100% Real Questions & Correct Answers from Lead2pass
Vendor: Microsoft Exam Code: 98-366 Exam Name: Networking Fundamentals Question 71—Question 80 Click to Download All 98-366 Q&As From Lead2pass QUESTION 71 Which wireless communication problem is caused by electromagnetic waves? A. Fading B. Attenuation C. Interference D. Diffraction Answer: C Explanation: Because the air is shared by all transmitters, transmissions by any device at the same frequency as an access point's radio can cause interference. Because 802.11 wireless networks operate in unlicensed bands used by many technologies, such as microwave ovens, video surveillance cameras, cordless phones, they are subject to interference.
QUESTION 72 An Action Center alert recommends that you enable Windows Firewall. After enabling the firewall, you can no longer access websites. Which two TCP ports should you add exceptions for on the firewall? (Choose two.) A. Port 21 B. Port 23 98-366 Dumps
98-366 Exam Questions
98-366 New Questions
98-366 VCE
98-366 PDF
Get Full Version 98-366 Q&As From Lead2pass: https://www.lead2pass.com/98-366.html
100% Real Questions & Correct Answers from Lead2pass
C. Port 25 D. Port 80 E. Port 443 Answer: DE Explanation: Port 80: HTTP Port 443: HTTPS
QUESTION 73 What are two advantages of using star topology rather than ring topology in a computer lab workgroup? (Choose two.) A. Failure of a central connectivity device does not bring down the entire network. B. A central connection point allows for flexibility and scalability. C. Data travels on redundant paths, so one cable cannot stop its transmission. D. A cable problem within the group affects two nodes, at most. Answer: BD
QUESTION 74 What are three characteristics of Ethernet network topology? (Choose three.) A. It uses tokens to avoid collisions on the network. B. It can use coaxial, twisted pair, and fiber optic media. C. It comprises the largest share of the networks in place today. D. It is a non-switching protocol. E. It can negotiate different transmission speeds. Answer: BCE Explanation: B: Ethernet networks can use coax, twisted-pair, or fibre optic cabling. C: Ethernet is the most widely used network topology. E: Speed can be negotiated on Ethernet network. Incorrect: not A: Tokes is used in ring topologies. The two possible topologies for Ethernet are bus and star. 98-366 Dumps
98-366 Exam Questions
98-366 New Questions
98-366 VCE
98-366 PDF
Get Full Version 98-366 Q&As From Lead2pass: https://www.lead2pass.com/98-366.html
100% Real Questions & Correct Answers from Lead2pass
Not D: A network topology is not a protocol. Switching can be performed on Ethernet networks.
QUESTION 75 This question requires that you evaluate the underlined text to determine if it is correct. Plain old telephone service (POTS), most ISDN lines, and switched T1 lines are all examples of Message Switching. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct. A. Circuit Switching B. Packet Switching C. FDDI Switching D. No change is needed Answer: A Explanation: * Examples of circuit-switched networks Public switched telephone network (PSTN) ISDN B-channel * You can get a circuit-switched T1, while frames clouds on T1s are usually packet-switched.
QUESTION 76 Hotspot Question For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
98-366 Dumps
98-366 Exam Questions
98-366 New Questions
98-366 VCE
98-366 PDF
Get Full Version 98-366 Q&As From Lead2pass: https://www.lead2pass.com/98-366.html
100% Real Questions & Correct Answers from Lead2pass
Answer:
Explanation: NO. No. YES. In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network.
QUESTION 77 98-366 Dumps
98-366 Exam Questions
98-366 New Questions
98-366 VCE
98-366 PDF
Get Full Version 98-366 Q&As From Lead2pass: https://www.lead2pass.com/98-366.html
100% Real Questions & Correct Answers from Lead2pass
Hotspot Question You are an intern for Contoso Ltd. Your supervisor asks you to configure the security zones for three new PCs so that they are able to connect to two web servers. The servers connect to the three new PCs as shown in the following image:
Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.
98-366 Dumps
98-366 Exam Questions
98-366 New Questions
98-366 VCE
98-366 PDF
Get Full Version 98-366 Q&As From Lead2pass: https://www.lead2pass.com/98-366.html
100% Real Questions & Correct Answers from Lead2pass
Answer:
Explanation: * Trusted sites The level of security set for Trusted sites is applied to sites that you have specifically indicated to be ones that you trust not to damage your computer or information. * Local intranet The level of security set for the Local intranet zone is applied to websites and content that is stored on a corporate or business network.
QUESTION 78 Your home computer is having problems accessing the Internet. You suspect that your Internet router's DHCP service is not functioning, so you check your computer's IP address. Which address indicates that your router's DHCP service is NOT functioning? A. 169.254.1.15 B. 172.16.1.15 C. 192.168.1.15 98-366 Dumps
98-366 Exam Questions
98-366 New Questions
98-366 VCE
98-366 PDF
Get Full Version 98-366 Q&As From Lead2pass: https://www.lead2pass.com/98-366.html
100% Real Questions & Correct Answers from Lead2pass
D. 10.19.1.15 Answer: A Explanation: 169.254.1.15 is an APIPA address. An APIPA address is used when the DHCP server is not available.
QUESTION 79 Which of these is a public address space? A. 192.168.0.0/16 B. 197.16.0.0/12 C. 10.0.0.0/8 D. 172.16.0.0/12 Answer: B Explanation: Incorrect: The private address space specified in RFC 1918 is defined by the following three address blocks: not A: 192.168.0.0/16 The 192.168.0.0/16 private network can be interpreted either as a block of 256 class C network IDs or as a 16-bit assignable address space (16 host bits) that can be used for any subnetting scheme within the private organization. The 192.168.0.0/16 private network allows the following range of valid IP addresses: 192.168.0.1 to 192.168.255.254. Not C: 10.0.0.0/8 The 10.0.0.0/8 private network is a class A network ID that allows the following range of valid IP addresses: 10.0.0.1 to 10.255.255.254. The 10.0.0.0/8 private network has 24 host bits that can be used for any subnetting scheme within the private organization. Not D: 172.16.0.0/12 The 172.16.0.0/12 private network can be interpreted either as a block of 16 class B network IDs or as a 20-bit assignable address space (20 host bits) that can be used for any subnetting scheme within the private organization. The 172.16.0.0/12 private network allows the following range of valid IP addresses: 172.16.0.1 to 172.31.255.254.
QUESTION 80 98-366 Dumps 98-366 Exam Questions
98-366 New Questions
98-366 VCE
98-366 PDF
Get Full Version 98-366 Q&As From Lead2pass: https://www.lead2pass.com/98-366.html
100% Real Questions & Correct Answers from Lead2pass
This question requires that you evaluate the underlined text to determine if it is correct. In a wireless network that requires an SSL certificate, WEP handles the SSL certificate. Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct. A. 802.1X B. WPA2-PSK C. WPA-PSK D. No change is needed Answer: A Explanation: 802.1x This deployment scenario requires server certificates for each NPS server that performs 802.1X authentication.
98-366 Dumps
98-366 Exam Questions
98-366 New Questions
98-366 VCE
98-366 PDF
Get Full Version 98-366 Q&As From Lead2pass: https://www.lead2pass.com/98-366.html