Archive for the ‘MCITP’ Category

09.12
16

Exam 70-686 Windows 7, Enterprise Desktop Administrator

by admin ·

Published: November 20, 2009
Languages: English
Audiences: IT professionals
Technology: Windows 7
Credit toward certification: MCP, Specialist, MCITP

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Planning and managing a client life cycle strategy (16%)
Plan and manage client licensing and activation

Applications and operating systems; activation method; KMS vs. MAK; prerequisites; choosing a SKU; licensing infrastructure; licensing compliance audits; inventory audits; virtualization licensing considerations; making recommendations for licensing strategy and compliance

Plan and manage software updates

Application updates and operating system updates; evaluating and approving software updates; enterprise applications; designing an update strategy; choosing an update tool; planning and deploying a service pack; schedule considerations; network considerations; test updates; auditing for security compliance

Plan and manage a physical hardware and virtualization strategy

Analyzing existing hardware environment; determining which systems meet minimum requirements; tradeoffs of physical vs. VDI environment; network load considerations; disk space; direct connection vs. brokered connection; determining a VHD strategy; choosing 32 bit vs. 64 bit

Preparation resources
Licensing and volume activation
Application management and preparing for a Windows 7 deployment
Microsoft desktop virtualization strategy and product offerings

Designing a standard image (17%)

Design an image creation strategy

Identifying operating system and enterprise applications that will be included with the standard image; thick, thin, or hybrid; role-based or geographic-based images vs. single core image; image localization

Design a custom image

Identifying applications to be installed; identifying features and components to be enabled or disabled; testing the customized image

Define an image update strategy

Performance optimization; security considerations; efficiency; offline servicing vs. online or post-image updates; re-creating; recapturing

Preparation resources
Choosing an image strategy and building Windows 7 system images
Phase 3: Preparing and customizing your Windows image
Phase 5: Managing and servicing your Windows image

Designing client configurations (17%)
Design standard system settings

Choosing methods, including logon scripts, startup scripts, and Group Policy; designing profiles; designing error reporting; designing audit policy

Define client security standards

Application control policies; encryption; stopping unnecessary services; designing firewall rules; defining anti-malware settings; changes to Kerberos and NTLM; configuring user rights; defining UAC policy; designing a security template for system lockdown; defining account policies; designing security standards for removable storage

Define Windows Internet Explorer settings

Defining security zones; cache location; branding; in-private mode; restricting or allowing plug-ins; add-ons; privacy policy; browser protected mode

Preparation resources
Local Group Policy editor
Windows Firewall with Advanced Security design guide
Change Internet Explorer security settings

Designing a Windows 7 client deployment (15%)

Analyze the environment and choose appropriate deployment methods

Building the infrastructure; advantages of lite-touch vs. zero-touch vs. local install; capacity and scale considerations; determining required changes to the infrastructure

Design a lite-touch deployment strategy

Unicast vs. multicast; auto-cast vs. scheduled-cast; staggered deployment; scheduling considerations; network load considerations; choosing a client boot method for deployment; unattended answer files; restricting who can receive images; choosing a delivery mechanism

Design a zero-touch deployment strategy

Designing and configuring task sequencing; unattended answer files; scheduling considerations; staggered deployment; network load considerations; restricting who can receive images

Design a user state migration strategy

Determining which user data and settings to preserve; local vs. remote storage considerations; determining mitigation plan for non-migrated applications; securing migrated data; testing designed strategy; wipe-and-load migration vs. side-by-side migration

Preparation resources
Choose the right Microsoft deployment tool
Lite-Touch, High-Volume Deployment
Zero-Touch, High-Volume Deployment

Designing application packages for deployment (17%)
Design a delivery or deployment strategy

Auditing for prerequisites and minimum requirements; choosing a deployment method such as virtualized, Remote Desktop Services, Group Policy, or software distribution; server-based or client-based install; scheduling considerations; staggered deployment; network considerations; package creation standards

Manage application compatibility

Testing incompatibility; choosing a method for resolving incompatibility, such as upgrading, Remote Desktop Services, shim, or VDI; auditing incompatible software

Preparation resources
Choosing a deployment strategy
Application compatibility
Application compatibility for Windows 7: Unlocking the power of Application Shims

Identifying and resolving deployment and client configuration issues (19%)

Identify and resolve Internet Explorer issues

Security zones; Web applications; advanced settings; Group Policy restrictions; certificates

Identify and resolve Group Policy issues

Delegation; inheritance; policies are not effective; blocking; permissions; loopback processing; user vs. computer settings; filtering; performance

Identify and resolve networking issues

Wireless; remote access; VPN; certificates; performance; IP communication; Windows Firewall

Identify and resolve authentication and authorization issues

User rights; distinguishing between client-based and server-based issues; time synchronization (Kerberos)

Preparation resources
Troubleshooting
Windows Firewall with Advanced Security troubleshooting guide: Diagnostics and tools
Windows 7: Troubleshooting and support


QUESTION 1
You are planning to upgrade Internet Explorer. You have the following requirements:
* Create a report that identifies which computers are successfully upgraded.
* Do not install additional software on the client computers.
You need to design a deployment method that meets the requirements. What should you do?

A. Use Windows Server Update Services (WSUS).
B. Use Internet Explorer Administration Kit (IEAK) and Group Policy.
C. Use Microsoft System Center Configuration Manager.
D. Use Microsoft System Center Essentials.

Answer: A


QUESTION 2
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server
2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the
deployment of a custom application. You have the following requirements:
* The application must be available to only users who need it.
* Minimize network traffic during deployment.
You need to design a deployment strategy that meets the requirements. Which deployment
method should you use?

A. Microsoft Application Virtualization (App-V)
B. Microsoft System Center Configuration Manager 2007
C. RemoteApp and Desktop Connections
D. software installation in Group Policy

Answer: C


QUESTION 3
Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client
computers that run Windows XP. Nine hundred of the computers are on the local area network.
One hundred computers are portable computers that connect to the main office only once every
few months. You are planning to deploy Windows 7. You need to generate a report of the software
that is installed on all client computers. You need this information as soon as possible. What should
you use?

A. Microsoft System Center Data Protection Manager
B. Microsoft Desktop Optimization Pack
C. Microsoft System Center Essentials
D. Microsoft System Center Operations Manager

Answer: B


QUESTION 4
Your network has client computers that run Windows Vista. You are planning to deploy Windows
7. You need to detect and analyze the compatibility of an application that requires elevated
privileges. What should you do?

A. Use the Standard User Analyzer (SUA) Wizard.
B. Run a virtual version of the Setup Analysis Tool (SAT).
C. Use the Standard User Analyzer (SUA) tool.
D. Run a stand-alone version of the Setup Analysis Tool (SAT).

Answer: C


QUESTION 5
Your company’s network has client computers that run Windows 7. Multiple users share the
computers in the shipping department. These computers reside in the Shipping Computers
organizational unit (OU). The company wants to deploy a new application. The application is not
packaged. You have the following requirements:
* Deploy the application to all computers in the shipping department.
* Perform the deployment from a central location.
You need to plan the software deployment process to meet the requirements. Which two actions
should you include in the process? (Each correct answer presents part of the solution. Choose two.)

A. Using Microsoft System Center Configuration Manager, create a collection that contains the
shipping department computers, and assign the package to the collection.
B. Create a package by using Microsoft System Center Configuration Manager.
C. Create a Group Policy object (GPO) and add a software installation policy under the Computer
Configuration container.
D. In the Group Policy Management Console, link the software installation policy to the Shipping
Computers OU.
E. Using Microsoft System Center Configuration Manager, create a collection that contains the
shipping department users, and assign the package to the collection.

Answer: A,B

Click here to view complete Q&A of 70-686 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-686 Training at certkingdom.com

08.31
16

Exam 70-642 Windows Server 2008 Network Infrastructure, Configuring

by admin ·

Published: March 6, 2008
Languages: English, German, Japanese
Audiences: IT professionals
Technology: Windows Server 2008
Credit toward certification: MCP, MCSA, MCTS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Configuring addressing and services (21%)
Configure IPv4 and IPv6 addressing
Configure IP address options; subnetting; supernetting; multi-homed; interoperability between IPv4 and IPv6
Configure Dynamic Host Configuration Protocol (DHCP)
DHCP options; creating new options; PXE boot; default user profiles; DHCP relay agents; exclusions; authorize server in Active Directory; scopes; DHCPv6
Configure routing
Static routing; persistent routing; Routing Internet Protocol (RIP); metrics; choosing a default gateway; maintaining a routing table; demand-dial routing; IGMP proxy
Configure Windows Firewall with advanced security
Inbound and outbound rules; custom rules; authorized users; authorized computers; configure firewall by using Group Policy; network location profiles; service groups; import/export policies; isolation policy; IPsec group policies; Connection Security Rules

Preparation resources
Configuring TCP/IP networking
Dynamic Host Configuration Protocol (DHCP)
Windows firewall and IPsec policy deployment step-by-step guide

Configuring names resolution (22%)
Configure a Domain Name System (DNS) server
Conditional forwarding; external forwarders; root hints; cache-only; socket pooling; cache locking
Configure DNS zones
Zone scavenging; zone types; Active Directory integration; Dynamic Domain Name System (DDNS); Secure DDNS; GlobalNames; zone delegation; DNS Security Extensions (DNSSEC); reverse lookup zones
Configure DNS records
Record types; Time to live (TTL); weighting records; registering records; netmask ordering; DnsUpdateProxy group; round robin; DNS record security; auditing
Configure DNS replication
DNS secondary zones; DNS stub zones; Active Directory Integrated replication scopes; securing zone transfer; SOA refresh; auditing
Configure name resolution for client computers
Configuring HOSTS file; Link-Local Multicast Name Resolution (LLMNR); broadcasting; resolver cache; DNS server list; Suffix Search order; DNS devolution

Preparation resources
IPv4 name resolution
Configure a DNS server to use forwarders
Configuring zone properties

Configuring network access (18%)
Configure remote access
Dial-up; Remote Access Policy; Network Address Translation (NAT); VPN protocols, such as Secure Socket Tunneling Protocol (SSTP) and IKEv2; Routing and Remote Access Services (RRAS); packet filters; Connection Manager; VPN reconnect; RAS authentication by using MS-CHAP, MS-CHAP v2, and EAP
Configure Network Access Protection (NAP)
Network layer protection; DHCP enforcement; VPN enforcement; RDS enforcement; configure NAP health policies; IPsec enforcement; 802.1x enforcement; flexible host isolation; multi-configuration System Health Validator (SHV)
Configure DirectAccess
IPv6; IPsec; server requirements; client requirements; perimeter network; name resolution policy table
Configure Network Policy Server (NPS)
IEEE 802.11 wireless; IEEE 802.3 wired; Group Policy for wireless; RADIUS accounting; Connection Request policies; RADIUS proxy; NPS templates

Preparation resources
Network access protection deployment guide
DirectAccess configuration, tips, tricks, and best practices
Administering NPS

Configuring file and print services (20%)
Configure a file server
File share publishing; Offline Files; share permissions; NTFS permissions; encrypting file system (EFS); BitLocker; Access-Based Enumeration (ABE); branch cache; Share and Storage Management console
Configure Distributed File System (DFS)
DFS namespace; DFS configuration and application; creating and configuring targets; DFS replication; read-only replicated folder; failover cluster support; health reporting
Configure backup and restore
Backup types; backup schedules; managing remotely; restoring data; shadow copy services; volume snapshot services (VSS); bare metal restore; backup to remote file share
Manage file server resources
FSRM; quota by volume or quota by user; quota entries; quota templates; file classification; Storage Manager for SANs; file management tasks; file screening
Configure and monitor print services
Printer share; publish printers to Active Directory; printer permissions; deploy printer connections; install printer drivers; export and import print queues and printer settings; add counters to Performance Monitor to monitor print servers; print pooling; print priority; print driver isolation; location-aware printing; print management delegation

Preparation resources
File services for Windows Server 2008
Windows Server 2008 file services: Deep dive
Print and document services

Monitoring and managing a network infrastructure (20%)
Configure Windows Server Update Services (WSUS) server settings
Update type selection; client settings; Group Policy object (GPO); client targeting; software updates; test and approval; disconnected networks
Configure performance monitoring
Data Collector Sets; Performance Monitor; Reliability Monitor; monitoring System Stability Index; page files; analyze performance data
Configure event logs
Custom views; application and services logs; subscriptions; attaching tasks to events find and filter
Gather network data
Simple Network Management Protocol (SNMP); Network Monitor; Connection Security Rules monitoring

Preparation resources
Managing Windows Server Update Services 3.0 servers
Performance and reliability monitoring getting started guide for Windows Server 2008
Monitoring and status tools
 


QUESTION 1
Your network contains 100 servers that run Windows Server 2008 R2.
A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network.
You need to define the Custom Event Delivery Optimization settings on Server1.
Which tool should you use?

A. Event Viewer
B. Task Scheduler
C. Wecutil
D. Wevtutil

Answer: C


QUESTION 2
Your network contains a server that runs Windows Server 2008 R2. You plan to create a custom script.
You need to ensure that each time the script runs, an entry is added to the Application event log.
Which tool should you use?

A. Eventcreate
B. Eventvwr
C. Wecutil
D. Wevtutil

Answer: A

Explanation:
You can create custom events in an event log by using the Eventcreate utility. This can be useful as a diagnostic tool in scripts when you record an error or event directly into the logs without using VBScript or another language to log the event.
http://support.microsoft.com/kb/324145


QUESTION 3
Your network contains a server that has the SNMP Service installed.
You need to configure the SNMP security settings on the server.
Which tool should you use?

A. Local Security Policy
B. Scw
C. Secedit
D. Services console

Answer: D


QUESTION 4
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the SNMP Service installed.
You perform an SNMP query against Server1 and discover that the query returns the incorrect identification information.
You need to change the identification information returned by Server1.
What should you do?

A. From the properties of the SNMP Service, modify the Agent settings.
B. From the properties of the SNMP Service, modify the General settings.
C. From the properties of the SNMP Trap Service, modify the Logon settings.
D. From the properties of the SNMP Trap Service, modify the General settings.

Answer: A


QUESTION 5
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00.
What should you do?

A. Create a scheduled task that runs the Netsh tool.
B. Create a scheduled task that runs the Nmcap tool.
C. From Network Monitor, configure the General options.
D. From Network Monitor, configure the Capture options.

Answer: B

Explanation:
nmcap /networks * /capture LDAP /file c:\file.cap If you want a timer add the following
/startwhen /timeafter x hours

 

Click here to view complete Q&A of 70-642 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-642 Training at certkingdom.com

 

08.29
16

Exam 70-640 Windows Server 2008 Active Directory, Configuring

by admin ·

Published: March 6, 2008
Languages: English, German, Japanese
Audiences: IT professionals
Technology: Windows Server 2008
Credit toward certification: MCP, MCTS, MCITP, MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Configuring Domain Name System (DNS) for Active Directory (18%)
Configure zones
Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDNS); Time to Live (TTL); GlobalNames; Primary, Secondary, Active Directory Integrated, Stub; SOA; zone scavenging; forward lookup; reverse lookup
Configure DNS server settings
Forwarding; root hints; configure zone delegation; round robin; disable recursion; debug logging; server scavenging
Configure zone transfers and replication
Configure replication scope (forestDNSzone; domainDNSzone); incremental zone transfers; DNS Notify; secure zone transfers; configure name servers; application directory partitions

Preparation resources
Configuring zone properties
Configure a DNS server for use with Active Directory Domain Services
Modify zone transfer settings

Configuring the Active Directory infrastructure (17%)
Configure a forest or a domain
Remove a domain; perform an unattended installation; Active Directory Migration Tool (ADMT); change forest and domain functional levels; interoperability with previous versions of Active Directory; multiple user principal name (UPN) suffixes; forestprep; domainprep
Configure trusts
Forest trust; selective authentication vs. forest-wide authentication; transitive trust; external trust; shortcut trust; SID filtering
Configure sites
Create Active Directory subnets; configure site links; configure site link costing; configure sites infrastructure
Configure Active Directory replication
DFSR; one-way replication; Bridgehead server; replication scheduling; configure replication protocols; force intersite replication
Configure the global catalog
Universal Group Membership Caching (UGMC); partial attribute set; promote to global catalog
Configure operations masters
Seize and transfer; backup operations master; operations master placement; Schema Master; extending the schema; time service

Preparation resources
Deploying a Windows Server 2008 forest root domain
Securing domain and forest trusts
Active Directory replication tools and settings

Configuring Active Directory roles and services (14%)
Configure Active Directory Lightweight Directory Service (AD LDS)
Migration to AD LDS; configure data within AD LDS; configure an authentication server; Server Core installation
Configure Active Directory Rights Management Service (AD RMS)
Certificate request and installation; self-enrollments; delegation; create RMS templates; RMS administrative roles; RM add-on for IE
Configure the read-only domain controller (RODC)
Replication; Administrator role separation; read-only DNS; BitLocker; credential caching; password replication; syskey; read-only SYSVOL; staged install
Configure Active Directory Federation Services (AD FSv2)
Install AD FS server role; exchange certificate with AD FS agents; configure trust policies; configure user and group claim mapping; import and export trust policies

Preparation resources
AD LDS getting started step-by-step guide
Read-only domain controllers step-by-step guide
AD FS step-by-step guide

Creating and maintaining Active Directory objects (18%)
Automate creation of Active Directory accounts
Bulk import; configure the UPN; create computer, user, and group accounts (scripts, import, migration); template accounts; contacts; distribution lists; offline domain join
Maintain Active Directory accounts
Manage computer accounts; configure group membership; account resets; delegation; AGDLP/AGGUDLP; deny domain local group; local vs. domain; Protected Admin; disabling accounts vs. deleting accounts; deprovisioning; contacts; creating organizational units (OUs); delegation of control; protecting AD objects from deletion; managed service accounts
Create and apply Group Policy objects (GPOs)
Enforce, OU hierarchy, block inheritance, and enabling user objects; group policy processing priority; WMI; group policy filtering; group policy loopback; Group Policy Preferences (GPP)
Configure GPO templates
User rights; ADMX Central Store; administrative templates; security templates; restricted groups; security options; starter GPOs; shell access policies
Deploy and manage software by using GPOs
Publishing to users; assigning software to users; assigning to computers; software removal; software restriction policies; AppLocker
Configure account policies
Domain password policy; account lockout policy; fine-grain password policies
Configure audit policy by using GPOs
Audit logon events; audit account logon events; audit policy change; audit access privilege use; audit directory service access; audit object access; advanced audit policies; global object access auditing; “Reason for Access” reporting

Preparation resources
Active Directory how to…
Group policy planning and deployment guide
Account policies

Maintaining the Active Directory environment (18%)
Configure backup and recovery
Using Windows Server Backup; back up files and system state data to media; backup and restore by using removable media; perform an authoritative or non-authoritative restores; linked value replication; Directory Services Recovery Mode (DSRM); backup and restore GPOs; configure AD recycle bin
Perform offline maintenance
Offline defragmentation and compaction; Restartable Active Directory; Active Directory database mounting tool
Monitor Active Directory
Event viewer subscriptions; data collector sets; real-time monitoring; analyzing logs; WMI queries; PowerShell

Preparation resources
Windows Server backup step-by-step guide for Windows Server 2008
Compact the directory database file (offline defragmentation)
Restartable AD DS step-by-step guide

Configuring Active Directory Certificate Services (15%)

Install Active Directory Certificate Services
Certificate authority (CA) types, including standalone, enterprise, root, and subordinate; role services; prepare for multiple-forest deployments
Configure CA server settings
Key archival; certificate database backup and restore; assigning administration roles; high-volume CAs; auditing
Manage certificate templates
Certificate template types; securing template permissions; managing different certificate template versions; key recovery agent
Manage enrollments
Network device enrollment service (NDES); auto enrollment; Web enrollment; extranet enrollment; smart card enrollment; authentication mechanism assurance; creating enrollment agents; deploying multiple-forest certificates; x.509 certificate mapping
Manage certificate revocations
Configure Online Responders; Certificate Revocation List (CRL); CRL Distribution Point (CDP); Authority Information Access (AIA)

Preparation resources
Active Directory certificate services step-by-step guide
Setting up a certification authority
Administering certificate templates


QUESTION 1
Your company has a main office and three branch offices. Each office is configured as a separate Active Directory site that has its own domain controller.
You disable an account that has administrative rights.
You need to immediately replicate the disabled account information to all sites.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A. From the Active Directory Sites and Services console, configure all domain controllers
as global catalog servers.
B. From the Active Directory Sites and Services console, select the existing connection objects and force replication.
C. Use Repadmin.exe to force replication between the site connection objects.
D. Use Dsmod.exe to configure all domain controllers as global catalog servers.

Answer: B,C

Explanation:
http://technet.microsoft.com/en-us/library/cc835086%28v=ws.10%29.aspx
Repadmin /syncall Synchronizes a specified domain controller with all of its replication partners. http://ivan.dretvic.com/2012/01/how-to-force-replication-of-domain-controllers/
How to force replication of Domain Controllers From time to time its necessary to kick off AD replication to speed up a task you may be doing, or just a good too to check the status of replication between DC’s.
Below is a command to replicate from a specified DC to all other DC’s.
Repadmin /syncall DC_name /Aped By running a repadmin /syncall with the /A(ll partitions) P(ush) e(nterprise, cross sites) d(istinguished names) parameters, you have duplicated exactly what Replmon used to do in Windows 2003, except that you did it in one step, not many.And with the benefit of seeing immediate results on how the operations are proceeding.
If I am running it on the DC itself, I don’t even have to specify the server name. http://technet.microsoft.com/en-us/library/cc776188%28v=ws.10%29.aspx Force replication over a connection
To force replication over a connection
1. Open Active Directory Sites and Services.
C:\Documents and Settings\usernwz1\Desktop\1.PNG


QUESTION 2
Your company has a branch office that is configured as a separate Active Directory site and has an Active Directory domain controller.
The Active Directory site requires a local Global Catalog server to support a new application.
You need to configure the domain controller as a Global Catalog server.
Which tool should you use?

A. The Server Manager console
B. The Active Directory Sites and Services console
C. The Dcpromo.exe utility
D. The Computer Management console
E. The Active Directory Domains and Trusts console

Answer: B

Explanation:

Answer: The Active Directory Sites and Services console http://technet.microsoft.com/en-us/library/cc781329%28v=ws.10%29.aspx Configure a domain controller as a global catalog server
To configure a domain controller as a global catalog server 1. Open Active Directory Sites and Services.
Further information: http://technet.microsoft.com/en-us/library/cc728188%28v=ws.10%29.aspx What Is the Global Catalog?
The global catalog is a distributed data repository that contains a searchable, partial representation of every object in every domain in a multidomain Active Directory Domain Services (AD DS) forest. The global catalog is stored on domain controllers that have been designated as global catalog servers and is distributed through multimaster replication. Searches that are directed to the global catalog are faster because they do not involve referrals to different domain controllers.
In addition to configuration and schema directory partition replicas, every domain controller in a forest stores a full, writable replica of a single domain directory partition. Therefore, a domain controller can locate only the objects in its domain. Locating an object in a different domain would require the user or application to provide the domain of the requested object. The global catalog provides the ability to locate objects from any domain without having to know the domain name. A global catalog server is a domain controller that, in addition to its
full, writable domain directory partition replica, also stores a partial, read-only replica of all other domain directory partitions in the forest. The additional domain directory partitions are partial because only a limited set of attributes is included for each object. By including only the attributes that are most used for searching, every object in every domain in even the largest forest can be represented in the database of a single global catalog server.
Note: A global catalog server can also store a full, writable replica of an application directory partition, but objects in application directory partitions are not replicated to the global catalog as partial, read-only directory partitions.
The global catalog is built and updated automatically by the AD DS replication system. The attributes that are replicated to the global catalog are identified in the schema as the partial attribute set (PAS) and are defined by default by Microsoft. However, to optimize searching, you can edit the schema by adding or removing attributes that are stored in the global catalog.
In Windows 2000 Server environments, any change to the PAS results in full synchronization (update of all attributes) of the global catalog. Later versions of Windows Server reduce the impact of updating the global catalog by replicating only the attributes that change.
In a single-domain forest, a global catalog server stores a full, writable replica of the domain and does not store any partial replica. A global catalog server in a single-domain forest functions in the same manner as a nonglobal-catalog server except for the processing of forest-wide searches.


QUESTION 3
Your company has an Active Directory domain. You have a two-tier PKI infrastructure that contains an offline root CA and an online issuing CA.
The Enterprise certification authority is running Windows Server 2008 R2.
You need to ensure users are able to enroll new certificates.
What should you do?

A. Renew the Certificate Revocation List (CRL) on the root CA. Copy the CRL to the CertEnroll folder on the issuing CA.
B. Renew the Certificate Revocation List (CRL) on the issuing CA, Copy the CRL to the SysternCertificates folder in the users’ profile.
C. Import the root CA certificate into the Trusted Root Certification Authorities store on all client workstations.
D. Import the issuing CA certificate into the Intermediate Certification Authorities store on all client workstations.

Answer: A

Explanation:
http://social.technet.microsoft.com/wiki/contents/articles/2900.offline-root-certification-authority-ca.aspx
Offline Root Certification Authority (CA)
A root certification authority (CA) is the top of a public key infrastructure (PKI) and generates a self-signed certificate. This means that the root CA is validating itself (self-validating). This root CA could then have subordinate CAs that effectively trust it. The subordinate CAs receive a certificate signed by the root CA, so the subordinate CAs can issue certificates that are validated by the root C
A. This establishes a CA hierarchy and trust path.
CA Compromise
If a root CA is in some way compromised (broken into, hacked, stolen, or accessed by an unauthorized or malicious person), then all of the certificates that were issued by that CA are also compromised. Since certificates are used for data protection, identification, and authorization, the compromise of a CA could compromise the security of an entire organizational network. For that reason, many organizations that run internal PKIs install their root CA offline. That is, the CA is never connected to the company network, which makes the root CA an offline root C
A. Make sure that you keep all CAs in secure areas with limited access.
To ensure the reliability of your CA infrastructure, specify that any root and non-issuing intermediate CAs must be offline. A non-issuing CA is one that is not expected to provide certificates to client computers, network devices, and so on. This minimizes the risk of the CA private keys becoming compromised, which would in turn compromise all the certificates that were issued by the CA.
How Do Offline CAs issue certificates?
Offline root CAs can issue certificates to removable media devices (e.g. floppy disk, USB drive, CD/DVD) and then physically transported to the subordinate CAs that need the certificate in order to perform their tasks. If the subordinate CA is a non-issuing intermediate that is offline, then it will also be used to generate a certificate and that certificate will be placed on removable media. Each CA receives its authorization to issue certificates from the CA directly above it in the CA hierarchy. However, you can have multiple CAs at the same level of the CA hierarchy. Issuing CAs are typically online and used to issue certificates to client computers, network
devices, mobile devices, and so on. Do not join offline CAs to an Active Directory Domain Services domain Since offline CAs should not be connected to a network, it does not make sense to join them to an Active Directory Domain Services (AD DS) domain, even with the
Offline Domain Join [This link is external to TechNet Wiki. It will open in a new window.] option introduced with Windows 7 and Windows Server 2008 R2.
Furthermore, installing an offline CA on a server that is a member of a domain can cause problems with a secure channel when you bring the CA back online after a long offline period. This is because the computer account password changes every 30 days. You can get around this by problem and better protect your CA by making it a member of a workgroup, instead of a domain. Since Enterprise CAs need to be joined to an AD DS domain, do not attempt to install an offline CA as a Windows Server Enterprise C
A. http://technet.microsoft.com/en-us/library/cc740209%28v=ws.10%29.aspx
Renewing a certification authority
A certification authority may need to be renewed for either of the following reasons: Change in the policy of certificates issued by the CA
Expiration of the CA’s issuing certificate


QUESTION 4
You have a Windows Server 2008 R2 Enterprise Root certification authority (CA).
You need to grant members of the Account Operators group the ability to only manage Basic EFS certificates.
You grant the Account Operators group the Issue and Manage Certificates permission on the CA.
Which three tasks should you perform next? (Each correct answer presents part of the solution.
Choose three.)

A. Enable the Restrict Enrollment Agents option on the CA.
B. Enable the Restrict Certificate Managers option on the CA.
C. Add the Basic EFS certificate template for the Account Operators group.
D. Grant the Account Operators group the Manage CA permission on the CA.
E. Remove all unnecessary certificate templates that are assigned to the Account Operators group.

Answer: B,C,E


QUESTION 5
Your company has an Active Directory domain.
You log on to the domain controller. The Active Directory Schema snap-in is not available in the Microsoft Management Console (MMC).
You need to access the Active Directory Schema snap-in.
What should you do?

A. Add the Active Directory Lightweight Directory Services (AD LDS) role to the domain controller by using Server Manager.
B. Log off and log on again by using an account that is a member of the Schema Administrators group.
C. Use the Ntdsutil.exe command to connect to the Schema Master operations master and open the schema for writing.
D. Register Schmmgmt.dll.

Answer: D

Explanation:
http://technet.microsoft.com/en-us/library/cc732110.aspx Install the Active Directory Schema Snap-In
You can use this procedure to first register the dynamic-link library (DLL) that is required for the Active Directory Schema snap-in. You can then add the snap-in to Microsoft Management Console (MMC).
To install the Active Directory Schema snap-in
1. To open an elevated command prompt, click Start, type command prompt and then right-click Command
Prompt when it appears in the Start menu. Next, click Run as administrator and then click OK.
To open an elevated command prompt in Windows Server 2012, click Start, type cmd, right click cmd and then click Run as administrator.
2. Type the following command, and then press ENTER:
regsvr32 schmmgmt.dll
3. Click Start, click Run, type mmc and then click OK.
4. On the File menu, click Add/Remove Snap-in.
5. Under Available snap-ins, click Active Directory Schema, click Add and then click OK.
6. To save this console, on the File menu, click Save.
7. In the Save As dialog box, do one of the following:
* To place the snap-in in the Administrative Tools folder, in File name, type a name for the snap-in, and then click Save.
* To save the snap-in to a location other than the Administrative Tools folder, in Save in
navigate to a location for the snap-in. In File name, type a name for the snap-in, and then
click Save


QUESTION 6
You have an Active Directory domain that runs Windows Server 2008 R2.
You need to implement a certification authority (CA) server that meets the following requirements:
Allows the certification authority to automatically issue certificates
Integrates with Active Directory Domain Services
What should you do?

A. Install and configure the Active Directory Certificate Services server role as a Standalone Root CA.
B. Install and configure the Active Directory Certificate Services server role as an Enterprise Root CA.
C. Purchase a certificate from a third-party certification authority, Install and configure the Active Directory
Certificate Services server role as a Standalone Subordinate CA.
D. Purchase a certificate from a third-party certification authority, Import the certificate into the computer store of the schema master.

Answer: B

Click here to view complete Q&A of 70-640 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-640 Training at certkingdom.com

 

03.10
15

The Big Question Rises How To Become Microsoft, Cisco, ComTIA Certified

by admin ·

The big question rises how to become the Microsoft certified , All Microsoft certifications are acquired by simply taking a series of exams. If you can self-study for said exams, and then pass them, then you can acquire the certification for the mere cost of the exam (and maybe whatever self-study materials you purchase).

You’ll also need, at minimum (in addition to the MCTS), the CompTIA A+, Network+ and Security+ certs; as well as the Cisco CCNA cert.

Microsoft Certified Technology Specialist (MCTS) – This is the basic entry point of Microsoft Certifications. You only need to pass a single certification test to be considered an MCTS and there are numerous different courses and certifications that would grant you this after passing one. If you are shooting for some of the higher certifications that will be discussed below, then you’ll get this on your way there.

Microsoft Certified Professional Developer (MCPD) – This certification was Microsoft’s previous “Developer Certification” meaning that this was the highest certification that was offered that consisted strictly of development-related material. Receiving it involved passing four exams within specific areas (based on the focus of your certification). You can find the complete list of courses and paths required for the MCPD here.

Microsoft Certified Solutions Developer (MCSD) – This is Microsoft’s most recent “Developer Certification” which will replace the MCPD Certification (which is being deprecated / retired in July of 2013). The MCSD focuses within three major areas of very recent Microsoft development technologies and would likely be the best to persue if you wanted to focus on current and emerging skills that will be relevant in the coming years. You can find the complete list of courses and paths required for the MCSD here.

The Microsoft Certifications that you listed are basically all of the major ones within the realm of development. I’ll cover each of the major ones and what they are :

Most people, however, take some kind of course. Some colleges — especially career and some community colleges — offer such courses (though usually they’re non-credit). Other providers of such courses are private… some of them Microsoft Certified vendors of one type or another, who offer the courses in such settings as sitting around a conference table in their offices. Still others specialize in Microsoft certification training, and so have nice classrooms set up in their offices.

There are also some online (and other forms of distance learning) courses to help prepare for the exams.

The cost of taking classes to prepare can vary wildly. Some are actually free (or very nearly so), while others can cost hundreds of dollars. It all just depends on the provider.

And here’s a Google search of MCTS training resources (which can be mind-numbing in their sheer numbers and types, so be careful what you choose):

There are some pretty good, yet relatively inexpensive, ways to get vendor certificate training. Be careful not to sign-up for something expensive and involved when something cheaper — like subscribing to an “all the certificates you care to study for one flat rate” web site — would, in addition to purchasing a study guide or two at a bookstore, likely be better.

If you want a career in IT, then you need to have both an accredited degree in same (preferably a bachelors over an associates), and also a variety of IT certifications. The MCTS is but one that you will need.

You should probably also get the Microsoft MCSE and/or MCSA. The ICS CISSP. And the ITIL.

There are others, but if you have those, you’ll be evidencing a broad range of IT expertise that will be useful, generally. Then, in addition, if the particular IT job in which you end-up requires additional specialist certification, then you can get that, too (hopefully at the expense of your employer who requires it of you).

Then, whenever (if ever) you’re interested in a masters in IT, here’s something really cool of which you should be aware…

There’s a big (and fully-accredited, fully-legitimate) university in Australia which has partnered with Microsoft and several other vendors to structure distance learning degrees which include various certifications; and in which degrees, considerable amounts of credit may be earned simply by acquiring said certifications. It’s WAY cool.

One can, for example, get up to half of the credit toward a Masters degree in information technology by simply getting an MCSE (though the exams which make it up must be certain ones which correspond with the university’s courses). I’ve always said that if one were going to get an MCSE, first consult the web site of this university and make sure that one takes the specific MCSE exams that this school requires so that if ever one later decided to enter said school’s masters program, one will have already earned up to half its degree’s credits by simply having the MCSE under his/her belt. Is that cool, or what?

I wouldn’t rely on them over experience (which is far and away the most valuable asset out there) but they are worth pursuing especially if you don’t feel like you have enough experience and need to demonstrate that you have the necessary skills to land a position as a developer.

If you are going to pursue a certification, I would recommend going after the MCSD (Web Applications Track) as it is a very recent certification that focuses on several emerging technologies that will still be very relevant (if not more-so) in the coming years. You’ll pick up the MCTS along the way and then you’ll have both of those under your belt. MCPD would be very difficult to achieve based on the short time constraints (passing four quite difficult tests within just a few months is feasible, but I don’t believe that it is worth it since it will be “retired” soon after).

No job experience at all is necessary for any of the Microsoft Certifications, you can take them at any time as long as you feel confident enough with the materials of the specific exam you should be fine. The tests are quite difficult by most standards and typically cover large amounts of material, but with what it sounds like a good bit of time to study and prepare you should be fine.

Certifications, in addition to degrees, are so important in the IT field, now, that one may almost no longer get a job in that field without both. The certifications, though, are so important that one who has a little IT experience can get a pretty good job even without a degree as long as he has all the right certs. But don’t do that. Definitely get the degree… and not merely an associates. Get the bachelors in IT; and make sure it’s from a “regionally” accredited school.

Then get the certs I mentioned (being mindful, if you think you’ll ever get an IT masters, to take the specific exams that that Strut masters program requires so that you’ll have already earned up to half the credit just from the certs).

If you already have two years of experience in working in the .NET environment, a certification isn’t going to guarantee that you will get employed, a salary increase or any other bonuses for achieving the honor. However, it can help supplement your resume by indicating that you are familiar with specific technologies enough to apply them in real-world applications to solve problems.

If your ready for career change and looking for Microsoft MCTS Training, Microsoft MCITP Training or any other Microsoft Certification preparation get the best online training from Certkingdom.com they offer all Microsoft, Cisco, Comptia certification exams training in just one Unlimited Life Time Access Pack, included self study training kits including, Q&A, Study Guides, Testing Engines, Videos, Audio, Preparation Labs for over 2000+ exams, save your money on boot camps, training institutes, It’s also save your traveling and time. All training materials are “Guaranteed” to pass your exams and get you certified on the fist attempt, due to best training they become no1 site 2012.

MCTS Training, MCITP Trainnig

Best Microsoft MTA Certification, Microsoft MCTS Training at certkingdom.com

02.15
15

70-662 TS: Microsoft Exchange Server 2010, Configuring

by admin ·

QUESTION 1

Your network contains an Active Directory forest. All domain controllers run Windows Server 2008. You need to ensure that you can install an Exchange Server 2010 server in the Active Directory forest. What should you do?

A. From the Exchange Server 2010 installation media, run setup /ps.
B. From the Exchange Server 2010 installation media, run setup /NewProvisionedServer.
C. From the Windows Server 2008 installation media, run adprep.exe /forestprep.
D. From the Windows Server 2008 installation media, run adprep.exe /domainprep.

Answer: A


QUESTION 2

You plan to deploy an Exchange Server 2010 Client Access server on a new server. The server will be a member of a database availability group (DAG). You need to identify the operating system required for the planned deployment. The solution must minimize software costs. Which operating system should you identify?

A. Windows Server 2008 Service Pack 2 (SP2) Enterprise
B. Windows Server 2008 R2 Foundation
C. Windows Server 2008 R2 Standard
D. Windows Server 2008 Service Pack 2 (SP2) Web

Answer: A

Explanation:
DAGs use Windows Failover Clustering technology, and as a result, they require the Enterprise version of Windows.
http://technet.microsoft.com/en-us/library/dd638104.aspx#SoftReq


QUESTION 3

You have an Active Directory forest that contains one domain named contoso.com. The functional level of both the forest and the domain is Windows Server 2003. You have an Exchange Server 2003 organization. All servers have Exchange Server 2003 Service Pack 2 (SP2) installed. You plan to transition to Exchange Server 2010. You need to prepare the Active Directory environment for the deployment of the first Exchange Server 2010 Service Pack 1 (SP1) server. What should you run?

A. Setup.com /Preparead
B. Setup.com /PrepareDomain
C. Setup.com /PrepareLegacyExchangePermissions
D. Setup.com /PrepareSchema

Answer: A

Explanation:
Preparedomain isn’t even a correct switch. You could argue that prepare legacy exchange permissions is also correct as this would be the first switch you would run if running them individually, followed by prepareschema. However preparead will run prepare legacy exchange permissions and prepare schema if it detects they have not been run.
http://technet.microsoft.com/en-us/library/bb125224.aspx


QUESTION 4

You have an Exchange organization that contains Exchange 2000 Server and Exchange Server 2003 Service Pack 2 (SP2) servers. You plan to transition the organization to Exchange Server 2010. You need to prepare the Exchange organization for the deployment of Exchange Server 2010 Mailbox, Client Access, and Hub Transport servers. What should you do first?

A. Install the Active Directory Connector (ADC).
B. Delete all Recipient Update Service (RUS) objects
C. Deploy an Exchange Server 2010 Edge Transport server.
D. Remove all Exchange 2000 Servers from the organization.

Answer: D

Explanation:
Ex 2000 is not supported in an Exchange 2010 organization.
http://technet.microsoft.com/en-us/library/aa998604.aspx


QUESTION 5

You have an Active Directory forest that contains three sites named Site1, Site2, and Site3. Each site contains two Exchange Server 2007 Client Access servers, two Mailbox servers, and two Hub Transport servers. All Exchange Server 2007 servers have Exchange Server 2007 Service Pack 1 (SP1) installed. You need to ensure that you can deploy Exchange Server 2010 servers in Site1. You must achieve this goal by using the minimum amount of administrative effort. What should you do?

A. Upgrade all Client Access servers in the organization to Exchange Server 2007 Service Pack 2 (SP2).
B. Upgrade all Exchange Server 2007 servers in Site1 to Exchange Server 2007 Service Pack 2 (SP2).
C. Upgrade all Exchange Server 2007 servers in the organization to Exchange Server 2007 Service Pack 2 (SP2).
D. Upgrade all Exchange Server 2007 servers in Site1 and all Client Access servers in the organization to
Exchange Server 2007 Service Pack 2 (SP2).

Answer: A

Explanation:
The key to this question is the fact that you must use the minimum amount of administrative effort. Microsoft Technet therefore gives us the answer, as follows: The Client Access server role can co- exist with Exchange 2007 Client Access servers. Before you upgrade the first Active Directory site, you must install Exchange 2007 Service Pack 2 (SP2) on all Exchange 2007 Client Access servers within your organization. You can add an Exchange 2010 Hub Transport server to an existing Exchange organization after you successfully deploy Exchange 2010 Client Access servers. After you introduce Exchange 2010 Hub Transport servers to your Exchange 2007 environment, you still need to maintain your Exchange 2007 Hub Transport servers. Exchange 2010 Mailbox servers can only communicate with Exchange 2010 Hub Transport servers, and Exchange 2007 Mailbox servers can only communicate with Exchange 2007 Hub Transport servers. When a message is sent from a mailbox on an Exchange 2010 Mailbox server to a mailbox on an Exchange 2007 Mailbox server, the message is first submitted to the closest Exchange 2010 Hub Transport server in the site. This server then relays the message to an Exchange 2007 Hub Transport server in the same site, which finally delivers the message to the Exchange 2007 Mailbox server. The Exchange 2010 Mailbox server role can co-exist with Exchange 2007 Mailbox servers. You can replicate public folder data between Exchange 2010 and Exchange 2007 public folder databases.

Reference:
http://technet.microsoft.com/en-us/library/dd638158.aspx


MCTS Training, MCITP Trainnig

Best Microsoft MCITP Certification, Microsoft 70-662 Training at certkingdom.com

04.22
13

70-450 PRO: Designing, Optimizing and Maintaining a Database Administrative Solution Using Microsoft SQL Server 2008

by admin ·

QUESTION 1
You work as a database administrator at Certkingdom.com. You are in the process of preparing the
deployment of a new database that will have 45 gigabytes storage space for the transaction log
file, and 280 gigabytes storage space for the database data file.
There are approximately six 120 GB disk drives available for the database in the storage array.
Certkingdom.com contains a RAID controller that supports RAID levels 0, 1, 5 and 10. The disks are on
the RAID controller. You have received an instruction from the CIO to make sure that the
transaction log’s write performance runs at optimum. The CIO has also instructed you to make
sure that in the event of a drive failure, the database and transaction log files are protected.
To achieve this goal, you decide to configure a storage solution.
Which of the following actions should you take?

A. You should consider using a RAID 1 volume as well as a RAID 5 volume in your storage configuration.
B. You should consider using a RAID 1 volume as well as a RAID 10 volume in your storage configuration.
C. You should consider using a RAID 3 volume as well as a RAID 5 volume in your storage configuration.
D. You should consider using a RAID 1 volume as well as a RAID 3 volume in your storage configuration.

Answer: A

Explanation:


QUESTION 2
You work as a database administrator at Certkingdom.com. Certkingdom.com has a database server named CertkingdomDB04
with a SQL Server 2008 instance that includes an extensive mission-critical database that is
constantly being used Certkingdom-DB04 has a quad-core motherboard with four CPUs.
When it is reported that Certkingdom-DB04 often encounters CPU pressure, you receive an instruction
from management to make sure that the accessible CPU cycles are not exhausted by online index rebuilds.
Which of the following actions should you take?

A. You should make use of the affinity I/O mask option.
B. You should make use of the optimize for ad hoc workloads option.
C. You should make use of the affinity mask option.
D. You should make use of the max degree of parallelism option.

Answer: D

Explanation:


QUESTION 3
You work as a database administrator at Certkingdom.com. Certkingdom.com has a database server named CertkingdomDB01
with a SQL Server 2008 instance.
During routine monitoring on Certkingdom-DB01, you discover that the amount of CXPACKET waits
experienced by the instance is low, while the amount of lazy writer waits is abundant.
You have been instructed to enhance the operation of the instance to ensure productivity.
Which of the following actions should you take?

A. You should consider setting up the Windows System Monitoring tool to better the performance.
B. You should consider setting up the Asynchronous database mirroring to better the performance.
C. You should consider using the SQLAGENT.OUT log to better the performance.
D. You should consider setting up the software non-uniform memory access (soft-NUMA) to better the performance.

Answer: D

Explanation:


QUESTION 4
You work as a database administrator at Certkingdom.com. Certkingdom.com has a database server named CertkingdomDB01.
Certkingdom-DB01 is configured with 4 quad-core processors, 80 gigabytes of RAM, and multiple
independent raid volumes.
You are in the process of using a transactional database on the instance. It is anticipated that the
transactional database will have a significant amount of INSERT, UPDATE, and DELETE
activities, which incorporates the creation of new tables.
You receive an instruction from management to minimize the contention in the storage allocation
structures so that database performance is optimized, and the disk bandwidth maximized.
Which of the following actions should you take?

A. You should consider enabling Server Auditing.
B. You should consider using multiple data files for the database.
C. You should consider using row-level compression.
D. You should consider using the checksum page verify option.

Answer: B

Explanation:


QUESTION 5
You work as a database administrator at Certkingdom.com.
Certkingdom.com has informed you that a new database, named CertkingdomData, has to be installed on a SQL
Server 2008 instance. CertkingdomData is made up of several schemas, of which one will host a significant amount of
read-only reference information. Information is regularly inserted and updated on CertkingdomData.
You have received instructions from the management to configure a physical database structure
that enhances the backup operation. Which of the following actions should you take?

A. This can be accomplished by using multiple filegroups and a single log file to set up the database.
B. This can be accomplished by using caching on the multiple data files.
C. This can be accomplished by using multiple downstream servers to create the database.
D. This can be accomplished by using the Database Engine Tuning Advisor tool to create the database.

Answer: A

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

04.15
13

70-646 Q&A / Study Guide / 70-646 Videos / Testing Engine

by admin ·

QUESTION 1
You work as the Enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain
named Certkingdom.com. The servers on the Certkingdom.com network run Windows Server 2008 and all client
computers run Windows Vista.
The Certkingdom.com network contains more than 3,000 computers. Certkingdom.com wants to make use of
Windows Server Update Services (WSUS) updates. You thus need to setup the appropriate
storage mechanism so that it provides high availability.
Where should you store the WSUS updates?

A. In a storage subsystem as a RAID 10.
B. In a network load balancing cluster.
C. In a newly created Group Policy.
D. In a Distributed File System (DFS) link that is configured to utilize several replicating targets.

Answer: D

Explanation: You need to keep the updates on a Distributed File System (DFS) link that uses
multiple replicating targets. This will ensure that the updates highly available. The DFS contain the
following capabilities: views of folders and files, that is a virtual organization where those files
physically reside in a network.
Reference: Step 4: Set up a DFS share
http://technet.microsoft.com/en-us/library/cc708533.aspx


QUESTION 2
You work as the Enterprise administrator at Certkingdom.com. The Certkingdom.com network has forest with two
domains named us.Certkingdom.com and uk.Certkingdom.com. The functional level of the forest is set at Windows
Server 2008.
A new Certkingdom.com security policy requires that the local guest accounts and administrator accounts
should be renamed. You have to ensure that the local guest accounts are disabled after it has
been renamed.
How can this be achieved?

A. By using a custom network profile.
B. By using a Group Policy object (GPO) for every domain.
C. By using a folder redirection on all the root domain controllers.
D. By using a ServerManagerCMD tool for the root main.

Answer: B

Explanation: You need to use Group Policy object (GPO) for every domain. With this you can
rename administrator accounts as well as renaming and disabling the local guest accounts.
Windows Server 2003 also permits you to modify the administrator account and guest account
names with a Group Policy.
Reference: HOW TO: Rename the Administrator and Guest Account in Windows Server 2003
http://support.microsoft.com/kb/816109


QUESTION 3
You work as the Enterprise administrator at Certkingdom.com. The Certkingdom.com network consists of a single
Active Directory domain named Certkingdom.com. All servers on the Certkingdom.com network run Windows
Server 2008 and all client computers run Windows Vista.
Certkingdom.com has its headquarters in Chicago where you are located and a branch office in Dallas that
employs a number of helpdesk staff. You have to implement a new server named Certkingdom-SR10 in
the Dallas office. The setup policy of Certkingdom.com states that all helpdesk staff have the necessary
permissions to manage services. The helpdesk staff should also be able to configure server roles
on Certkingdom-SR10. You need to accomplish this ensuring that the helpdesk staff have the least
amount of permissions.
How can this be achieved?

A. You should make the helpdesk staff, members of the global security group.
B. You should make the helpdesk staff, members of the Server Operators group on Certkingdom-SR10.
C. You should make the helpdesk staff, members of the Account Operators group on Certkingdom-SR10.
D. You should make helpdesk staff, members of the Administrators group on Certkingdom-SR10.

Answer: D

Explanation: To add the helpdesk staff to the Administrators local group will give full
administrative access to an individual computer or a single domain. The user must be a member
of the Administrators group to change accounts or stop and start services or install server roles.
Reference: Using Default Group Accounts
http://technet.microsoft.com/en-us/library/bb726982.aspx
Reference: Securing the Local Administrators Group on Every Desktop
http://www.windowsecurity.com/articles/Securing-Local-Administrators-Group-Every-Desktop.html


QUESTION 4
You work as the Enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain
named Certkingdom.com. The servers on the Certkingdom.com network are configured to run Windows Server
2008 and the client computers run Windows Vista.
Certkingdom.com has its headquarters in Paris and branch offices in London and Stockholm. You are in
the process of devising a file sharing policy to ensure standardization throughout the network.
Your policy needs to ensure that the Certkingdom.com offices are able to access the files using the
universal Naming Convention (UNC) path. In the event of a server failure files should still be
accessible and the minimum bandwidth needs to be utilized.
You need to determine the components that need to be added to your policy?

A. You should add a DFS namespace that is domain-based and uses replication.
B. You should add the Hyper-V feature to your policy.
C. You should use failover clusters with three servers, one for each office.
D. You should add a DFS namespace that is server-based and uses replication.

Answer: A

Explanation: To comply with the CIO’s request, you need to use domain-based DFS namespace
that uses replication. To implement domain-based DFS namespace, the servers need to members
of the Active Directory domain. Furthermore, domain-based DFS enables multiple replications.
Multiple DFS replicas also provide some fault tolerance.


QUESTION 5
You work as the Enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain
named Certkingdom.com. All servers on the Certkingdom.com network run Windows Server 2008 and all client
computers run Windows Vista.
The Certkingdom.com network contains a Windows Server 2008 failover cluster that in turn hosts a
database application. During routine monitoring you discover that the database application make
use of almost half of processor and memory usage allocated for it. You want to make sure that the
level of performance is maintained on the cluster.
How can this be achieved? (Choose TWO. Each answer forms part of the solution.)

A. By using the Windows System Resource Manager (WSRM)
B. The using event subscriptions.
C. By using the Microsoft System Center Configuration Manager (SCCM)
D. By establishing a resource-allocation policy for process-based management.
E. By establishing Performance Monitor alerts.

Answer: A,D

Explanation: You need to use Windows System Resource Manager (WSRM) and set up a
resource-allocation policy for process-based management. The Windows System Resource
Manager (WSRM) enables the allocation of resources, including processor and memory
resources, among multiple applications based on business priorities. You can set the CPU and
memory allocation policies on applications. Furthermore, Windows System Resource Manager
(WSRM) does not manage address windowing extensions (AWE) memory. It also does not
manage large page memory, locked memory, or OS pool memory.
Reference: Windows System Resource Manager Fast Facts
http://www.microsoft.com/windowsserver2003/techinfo/overview/wsrmfastfacts.mspx


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

04.9
13

70-431 Q&A / Study Guide / Testing Engine / Videos

by admin ·

QUESTION 1
Certkingdom has hired you as their Database administrator. You create a database on named
Development on ABC-DB01 that hosts an instance of SQL Server 2005 Enterprise Edition.
You perform weekly maintenance and conclude that the Development database growing at about
100 MB on a monthly basis. The network users started complaining about poor performance of
queries run against the database.
There is 2GB RAM installed on DB01 and the database consumes 1.6 GB of RAM.
How would you determine whether additional RAM should be acquired for ABC-DB01?

A. You should consider monitoring the SQL Server: Memory Manager – Target Server Memory
(KB) Page Splits/sec counter in System Monitor.
B. You should consider monitoring the SQL Server: Buffer Manager counter in System Monitor.
C. You should consider monitoring the System – Processor Queue counter in System Monitor.
D. You should consider monitoring the SQL Server: Access Methods – Page Splits/sec counter in System Monitor.

Answer: B

Explanation: The SQL Server: Buffer Manager object is utilized to view the information related to
bottlenecks.


QUESTION 2
You create a database on ABC-DB01 that is running an instance of SQL Server 2005 Enterprise Edition.
Certkingdom recently suffered a power outage to the building which forces you to restart ABC-DB01
which now fails to start the SQL Server (MSSQLSERVER). Certkingdom wants you to troubleshoot
the service failure.
What must be done to determine the cause of the service start failure?

A. You should consider reviewing the Event Viewer logs listed below:
The Event Viewer Applications log.
The Event Viewer System logs.
Microsoft Notepad should be utilized to manually view the Microsoft SQL
ServerMSSQL.1MSSQLLOGErrorLog file.

B. You should consider reviewing the Event Viewer logs listed below :
The Event Viewer Windows logs.
The Event Viewer Setup logs.
The Event Viewer Application log.

C. You should consider reviewing the Event Viewer logs listed below :
The Event Viewer Forwarded Event logs.
The Event Viewer Hardware events.
The Event Viewer Security log.

D. You should consider reviewing the Event Viewer logs listed below :
The Event Viewer Setup Events logs.
The Event Viewer Windows logs.
The Event Viewer Applications and Services logs.

Answer: A


QUESTION 3
Certkingdom has recently opened an office in Perth where you work as the database administrator.
The Certkingdom database infrastructure runs on computers utilizing SQL Server 2005 Enterprise
Edition. You create a Import database with a backup schedule configured in the table below:

The Imports database contains a table named incoming which was updated a week ago. During
the course of the day A network user informs you that a table has been dropped from the Imports
table at 16:10. Certkingdom wants the incoming table restored to the Imports database.
What must be done to restore the table using minimal effort and ensuring data loss is kept to a minimum?

A. You should consider restoring the database from the recent deferential backup.
B. You should consider having the differential of Monday and snapshot backup from Tuesday restored.
C. You should consider deletion of all differential and database snapshots except the recent backup.
D. You should consider having the database table recovered from the recent database snapshot.

Answer: A


QUESTION 4
Certkingdom hired you as the network database administrators. You create a database named
Customers on ABC-DB01 running an instance of SQL Server 2005 Enterprise Edition.
A custom application is used to access and query the database. The users recently reported that
the custom application experiences deadlock conditions constantly.
How would you determine which Server session ID is related to the deadlocks?
What must be done to observer the SQL Server session ID involved with the deadlock scenario?

A. You should consider monitoring the SQL Server Profiler to monitor Error and Warning events.
B. You should consider monitoring the SQL Server Profiler to monitor Lock Deadlock Chain events.
C. You should consider monitoring the SQL Server Profiler to monitor Objects.
D. You should consider monitoring the SQL Server Profiler to monitor performance.

Answer: B


QUESTION 5
You are the system administer of a SQL Server 2005 Enterprise Edition server named DB01 that
uses Windows Authentication mode. Certkingdom uses a custom developed application for running
queries against the database on DB01. Users complain that the custom application stops
responding. Yu notice that the CPU utilization at 100% capacity.
You then try to connect to DB01 by utilizing the SQL Server Management Studio but DB01 still
does not respond. Certkingdom wants you to connect to ABC-DB01 to determine the problem.
What should be done to successfully determine the problem?

A. You should consider utilizing the osql –L command from the command prompt.
B. You should consider utilizing the sqlcmd –A command from the command prompt.
You could additionally use SQL Server Management Studio to access Database Engine Query for
connecting to DB01 with the SQL Server Authentication mode.
C. You should consider utilizing the osql –E command from the command prompt.
D. You should consider utilizing the sqlcmd –N command from the command prompt.
E. You should consider utilizing the sqlcmd –R command from the command prompt.

Answer: B

Explanation: The sqlcmd –A command is utilized to ensure that a dedicated administrative connection is utilized.


MCTS Training, MCITP Trainnig

09.12
12

Microsoft TS: Microsoft Windows Embedded Standard 2009, Development – 70-577 Exam

by admin ·

In order to offer the customers the latest edition of 70-577 exam, Certkingdom staffs make great efforts to make sure that they are always in-touch with the changes in the exam. It is certain that the Certkingdom training materials are the most actual information available for you.

We developed 70-577 practice exam free with the help of our highly certified professionals according to the latest Microsoft updates. Our study guide certification assures you passing your 70-577 exam in your first attempt with high scores and become Microsoft Certification certified professional. You can download certification test and start preparing your 70-577 exam preparation guide not only help you pass your 70-577 exam but enable you to demonstrate the purpose of the 70-577 exam.

MCTS Training, MCITP Trainnig
Best Microsoft MCTS Certification,
Microsoft MCITP Training at certkingdom.com

It has been specially made from the exam point of view and teaches you the necessary tricks you need to outsmart the rest! Do not take chances with your future! Turn to Certkingdom range of resources including 70-577 Exam Materials, Study material, technical training , training manuals , test papers, Certkingdom exam Questions, 70-577 Study Guide, Braindumps / Dumps , training Questions , study Questions , Practice Exams, study Tests, Certification training Study Notes and Detailed Explanations & Answers, 70-577 Certification Papers, Classes and Study Programs and exam simulators.

Certkingdom Microsoft Certification 70-577 training material provides you with comprehensive Practice Test questions with precise and accurate answers. 70-577 exam practice questions and answers are constantly updated to keep up with the current certification exam. Certkingdom 70-577 Testing Engine provides you with an opportunity to test your knowledge and skills in a simulated, certification-testing environment.

Certkingdom 70-577 examination exam question contains the complete unrestricted dump. This 70-577 examination questions of just one of these, including many exams, so you can easily through the 70-577, no matter you are through to your product certificate or any other today popular authentication. Perfect 70-577, not rely on the exam 70-577 training exercises. Get 70-577 learning guidance, this is actually the best you can use 70-577 PDF format questions and answers, to get through the VMWare 70-577 today.

There are many sites which provide information on Microsoft 70-577 exam and provide you study materials like Microsoft Certification 70-577 dumps and others. To make a good preparation for this highly professional exam you must have a complete knowledge and for that you must use an authentic source. Certkingdom is the best source to prepare for your Microsoft 70-577 exam for 100 percent results.

Many of the websites on the internet offer study material in the form of softwares. An amazing website in this regard is Certkingdom. It offers you enormous help in the form of its software designed with the name of the certification, 70-577 test. It consists of an easy to understand material and is according to exam needs. That is why 70-577 Certkingdom has gained much popularity within a very short period of time.

When it comes to perfect training any free 70-577 examination resources are not give you need. In Certkingdom 70-577 download files from the information filled the most realistic, you can find 70-577 exam preparation. In practice 70-577 Certkingdom. With answers you get from the question is unique. This is why thousands of depend on us to provide the best 70-577 the most cheap training. If your budget 70-577 is limited, you need to complete solutions. Don’t rely on free 70-577 learning guidance or expensive 70-577 training guidelines. The best 70-577 demand training!

MCTS Training, MCITP Trainnig
Best Microsoft MCTS Certification,
Microsoft MCITP Training at certkingdom.com

09.3
12

Microsoft UPGRADE: MCAD Skills to MCTS Web Apps Using MS .NET Frwrk- 70-559 Exam

by admin ·

Our Certkingdom.com Practice Exams delivered via our state of the art exam simulator. You control the kinds of questions to practice, number of questions and time duration of each test. At Certkingdom.com you have the Microsoft Certification 70-559 Practice Exam in which you will get a chance to practice what you have learnt without any pressure or anxiety. You will also avoid any common mistakes you might make in the 70-559 actual tests. While taking the 70-559 practice exams not only will you gain confidence, but also are able to repeat your experience when taking the actual test.

Microsoft Certification 70-559 exam is one of the best certifications from Microsoft and hence the competition is tough. But at Microsoft, your talents and potential will get the right break and 70-559 is the perfect means to this. You will find all the germane information on Certkingdom.com Microsoft product page. Our products will enable you to attempt all the possible questions test can have, and this ability that you will acquire led us to offering our guarantee.

Certkingdom.com 70-559 exam Preparation Material provides you everything you will need to take your 70-559 Exam. The 70-559 Exam details are researched and produced by Professional Certification Experts who are constantly using industry experience to produce precise, and logical. You may get questions from different web sites or books, but logic is the key. Our Product will help you not only pass in the first try, but also save your valuable time.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

Many IT institutions offer study materials as well as general guidance on Microsoft Certification exam 70-559. But usually the study materials obtained through these sources is too detailed and does not attract the attention of the candidates. Keeping in view the demands of the candidates for 70-559 exam, some study materials providers like Certkingdom.com has devised to the point Questions & Answers known as 70-559 dumps. Certkingdom.com 70-559 dumps are highly useful in your preparation for 70-559 exam. 70-559 dumps help you prepare the most relevant study matter on your certification.

It is well known that Microsoft 70-559 exam is the hot exam of Microsoft certifications. Certkingdom.com offer you all the Q&A of the Microsoft 70-559 real exam. It is the examination of the perfect combination and it will help you pass Microsoft Certification 70-559 exam at the first time!

Certkingdom.com is one website that provides you related, high quality and up-to-the-mark exam questions, knowledge and study materials about Microsoft 70-559 certification.

Every Actual test dumps for Microsoft 70-559 exam is paired with a Microsoft 70-559 download for use on simulator. There are numerous options for 70-559 practice exams that can be downloaded and used on our 70-559 simulator. That way, a real Microsoft Certification 70-559 testing environment is formed, which is incomparable to anything else.

Pass your 70-559 exam with Certkingdom.com 70-559 exam simulator, the most effective training software for the Microsoft Certification certification exams. Developed by highly experienced and certified IT veterans, it offers extremely realistic questions and detailed explanations. Last but not the least, it comes with FREE technical support and “100% Money Back If You Not Pass Guarantee”. Check out the FREE demo version.

Some of the certification, on account of their demand and corresponding fields, are more preferred than other certifications. 70-559 exam is one of those most preferred IT certifications which are the dream of all IT professionals. If you successfully achieve certification of 70-559 exam, it opens up a number of career opportunities for you. The 70-559 exam is offered to you by the well-known international IT company. Microsoft Certification and is also branded as Microsoft 70-559.