Soal_dan_Jawaban_Exam_MTA_Networking_Fun

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

MTA Networking Fundamentals Certification Practice Exam #2

1 To protect a network when it is connected to the Internet, you should use a:


Select one:
a. Router
b. Switch
c. Bridge
d. Firewall
Explanation/Reference:
A firewall is software or hardware that checks information coming from the Internet or a
network, and then either blocks it or allows it to pass through to your computer, depending
on your firewall settings.

2 This question requires that you evaluate the underlined text to determine if it is correct. The
NTP value in a resource record indicates a length of time that other DNS servers use to
determine how long to cache information for a record before expiring and discarding it. Select
the correct answer if the underlined text does not make the statement correct. Select "No
change is needed'' if the underlined text makes the statement correct.
Select one:
a. SOA RR
b. TTL
c. GPS
d. No change is needed
Explanation/Reference:
Time to live (TTL) is what dictates how long it will be until your computer refreshes its DNS
related information.

3 This question requires that you evaluate the underlined text to determine if it is correct. The
loopback address of your computer is 127.0.0.1. Select the correct answer if the underlined
text does not make the statement correct. Select 'No change is needed" if the underlined text
makes the statement correct.
Select one:
a. 10.0.1.1
b. 169.254.0.5
c. 192168.1.1
d. No change is needed
Explanation/Reference:
127.0.0.1 is the IPv4 loopback address.

4 A user reports that she cannot connect to network resources from a computer on the
company network. The user was able to connect to the network resources yesterday. You
verify that the user's computer is properly physically connected to the network. You discover
that the computer's IP address is 169.254.48.97. You need to restore access to network
resources. What should you do next?
Select one:
a. Verify that the DHCP service is available.
b. Flush the cache on the DNS server.
c. Check your router's current routing tables.
d. Reset the user's password on the server.
Explanation/Reference:
169.254.48.97 is an APIPA address. An APIPA address is used when the DHCP server is not
available.

5 This question requires that you evaluate the underlined text to determine if it is correct. The
process of replicating a zone file to multiple DNS servers is called zone replication, Select the
correct answer if the underlined text does not make the statement correct. Select 'No change
is needed" if the underlined text makes the statement correct.
Select one:
a. Start of authority
b. No change is needed
c. Zone transfer
d. Zone synchronization
Explanation/Reference:
DNS zone transfer, also sometimes known by the inducing DNS query type AXFR, is a type of
DNS transaction. It is one of the many mechanisms available for administrators to replicate
DNS databases across a set of DNS servers

6 Which protocol can be used to encrypt packets on the Internet?


Select one:
a. TFTP
b. HTTP
c. SMTP
d. HTTPS
Explanation/Reference:
HTTPS, which stands for Hypertext Transfer Protocol Secure, makes it more difficult for
hackers, the NSA, and others to track users. The protocol makes sure the data isn’t being
transmitted in plain-text format, which is much easier to eavesdrop on.

7 The service that resolves fully qualified domain names (FQDN) to IP addresses is:
Select one:
a. Internet Service Provider (ISP).
b. Domain Name Service (DNS).
c. Address Resolution Protocol (ARP).
d. Windows Internet Name Service (WINS).
Explanation/Reference:
The DNS translates Internet domain and host names to IP addresses. DNS automatically
converts the names we type in our Web browser address bar to the IP addresses of Web
servers hosting those sites.

8 A computer that has an IP address of 169.254.0.1 cannot access the network. Which of the
following services should you confirm is available?
Select one:
a. TFTP
b. WINS
c. DHCP
d. DNS
Explanation/Reference:
169.254.0.1 is an APIPA address. An APIPA address is used when the DHCP server is not
available.

9 Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)
Select one:
a. Establishing network speed parameters
b. Exchanging key information
c. Verifying the client's patch level
d. Negotiating algorithms to use
Explanation/Reference:
Internet Key Exchange (IKE) negotiates the IPSec security associations (SAs). This process
requires that the IPSec systems first authenticate themselves to each other and establish
ISAKMP (IKE) shared keys.
In phase 1 of this process, IKE creates an authenticated, secure channel between the two IKE
peers, called the IKE security association. The Diffie- Hellman key agreement is always
performed in this phase.
In phase 2, IKE negotiates the IPSec security associations and generates the required key
material for IPSec. The sender offers one or more transform sets that are used to specify an
allowed combination of transforms with their respective settings. The sender also indicates
the data flow to which the transform set is to be applied. The sender must offer at least one
transform set. The receiver then sends back a single transform set, which indicates the
mutually agreed-upon transforms and algorithms for this particular IPSec session.

10 What happens when an 802.11a node broadcasts within the range of an 802.11g access
point?
Select one:
a. The node transmits, but the access point is unable to receive.
b. The access point transmits, but the node is unable to receive.
c. A connection occurs.
d. Both the node and the access point are unable to transmit.
Explanation/Reference:

11 Which two of the following are connectivity options for wide area networks (WANs)?
(Choose two.)
Select one:
a. Leased line
b. Token ring
c. Dial-up
d. Ethernet
Explanation/Reference:
Token ring and Ethernet are used in LANs.

12 Which type of port is used to support VLAN traffic between two switches?
Select one:
a. WAN port
b. Trunk port
c. Virtual port
d. LAN port
Explanation/Reference:
Trunk links are required to pass VLAN information between switches.

13 The command-line tool used to list a host's active incoming connections is:
Select one:
a. NSLOOKUP
b. IPCONFIG
c. PING
d. NETSTAT
Explanation/Reference:
Used without parameters, netstat displays active TCP connections.
Note: Netstat displays active TCP connections, ports on which the computer is listening,
Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP
protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6
protocols).

14 A router's static route is set by the:


Select one:
a. Network administrator
b. Next upstream router
c. Routing protocol
d. Adjacent network
Explanation/Reference:
Static routing is a form of routing that occurs when a router uses a manually-configured
routing entry, rather than information from a dynamic routing protocol to forward traffic.

15 Which of these represents the Internet Protocol version 6 (IPv6) loopback address?
Select one:
a. FEC0:A8C0::AA01
b. ::1
c. 192.168.0.1
d. 127.0.0.1
Explanation/Reference:
The localhost (loopback) address, 0:0:0:0:0:0:0:1, and the IPv6 unspecified address,
0:0:0:0:0:0:0:0, are reduced to ::1 and ::, respectively.

16 Which two are published IEEE 802.11 wireless transmission standards? (Choose two.)
Select one:
a. 802.11k
b. 802.11n
c. 802.11g
d. 802.11f
e. 802.11m
Explanation/Reference:
The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that
use the same basic protocol. 802.11-1997 was the first wireless networking standard in the
family, but 802.11b was the first widely accepted one, followed by 802.11a, 802.11g,
802.11n, and 802.11ac.

17 One reason to replace an unmanaged switch with a managed switch is to:


Select one:
a. Manage the routing tables.
b. Route between networks,
c. Reduce collision domains.
d. Support multiple VLANS.
Explanation/Reference:
A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like
an ordinary network switch and provides extra functions on higher OSI layers.
The major difference between the packet switching operation of a router and that of a Layer
3 switch is the physical implementation. In general-purpose routers, packet switching takes
place using software that runs on a microprocessor, whereas a Layer 3 switch performs this
using dedicated application- specific integrated circuit (ASIC) hardware.

18 A service that resolves NetBIOS names to IP addresses is:


Select one:
a. Internet Service Provider (ISP).
b. Domain Name Service (DNS).
c. Address Resolution Protocol (ARP).
d. Windows Internet Name Service (WINS).
Explanation/Reference:
Windows Internet Name Service (WINS) is Microsoft’s implementation of NetBIOS Name
Service (NBNS), a name server and service for NetBIOS computer names. Effectively, WINS is
to NetBIOS names what DNS is to domain names — a central mapping of host names to
network addresses.

19 A characteristic of the mesh topology is that it:


Select one:
a. Cannot use wired connections.
b. Cannot use wireless connections.
c. Uses a central hub.
d. Uses redundant paths.
Explanation/Reference:
Mesh network topology is one of the key network architectures in which devices are
connected with many redundant interconnections between network nodes such as routers
and switches. In a mesh topology, if any cable or node fails, there are many other ways for
two nodes to communicate.

20 A node within a local area network (LAN) must have which two of the following? (Choose
two.)
Select one:
a. IP Address
b. Share name
c. Username and password
d. NIC
Explanation/Reference:
A node must be able to access the LAN through a network interface.
A node must also have an IP address.

21 Which of the following is a Layer 2 WAN protocol?


Select one:
a. Transmission Control Protocol (TCP)
b. Simple Network Management Protocol (SNMP)
c. Point-to-Point Protocol (PPP)
d. Internet Protocol (IP)
Explanation/Reference:
WAN Protocols and Their Corresponding OSI Layers

22 You ping a server by using fully qualified domain name (FQDN) and do not receive a
response. You then ping the same server by using its IP address and receive a response. Why
do you receive a response on the second attempt but not on the first attempt?
Select one:
a. NSLOOKUP is stopped.
b. The DNS is not resolving.
c. The DHCP server is offline.
d. PING is improperly configured.
Explanation/Reference:
DNS is not working.

23 Which type of network is most vulnerable to intrusion?


Select one:
a. Leased Line
b. Broadband
c. Wireless
d. Dial-up
Explanation/Reference:
Insecure Wi-Fi is the easiest way for people to access your home network, leech your
internet, and cause you serious headaches with more malicious behavior.

24 An Action Center alert recommends that you enable Windows Firewall. After enabling the
firewall, you can no longer access websites. Which two TCP ports should you add exceptions
for on the firewall? (Choose two.)
Select one:
a. Port 80
b. Port 21
c. Port 443
d. Port 25
e. Port 23
Explanation/Reference:
Port 80: HTTP
Port 443: HTTPS

25 What type of DNS record maps host names to addresses?


Select one:
a. Canonical (CNAME) DNS record
b. Service (SRV) DNS record
c. Mail Exchanger (MX) DNS record
d. Host (A) DNS record
Explanation/Reference:
An A or Address record (also known as a host record) links a domain to the physical IP
address of a computer hosting that domain’s services.

https://independent.academia.edu/hizkiahartaku

References : https://vceguide.com/

You might also like