100% Real Microsoft MTA 98-366 Exam Questions & Answers, Accurate & Verified By IT Experts
Instant Download, Free Fast Updates, 99.6% Pass Rate
Microsoft MTA 98-366 Practice Test Questions in VCE Format
Microsoft MTA 98-366 Practice Test Questions, Exam Dumps
Microsoft 98-366 Networking Fundamentals exam dumps vce, practice test questions, study guide & video training course to study and pass quickly and easily. Microsoft 98-366 Networking Fundamentals exam dumps & practice test questions and answers. You need avanset vce exam simulator in order to study the Microsoft MTA 98-366 certification exam dumps & Microsoft MTA 98-366 practice test questions in vce format.
MTA networking fundamentals Internet intranet and extranet DMZ, and then we will cover VPN, or virtual private networking. Let's get started. The first slide. I decided to start with something that is pretty obvious. The ty obvious. ThYou all go. Yeah, I know. The Internet. I go to Facebook every day. I hope you don't do that during your business hours. The Internet, that is, is a big, big, large network. A lot of computers and network devices that are connected are linked. Then they'll be able to see and talk to each other. And thanks to that, you can access websites like Facebook. You can download applications, and you can play online games. It's very difficult to imagine today's everyday life without the Internet today.I'm not sure if you agree with me, but that's the case. A lot of people work from home thanks to the Internet. In the last 1015 years, it has changed the world in the last 1015 years.Again, if you've watched any of my previous courses, you know that I keep complaining that I'm really old. Yes, I remember when the Internet was something like that. Well, I don't really need that. Why should I get a connection like that at home? I don't need that. I have a book. I've got this. I've got that. I don't need anything like that. Go away. It sounds really funny when you think about networks and how we work today. An intranet is a network that is exclusive to your company. It is a local network. What does it mean? Imagine that you work for a company. Let's say that is your company. You want to share a very important document. Let's say you want to describe some policies and benefits that your company offers. How do you share it? Of course, what you can do is email it to everybody. Is it a good solution? It might be. However, the problem is that you have to send it to, let's say, 500 people. Mike might be on holiday. Maybe his inbox is for Maybe he's going to be busy next week. That's why what you can do is share a document like that. You can put a link on your internal website, and thanks to that, you just publish a link. It's very similar to, let's say, services like Dropbox or something like that. Yeah, it is internal. It means that your company can access it. Your colleagues can access it. In most cases, it's not available on the Internet. It might be if you connect to the network in a secure way. How? One of the things that you can do and that is a very popular solution we are going to cover it later on) is use VPNs, or virtual private networks. Now extranet. It is inside your intranet. However, it is available on the Internet. In most cases, it is used if you want to exchange some files or documents with other companies. It is isolated. It has to be les or documenA lot of prerequisites to make it happen. We go back to our diagram that we saw in the previous lecture. Now we know a little more. a question for you. Where is the Internet? And you say, Oh, it's easy; it's labeled. OK, where is my intranet? And you all go, Well, I don't know. It's not labeled. It's not. There is a chance it is running on the server. Maybe it is a dedicated PC or another server somewhere. You don't know. It's not easy to identify if you don't know where this service is. A few words about the DMZ. That is something you willfind in many different places. And it sounds like wow. What exactly is the DMZ? And there is no magic behind it. It's pretty simple, if you understand how it works. The DMZ is also a place that can be accessed from the outside world. However, it is isolated, and it's really isolated. What I mean by that is that I will give you the following example. Let's say you decided to run your own DropBox server. You want to run what we sometimes call a cloud solution, okay? a cloud solution. That's what you want to run: a cloud solution. What do you do? What can you do? Let's take a look at this network diagram that you can see here. That is your router. This is your Intranet, OK? something that is available for your colleagues and your company. And then you say, "Well, I want to share a lot of files or maybe ten files with everybody in the world." I have a great website; I have a great document; I have an ebook; whatever. It's not a good idea to put that over here. Why? Because it is for your own company. And then, when we talked about the extranet, I said it could be used for some other companies and people you work with. That's not a good idea to allow, let's say, Mike from Chicago to access it directly. It's not a good idea. Why? Because that is really important to understand. If Mike gets access to a single file over here, there is a chance he can compromise the whole network. He can hack into our service, and so on. It's like you left a door open. It's not a good thing. That's what we can do. We can implement a "DMZ," a "special zone," a "special place," or a "secret place" in our network. However, it is isolated. If Mike gets access to the server—okay, let's say it is a server—he manages to get full access to the server. He's really smart, and he managed to break our password and get access to everything that is on the server. Then he said, okay, let me go over there. He is not going to be allowed. In most cases, there is a special device that will protect our Internet and local area network. Any idea? We talked about that, Yes, I'm pretty sure you guessed. It is, in most cases, a firewall. A firewall says sorry, Mike, you're not allowed. And what's more, well, sorry, mate, I am going to report your activity to our network administrator because I don't like the idea that you tried to access our LAN. And Mike says right in this section, we talked about the internet, intranet, and extranet. That's not the end of our discussion. There is one more topic that we have to cover. Do you know? Do you know? Do you know? Yes, I said VPNs. We are going to include that in our next lecture. I decided to include it in the intranet and extranet because it is a very popular method, a solution that people use to connect to a network and work from home. That's why it makes sense to cover it straight away, explain what that is, and then when we get to security we'll talk a little more about VPN. Thank you very much.
Part two of our internet-intranet and extranet discussion VPNs. What is a VPN? VPN stands for virtual private network." It is a special connection. Sometimes we say it is a tunnel. It allows you to connect to your corporate network in a secure way. in most cases, using the internet. Of course, you can use VPNs in many different ways. That is what most people use VPNs for. That's why I decided to describe it like that. For now, please memorize. It's really important that we use a special set of protocols. because it's not a single protocol, IPsec. We use it to make that connection secure. And you all go. Okay. I don't really get it. It sounds really strange. I have never used VPNs before. Why? Where? How? Here we go. We have two types of VPNs. remote access and a site-to-site VPN. We will start with the second one. site-to-site VPN. You have a network diagram on the screen. I'm going to draw my own one. Let's say you have two offices, A and B. You have a really important server over here and a user. Let's call it Mike again. And Mike wants to download a file from that server. How can you do that? It's not going to be an easy task because Mike is not based in the same place as the server. That's why it's not going to be an easy task. What you can do is create a secure connection, a secure panel, between these two companies. VPN. Thanks to that, Mike will be able to see, download, upload, and view anything he wants. And, of course, he is permitted to do so on that server. That is a site to toe VPN. The second VPN that I want to talk about is a remote access VPN. That's pretty obvious. It is used if you want to work from home. Let's use the same example. You're John, and you're over here. You're at home and you want to download something from that server. It's not a good idea to allow anything. You know, you should not allow anything to be available directly because it's not secure. Anyone can see that. It's not a good thing. What you can do is use a VPN to connect to your network. Yes, we can use it as a verb. People do that. People use it as a verb. You can VPN into your network. And thanks to that, you can access a file—a database. You can work from home. That's the magic behind a VPN. And you know what? It is secure. It's really secure. All traffic is encrypted. We're going to talk about security later on. Don't worry. We will cover a little more, especially a set of protocols. Do you remember how I covered that? I mentioned that. Do you remember? IPsec? Okay, we are going to talk about that later on. in this lecture. We talked about VPNs, and that's all I wanted to cover in our second section. That was dedicated to the Internet's intranet and extranet. In our next lecture, we're going to talk about local area networks. Again, we will have two sessions dedicated to local area networks. Yes, because there are a lot of things you have to understand and memorise if you want to pass your MTA exam, and, of course, if you want to work as a network engineer in the future. Thank you very much.
MTA Networking Fundamentals Local Area Networks We'll have two lectures dedicated to lanes local area networks. In the first one, we'll talk about local area networks in general and cover Mac addresses and loopback interfaces. In the second lecture, we'll cover things like villains and switches. Let's start with local area networks, and we'll talk about them in general. Now, I have a question for you. Can you try to under-identify this device? I used a Web browser to connect to a network device. What is it? Yes, I'm pretty sure you managed to guess it. It is a switch. It is an HP 25-ten switch. We are going to use that switch throughout our series. We'll look at some options later on when we get to network hardware. Now you can ask, why did you decide to show it to us? I did because a switch is a device that allows you to create local area networks. Let's try and define LAN. A LAN is a network that you can find everywhere. And if you have two computers or two devices connected to each other, it doesn't matter how—in most cases, it is a switch. You've just created a local area network. Please note that you can have a lot of different devices. You can see what it is. A printer? Was that probably on a server? And two PCs? Yeah, this is our switch. We need a way to identify our devices. When you think about that, it's really important to understand that, because it applies to everything. We have to have a way to identify things. That's why we have a postcode. That's why we have a phone number. Yeah, we need things that will allow us to identify and reach, for instance, a place or, I don't know, a server. Okay. In local-area networks, we use special addresses that can help us identify devices on the network. They are called Mac addresses. Sometimes you can hear people call it hardware or a physical address. Here, Microsoft calls it "physical address." I'll show you how you can check that in Windows XP Seven or Eight in a moment. Microsoft calls it a physical address. Make sure that you memorise it because you can see that on your exam. Microsoft can ask you: What is a Mac address? And they can ask you: Is it a physical address? Is whatever an logical address? Is it? I don't know. You can see a question like that. It's really important to memorise that an aMac address is a physical hardware address. Now, there is one more address that you can find everywhere. I'm pretty sure you have seen it before, and it is an IP address. We are going to talk a little more about IP addresses. Actually, we're going to even do subnetting. It means we'll divide our IP address into subnets later on. For now, please try and memorise that. In our local area network, we use Mac addresses. For routed transmissions, IP addresses are used for routing. I promised I would show you how to check that. In Windows, we go to command-prompt to access that screen. If you've never used it before, go to Start and type CMD or Command Prompt, then press Enter. This is sometimes called the CLI command-line interface. It allows you to type commands. You can tell Windows what you want to see and what you want to enable, because it's not only to produce a report or get some information. You can set up and change things from the command prompt as well. However, in most cases, we use it to troubleshoot and gather information we want to check. OK, what is my IP address? Is this host alive? How can I get to Google.com? And so on. You can ask a lot of different questions. Of course, during our MTA training we are going to use the CMD many, many times. I will introduce a lot of commands. There is a document in one of the lectures where you can find tools and commands that you can use in Windows. In here, we're talking about Mac addresses, right? We want to check what our MAC address is. A Mac address is the physical hardware address of our net card. In this case, I am on a PC. It means that a Mac address will show; it will be the Mac address of my network interface card. To find it, we type "I pick config," and one of the things that you will see on the screen will be the Mac address. Here we go. That's the physical address. Mac address, my Mac address, and the Mac address of my Nic card Why is it important? I'll show you how it works. Imagine that you have two PCs that want to send a piece of information. Okay, let's say we have PC One. That's how we draw a switch, especially in the Cisco world. And then we have PC Two. This guy is a switch. Let's call it Switch One. Now, PC One wants to send a message to PC Two. PC One says, Well, I want to send you an email. I want to send a file. And to make it happen, PC One is going to use the Mac address of PC Two. When we get to switches, I'll show you how it works in detail. And what is what is this switch you know all about? Because this switch is going to play a very important role in this discussion. For now, please memorise that PC One is going to use a Mac address if it wants to send a message to PC Two. It will use an IP address at the beginning of this conversation only to figure out what the Mac address is. I want to leave it here because you have to know a little more about switches before we can talk in details about Mac addresses, ports, and how a switch learns and helps you reach PC two Microsoft at this stageof your MTA training, they want you to know whata loopback interface is, what a loopback IP is. If you want to test your neck card, your interface card, What you can do, you can pingone twenty seven zero zero one. When you do that and you can see a reply, it means that your Nic card is okay. Your TCP/IP is okay. If you don't know what that is, we're going to talk about that later on. There is even a dedicated lecture to the protocols that make it work for now. Please memorise that a loopback IP is one twenty-seven zero zero x, to be more specific, because it doesn't have to be one. For now, it is one. You can ping it to make sure that your localnick card, your interface card, the card that you useto connect your ethernet cable, that allows you to browsethe Internet and connect to a server, everything is okay. You want to make sure that drivers are okay and that your NFC card is responding at the moment. You type "ping one twenty-seven zero one," and you expect to see a reply. want to see that in action because it's really boring to watch a screenshot. Let's do that thing at one twenty-seven, zero zero one, and we can see a reply. As I said, it doesn't have to be one. Just keep it in secret. Another thing Microsoft wants you to know. If that was me, I would never include that in any training because this is a feature that we don't use anymore. It used to be a really popular solution many, many years ago when we didn't have routers or mobile broadband connections. Today, well, I have not used that feature for, I don't know, seven, eight years now. Microsoft wants you to. I agree. Maybe it is a good idea to at least know that there is a feature like that. So you all go, "What are you talking about?" Well, I am talking about the Internet Connection Sharing Center. It is a place that allows you to share your Internet connection. It means, let's say, that your PC is your laptop, and you want to share your Internet connection with somebody else. what you can do. You can use ICS, the Internet Connection Sharing Screen. Thanks to that, you can allow another PC to get access to the Internet. If I were you, I would ignore that feature because you will never use it in practice. Every day in this lecture, we talked about local area networks. I hope that it all makes sense. I will ask you again to memorise what a Mac address is. In our next lecture, we're going to talk about VLANs. I'd like to introduce it again at this point to give you foundations, fundamentals, and something you can use later on. From my experience, it is much easier to talk about. You know, more advanced featuresif you introduce some basics. First. Villains, stay with me.
local area networks. VLANs are our main topic in this lecture. We are going to talk about the advantages and disadvantages of wired and wireless connections. Let's start with VLANs. I decided to quote Cisco because it is a really nice definition of a VLAN. Again, for now, it is like an introduction. Okay? We need that when we get to more advanced topics. Hardware switches, routers' routing, and so on. We will need all these things for now. I want to introduce villains—virtual local area networks. What is a villain? I like to give my own example because you can read the definition on your screen. I want to give you an example because I think that's the easiest way to understand that. Imagine that you have a switch. You have four ports on that switch. Port number one, you have a really important server. Okay? That is your server. It is for your HR department. It means that they store sensitive information about employees—salaries, things like that. a place that you need in a company. Then you have a PC. And this is an HR specialist, someone who works in an HR department. The last two ports are just my two favourite names. It's Mike and John. They just worked at this company. They have nothing to do with HR. Let's say there are engineers, okay? It is its own company. Let's say it is like that. I have a question for you. Do you believe Mike and John should have access to that server, and you all say, "Of course not." You're not allowed to do what you can do.You can, of course, create some rules and ask Mike, "OK, can you give me a username and password?" Can you give me, I don't know a code to access. However, it's not a good idea to give her a chance to do that, if you know what I mean. It's like, you know, trying to break into a house. If you don't allow anyone to get even close to your house, it's even better. Yeah, it's even better to do that rather than invest in the best door possible. because there is a chance that someone manages to find a way in. The same applies to our situation. So what can we do? We can say that these two guys will be in Villain Seven. It's just a number. And then we say, Let me change the color. Let's say that Mike and John,they will be in Villain 27. The idea is that villains without a router can't talk to each other. If you set up your switch like that, Mike and John will not even get a chance to see the HR Seven. I hope it makes sense. We'll talk a little more about that in more detail when we get to switches and hardware. For now, I wanted to tell you that story and show you an example like that to make it easier when I get to switches and hardware. The last section here that I want to cover is dedicated to wired and wireless connections. As an MTA-certified engineer, you have to have a very good idea about wireless, wired, and all connections—everything that is related to these topics. A question to you: What is the main advantage of a wired connection? What is the main advantage of wireless connections? Our next lecture is dedicated to wireless. We will talk about wireless standards. I'm pretty sure you know about wireless. There is a big chance—and I can say even more—that you're using wireless at the moment to watch my training. What is the main advantage of wired versus wireless? The main advantage Let's start with wireless. For me, the most important thing about that is the freedom. Okay? I can be in my living room, bathroom, kitchen, or basement. Well, basement, it all depends. That is the problem with the mainproblem with wireless is the range. Still, it is awesome. Please keep in mind that we have a router, albeit a wireless router. or to be more specific, a router with a built-in access point. That is really cool. When you think about wireless, you put a router in your living room. You don't need any cameras. You just go to your bedroom and you can browse the Internet. You can watch a movie or play an online game. Awesome. Let's think about a wired connection. Now, what is the main advantage? And you all go. If you've never worked in it, you're in for a treat; wireless is fantastic, mate. We don't need wires. And it is not true. To be more specific, even if you get to a brand new office, you get a new office. You will see wires everywhere. Why is that? If wireless is so good and it's really cheap to deploy, just think about a big office. You have an office with 25 desks. It will cost a lot of money. You have to pay a lot to have structured cabling in it. You can just buy one access point for £500, a really decent business-class access point, and you're done. I can make it happen in like 3 hours. and you will spend weeks doing cabling. Still, all companies do that. People will invest thousands of pounds, if not millions, every day. because wireless is not reliable. It's great if you want to browse the Internet; if you want to go to Facebook or watch a clip on YouTube, it's awesome. However, it's not reliable. If you want to work every day with a SQL database, if you want to access a Java website, if you want to, I don't know, whatever, access a file or a spreadsheet on a server, You will not use wireless. We like to use a wired connection. That's what you have to memorise from this slide. In this lecture, we talked about villains, wired, and wireless solutions. As I mentioned, our next session is going to be dedicated to white area networks and wireless. We will talk about white area networks first and then wireless. Thank you very much.
Go to testing centre with ease on our mind when you use Microsoft MTA 98-366 vce exam dumps, practice test questions and answers. Microsoft 98-366 Networking Fundamentals certification practice test questions and answers, study guide, exam dumps and video training course in vce format to help you study with ease. Prepare with confidence and study using Microsoft MTA 98-366 exam dumps & practice test questions and answers vce from ExamCollection.
Purchase Individually
Microsoft 98-366 Video Course
Top Microsoft Certification Exams
Site Search:
SPECIAL OFFER: GET 10% OFF
Pass your Exam with ExamCollection's PREMIUM files!
SPECIAL OFFER: GET 10% OFF
Use Discount Code:
MIN10OFF
A confirmation link was sent to your e-mail.
Please check your mailbox for a message from support@examcollection.com and follow the directions.
Download Free Demo of VCE Exam Simulator
Experience Avanset VCE Exam Simulator for yourself.
Simply submit your e-mail address below to get started with our interactive software demo of your free trial.
Yesterday passed the exam i had 31 questions with a passing score of 70.
Some questions where the same as in de dumps. There where also some newer questions that weren't in the dump. Knowledge of IPv4, IPv6, OSI, DNS, DHCP, WIFI are key.
planning to take exam 98—366 in two days’ time and i am looking for microsoft press pdf 98-366 exams. if anyone has it please help me out.
@ kiigo i think self-studies will do. i did exactly that all i used was mta fundamentals exam 98-366 practice test after going through the branidumps and some books i did pass.
recently i did ccna exams and passed though did self-study. i am thinking that i want to enrollee for 98-366 course to although i am not sure if it can work out if i do self study. or should i gent an instructor?
the secretes of passing mta series is to study the dumps and have lots of time lab work. get to try the 98-366 practice test. from this you will pass. but its much easier when one gains experience before starting the course.
hi people can i get 98-366 dumps that have mta networking fundamentals exams 98-366 answers. i want to confirm if my answers could be correct. and also know how best to go about answering questions.
with this dumbs here yon this site i got mta 98-366 practice test. lucky me, as people are complaining on how they failed, i passed my exam thanks to examcollection
Add Comment
Feel Free to Post Your Comments About EamCollection VCE Files which Include Microsoft MTA 98-366 Exam Dumps, Practice Test Questions & Answers.