Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Microsoft Technology Associate (MTA) – Infrastructure & Security Exam With Correct Answers 2025/2026.

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
19-02-2026
Geschreven in
2025/2026

1. What is the "OSI Model" and why is it used in networking? correct answer The Open Systems Interconnection (OSI) model is a conceptual framework that characterizes and standardizes the communication functions of a telecommunication or computing system. It consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. It is used to troubleshoot network issues by isolating problems to a specific layer and to ensure interoperability between different vendors' products. 2. Explain the purpose of a "Default Gateway." correct answer A default gateway is the node (typically a router) on a computer network that serves as an access point to another network when no other route matches the destination IP address of a packet. Without a default gateway, a device can communicate with other devices on its local subnet but cannot access the Internet or remote networks. 3. What is "DHCP" (Dynamic Host Configuration Protocol)? correct answer DHCP is a network management protocol used on IP networks where a DHCP server dynamically assigns an IP address and other network configuration parameters (like subnet masks and DNS addresses) to each device on a network. This eliminates the need for manual IP configuration, preventing IP conflicts and simplifying network administration. 4. Define "Subnetting" and its primary benefit. correct answer Subnetting is the practice of dividing a single physical network into two or more smaller logical sub-networks (subnets). The primary benefit is improved network performance and security; it reduces broadcast traffic and allows administrators to apply different security policies to different groups of users.

Meer zien Lees minder
Instelling
MTA - Microsoft Technology Associate
Vak
MTA - Microsoft Technology Associate

Voorbeeld van de inhoud

Microsoft Technology Associate (MTA) – Infrastructure
& Security Exam With Correct Answers 2025/2026.


1. What is the "OSI Model" and why is it used in networking?
correct answer The Open Systems Interconnection (OSI) model is a conceptual framework
that characterizes and standardizes the communication functions of a telecommunication or
computing system. It consists of seven layers: Physical, Data Link, Network, Transport,
Session, Presentation, and Application. It is used to troubleshoot network issues by isolating
problems to a specific layer and to ensure interoperability between different vendors'
products.

2. Explain the purpose of a "Default Gateway."
correct answer A default gateway is the node (typically a router) on a computer network that
serves as an access point to another network when no other route matches the destination
IP address of a packet. Without a default gateway, a device can communicate with other
devices on its local subnet but cannot access the Internet or remote networks.

3. What is "DHCP" (Dynamic Host Configuration Protocol)?
correct answer DHCP is a network management protocol used on IP networks where a DHCP
server dynamically assigns an IP address and other network configuration parameters (like
subnet masks and DNS addresses) to each device on a network. This eliminates the need
for manual IP configuration, preventing IP conflicts and simplifying network administration.

4. Define "Subnetting" and its primary benefit.
correct answer Subnetting is the practice of dividing a single physical network into two or
more smaller logical sub-networks (subnets). The primary benefit is improved network
performance and security; it reduces broadcast traffic and allows administrators to apply
different security policies to different groups of users.

5. What is a "MAC Address" and how does it differ from an IP address?
correct answer A Media Access Control (MAC) address is a unique identifier assigned to a
Network Interface Controller (NIC) for use as a network address in communications within a
network segment (Layer 2). Unlike an IP address, which is logical and can change depending
on the network, a MAC address is hard-coded into the hardware and generally remains
permanent.

6. Explain "VLAN" (Virtual Local Area Network).
correct answer A VLAN is a logical group of workstations, servers, and network devices that
appear to be on the same LAN despite their geographical distribution. VLANs allow a
network administrator to segment a network without needing to run new cables, improving
security by isolating sensitive data traffic from the rest of the network.

7. What is the "TCP/IP" suite?
correct answer TCP/IP is the set of communications protocols used to connect hosts on the
Internet. It is named after its two most important protocols: Transmission Control Protocol
(TCP) and Internet Protocol (IP). While the OSI model has seven layers, the TCP/IP
model typically consists of four: Network Access, Internet, Transport, and Application.

, 8. Describe the function of "DNS" (Domain Name System).
correct answer DNS acts as the "phonebook" of the Internet, translating human-friendly
domain names (like microsoft.com) into machine-friendly IP addresses (like 104.215.148.63).
When you enter a URL, your computer queries a DNS resolver to find the correct server to
connect to.

9. What is "Port Forwarding"?
correct answer Port forwarding is a technique used to allow external devices to access
computer services on private networks. It redirects a communication request from one
address and port number combination to another while the packets are traversing a network
gateway, such as a router. This is commonly used for hosting web servers or gaming.

10. Explain the difference between "Switch" and "Hub."
correct answer A hub is a simple device that broadcasts all incoming data packets to every
port, leading to high network congestion and security risks. A switch is an "intelligent" device
that learns the MAC addresses of connected devices and forwards data only to the specific
port intended for the recipient, greatly improving efficiency.

11. What is "Ping" and what protocol does it use?
correct answer Ping is a computer network administration software utility used to test the
reachability of a host on an IP network and to measure the round-trip time for messages. It
uses the Internet Control Message Protocol (ICMP) to send "echo requests" and wait for
"echo replies."

12. Define "Traceroute" (or Tracert).
correct answer Traceroute is a diagnostic tool for displaying the route (path) and measuring
transit delays of packets across an IP network. it lists all the routers (hops) a packet passes
through to reach its destination, helping administrators identify where a connection is failing.

13. What is a "VPN" and what is "Tunneling"?
correct answer A Virtual Private Network (VPN) provides a secure connection over a public
network. Tunneling is the process of encapsulating a private data packet inside a public
protocol (like IP) to transport it securely. This creates an encrypted "tunnel" that keeps data
private from ISPs or hackers.

14. Describe "Denial of Service" (DoS) and "DDoS."
correct answer A DoS attack attempts to make a machine or network resource unavailable to
its intended users by flooding it with traffic. A Distributed Denial of Service (DDoS) attack is a
DoS where the attack traffic comes from multiple synchronized sources (often a botnet),
making it much harder to block.

15. What is "Social Engineering" in a security context?
correct answer Social engineering is the psychological manipulation of people into
performing actions or divulging confidential information. It relies on human error rather than
technical vulnerabilities. Examples include phishing, baiting, and pretexting.

16. Explain "Firewall" rules and "Access Control Lists" (ACLs).
correct answer A firewall uses a set of rules to determine whether to allow or block network
traffic. An ACL is a list of permissions attached to an object (like a router port) that specifies
which users or system processes are granted access. ACLs are the primary method for
filtering traffic based on IP address or port number.

Geschreven voor

Instelling
MTA - Microsoft Technology Associate
Vak
MTA - Microsoft Technology Associate

Documentinformatie

Geüpload op
19 februari 2026
Aantal pagina's
7
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$22.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
trmainanapoleon

Maak kennis met de verkoper

Seller avatar
trmainanapoleon Chamberlain College Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
3
Lid sinds
3 maanden
Aantal volgers
0
Documenten
179
Laatst verkocht
1 maand geleden
STUVIASUCCESS

Welcome to STUVIA SUCCESS Where well-researched,Clearly organized and exam-oriented study documents are designed to help students understand faster ,revise smarter and score better. My resources are created to give you real academic value. BUY WITH CONFIDENCE-YOUR SUCCESS IS THE GOAL.

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen