Book Image

Networking Fundamentals

By : Gordon Davies
Book Image

Networking Fundamentals

By: Gordon Davies

Overview of this book

A network is a collection of computers, servers, mobile devices, or other computing devices connected for sharing data. This book will help you become well versed in basic networking concepts and prepare to pass Microsoft's MTA Networking Fundamentals Exam 98-366. Following Microsoft's official syllabus, the book starts by covering network infrastructures to help you differentiate intranets, internets, and extranets, and learn about network topologies. You’ll then get up to date with common network hardware devices such as routers and switches and the media types used to connect them together. As you advance, the book will take you through different protocols and services and the requirements to follow a standardized approach to networking. You’ll get to grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The book also shows you how to recall IP addresses through name resolution. Finally, you’ll be able to practice everything you’ve learned and take the exam confidently with the help of mock tests. By the end of this networking book, you’ll have developed a strong foundation in the essential networking concepts needed to pass Exam 98-366.
Table of Contents (23 chapters)
Free Chapter
1
Section 1: Network Infrastructure
7
Section 2: Network Hardware
11
Section 3: Protocols and Services
18
Section 4: Mock Exams
19
Mock Exam 1
20
Mock Exam 2

Questions

1. Which of these refers to the connectivity between different external networks?

(A) VPN
(B) Intranet
(C) Internet
(D) DMZ

2. Which of these does not allow us to identify a device on the network?

(A) Virtual port number
(B) IP address
(C) MAC address
(D) Hostname

3. Replace the underlined word in the following statement with the correct word(s). If you believe the statement is already correct, then select No change is required:
A DMZ allows or denies network traffic based on a set of rules.

(A) VPN
(B) Internet
(C) Firewall
(D) No change is required

4. Which of these technologies allows you to securely connect to a private network over an insecure network?

(A) Extranet
(B) DMZ
(C) Firewall
(D) VPN

5. Which of the following devices would you most likely position within a DMZ?

(A) Domain controller
(B) DHCP server
(C) Print server
(D) Web server

6. What is the default security...