Microsoft Microsoft Certifications 98-366 Questions & Answers
Question 61:
You are setting up a network computer game.
You need to open up ports on your firewall so your friends can join the network.
Which command displays the ports that your computer is listening for?
A. nslookup
B. nbtstat
C. ping
D. netstat
Correct Answer: D
netstat (network statistics) is a command-line tool that displays network connections for the Transmission Control Protocol (both incoming and outgoing), routing tables, and a number of network interface (network interface controller or
software-defined network interface) and network protocol statistics.
Incorrect:
not A: nslookup is used for DNS troubleshooting.
Not B: Nbtstat is designed to help troubleshoot NetBIOS name resolution problems.
Not C: ping is used to troubleshoot network connectivity.
Question 62:
This question requires that you evaluate the underlined text to determine if it is correct.
A "secondary zone" is the first DNS zone to which all updates for the records that belong to that zone are written.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Primary zone
B. Stub zone
C. Conditional forwarding zone
D. No change is needed.
Correct Answer: A
When a zone that this DNS server hosts is a primary zone, the DNS server is the primary source for information about this zone, and it stores the master copy of zone data in a local file or in AD DS.
Question 63:
Which Microsoft network service can you use to establish a connection to a corporate LAN without any user action?
A. VPN
B. Remote Desktop
C. DirectAccess
D. Nap
Correct Answer: C
DirectAccess allows remote users to securely access internal network file shares, Web sites, and applications without connecting to a virtual private network (VPN). An internal network is also known as a private network or intranet. DirectAccess establishes bi-directional connectivity with an internal network every time a DirectAccess-enabled computer connects to the Internet, even before the user logs on. Users never have to think about connecting to the internal network and IT administrators can manage remote computers outside the office, even when the computers are not connected to the VPN.
Question 64:
What are two characteristics of fiber optic cable? (Choose two.)
A. Conducts electricity
B. Requires metal conduit
C. Supports splicing
D. Requires a polish for end connectors
Correct Answer: CD
C: A mechanical splice is a junction of two or more optical fibers that are aligned and held in place by a self-contained assembly (usually the size of a large carpenter's nail).[1] The fibers are not permanently joined, just precisely held together so that light can pass from one to another.
D: Modern connectors typically use a "physical contact" polish on the fiber and ferrule end. This is a slightly convex surface with the apex of the curve accurately centered on the fiber, so that when the connectors are mated the fiber cores come into direct contact with one another.
Note: Optical fiber connectors are used to join optical fibers where a connect/disconnect capability is required. Due to the polishing and tuning procedures that may be incorporated into optical connector manufacturing, connectors are generally assembled onto optical fiber in a supplier's manufacturing facility.
Question 65:
Which two features of a Windows Server 2008 R2 server should you install to use that server as a software router? (Choose two.)
A. Network Policy and Access Services
B. Routing and Remote Access Services
C. Remote Administration
D. DirectAccess
Correct Answer: AB
To install the Routing and Remote Access service
1.
In the Server Manager main window, under Roles Summary, click Add roles.
-- OR -In the Initial Configuration Tasks window, under Customize This Server, click Add roles.
2.
In the Add Roles Wizard, click Next.
3.
In the list of server roles, select Network Policy and Access Services. Click Next twice.
4.
In the list of role services, select Routing and Remote Access Services to select all of the role services. You can also select individual server roles.
5.
Proceed through the steps in the Add Roles Wizard to complete the installation. Reference: Install and Enable the Routing and Remote Access Service
Question 66:
You work at a coffee shop. Your supervisor asks you to help set up a computer network.
The network needs to have the following items: A public facing web server A Wi-Fi network for customers A private network for the point of sale terminals An office PC A file/print server A network printer
You need to set up a perimeter network to protect the network.
Which two items should you include in the perimeter network? (Choose two.)
A. Network printer
B. Web server
C. File server
D. Wi-Fi network
E. Point of sale terminals
Correct Answer: AB
Put the web server and the network printer on the perimeter network.
The file server, wifi-network, and the Point of sale terminals should not be accessible from the internet.
Note: A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.
Question 67:
A university has network links between various locations. Where would a T3 connection be appropriate?
A. Server to network in the main campus server room
B. Main campus to a large satellite campus
C. Computer lab PC to lab printer
D. Library laptop PC to Internet
Correct Answer: A
T3 lines are a common aggregation of 28 T1 circuits that yields 44.736 Mbps total network bandwidth . Besides being used for long-distance traffic, T3 lines are also often used to build the core of a business network at its headquarters
Question 68:
This question requires that you evaluate the underlined text to determine if it is correct.
The four IEEE standards, 802.11a, b, g, and n, are collectively known as "mobile ad hoc" networks.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. WiMAX
B. Bluetooth
C. WiFi
D. No change is needed
Correct Answer: C
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5, and 60 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of the standard was released in 1997, and has had subsequent amendments. The standard and amendments provide the basis for wireless network products using the Wi-Fi brand.
Question 69:
This question requires that you evaluate the underlined text to determine if it is correct. IPv4 multicast addresses range from "192.168.0.0 to 192.168.255.255".
Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
A. 127.0.0.0 to 127.255.255.255
B. 172.16.0.0 to 172.31.255.255
C. 224.0.0.0 to 239.255.255.255
D. No change is needed
Correct Answer: C
Class D is multicast.
Class A: 0.0.0.0 - 127.255.255.255 Class B: 128.0.0.0 - 191.255.255.255 Class C: 192.0.0.0 - 223.255.255.25 Class D: 224.0.0.0 - 239.255.255.255
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-366 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.