Exam 98-366 Networking Fundamentals Interview Questions
A strong foundation of networking concepts is essential for IT roles. The Microsoft Technology Associate is an innovative certification program specially designed to provide a pathway for future success in advanced technology courses. The Networking Fundamentals MTA Exam 98-366 helps you to validate your fundamental technology concepts and acts as a foundation for your future career growth. Further, this can prove to be the stepping stone towards becoming a Microsoft Technology Specialist (MCTS)
Now, Let us look at some Exam 98-366 Networking Fundamentals Interview Questions and see what types and patterns can be expected.
1. What is Network Security?
Network security could be defined as the process of protecting resources from unauthorized access or attack by applying controls to network traffic. The goal is to ensure that only legitimate traffic is allowed. Azure includes a robust networking infrastructure to support your application and service connectivity requirements.
2. Define Network Access Control.
Network access control is the act of limiting connectivity to and from specific devices or subnets within a virtual network. The goal of network access control is to limit access to your virtual machines and services to approved users and devices. Access controls are based on decisions to allow or deny connections to and from your virtual machine or service.
3. What types of network access controls does Azure support?
Azure supports several types of network access control, such as:
- Network layer control
- Route control and forced tunneling
- Virtual network security appliances
4. What are Service Tags?
Service tags are Microsoft-created labels that represent a group of IP addresses. They update dynamically to include IP ranges that meet the conditions that define inclusion in the label. For example, if you want to create a rule that applies to all Azure storage on the east region you can use Storage.
5. Define Service Endpoints.
Service endpoints are another way to apply control over your traffic. You can limit communication with supported services to just your VNets over a direct connection. Traffic from your VNet to the specified Azure service remains on the Microsoft Azure backbone network.
6. What is Wireless LAN Service?
The Wireless LAN service is a feature in Windows Server® 2008 R2 and Windows Server® 2008 that you can use to enable the wireless WLAN Auto Configuration service, and to configure WLAN AutoConfig for automatic startup. Once enabled, WLAN AutoConfig dynamically selects the wireless network to which the computer will automatically connect, and configures the necessary settings on the wireless network adapter. This includes automatically selecting and connecting to a more preferred wireless network when one becomes available.
7. What is IEEE 802.1X?
The IEEE 802.1X standard defines the port-based network access control that is used to provide authenticated wired access to Ethernet networks. This port-based network access control uses the physical characteristics of the switched Local Area Network (LAN) infrastructure to authenticate devices attached to a LAN port.
8. What components does Network Policy Server use?
Network Policy Server (NPS) lets you centrally configure and manage network policies by using the following three components: RADIUS server, RADIUS proxy, and Network Access Protection (NAP) policy server.
9. What is a Server Certificate?
A server certificate is a digital document that is commonly used for authentication and to help secure information on open networks. A certificate securely binds a public key to the entity that holds the corresponding private key. They are digitally signed by the issuing certification authority (CA), and they can be issued for a user, a computer, or a service.
10. Define EAP.
Extensible Authentication Protocol (EAP) extends Point-to-Point Protocol (PPP) by enabling additional authentication methods that use credential and information exchanges of arbitrary lengths. With EAP authentication, both the network access client and the authenticator (such as an NPS server) must support the same EAP type for successful authentication to occur.
11. What is Kernel Mode Remote Direct Memory Access?
kRDMA is a new feature for Windows Server 2012. Kernel mode Remote Direct Memory Access (RDMA) is an accelerated input-output (I/O) delivery model that allows application software to bypass most software layers to communicate directly with the computer hardware, which improves application performance and reduces delay.
12. What are the features of NIC?
Network Interface Card (NIC) Teaming, also known as load balancing and failover (LBFO), allows multiple network adapters on a computer to be placed into a team for the following purposes:
- Bandwidth aggregation
- Traffic failover to prevent connectivity loss in the event of a network component failure
13. Define Receive Segment Coalescing (RSC).
RSC is a stateless offload technology that helps reduce CPU utilization for network processing on the receive side by offloading tasks from the CPU to an RSC-capable network adapter. CPU saturation due to networking-related processing can limit server scalability.
14. What is the purpose of Define Receive Segment Coalescing (RSC)?
RSC enables an RSC-capable network interface card to do the following:
- Parse multiple TCP/IP packets and strip the headers from the packets while preserving the payload of each packet.
- Join the combined payloads of the multiple packets into one packet.
- Send the single packet, which contains the payload of multiple packets, to the network stack for subsequent delivery to applications.
15. What are the benefits of Optimization of TCP Loopbacks?
Optimization of TCP loopback provides the following benefits:
- TCP loopback optimization provides an optimized low-latency loopback path for performance-critical applications that rely on loopback for inter-process communication.
- TCP loopback optimization does not cause any disparity in performance between IPv4 and IPv6 networks.
- With TCP loopback optimization, you are provided the choice to use either registered (Winsock RIO) sockets or Winsock to make use of the optimized fast path. You can observe when the connections take the slow path rather than the optimized fast path.
- The optimized loopback path is available for developers to programmatically control on a per-connection basis.
16. What are Failover Clusters?
A failover cluster is a group of independent computers that work together to increase the availability and scalability of clustered roles (formerly called clustered applications and services). The clustered servers (called nodes) are connected by physical cables and by software. If one or more of the cluster nodes fail, other nodes begin to provide service (a process known as failover). In addition, the clustered roles are proactively monitored to verify that they are working properly.
17. What is a Router?
A router is a device that manages the flow of data between network segments, or subnets. A router directs incoming and outgoing packets based on the information it holds about the state of its own network interfaces and a list of possible sources and destinations for network traffic. Generally, dedicated hardware routers handle heavier routing demands best, and less expensive software-based routers are sufficient to handle lighter routing loads.
18. Differentiate between Unicasting and Multicasting.
Unicasting is the sending of network traffic to an endpoint. Multicasting is the sending of network traffic to a group of endpoints.
19. What is NAT?
Network address translation (NAT) provides a method for translating the Internet Protocol version 4 (IPv4) addresses of computers on one network into IPv4 addresses of computers on a different network. NAT technology lets computers on any network use reusable private addresses to connect to computers with globally unique public addresses on the Internet.
20. What is Demand Dial Routing?
Demand-dial routing is the forwarding of packets between networks and over Point-to-Point Protocol (PPP) links, such as analog phone lines and Integrated Services Digital Network (ISDN).
21. What Does Packet Filtering do?
Packet Filters specify which type of traffic is allowed into and out of the router. The packet filtering feature is based on exceptions. You can set packet filters per interface and configure them to do one of the following:
- Pass through all traffic except packets prohibited by filters.
- Discard all traffic except packets allowed by filters.
22. What is Microsoft iSCSI Initiator?
Microsoft iSCSI Software Initiator enables you to connect a Windows® host computer to an external iSCSI-based storage array via an Ethernet network adapter. You can use Microsoft iSCSI Initiator in your existing network infrastructure to enable block-based Storage Area Networks (SANs), which provide iSCSI target functionality without having to invest in additional hardware, as well as to enable the use of iSCSI storage devices in the home and small office.
23. What is Transmission Control Protocol/Internet Protocol (TCP/IP)?
Transmission Control Protocol/Internet Protocol (TCP/IP) is an industry standard suite of protocols that is designed for large networks consisting of network segments that are connected by routers. TCP/IP is the core protocol suite that is used on the Internet.
24. What is Telnet?
Telnet Client and Telnet Server, allows users to make remote connections based on the Telnet protocol. By using Telnet Client and Telnet Server, you can run command-line programs, shell commands, and scripts in a remote command console session just as though you were locally logged on to the remote host. It allows for interoperability between disparate operating systems, and it facilitates administration of remote systems, saving administrative time and network resources.
25. What is Remote Administration?
Remote administration is a method of managing one or more remote computers from a single location. In a large organization, you can use remote administration to centrally manage hundreds or even thousands of computers located in other buildings or even in other cities. In a small organization, you can use remote administration to manage a single server located in another office.
26. What is Network Load Balancing?
Network Load Balancing (NLB) is an optional feature in Windows Server® 2008 that load balances network traffic among multiple servers in an NLB cluster. NLB is particularly useful for ensuring that stateless applications, such as a Web server running Internet Information Services (IIS), are scalable by adding additional servers as the load increases.
27. What are the benefits of Applockers as a security strategy?
You can use AppLocker as part of your overall security strategy for the following scenarios:
- Help prevent malicious software (malware) and unsupported applications from affecting computers in your environment.
- Prevent users from installing and using unauthorized applications.
- Implement application control policy to satisfy security policy or compliance requirements in your organization.
28. What is BitLocker Drive Encryption?
BitLocker Drive Encryption allows you to encrypt all data stored on the Windows operating system volume and configured data volumes, and by using a Trusted Platform Module (TPM), it can also help ensure the integrity of early startup components.
29. What is Kerberos?
Kerberos is an authentication mechanism used to verify the identity of a user or host. This page contains information about evaluating, developing, and troubleshooting Kerberos, the preferred authentication method for services in Windows Server 2008.
30. Define Smart Cards.
Smart cards are a tamper-resistant and portable way to provide security solutions for tasks such as client authentication, logging on to domains, code signing, and securing e-mail.
Prepare for the Exam 98-366 Networking Fundamentals Exam Now!