Professional Documents
Culture Documents
Soal_dan_Jawaban_Exam_MTA_Networking_Fun
Soal_dan_Jawaban_Exam_MTA_Networking_Fun
Soal_dan_Jawaban_Exam_MTA_Networking_Fun
2 This question requires that you evaluate the underlined text to determine if it is correct. The
NTP value in a resource record indicates a length of time that other DNS servers use to
determine how long to cache information for a record before expiring and discarding it. Select
the correct answer if the underlined text does not make the statement correct. Select "No
change is needed'' if the underlined text makes the statement correct.
Select one:
a. SOA RR
b. TTL
c. GPS
d. No change is needed
Explanation/Reference:
Time to live (TTL) is what dictates how long it will be until your computer refreshes its DNS
related information.
3 This question requires that you evaluate the underlined text to determine if it is correct. The
loopback address of your computer is 127.0.0.1. Select the correct answer if the underlined
text does not make the statement correct. Select 'No change is needed" if the underlined text
makes the statement correct.
Select one:
a. 10.0.1.1
b. 169.254.0.5
c. 192168.1.1
d. No change is needed
Explanation/Reference:
127.0.0.1 is the IPv4 loopback address.
4 A user reports that she cannot connect to network resources from a computer on the
company network. The user was able to connect to the network resources yesterday. You
verify that the user's computer is properly physically connected to the network. You discover
that the computer's IP address is 169.254.48.97. You need to restore access to network
resources. What should you do next?
Select one:
a. Verify that the DHCP service is available.
b. Flush the cache on the DNS server.
c. Check your router's current routing tables.
d. Reset the user's password on the server.
Explanation/Reference:
169.254.48.97 is an APIPA address. An APIPA address is used when the DHCP server is not
available.
5 This question requires that you evaluate the underlined text to determine if it is correct. The
process of replicating a zone file to multiple DNS servers is called zone replication, Select the
correct answer if the underlined text does not make the statement correct. Select 'No change
is needed" if the underlined text makes the statement correct.
Select one:
a. Start of authority
b. No change is needed
c. Zone transfer
d. Zone synchronization
Explanation/Reference:
DNS zone transfer, also sometimes known by the inducing DNS query type AXFR, is a type of
DNS transaction. It is one of the many mechanisms available for administrators to replicate
DNS databases across a set of DNS servers
7 The service that resolves fully qualified domain names (FQDN) to IP addresses is:
Select one:
a. Internet Service Provider (ISP).
b. Domain Name Service (DNS).
c. Address Resolution Protocol (ARP).
d. Windows Internet Name Service (WINS).
Explanation/Reference:
The DNS translates Internet domain and host names to IP addresses. DNS automatically
converts the names we type in our Web browser address bar to the IP addresses of Web
servers hosting those sites.
8 A computer that has an IP address of 169.254.0.1 cannot access the network. Which of the
following services should you confirm is available?
Select one:
a. TFTP
b. WINS
c. DHCP
d. DNS
Explanation/Reference:
169.254.0.1 is an APIPA address. An APIPA address is used when the DHCP server is not
available.
9 Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)
Select one:
a. Establishing network speed parameters
b. Exchanging key information
c. Verifying the client's patch level
d. Negotiating algorithms to use
Explanation/Reference:
Internet Key Exchange (IKE) negotiates the IPSec security associations (SAs). This process
requires that the IPSec systems first authenticate themselves to each other and establish
ISAKMP (IKE) shared keys.
In phase 1 of this process, IKE creates an authenticated, secure channel between the two IKE
peers, called the IKE security association. The Diffie- Hellman key agreement is always
performed in this phase.
In phase 2, IKE negotiates the IPSec security associations and generates the required key
material for IPSec. The sender offers one or more transform sets that are used to specify an
allowed combination of transforms with their respective settings. The sender also indicates
the data flow to which the transform set is to be applied. The sender must offer at least one
transform set. The receiver then sends back a single transform set, which indicates the
mutually agreed-upon transforms and algorithms for this particular IPSec session.
10 What happens when an 802.11a node broadcasts within the range of an 802.11g access
point?
Select one:
a. The node transmits, but the access point is unable to receive.
b. The access point transmits, but the node is unable to receive.
c. A connection occurs.
d. Both the node and the access point are unable to transmit.
Explanation/Reference:
11 Which two of the following are connectivity options for wide area networks (WANs)?
(Choose two.)
Select one:
a. Leased line
b. Token ring
c. Dial-up
d. Ethernet
Explanation/Reference:
Token ring and Ethernet are used in LANs.
12 Which type of port is used to support VLAN traffic between two switches?
Select one:
a. WAN port
b. Trunk port
c. Virtual port
d. LAN port
Explanation/Reference:
Trunk links are required to pass VLAN information between switches.
13 The command-line tool used to list a host's active incoming connections is:
Select one:
a. NSLOOKUP
b. IPCONFIG
c. PING
d. NETSTAT
Explanation/Reference:
Used without parameters, netstat displays active TCP connections.
Note: Netstat displays active TCP connections, ports on which the computer is listening,
Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP
protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6
protocols).
15 Which of these represents the Internet Protocol version 6 (IPv6) loopback address?
Select one:
a. FEC0:A8C0::AA01
b. ::1
c. 192.168.0.1
d. 127.0.0.1
Explanation/Reference:
The localhost (loopback) address, 0:0:0:0:0:0:0:1, and the IPv6 unspecified address,
0:0:0:0:0:0:0:0, are reduced to ::1 and ::, respectively.
16 Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)
Select one:
a. 802.11k
b. 802.11n
c. 802.11g
d. 802.11f
e. 802.11m
Explanation/Reference:
The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that
use the same basic protocol. 802.11-1997 was the first wireless networking standard in the
family, but 802.11b was the first widely accepted one, followed by 802.11a, 802.11g,
802.11n, and 802.11ac.
20 A node within a local area network (LAN) must have which two of the following? (Choose
two.)
Select one:
a. IP Address
b. Share name
c. Username and password
d. NIC
Explanation/Reference:
A node must be able to access the LAN through a network interface.
A node must also have an IP address.
22 You ping a server by using fully qualified domain name (FQDN) and do not receive a
response. You then ping the same server by using its IP address and receive a response. Why
do you receive a response on the second attempt but not on the first attempt?
Select one:
a. NSLOOKUP is stopped.
b. The DNS is not resolving.
c. The DHCP server is offline.
d. PING is improperly configured.
Explanation/Reference:
DNS is not working.
24 An Action Center alert recommends that you enable Windows Firewall. After enabling the
firewall, you can no longer access websites. Which two TCP ports should you add exceptions
for on the firewall? (Choose two.)
Select one:
a. Port 80
b. Port 21
c. Port 443
d. Port 25
e. Port 23
Explanation/Reference:
Port 80: HTTP
Port 443: HTTPS
https://independent.academia.edu/hizkiahartaku
References : https://vceguide.com/