Pass Microsoft MTA 98-366 Exam in First Attempt Easily
Latest Microsoft MTA 98-366 Practice Test Questions, MTA Exam Dumps
Accurate & Verified Answers As Experienced in the Actual Test!
Download Free Microsoft MTA 98-366 Exam Dumps, MTA Practice Test
Free VCE files for Microsoft MTA 98-366 certification practice test questions and answers, exam dumps are uploaded by real users who have taken the exam recently. Download the latest 98-366 Networking Fundamentals certification exam practice test questions and answers and sign up for free on Exam-Labs.
Microsoft MTA 98-366 Practice Test Questions, Microsoft MTA 98-366 Exam dumps
Hello and welcome. My name is Marius, and I am very, very happy that you decided to join me. MTA networking fundamentals. This training is divided into three sections—network, infrastructure, hardware, protocols, and services. I have prepared a lot of interesting topics. I was trying to give you a lot of real-world examples as well. It's really important. I appreciate you wanting to pass your MTA exam. It is even more important to know how to apply your skills when you get a routine firewall switch firewall.I hope you're going to enjoy the series.
2. What is MTA all about? Is it worth it?
So you want to be MTA certified? You want to get a certificate like that. Microsoft created MTA to give you a pretty easy way to start your career in it or to advance your career in it. Our main focus will be on MTA IT infrastructure. That's what you can see on the screen here. We are going to cover MTA networking fundamentals. That's not the only MTA exam that you can take. Please note that you can become MTA certified in web applications and HTML databases. There are a lot of paths you can take. The one that we're interested in is for a support engineer, for a network engineer, or for anybody who wants to learn about networking. Networking fundamentals. If you want to take your exam, you will find that almost all topics have been covered in my lectures. I prepared a lot of questions for you as well to make sure that you can move on. You're okay with everything that we have discussed. Good luck. If you want to take your MTA exam, of course you have to go to a test centre like Pearson. You have to register, take an exam like that, and you will get a nice certificate. If your main focus is on networking, then that's fine. You can learn a lot of things as well. We'll talk about routers, switches, security, VPN, wireless, and THCP protocol services a lot in subnetting. Yes, we're going sous-netting as well. Okay, I think we are ready to start our first section. Thank you very much.
Understanding Network Infrastructures
1. What to expect in this section
Hi, my name is Marius, and I am very very happy that you decided to join me. MTA Networking Fundamentals: In our first section, we are going to talk about local area networks and wide area networks. VPNs will cover things like network topologies and, of course, a really important topic, wireless and wireless security.S
2. What is a computer network?
MTA Networking Fundamentals What is a network? That's what I want to discuss in this lecture. We'll talk about networks in general. You can treat that as an introduction to all the other lectures that we are going to cover in this section. Let's answer the first question: What is a network? A network can be defined as a group of two or more computer systems that are connected together. And that is the key phrase. They are linked. It means they can see each other and talk to each other. Of course, you can come up with many different examples. And that's what our training is all about. to talk about networks, hardware solutions, protocols, and services. Here we want to define what a network is. Now, I've prepared a very simple network diagram. It means it shows how network devices are connected. We are going to use the same diagram later on when we talk about local and wide-area networks. Here I want to ask you: can you recognise any devices?
I'm pretty sure there might be some new things on the screen at the moment. However, there should be some things that are okay for you, and you know them pretty well. I am sure that is pretty easy. That is just a PC. Of course, it can be a printer, a laptop, or a scanner. It just says "Client PC." Of course, it can be any device that you can find on the network. Sometimes we call it "end devices and users." That is what is available in a network today. And devices. What about this guy? I'm sure you're familiar with this device. It is a server. It means that devices that are on our network can use a server. Of course, our training is dedicated to networking fundamentals. That's why we are not going to talk about Microsoft services. I want to mention that there is MTA training that describes Microsoft services. I encourage you to watch it. I recorded it a couple of weeks ago. You can get it from Udemy as well. In MTA services, we focus on Microsoft Windows Server 2008 and Twelve. We demonstrate how to share and manage files, printers, domains, and other resources. Yeah, these are networking fundamentals. We want to make sure that we understand how they are connected. Now, what about this device? It is a firewall. There is a dedicated video to firewalls, but for now, you can memorise that a firewall is a device that is designed to make your network secure and decide what is and is not allowed.
For instance, just to give you a quick example, if I want to connect to a network, this Firework can ask, "Okay, who are you?" What is your username and password? Are you authorised to access that server? If I'm not, then unfortunately I will not be a happy guy tonight because this firewall said, "Well, I am very sorry, you're not allowed to connect to my network." This device is a router in mostcases, it is an edge device. That's how we call it as well ina small office, home office network in 99%,it is connected to the Internet directly. What's more, in a network like that, we have a firewall under our router in one big box. It means it's just one device. That's all for now for network devices, because we have lectures where I talk about routers, firewalls, switches, and access points. You can treat that as an introduction, an overview, to make sure that you know where to start. In this lecture, we talked about computer networks in general. I showed you what a network is. I'm pretty sure you know it very well by now. We discussed really basic network devices as well, like firewalls and routers in general. And there is MTA service training. If you're interested in Microsoft Windows Server 2000 and 812, You want to learn how ActiveDirectory services work and things like that. I encourage you to go to MTA Service because our main focus here will be on networking. We want to make sure that you understand how all these devices are connected. In our next video, we are going to talk about Internet intranets and extranets. We'll talk about LAN One and the DMZ. We're going to talk about VPNs as well. Thank you very much.
3. Internet, Intranet, and Extranet
MTA networking fundamentals: intranet and extranet DMZ. And then we will cover VPN, or virtual private network. Let's get started. the first slide. I decided to start with something that is pretty obvious. The Internet. Yes. You all go. Yeah, I know. The Internet. I go to Facebook every day. I hope you don't do that during your business hours. The Internet, well, that is a big, large network. A lot of computers and network devices that are connected are linked. Then they'll be able to see and talk to each other. And thanks to that, you can access websites like Facebook. You can download applications, and you can play online games. It's very difficult to imagine today's everyday life without the Internet today.I'm not sure if you agree with me, but that's the case.
A lot of people work from home thanks to the Internet. In the last 1015 years, it has changed the world in the last 1015 years.Again, if you've watched any of my previous courses, you know that I keep complaining that I'm really old. Yes, I remember when the Internet was something like that. Well, I don't really need that. Why should I get a connection like that at home? I don't need that. I have a book. I've got this. I've got that. I don't need anything like that. Go away. It sounds really funny when you think about networks and how we work today. Intranet. It is a network for your company. It is a local network. What does it mean? Imagine that you work for a company. Let's say that it's your company, okay? You want to share a very important document. Let's say you want to describe some policies and benefits that your company offers. How do you share it? Of course, what you can do is email it to everybody. Is it a good solution? It might be. However, the problem is that you have to send it to, let's say, 500 people. Mike might be on holiday. Maybe his inbox is for Maybe he's going to be busy next week. That's why what you can do is share a document like that. You can put a link on your internal website, and thanks to that, you just publish a link. It's very similar to, let's say, services like Dropbox or something like that. It is internal. It means that your company can access it. Your colleagues can access it. In most cases, it's not available on the Internet. It might be if you connect to the network in a secure way.
How? One of the things that you can do, and which is a very popular solution that we're going to cover later on, is use VPNs (virtual private networks). Now extranets. It is inside your intranet. However, it is available on the Internet. In most cases, it is used. if you want to exchange some files or documents with other companies. It is isolated. It has to be secure. Agreed. A lot of prerequisites to make it happen. We go back to our diagram that we saw in the previous lecture. Now we know a little more. a question for you. Where is the Internet? And you say, Oh, it's easy; it's labeled. Okay, where is my Intranet? And you all go, Well, I don't know. It's not labeled. It's not. There is a chance it may be running on this server. Maybe it is a dedicated PC or another server somewhere. You don't know. It's not easy to identify if you don't know where to go. A few words about the DMZ. That is something you will find in many different places. And it sounds like wow. What exactly is the DMZ? And there is no magic behind it's.It's pretty simple if you understand how it works. The DMZ is also a place that can be accessed from the outside world. However, it is isolated, and it's really isolated. What I mean by that is that I will give you the following example. Let's say you decided to run your own DropBox server. You want to run. Sometimes we call it a cloud solution. Okay? a cloud solution. That's what you want to run: a cloud solution. Let's check out this network diagram that you can see here. That is your router. This is your intranet. something that is available for your colleagues and your company. And then you say, "Well, I want to share a lot of files or maybe ten files with everybody in the world." I have a great website; I have a great document; I have an ebook; whatever. It's not a good idea to put that over here.
Why? Because it is for your own company. And then, when we talked about the extranet, I said it could be used for some other companies and people you work with. That's not a good idea to allow, let's say, Mike from Chicago to access it directly. It's not a good idea. Why? That is really important to understand. If Mike gets access to a single file over here, there is a chance he can compromise the whole network. He can hack into our service, and so on. It's like you left a door open. It's not a good thing. That's what we can do. We can implement a "DMZ," a "special zone," a "special place," or a "secret place" in our network. However, it is isolated. If Mike gets access to the server—okay, let's say it is a server—he manages to get full access to the server. He's really smart, and he managed to break our password and get access to everything that is on this server. Then he says, "Okay, let me go over there." He is not going to be allowed. In most cases, there is a special device that will protect our Internet and local area network. Any idea? We talked about that. Yes, I'm pretty sure you guessed. In most cases, a firewall says Sorry Mike, you're not allowed. And what's more, well, sorry, mate, I am going to report your activity to our network administrator because I don't like the idea that you tried to access our land. And Mike says right in this section, we talked about the Internet's intranet and extranet. That's not the end of our discussion. There is one more topic that we have to cover. Do you know? Yes, I said VPNs. We are going to include that in our next lecture. I decided to put that in the intranet and extranet because it is a very popular solution that people use to access a network to work from home. That's why it makes sense to cover it straight away, explain what that is, and then when we get to security, we'll talk a little more about VPN. Thank you very much.
4. Virtual Private Networks (VPNs)
Part two of our intranet and extranet discussion. VPNs. What is a VPN? a virtual private network. It is a special connection. Sometimes we say it is a tunnel. It allows you to connect to your corporate network in a secure way. in most cases, using the Internet. Of course, you can use VPNs in many different ways. That is what most people use VPNs for. That's why I decided to describe it like that. For now, please memorize. It's really important that we use a special set of protocols. because it's not a single protocol, IPsec. We use it to make that connection secure. And you all go. Okay. I don't really get it. It sounds really strange. I have never used a VPN before. What? Why? Where? How? Here we go. We have two types of VPNs. remote access and a site-to-site VPN. We will start with the second one. side-to-side VPN. You have a network diagram on the screen. I'm going to draw my own one. Let's say you have two offices, A and B. You have a really important server over here. and a user. Let's call him Mike again. And Mike wants to download a file from that server. How can you do that? It's not going to be an easy task because Mike is not based in the same place as the server. That's why it's not going to be an easy task. What you can do is create a secure connection, a secure tunnel, between these two companies. Thanks to that, Mike will be able to see, download, upload, or view anything he wants.
And, of course, he is permitted to do so on that server. That is a site-to-site VPN. The second VPN that I want to talk about is a remote access VPN. That's pretty obvious. It is used if you want to work from home. Let's use the same example. You're John, and you're over here. You're at home and you want to download something from that server. It's not a good idea to allow anything. You should not allow anything to be available directly because it's not secure. Anyone can see that. It's not a good thing. What you can do is use a VPN to connect to your network. Yes, we can use it as a verb. People do that. People use it as a verb. You can VPN into your network. And thanks to that, you can access a file—a database. You can work from home. That's the magic behind a VPN. And you know what? It is secure. It's really secure. All traffic is encrypted. We're going to talk about security later on. Don't worry. We will cover a little more, especially a set of protocols. Do you remember how I covered that? I mentioned that. Do you remember IPsec? We are going to talk about that later on. in this lecture. We talked about VPNs, and that's all I wanted to cover in our second section that was dedicated to the Internet's intranet and extranet. In our next lecture, we're going to talk about local area networks. Again, we will have two sessions dedicated to local area networks. Yes, because there are a lot of things you have to understand and memorise if you want to pass your MTA exam, and, of course, if you want to work as a network engineer in the future. Thank you very much.
5. Local Area Networks
MTA Networking Fundamentals Local Area Networks We'll have two lectures dedicated to lanes local area networks. In the first one, we'll talk about it. Local area networks in general will cover Mac addresses and loopback interfaces. In the second lecture, we'll cover things like villains and switches. Let's start with local area networks, and we'll talk about them in general. Now, I have a question for you. Can you try to under-identify this device? I used a Web browser to connect to a network device. What is it? Yes, I'm pretty sure you managed to guess it. It is a switch. It is an HP 25-ten switch. We are going to use that switch throughout our series.
We'll look at some options later on when we get to network hardware. Now you can ask, why did you decide to show it to us? I did because a switch is a device that allows you to create local area networks. Let's try and define LAN. A LAN is a network that you can find everywhere. And if you have two computers or two devices connected to each other, it doesn't matter how—in most cases, it is a switch. You've just created a local area network. Please note that you can have a lot of different devices. You can see what it is. A printer? Was that probably on a server? And two PCs? Yeah, this is our switch. We need a way to identify our devices. When you think about that, it's really important to understand that, because it applies to everything. We have to have a way to identify things. That's why we have a postcode. That's why we have a phone number. Yeah, we need things that will allow us to identify and reach, for instance, a place or, I don't know, a server. Okay. In local-area networks, we use special addresses that can help us identify devices on the network. They are called Mac addresses. Sometimes you can hear people call it hardware or a physical address. Here, Microsoft calls it "physical address." I'll show you how you can check that in Windows XP Seven or Eight in a moment. Microsoft calls it a physical address. Make sure that you memorise it because you can see that on your exam. Microsoft can ask you:
What is a Mac address? And they can ask you: Is it a physical address? Is whatever an logical address? Is it? I don't know. You can see a question like that. It's really important to memorise that an aMac address is a physical hardware address. Now there is one more address that you can find everywhere. I'm pretty sure you have seen it before, and it is an IP address. We are going to talk a little more about IP addresses. Actually, we're going to even do subnetting. It means we will divide our IP address into subnets later on. For now, please try and memorise that. In our local area network, we use Mac addresses. For routed transmissions, IP addresses are used for routing. I promised I would show you how to check that. In Windows, we go to CommandPrompt to access that screen. If you've never used it before, go to Start and type CMD or Command Prompt, then press Enter. This is sometimes called the CLI command-line interface. It allows you to type commands. You can tell Windows what you want to see and what you want to enable, because it's not only to produce a report or get some information. You can set up and change things from the command prompt as well. However, in most cases, we use it to troubleshoot and gather information we want to check. Okay, what is my IP address? Is this host alive? How can I get to Google.com? And so on. You can ask a lot of different questions. Of course, during our MTA training, we are going to use the CMD many times. I will introduce a lot of commands. There is a document in one of the lectures where you can find tools and commands that you can use in Windows. In here, we're talking about Mac addresses, right? We want to check what our MAC address is. A Mac address is our nick card's physical hardware address. In this case, I am on a PC. It means that a Mac address will show; it will be the Mac address of my network interface card. To find it, we type "Ipconfigall," and one of the things that you will see on the screen will be "here we go." That's the physical address. Mac address. My Mac address, the Mac address of my name Why is it important? I'll show you how it works.
Imagine that you have two PCs that want to send a piece of information. Let's say we have a PC One. That's how we draw a switch, especially in the Cisco world. And then we have PC Two. This guy is a switch. Let's call it Switch One. Now, PC One wants to send a message to PC Two. PC One says, Well, I want to send you an email. I want to send a file. And to make it happen, PC One is going to use the Mac address of PC Two. When we get to switches, I'll show you how it works in detail. And what is this switch all about? Because this switch is going to play a very important role in this discussion. For now, please memorise that PC One is going to use a Mac address if it wants to send a message to PC Two. It will use an IP address at the beginning of this conversation only to figure out what the Mac address is. I want to leave it here because you have to know a little more about switches before we can talk in details about Mac addresses, ports, and how a switch learns and helps you reach PC Two. Microsoft, at this stage of your MTA training, wants you to know what a loopback interface is and what the loopback IP is.
If you want to test your neck card, your interface card, What you can do, you can pingone twenty seven zero zero one. When you do that and you can see a reply, it means that your Nic card is okay. Your TCPI. If you don't know what that is, we're going to talk about that later on. There is even a dedicated lecture on the protocols that make it work. For now, please memorise that loop back.IP is one twenty-seven zero-x, to be more specific, because it doesn't have to be one. For now, it is one. You can ping it to make sure that your local interface card, the card that you use to connect your Ethernet cable and that allows you to browse the Internet and connect to a server, is working okay. You want to make sure that drivers are okay and that your NFC card is responding at the moment. You type "ping 1" (one twenty-seven zero one) and you expect to see a reply. want to see that in action because it's really boring to watch a screenshot. Let's do that thing at one twenty-seven, zero zero one, and we can see a reply.
As I said, it doesn't have to be one. Just keep it in secret. Another thing Microsoft wants you to know. If that was me, I would never include that in any training because this is a feature that we don't use anymore. It used to be a really popular solution many years ago when we didn't have routers or mobile broadband connections. Today, well, I have not used that feature for, I don't know, seven, eight years now. Microsoft wants you to. I agree. Maybe it is a good idea to at least know that there is a feature like that. So you all go, "What are you talking about?" Well, I am talking about the Internet Connection Sharing Center. It is a place that allows you to share your Internet connection. It means, let's say, that your PC is your laptop, and you want to share your Internet connection with somebody else. What you can do is use ICS, or the Internet Connection Sharing screen. Thanks to that, you can allow another PC to get access to the Internet. If I were you, I would ignore that feature because you will never use it in practice. Every day in this lecture, we talked about local area networks. I hope that it all makes sense. I will ask you again to memorise what a Mac address is. In our next lecture, we're going to talk about VLANs. I'd like to introduce it again at this point to give you foundations, fundamentals, and something you can use later on. From my experience, it is much easier to talk about more advanced features if you introduce some basics. First, Villa, stay with me.