Mta 98-366
Mta 98-366
Mta 98-366
What will Sidney need to install for Josh to be able to access Fourth Coffee’s
server from his home
and mobile phones?
a. a firewall
**b. a VPN
c. an intranet
1. When Brian connects a cable from his laptop’s NIC into an RJ45 jack he is
connecting to the:
a. VLAN
***b. wired LAN
c. wireless LAN
2. A VLAN is also called a:
***a. logical network
b. internal network
c. external network
3. What will be Erin’s best solution for providing Internet connectivity
to the pool area?
a. expand the hotel’s wired network
***b. expand the hotel’s wireless network
c. add a new WAN
1. To link all three of Fourth Coffee’s LANs together, Sidney will create a:
a. LAN
b. PAN
***c. WAN
2. Between the original coffee shop and the first expansion location, Sidney
decides to order
***a private, dedicated line from the phone company known as:
a. a leased line
b. dial-up
c. ISDN
3. Sidney reassures Josh that the existing VPN is secure because the data
transferred across the public network is:
a. defragmented
***b. encrypted
c. zipped
1. The topology concerned with how data gets transferred within the network
is the:
**a. logical topology
b. mesh topology
c. physical topology
2. The topology considered more reliable because all of the nodes are
connected
to each other is the:
a. bus topology
**b. mesh topology
c. star topology
3. What topology should Jack choose for Molly’s network?
a. bus
b. ring
**c. star
Essential details
Essential details
• VPNs create a private network and provide a secure tunnel across the Internet.
• Firewalls can be hardware devices.
• For security zones, keep the security level as high as possible.
• In Microsoft® Internet Explorer® click Tools and then click Internet Options to set your
security settings.
• Mobile phones can be used to connect to a company’s servers.
Essential details
• LANs connect local computers together in a small geographical area.
• Perimeter networks provide an extra layer of security for a company’s internal
network.
• Computers connect to a LAN through a NIC (network interface card).
• The loopback address is a reserved, static address of 127.0.0.1.
• In Microsoft Windows® 7, right-click Network and select Properties to view your network
configuration.
Essential details
• VLANs are created on switches and help improve network performance.
• Wired networks take time to install because wires need to be pulled to all of the
connection jacks.
• Wireless LANs are easy to expand to remote areas.
• Security can be implemented in both wired and wireless LANs.
• In Microsoft Windows 7, click the wireless network icon (on the right side of the taskbar)
to view the available
wireless networks.
1. The Humane Society cannot afford a router but they do have a switch and a
Windows Server.
What should Scott do?
a. tell Justin that they’ll have to wait until they can afford a router
b. use the switch because a Layer 2 device can perform the same functions as a router
***c. use the switch to connect the desktops and servers and then install routing
software
on the server
2. One week later a router is installed and Scott needs to figure out what
routes
the router knows, so he:
a. accesses the router’s NAT database and views the routes
***b. accesses the router’s routing table and views the routes
c. pings the router and it returns the routes
3. When Scott views the routes he sees that the router is learning new routes
because of:
***a. dynamic routing
b. NAT
c. static routing
1. The best media choice for data to travel long distances without the risk of
interference is:
***a. fiber
b. thin coax
c. unshielded twisted-pair
2. Fiber:
a. can only be used for short distances
b. is extremely inexpensive
***c. transmits data in the form of light
3. Any type of undesirable electromagnetic emission or electrical/electronic
disturbance is known as:
a. EIGRP
***b. EMI
c. STP
1. Based on the media goals, the type of cable that should be run to the
classrooms is:
a. coaxial
b. fiber
***c. UTP
2. Based on the media goals, the type of cable that should be used for the
backbone is:
***a. fiber
b. STP
c. wireless
3. Jon asks Mary Kay what media she would recommend for the common areas.
She replies:
***a. “Wireless, because of ease of installation and flexibility.”
b. “Fiber, because of its low cost.”
c. “Wireless because it is secure by default without any configuration
Which of the following regenerates a signal and broadcasts that signal to every computer
connected to it?
a. Hub
b. Switch
c. Router
d. Firewall
Answer: A, Hub
Which of the following is not a central connecting device?
a. Hub
b. Switch
c. SOHO router
d. Windows 7 client
Answer: D, Windows 7 Client
You need to install a network adapter to a computer so that it can be connected to a network
that uses twisted-pair cabling. What type of port does the network adapter need to use?
a. RJ11
b. RJ45
c. RG-58
d. Fiber optic
Answer: B, RJ45
Where can you go in Windows 7 to access the Properties of a network adapter?
a. Device Manager
b. Ping
c. Advanced Firewall
d. Task Manager
Answer: A, Device Manager
You need to connect a computer's network adapter to a switch. You want the connection
to be able to send and receive data simultaneously. What type of connection do you need?
a. Half duplex
b. Full duplex
c. Simplex
d. 100 Mbps
Answer: B, Full Duplex
You need to connect a computer at a rate of 100,000,000 bits per second. What speed
network adapter should you install?
a. 10 Mbps
b. 100 MB/s
c. 100 Mbps
d. 1000 Mbps
Answer: C, 100 Mbps
You need to connect to a router that has the IP address 192.168.1.100 on a standard,
default Class C network using the subnet mask 255.255.255.0. Which of the following
is a valid IP address for your network adapter?
a. 192.168.0.1
b. 192.168.1.1
c. 192.168.100.1
d. 192.168.1.100
Answer: B, 192.168.1.1
You have just installed a network adapter and configured an IP address and subnet
mask. What command can you use to verify that the IP address is configured and listed
properly?
a. Ping
b. Tracert
c. CMD
d. Ipconfig
Answer: D, Ipconfig
You need to ping your own computer to see if it is alive. Which of the following would
qualify as command-line syntax to do so?
a. Ping localclient
b. Ping 128.0.0.1
c. Ping loopback
d. Ping network adapter
Answer: C, Ping loopback
You have been instructed to connect a computer to a group of hosts that have been
segmented from the regular network. What kind of network is this?
a. LAN
b. WLAN
c. WAN
d. VLAN
Answer: D, VLAN
The manager of IT asks you to connect a perimeter network to the firewall, which will
be separate from the LAN. This type of network is known as a ______________.
Answer: DMZ
A ______________ topology can be defined by connecting several hubs to a switch.
Answer: Star
802.3u Ethernet networks run at ____________ Mbps.
Answer: 100 Mbps
A ____________ is a program used to download files quickly from a P2P network.
Answer: BitTorrent Client
The ______________ network architecture is physically a star and logically a ring.
Answer: Token Ring
802.3ab Ethernet networks run at ____________ Mbps.
Answer: 1000 Mbps
A ___________ connection is one in which data can be both sent and received, but not
at the same time.
Answer: Half Duplex
A ______________ topology can be defined as connecting several computers together
in a circle without the use of a hub or a switch.
Answer: Ring
When several computers are connected in a small geographic area, it is known
as a ____________.
Answer: LAN (Local Area Network)
A _______________ acts as a central connecting device and allows laptops, PDAs, and
handheld computers to communicate with each other.
WAP (Wireless Access Point)
Essential details
• WANs can span completely around the world–from the United States to Australia!
• A WAN link selection depends upon a company’s goals for speed, availability, cost, and
so on.
• The Plain Old Telephone Service (POTS) is the oldest communications network.
• For small companies, leased lines are a great WAN solution for connecting two
locations.
• Always protect data by encrypting it prior to transferring it across the Internet.
Essential details
• E1 and E3 are WAN connections available in Europe versus T1 and T3 for the United
States.
• DSL and Cable broadband Internet access technologies each have a corresponding
modem.
• Dial-up and ISDN have decreased in popularity while DSL and Cable have become more
popular.
• Even more WAN technologies exist, such as Frame Relay and ATM (Asynchronous
Transfer Mode).
• WAN links need to be optimized for efficient and fast performance.
Essential details
• Each of the wireless networking standards has different characteristics, such as speed,
distance, frequency,
and so on.
• Connect a WAP (wireless access point) to a wired router to provide connectivity
between the wireless devices
and wired network.
• WPA (Wi-Fi Protected Access) and WPA2 is more secure than WEP (Wired Equivalent
Privacy).
• WP-Enterprise and WP2-Enterprise are used in business environments and work with an
802.1X authentication server.
• The 802.1X authentication method is used in business environments and requires
a certificate or smart card for network access.
Essential details
• Bus topologies were popular along with coaxial cable.
• Mesh topologies are more expensive because of the redundant wiring.
• In star topologies a switch is usually used as the central device along with twisted pair
cable.
• Ring topologies are used as backbones for large networks with fiber cable and may
contain redundant rings.
• CSMA/CD is similar to a chat room, while CSMA/CA (Collision Avoidance) is similar
to a classroom.
E ssential details
• Know the layers of the ISO’s (International Standards Organization) OSI model.
• Hubs and repeaters are Layer 1 devices, switches and NICs are Layer 2, and routers are
Layer 3.
• Switches can create VLANs (Virtual Local Area Networks), which isolate network
broadcast traffic.
• Bandwidth is the throughput or the data transfer rate.
• If you have a fast port but a slow cable, the network will operate at the slowest speed,
which is the cable’s
speed.
E ssential details
• Switches are more than just a connection point for computers in a LAN.
• Choose the right networking device for the specific goal.
• Hardware redundancy provides highly available networks.
• Managed switches provide more options for network support.
• Use VLANs to segment systems from each other, which in turn enhances security.
E ssential details
• Routing tables are shared between neighboring routers.
• The router always chooses the best path with the lowest cost from source to
destination.
• NAT allows a private address to be translated to a public address for Internet access.
• Computers, routers, and other IP devices need a unique 32-bit IP address and a 32-bit
IP subnet mask to
communicate in an IP network.
• Computers also need a gateway address, which is the connected router’s IP address.
E ssential details
• Fiber has a variety of different type of connectors that connect into switches, routers,
and so on.
• Fiber is available in single-mode and multimode.
• Coax is commonly used for TV connections today rather than enterprise network
installations.
• UTP is commonly used today in star and extended star topologies because it is
inexpensive and easy
to install.
• Wireless provides many advantages over traditional cabling choices and therefore
continues to increase
in popularity.
E ssential details
• UTP cables in LANs contain RJ45 connectors.
• Cat 5e and 6 are popular for new UTP installations.
• Because of safety concerns, it is relatively easy to create UTP cables and a lot more
difficult
to create fiber cables.
• Cables need to be organized efficiently and properly labeled.
• Know and follow the maximum distances for cable runs and even for wireless
deployments.
Essential details
• Know the OSI model’s seven layers and the standards they represent.
• Standards are followed so that computers and devices can speak the same language in
order to
communicate with each other.
• Each layer communicates with the other layers directly above and below.
• Data is encapsulated or wrapped up at each layer within a different wrapper.
• Protocols are a set of rules that provide guidelines for computer communication
Essential details
• The TCP/IP model, or the TCP/IP protocol suit, contains four layers and protocols at each
layer.
• Different encapsulation types exist at the different layers, such as packets at the
Network layer.
• TCP operates at the Transport layer and IP operates at the Network layer.
• All computers and devices participating in a TCP/IP network require an IP address,
subnet mask, and default gateway.
• There are a few ports that should be remembered including: 53 (DNS),
80 (HTTP), 25 (SMTP), 110 (POP3).
Essential details
• IP addresses contain four octets and each octet contains eight bits.
• Ranges of IP addresses are reserved for private networks.
• A broadcast address is similar to an e-mail distribution list because information that is
sent to a specific
broadcast address will be sent to all devices on that specific subnet.
• Servers use static addresses; clients use dynamic IP addresses.
• DHCP servers provide IP addresses to clients for a set lease time.
Essential details
• IPv4 addresses contain the numbers 0-255 and IPv6 addresses contain hexadecimal
characters.
• Hexadecimal characters include the numbers 0-9 and letters A-F.
• IPv6 is becoming the new standard.
• Windows provides support for both IPv4 and IPv6 through the Dual Stack Architecture.
• Teredo, ISATAP, and 6to4 are tunneling technologies that provide transitional and
backward compatibility between IPv6 and IPv4 networks.
Essential details
• IPv4 and IPv6 packets both contain the source and destination IP addresses that are
used by the router to
route the packet.
• IPv6 addresses contain a dedicated subnetting portion.
• Identify the subnet that an IP address belongs to in a network by performing a bitwise
AND operation of the
subnet mask and IP address.
• The loopback address for IPv4 is 127.0.0.1 and for IPv6 is 0:0:0:0:0:0:0:1 or ::1
(compressed
format).
Essential details
• WINS servers resolve NetBIOS names to IP addresses and assist in reducing NetBIOS
traffic on subnets.
• DNS servers resolve domain names to IP addresses.
• DNS servers are part of the Internet’s infrastructure.
• DNS servers are also used in both enterprise and small business networks.
• Different DNS record types exist on a DNS server.
Essential details
• Clients are generally assigned dynamic address.
• Servers are assigned static address so that they may be easily located on a network.
• DHCP servers assign dynamic addresses to clients.
• Remote Access Servers, also known as Communication Servers, provide access
to remote network resources.
• IPsec, created by IETF (Internet Engineering Task Force), secures IP communications
through secure authentication and encryption.
Essential details
• To check connectivity, first ping your loopback address (127.0.0.1), then ping your
computer’s IP address, then
ping your default gateway, and finally ping the remote host.
• Ping contains different options for IPv4 and IPv6.
• Ipconfig/all displays lots of useful information, including DNS servers.
• Tracert traces the route a packet takes from the source to destination.
• Telnet logs into a router or computer.