correct.
IPv4 multicast addresses range from "192.168.0.0 to 192.168.255.255".
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement
correct.
A. 127.0.0.0 to 127.255.255.255
B. 172.16.0.0 to 172.31.255.255
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
C. 224.0.0.0 to 239.255.255.255
D. No change is needed
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Class D is multicast.
The four IEEE standards, 802.11a, b, g, and n, are collectively known as "mobile ad hoc" networks.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement
correct.
A. WiMAX
B. Bluetooth
C. WiFi
D. No change is needed
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer
communication in the 2.4, 3.6, 5, and 60 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The
base version of the standard was released in 1997, and has had subsequent amendments. The standard and amendments provide the basis for wireless network
products using the Wi-Fi brand.
QUESTION 94
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
A university has network links between various locations. Where would a T3 connection be appropriate?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
T3 lines are a common aggregation of 28 T1 circuits that yields 44.736 Mbps total network bandwidth . Besides being used for long-distance traffic, T3 lines are
also often used to build the core of a business network at its headquarters
QUESTION 95
You work at a coffee shop. Your supervisor asks you to help set up a computer network.
Which two items should you include in the perimeter network? (Choose two.)
A. Network printer
B. Web server
C. File server
D. Wi-Fi network
E. Point of sale terminals
Correct Answer: AB
Section: (none)
Explanation
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation/Reference:
Put the web server and the network printer on the perimeter network.
The file server, wifi-network, and the Point of sale terminals should not be accessible from the internet.
Note: A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed
side of a network.
QUESTION 96
Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router? (Choose two.)
Explanation/Reference:
To install the Routing and Remote Access service
1. In the Server Manager main window, under Roles Summary, click Add roles.
-- OR --
In the Initial Configuration Tasks window, under Customize This Server, click Add roles.
2. In the Add Roles Wizard, click Next.
3. In the list of server roles, select Network Policy and Access Services. Click Next twice.
4. In the list of role services, select Routing and Remote Access Services to select all of the role services. You can also select individual server roles.
5. Proceed through the steps in the Add Roles Wizard to complete the installation. Reference: Install and Enable the Routing and Remote Access Service
QUESTION 97
What are two characteristics of fiber optic cable? (Choose two.)
A. Conducts electricity
B. Requires metal conduit
C. Supports splicing
D. Requires a polish for end connectors
Correct Answer: CD
Section: (none)
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Explanation
Explanation/Reference:
C: A mechanical splice is a junction of two or more optical fibers that are aligned and held in place by a self-contained assembly (usually the size of a large
carpenter's nail).[1] The fibers are not permanently joined, just precisely held together so that light can pass from one to another.
D: Modern connectors typically use a "physical contact" polish on the fiber and ferrule end. This is a slightly convex surface with the apex of the curve accurately
centered on the fiber, so that when the connectors are mated the fiber cores come into direct contact with one another.
Note: Optical fiber connectors are used to join optical fibers where a connect/disconnect capability is required. Due to the polishing and tuning procedures that may
be incorporated into optical connector manufacturing, connectors are generally assembled onto optical fiber in a supplier’s manufacturing facility.
QUESTION 98
Which Microsoft network service can you use to establish a connection to a corporate LAN without any user action?
A. VPN
B. Remote Desktop
C. DirectAccess
D. Nap
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
DirectAccess allows remote users to securely access internal network file shares, Web sites, and applications without connecting to a virtual private network
(VPN). An internal network is also known as a private network or intranet. DirectAccess establishes bi-directional connectivity with an internal network every time a
DirectAccess-enabled computer connects to the Internet, even before the user logs on. Users never have to think about connecting to the internal network and IT
administrators can manage remote computers outside the office, even when the computers are not connected to the VPN.
QUESTION 99
This question requires that you evaluate the underlined text to determine if it is correct.
A "secondary zone" is the first DNS zone to which all updates for the records that belong to that zone are written.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement
correct.
A. Primary zone
B. Stub zone
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
C. Conditional forwarding zone
D. No change is needed.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
When a zone that this DNS server hosts is a primary zone, the DNS server is the primary source for information about this zone, and it stores the master copy of
zone data in a local file or in AD DS.
QUESTION 100
You are setting up a network computer game.
You need to open up ports on your firewall so your friends can join the network.
Which command displays the ports that your computer is listening for?
A. nslookup
B. nbtstat
C. ping
D. netstat
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
netstat (network statistics) is a command-line tool that displays network connections for the Transmission Control Protocol (both incoming and outgoing), routing
tables, and a number of network interface (network interface controller or software-defined network interface) and network protocol statistics.
Incorrect:
not A: nslookup is used for DNS troubleshooting.
Not B: Nbtstat is designed to help troubleshoot NetBIOS name resolution problems.
Not C: ping is used to troubleshoot network connectivity.
QUESTION 101
This question requires that you evaluate the underlined text to determine if it is correct.
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
When a client computer is unable to reach a DHCP server, it will automatically assign an IP address in the "10.0.0.0 -10.0.0.255" range.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement
correct.
A. 127.0.0.0-127.0.0.255
B. 169.254.0.0-169.254.255.255
C. 192168.100.0 -192.168.100.255
D. No change is needed
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
169.254.0.0 - 169.254.255.255 is the APIPA address range. An APIPA address is used when the DHCP server is not available.
QUESTION 102
A node within a local area network (LAN) must have which two of the following? (Choose two.)
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
A node must be able to access the LAN through a network interface.
A node must also have an IP address.
QUESTION 103
This question requires that you evaluate the underlined text to determine if it is correct.
"A/anvirtual private network (VPN)" protects a network's perimeter by monitoring traffic as it enters and leaves.
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement
correct.
A. Extranet
B. Firewall
C. Intranet
D. No change is needed
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A firewall is software or hardware that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your
computer, depending on your firewall settings.
QUESTION 104
This question requires that you evaluate the underlined text to determine if it is correct.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement
correct.
A. 10.0.1.1
B. 169.254.0.5
C. 192168.1.1
D. No change is needed
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
127.0.0.1 is the IPv4 loopback address.
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online
https://vceplus.com/
www.vceplus.com - VCE Exam Simulator - Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - PDF Online