Valid 98-366 Dumps shared by ExamDiscuss.com for Helping Passing 98-366 Exam! ExamDiscuss.com now offer the newest 98-366 exam dumps, the ExamDiscuss.com 98-366 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com 98-366 dumps with Test Engine here:

Access 98-366 Dumps Premium Version
(259 Q&As Dumps, 35%OFF Special Discount Code: freecram)

Next Question >>

Question 1/105

Which protocol is a transport layer protocol?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (105q)
Question 1: Which protocol is a transport layer protocol?...
Question 2: If a router is installed so that it separates a DHCP server ...
Question 3: In which OSI layer does routing occur?...
Question 4: Which of the following represents a Media Access Control (MA...
Question 5: In addition to switching, multilayer switches also:...
Question 6: The type of connector used on a 100BaseT Ethernet cable is:...
Question 7: Which of the following is a public IP address?...
Question 8: The top-level domain of www.adventureworks.com is:...
Question 9: In a physical star topology, the central device is referred ...
Question 10: DRAG DROP Order the layers of the OSI model: Select and Plac...
1 commentQuestion 11: DRAG DROP Match the VPN connection type to the corresponding...
Question 12: One advantage of dynamic routing is that it:...
Question 13: Which type of network covers the broadest area?...
Question 14: Which subnet mask is valid?
Question 15: The default port used for SMTP is:...
Question 16: Which of the following uses a tunneling protocol?...
Question 17: A node within a local area network (LAN) must have a network...
Question 18: What is the default subnet mask for a Class C Internet netwo...
Question 19: Which of these is an application layer protocol?...
Question 20: When a client's DHCP-issued address expires, the client will...
Question 21: This question requires that you evaluate the underlined text...
Question 22: VPNs are implemented to provide:...
Question 23: Which two of the following are connectivity options for wide...
Question 24: You ping a server by using fully qualified domain name (FQDN...
Question 25: A computer that has an IP address of 169.254.0.1 cannot acce...
Question 26: The topology of a local area network (LAN) is defined by the...
Question 27: The protocol that maps IP addresses to a Media Access Contro...
Question 28: The query protocol used to locate resources on a network is:...
Question 29: A network that separates an organization's private network f...
Question 30: To which IP configuration does the CIDR notation 192.168.1.1...
Question 31: A service that resolves NetBIOS names to IP addresses is:...
Question 32: A user reports that she cannot connect to network resources ...
Question 33: Connecting to a private network address from a public networ...
Question 34: Which type of port is used to support VLAN traffic between t...
Question 35: One purpose of a perimeter network is to:...
Question 36: A Media Access Control (MAC) address identifies a/an:...
Question 37: Which of the following is a Layer 2 WAN protocol?...
Question 38: Which technology provides the highest bit rate?...
Question 39: A router's static route is set by the:...
Question 40: Teredo tunneling is a protocol that:...
Question 41: Which of the following services masks internal IP addresses ...
Question 42: The default subnet mask for a Class B network is:...
Question 43: If an 802.llg Internet connection has connectivity problems,...
Question 44: What is the minimum cabling requirement for a 100BaseTX netw...
Question 45: The host name of the fully qualified domain name (FQDN) mail...
Question 46: The maximum throughput of an 802.llg network is:...
Question 47: Which of the following determines the media access method th...
Question 48: Which wireless authentication method provides the highest le...
Question 49: The default port used for telnet is:...
Question 50: DRAG DROP Match each protocol to its description. To answer,...
Question 51: This question requires that you evaluate the underlined text...
Question 52: The service that resolves fully qualified domain names (FQDN...
Question 53: A characteristic of the mesh topology is that it:...
Question 54: A Layer 2 device that connects multiple computers within a n...
Question 55: A private network that allows members of an organization to ...
Question 56: What type of record does DNS use to find a mail service?...
Question 57: HOTSPOT For each of the following statements, select Yes if ...
Question 58: Internet Key Exchange (IKE) is responsible for which two fun...
Question 59: Which of these addresses is a multicast address?...
Question 60: Which protocol can be used to encrypt packets on the Interne...
Question 61: One reason to replace an unmanaged switch with a managed swi...
Question 62: Which two are published IEEE 802.11 wireless transmission st...
Question 63: What type of DNS record maps host names to addresses?...
Question 64: HOTSPOT You are trying to access a music sharing service on ...
Question 65: A university has network links between various locations. Wh...
Question 66: DRAG DROP Match each set of characteristics to the correspon...
Question 67: Which DNS record type specifies the host that is the authori...
Question 68: A network device that associates a Media Access Control (MAC...
Question 69: One reason to incorporate VLANs in a network is to:...
Question 70: The ping tool is used to: (Choose two.)...
Question 71: HOTSPOT For each of the following statements, select Yes if ...
Question 72: Two companies want to share data by using the Internet. Whic...
Question 73: HOTSPOT For each of the following statements, select Yes if ...
Question 74: The default gateway address identifies the:...
Question 75: DRAG DROP Match each IP address to its corresponding IPv4 ad...
Question 76: Which of the following uses pointer records and A records?...
Question 77: Which technology can you use to extend an internal network a...
Question 78: How many bits are there in an Internet Protocol version 6 (I...
Question 79: Which setting is used to determine the Domain Name System (D...
Question 80: If a router cannot determine the next hop for a packet, the ...
Question 81: You need to divide a network into three subnets. Which devic...
Question 82: HOTSPOT You cannot get to any site on the Internet or on the...
Question 83: Which of the following are features of DHCP? (Choose two.)...
Question 84: Security is a concern on wireless networks due to:...
Question 85: In local area network (LAN) topologies, the primary media ac...
Question 86: DRAG DROP Match each network type to its corresponding defin...
Question 87: Which command is used to verify that a server is connected t...
Question 88: Attenuation in a wireless network signal is a result of:...
Question 89: Which of these represents the Internet Protocol version 6 (I...
Question 90: Which network does the IP address 220.100.100.100 belong to?...
Question 91: A cable that meets the l000BaseT standard has a maximum leng...
Question 92: This question requires that you evaluate the underlined text...
Question 93: The ipconfig command will:
Question 94: Which of these factors has the biggest impact on data transm...
Question 95: The function of a router is to:...
Question 96: What happens when an 802.11b node starts broadcasting within...
Question 97: Which type of network is most vulnerable to intrusion?...
Question 98: A VPN is a/an:
Question 99: This question requires that you evaluate the underlined text...
Question 100: Tracert is used to:
Question 101: To directly connect the Ethernet network interface cards (NI...
Question 102: The command-line tool used to list a host's active incoming ...
Question 103: To protect a network when it is connected to the Internet, y...
Question 104: In which physical network topology is each computer connecte...
Question 105: At what layer in the OSI model are hardware addresses refere...