How to pass Hotest 98-366 study guide exam easily with less time? We provides the most valid 98-366 vce to boost your success rate in MTA May 16,2022 Hotest 98-366 practice Networking Fundamentals exam. If you are one of the successful candidates with We latest 98-366 dumps, do not hesitate to share your reviews on our MTA materials.

We Geekcert has our own expert team. They selected and published the latest 98-366 preparation materials from Official Exam-Center.

The following are the 98-366 free dumps. Go through and check the validity and accuracy of our 98-366 dumps.We have sample questions for 98-366 free dumps. You can download and check the real questions of updated 98-366 dumps.

Question 1:

One advantage of dynamic routing is that it:

A. Automatically maintains routing tables.

B. Limits traffic derived from routing protocols.

C. Reduces broadcast traffic.

D. Automatically enables DHCP.

Correct Answer: A

Dynamic Routing, also called adaptive routing, describes the capability of a system, through which routes are characterized by their destination, to alter the path that the route takes through the system in response to a change in conditions. The adaptation is intended to allow as many routes as possible to remain valid (that is, have destinations that can be reached) in response to the change.

Question 2:

A Layer 2 device that connects multiple computers within a network is a:

A. Repeater

B. Switch

C. Router

D. Packet

Correct Answer: B

Layer 2 switching uses the media access control address (MAC address) from the host\’s network interface cards (NICs) to decide where to forward frames.

Question 3:

The default subnet mask for a Class B network is:





Correct Answer: D

Class A default subnet mask is Class B default subnet mask is Class C default subnet mask is

Question 4:

The command-line tool used to list a host\’s active incoming connections is:





Correct Answer: A

Used without parameters, netstat displays active TCP connections.

Note: Netstat displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols).

Question 5:

A computer that has an IP address of cannot access the network. Which of the following services should you confirm is available?





Correct Answer: C is an APIPA address. An APIPA address is used when the DHCP server is not available.

Question 6:

Teredo tunneling is a protocol that:

A. Translates Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6).

B. Allows IPv6 connectivity through IPv4 devices.

C. Provides VPN security.

D. Dynamically allocates IPv6 addresses.

Correct Answer: B

Teredo alleviates this problem by encapsulating IPv6 packets within UDP/IPv4 datagrams, which most NATs can forward properly. Thus, IPv6-aware hosts behind NATs can be used as Teredo tunnel endpoints even when they don\’t have a dedicated public IPv4 address.

Question 7:

The default port used for telnet is:

A. 23

B. 25

C. 80

D. 8080

Correct Answer: A

The telnet protocol is used to establish a connection to Transmission Control Protocol (TCP) port number 23, where a Telnet server application (telnetd) is listening.

Question 8:

When a client\’s DHCP-issued address expires, the client will:

A. Select a new address and request approval from the DHCP server.

B. Require manual configuration with a static IP address.

C. Attempt to obtain a new address by broadcasting.

D. Continue to use the address until it is notified to stop.

Correct Answer: C

Rebinding would occur.


If the DHCP client is unable to communicate with the DHCP server from which it obtained its lease, and 87.5 percent of its lease time has expired, it will attempt to contact any available DHCP server by broadcasting DHCPRequest messages.

Any DHCP server can respond with a DHCPAck message, renewing the lease, or a DHCPNak message, forcing the DHCP client to initialize and restart the lease process.



IP addressing information is leased to a client, and the client is responsible for renewing the lease. By default, DHCP clients try to renew their lease when 50 percent of the lease time has expired. To renew its lease, a DHCP client sends a

DHCPRequest message to the DHCP server from which it originally obtained the lease.

Reference: DHCP Client States in the Lease Process

Question 9:

A Media Access Control (MAC) address identifies a/an:

A. UPnP device.

B. Local broadcast domain.

C. Network interface card (NIC).

D. Local area network (LAN).

Correct Answer: C

A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment.

Question 10:

If an 802.llg Internet connection has connectivity problems, what may be the cause?

A. A cordless phone

B. A cellular phone

C. Incandescent lights

D. Electromagnetic interference (EMI)

Correct Answer: D

Over the last 10 years 802.11 technology has made remarkable strides — getting faster, stronger and more scalable. But one problem still haunts Wi-Fi: reliability.

Nothing is more frustrating for network managers than users complaining about flaky Wi-Fi performance, spotty coverage and dropped connections. Dealing with a Wi-Fi environment that you can\’t see and that is constantly changing is the problem. And radio frequency interference is the culprit.

Question 11:

Which of these factors has the biggest impact on data transmission speed in a wireless network?

A. The access method used for the network

B. The transmission standard of the equipment used

C. The use of strong encryption for transmissions

D. The transmission wattage rating used on the NIC

Correct Answer: B

The speed of a Wi-Fi wireless network connection depends on several factors.

Like most kinds of computer networks, Wi-Fi supports varying levels of performance depending on which technology standards it supports. Each Wi-Fi standard is rated according to its maximum theoretical network bandwidth:

A Wi-Fi network connection operates at the highest possible speed that both devices (endpoints) can support. An 802.11g laptop connected to an 802.11n router, for example, will network at the lower speeds of \’g\’.

Question 12:

Which type of network is most vulnerable to intrusion?

A. Dial-up

B. Wireless

C. Broadband

D. Leased line

Correct Answer: B

Insecure Wi-Fi is the easiest way for people to access your home network, leech your internet, and cause you serious headaches with more malicious behavior.

Question 13:

Attenuation in a wireless network signal is a result of:

A. Number of wireless nodes connected.

B. Distance from the access point.

C. Interference from cellular phones.

D. Encryption of the signal.

Correct Answer: B

Solid objects greatly attenuate (reduce) Wi-Fi radio signals, so clear line of sight is best.

Question 14:

In local area network (LAN) topologies, the primary media access methods are: (Choose two.)

A. Contention

B. Negotiation

C. Kerberos

D. Token passing

Correct Answer: AD

Media contention occurs when two or more network devices have data to send at the same time. Because multiple devices cannot talk on the network simultaneously, some type of method must be used to allow one device access to the network media at a time. This is done in two main ways: carrier sense multiple access collision detect (CSMA/CD) and token passing.

Question 15:

Which technology can you use to extend an internal network across shared or public networks?


B. Microsoft ASP-NET

C. Microsoft .NET Framework


Correct Answer: D

VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company\’s internal network.

Recommended Posts