Microsoft Microsoft Certifications 98-366 Questions & Answers
Question 71:
This question requires that you evaluate the underlined text to determine if it is correct.
All session data is "encrypted between all machines" while using telnet.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Not encrypted
B. Encrypted between any Windows machines
C. Encrypted only to any non-Windows machines
D. No change is needed
Correct Answer: A
Telnet, by default, does not encrypt any data sent over the connection (including passwords), and so it is often practical to eavesdrop on the communications and use the password later for malicious purposes; anybody who has access to a router, switch, hub or gateway located on the network between the two hosts where Telnet is being used can intercept the packets passing by and obtain login, password and whatever else is typed with a packet analyzer.
Question 72:
Which DNS record type specifies the host that is the authority for a given domain?
A. NS
B. MX
C. CNAME
D. SOA
Correct Answer: D
The start of authority (SOA) resource record indicates the name of origin for the zone and contains the name of the server that is the primary source for information about the zone. It also indicates other basic properties of the zone.
Question 73:
This question requires that you evaluate the underlined text to determine if it is correct.
The process of replicating a zone file to multiple DNS servers is called "zone replication".
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Zone transfer
B. Zone synchronization
C. Start of authority
D. No change is needed
Correct Answer: A
DNS zone transfer, also sometimes known by the inducing DNS query type AXFR, is a type of DNS transaction. It is one of the many mechanisms available for administrators to replicate DNS databases across a set of DNS servers
Question 74:
Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)
A. Establishing network speed parameters
B. Verifying the client's patch level
C. Negotiating algorithms to use
D. Exchanging key information
Correct Answer: CD
Internet Key Exchange (IKE) negotiates the IPSec security associations (SAs). This process requires that the IPSec systems first authenticate themselves to each other and establish ISAKMP (IKE) shared keys.
In phase 1 of this process, IKE creates an authenticated, secure channel between the two IKE peers, called the IKE security association. The Diffie-Hellman key agreement is always performed in this phase.
In phase 2, IKE negotiates the IPSec security associations and generates the required key material for IPSec. The sender offers one or more transform sets that are used to specify an allowed combination of transforms with their respective
settings. The sender also indicates the data flow to which the transform set is to be applied. The sender must offer at least one transform set. The receiver then sends back a single transform set, which indicates the mutually agreed-upon
transforms and algorithms for this particular IPSec session.
Reference: IPSec Overview Part Four: Internet Key Exchange (IKE)
Question 75:
What is the minimum cabling requirement for a 100BaseTX network?
A. Category 3 UTP cable
B. Category 5 UTP cable
C. Category 6 UTP cable
D. Multimode fiber cable
Correct Answer: B
100BASE-TX is the predominant form of Fast Ethernet, and runs over two wire-pairs inside a category 5 or above cable.
100BASE-TX and 1000BASE-T were both designed to require a minimum of Category 5 cable and also specify a maximum cable length of 100 meters. Category 5 cable has since been deprecated and new installations use Category 5e.
Question 76:
Which of the following is a public IP address?
A. 10.156.89.1
B. 68.24.78.221
C. 172.16.152.48
D. 192.168.25.101
Correct Answer: B
Incorrect:
The private address space specified in RFC 1918 is defined by the following three address blocks:
not D: 192.168.0.0/16
The 192.168.0.0/16 private network can be interpreted either as a block of 256 class C network IDs or as a 16-bit assignable address space (16 host bits) that can be used for any subnetting scheme within the private organization. The
192.168.0.0/16 private network allows the following range of valid IP addresses: 192.168.0.1 to 192.168.255.254.
Not A:
10.0.0.0/8
The 10.0.0.0/8 private network is a class A network ID that allows the following range of valid IP addresses: 10.0.0.1 to 10.255.255.254. The 10.0.0.0/8 private network has 24 host bits that can be used for any subnetting scheme within the
private organization.
Not C:
172.16.0.0/12
The 172.16.0.0/12 private network can be interpreted either as a block of 16 class B network IDs or as a 20-bit assignable address space (20 host bits) that can be used for any subnetting scheme within the private organization. The
172.16.0.0/12 private network allows the following range of valid IP addresses: 172.16.0.1 to 172.31.255.254.
Reference: Technet, Public and Private Addresses
Question 77:
How many bits are there in an Internet Protocol version 6 (IPv6) address?
A. 32
B. 64
C. 128
D. 256
Correct Answer: C
IPv6 uses a 128-bit address, allowing 2**128, or approximately 3.4?0**38 addresses, or more than 7.9?0**28 times as many as IPv4, which uses 32-bit addresses
Question 78:
The default gateway address identifies the:
A. Device that will connect the computer to the local network.
B. Device that will connect the computer to a remote network.
C. Server that will provide name services for the computer.
D. Server that will authenticate the user of the computer.
Correct Answer: B
A default gateway is the node on the computer network that the network software uses when an IP address does not match any other routes in the routing table. In home computing configurations, an ISP often provides a physical device which both connects local hardware to the Internet and serves as a gateway.
Question 79:
What type of record does DNS use to find a mail service?
A. Service (SRV) DNS record
B. Canonical (CNAME) DNS record
C. Mail Exchanger (MX) DNS record
D. Host (A) DNS record
Correct Answer: C
A mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how email should be routed with the Simple Mail Transfer Protocol (SMTP).
Question 80:
In which OSI layer does routing occur?
A. Transport
B. Network
C. Data Link
D. Physical
Correct Answer: B
In the seven-layer OSI model of computer networking, the network layer is layer 3. The network layer is responsible for packet forwarding including routing through intermediate routers.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 98-366 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.