Archive for the ‘MCSE 2003’ Category

10.15
16

Exam 70-744 Securing Windows Server 2016 (In development)

by admin ·

Published: November 3, 2016
Languages: English
Audiences: IT professionals
Technology: Windows Server 2016
Credit toward certification: MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Implement server hardening solutions (25–30%)
Configure disk and file encryption
Determine hardware and firmware requirements for secure boot and encryption key functionality; deploy BitLocker encryption; deploy BitLocker without a Trusted Platform Module (TPM); deploy BitLocker with a TPM only; configure the Network Unlock feature; configure BitLocker Group Policy settings; enable Bitlocker to use secure boot for platform and BCD integrity validation; configure BitLocker on Clustered Shared Volumes (CSVs) and Storage Area Networks (SANs); implement BitLocker Recovery Process using self-recovery and recovery password retrieval solutions; configure BitLocker for virtual machines (VMs) in Hyper-V; determine usage scenarios for Encrypting File System (EFS); configure the EFS recovery agent; manage EFS and BitLocker certificates, including backup and restore
Implement server patching and updating solutions
Install and configure Windows Server Update Services (WSUS), manage updates using WSUS, create computer groups, configure update approvals and deployments, configure automatic updates, configure WSUS reporting, troubleshoot WSUS configuration and deployments
Implement malware protection
Implement antimalware solution with Windows Defender, integrate Windows Defender with WSUS and Windows Update, configure Windows Defender using Group Policy, configure Windows Defender scans using Windows PowerShell, implement AppLocker rules, implement AppLocker rules using Windows PowerShell, implement Control Flow Guard, implement Code Integrity (Device Guard) Policies, create Code Integrity policy rules, create Code Integrity file rules
Protect credentials
Determine requirements for implementing Credential Guard; configure Credential Guard using Group Policy, WMI, command prompt, and Windows PowerShell; implement NTLM blocking
Create security baselines
Install and configure Security Compliance Manager (SCM); create, view, and import security baselines; deploy configurations to domain and non-domain joined servers

Secure a virtualization infrastructure (5–10%)
Implement a Guarded Fabric solution
Install and configure the Host Guardian Service (HGS), configure Admin-trusted attestation, configure TPM-trusted attestation, configure the Key Protection Service using HGS, migrate Shielded VMs to other guarded hosts, configure Nano Server as TPM attested guarded host, troubleshoot guarded hosts
Implement Shielded and encryption-supported VMs
Determine requirements and scenarios for implementing Shielded VMs, create a Shielded VM using only a Hyper-V environment, enable and configure vTPM to allow an operating system and data disk encryption within a VM, determine requirements and scenarios for implementing encryption-supported VMs, troubleshoot Shielded and encryption-supported VMs

Secure a network infrastructure (10–15%)
Configure Windows Firewall
Configure Windows Firewall with Advanced Security; configure network location profiles; configure and deploy profile rules; configure firewall rules for multiple profiles using Group Policy; configure connection security rules using Group Policy, the GUI management console, or Windows PowerShell; configure Windows Firewall to allow or deny applications, scopes, ports, and users using Group Policy, the GUI management console, or Windows PowerShell; configure authenticated firewall exceptions; import and export settings
Implement a software-defined Distributed Firewall
Determine requirements and scenarios for Distributed Firewall implementation with software-defined networking, determine usage scenarios for Distributed Firewall policies and network security groups
Secure network traffic
Configure IPsec transport and tunnel modes, configure IPsec authentication options, configure connection security rules, implement isolation zones, implement domain isolation, implement server isolation zones, determine SMB 3.1.1 protocol security scenarios and implementations, enable SMB encryption on SMB Shares, configure SMB signing via Group Policy, disable SMB 1.0, secure DNS traffic using DNSSEC and DNS policies, install and configure Microsoft Message Analyzer (MMA) to analyze network traffic

Manage privileged identities (25–30%)
Implement an Enhanced Security Administrative Environment (ESAE) administrative forest design approach
Determine usage scenarios and requirements for implementing ESAE forest design architecture to create a dedicated administrative forest, determine usage scenarios and requirements for implementing clean source principals in an Active Directory architecture
Implement Just-in-Time (JIT) Administration
Create a new administrative (bastion) forest in an existing Active Directory environment using Microsoft Identity Manager (MIM), configure trusts between production and bastion forests, create shadow principals in bastion forest, configure the MIM web portal, request privileged access using the MIM web portal, determine requirements and usage scenarios for Privileged Access Management (PAM) solutions, create and implement MIM policies, implement Just-in-Time administration principals using time-based policies, request privileged access using Windows PowerShell
Implement Just-Enough-Administration (JEA)
Enable a JEA solution on Windows Server 2016; create and configure session configuration files, create and configure role capability files, create a JEA endpoint, connect to a JEA endpoint on a server for administration, view logs, download WMF 5.1 to a Windows Server 2008 R2, configure a JEA endpoint on a server using Desired State Configuration (DSC)
Implement Privileged Access Workstations (PAWs) and User Rights Assignments
Implement a PAWS solution, configure User Rights Assignment group policies, configure security options settings in Group Policy, enable and configure Remote Credential Guard for remote desktop access
Implement Local Administrator Password Solution (LAPS)
Install and configure the LAPS tool, secure local administrator passwords using LAPS, manage password parameters and properties using LAPS

Implement threat detection solutions (15–20%)
Configure advanced audit policies
Determine the differences and usage scenarios for using local audit policies and advanced auditing policies; implement auditing using Group Policy and AuditPol.exe; implement auditing using Windows PowerShell; create expression-based audit policies; configure the Audit PNP Activity policy; configure the Audit Group Membership policy; enable and configure Module, Script Block, and Transcription logging in Windows PowerShell
Install and configure Microsoft Advanced Threat Analytics (ATA)
Determine usage scenarios for ATA; determine deployment requirements for ATA, install and configure ATA Gateway on a dedicated server, install and configure ATA Lightweight Gateway directly on a domain controller, configure alerts in ATA Center when suspicious activity is detected, review and edit suspicious activities on the attack time line
Determine threat detection solutions using Operations Management Suite (OMS)
Determine usage and deployment scenarios for OMS, determine security and auditing functions available for use; determine Log Analytics usage scenarios

Implement workload-specific security (5–10%)
Secure application development and server workload infrastructure
Determine usage scenarios, supported server workloads, and requirements for Nano Server deployments; install and configure Nano Server; implement security policies on Nano Servers using Desired State Configuration (DSC); determine usage scenarios and requirements for Windows Server and Hyper-V containers; install and configure Hyper-V containers
Implement a secure file services infrastructure and Dynamic Access Control (DAC)
Install the File Server Resource Manager (FSRM) role service, configure quotas, configure file screens, configure storage reports, configure file management tasks, configure File Classification Infrastructure (FCI) using FSRM, implement work folders, configure file access auditing, configure user and device claim types, implement policy changes and staging, perform access-denied remediation, create and configure Central Access rules and policies, create and configure resource properties and lists

Click here to view complete Q&A of 70-744 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-744 Training at certkingdom.com

06.5
16

Exam 70-470 Recertification for MCSE: Business Intelligence

by admin ·

Published: August 10, 2014
Languages: English, Japanese
Audiences: IT professionals
Technology: Microsoft SQL Server 2014
Credit toward certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Build an analysis services multidimensional database
Implement a cube
Use SQL Server Data Tools – Business Intelligence (SSDT-BI) to build the cube; use SSDT-BI to do non-additive or semi-additive measures in a cube, define measures, specify perspectives, define translations, define dimension usage, define cube-specific dimension properties, define measure groups, implement reference dimensions, implement many-to-many relationships, implement fact relationships, implement role-playing relationships, create and manage linked measure groups and linked dimensions, create actions
Implement custom logic in a data model
Define key performance indicators (KPIs); define calculated members; create relative measures (growth, YoY, same period last year), percentage of total using MDX; named sets; add Time Intelligence; implement ranking and percentile; define MDX script to import partial PowerPivot model
Select an appropriate model for data analysis
Select Tabular versus Multidimensional based on scalability needs, traditional hierarchical, data volume; select appropriate organizational BI, such as corporate BI or PowerBI, and team and personal BI needs and data status

Manage, maintain, and troubleshoot a SQL Server Analysis Services (SSAS) database
Process data models
Define processing of tables or partitions for tabular and multidimensional models; define processing of databases, cubes, and dimensions for multidimensional models; select full processing versus incremental processing; define remote processing; define lazy aggregations; automate with Analysis Management Objects (AMO) or XML for Analysis (XMLA); process and manage partitions by using PowerShell
Install and maintain an SSAS instance
Install SSAS; install development tools; identify development and production installation considerations; upgrade SSAS instance; define data file and program file location; plan for Administrator accounts; define server and database level security; support scale-out read-only; update SSAS (service packs); install and maintain each instance type of Analysis Services, including PowerPivot; restore and import PowerPivot; back up and restore by using PowerShell

Build a tabular data model
Implement a tabular data model
Define tables, import data, define calculated columns, define relationships, define hierarchies and perspectives, manage visibility of columns and tables, embed links, optimize BISM for Power View, mark a date table, sort a column by another column
Implement data access for a tabular data model
Manage partitions, processing, select xVelocity versus DirectQuery for data access

Build a report with SQL Server Reporting Services (SSRS)
Design a report
Select report components (crosstab report, Tablix, design chart, data visualization components), design report templates (Report Definition Language), identify the data source and parameters; design a grouping structure; drill-down reports, drill-through reports; determine if any expressions are required to display data that is not coming directly from the data source
Manage a report environment
Manage subscriptions and subscription settings; define data-driven subscriptions; manage data sources; integrate SharePoint Server; define email delivery settings; manage the number of snapshots; manage schedules, running jobs, and report server logs; manage report server databases; manage the encryption keys; set up the execution log reporting; review the reports; configure site-level settings; design report lifecycle; automate management of reporting services; create a report organization structure; install and configure reporting services; deploy custom assemblies
Configure report data sources and datasets
Select appropriate query types (stored procedure versus table versus text only); configure parameterized connection strings (dynamic connection strings); define filter location (dataset versus query); configure data source options, for example, extract and connect to multiple data sources; shared and embedded data sources and datasets; use custom expressions in data sources; connect to Microsoft Azure SQL database; connect to Microsoft Azure Marketplace; implement DAX and MDX queries to retrieve appropriate data sets; work with non-relational data sources, such as XML or SharePoint lists; connect to HDInsight Server

Plan business intelligence (BI) infrastructure
Plan for performance
Optimize batch procedures: extract, transform, load (ETL) in SQL Server Integration Services (SSIS)/SQL and processing phase in Analysis Services; configure Proactive Caching within SQL Server Analysis Services (SSAS) for different scenarios; understand performance consequences of named queries in a data source view; analyze and optimize performance, including Multidimensional Expression (MDX) and Data Analysis Expression (DAX) queries; understand the difference between partitioning for load performance versus query performance in SSAS; appropriately index a fact table; optimize Analysis Services cubes in SQL Server Data Tools; create aggregations

Design BI infrastructure
Design a high availability and disaster recovery strategy
Design a recovery strategy, back up and restore SSAS databases, back up and restore SSRS databases, move and restore the SSIS Catalog, design an AlwaysON solution

Design a reporting solution
Design a Reporting Services dataset
Design appropriate data query parameters, create appropriate SQL queries, create appropriate DAX queries for an application, manage data rights and security, extract data from analysis services by using MDX queries, balance query-based processing versus filter-based processing, manage data sets through the use of stored procedures
Manage Excel Services/reporting for SharePoint
Configure data refresh schedules for PowerPivot published to SharePoint, publish BI info to SharePoint, use SharePoint to accomplish BI administrative tasks, install and configure Power View, publish PowerPivot and Power View to SharePoint
Design BI reporting solution architecture
Linked drill-down reports, drill-through reports, and sub reports; design report migration strategies; access report services API; design code-behind strategies; identify when to use Reporting Services (RS), Report Builder (RB), or Power View; design and implement context transfer when interlinking all types of reports (RS, RB, Power View, Excel); implement BI tools for reporting in SharePoint (Excel Services versus PowerView versus Reporting Services); select a subscription strategy; enable Data Alerts; design map visualization

Design BI data models
Design the data warehouse
Design a data model that is optimized for reporting; design and build a cube on top; design enterprise data warehouse (EDW) and OLAP cubes; choose between natural keys and surrogate keys when designing the data warehouse; use SQL Server to design, implement, and maintain a data warehouse, including partitioning, slowly changing dimensions (SCD), change data capture (CDC), Index Views, and column store indexes; identify design best practices; implement a many-to-many relationship in an OLAP cube; design a data mart/warehouse in reverse from an Analysis Services cube; implement incremental data load; choose between performing aggregation operations in the SSIS pipeline or the relational engine
Design cube architecture
Partition cubes and build aggregation strategies for the separate partitions; design a data model; choose the proper partitioning strategy for the data warehouse and cube; design the data file layout; identify the aggregation method for a measure in a MOLAP cube; performance tune a MOLAP cube using aggregations; design a data source view; design for cube drill-through and write back actions; choose the correct grain of data to store in a measure group; design analysis services processing by using indexes, indexed views, and order by statements

Design an ETL solution
Design SSIS package execution
Use the new project deployment model; pass values at execution time; share parameters between packages; plan for incremental loads versus full loads; optimize execution by using Balanced Data Distributor (BDD); choose optimal processing strategy (including Script transform, flat file incremental loads, and Derived Column transform)
Plan to deploy SSIS solutions
Deploy the package to another server with different security requirements, secure integration services packages that are deployed at the file system, demonstrate awareness of SSIS packages/projects and how they interact with environments (including recoverability), decide between performing aggregation operations in the SSIS pipeline or the relational engine, plan to automate SSIS deployment, plan the administration of the SSIS Catalog database

QUESTION 1
You need to identify the reports that produce the errors that Marc is receiving.
What should you do?

A. Write a query by using the Subscriptions table in the report server database.
B. Use the Windows Event Viewer to search the Application log for errors.
C. Write a query by using the ExecutionLog3 view in the report server database.
D. Search the ReportServerService_<timestamp>.log file for errors.

Answer: C


QUESTION 2
You need to deploy the StandardReports project.
What should you do? (Each correct answer presents a complete solution. Choose all that apply.)

A. Deploy the project from SQL Server Data Tools (SSDT).
B. Use the Analysis Services Deployment utility to create an XMLA deployment script.
C. Use the Analysis Services Deployment wizard to create an MDX deployment script.
D. Use the Analysis Services Deployment wizard to create an XMLA deployment script.

Answer: A,D

Explanation: There are several methods you can use to deploy a tabular model project. Most of the deployment methods that can be used for other Analysis Services projects, such as multidimensional, can also be used to deploy tabular model projects.
A: Deploy command in SQL Server Data Tools
The Deploy command provides a simple and intuitive method to deploy a tabular model project from the SQL Server Data Tools authoring environment.
Caution:
This method should not be used to deploy to production servers. Using this method can overwrite certain properties in an existing model.
D: The Analysis Services Deployment Wizard uses the XML output files generated from a Microsoft SQL Server Analysis Services project as input files. These input files are easily modifiable to customize the deployment of an Analysis Services project. The generated deployment script can then either be immediately run or saved for later deployment.
Incorrect:
not B: The Microsoft.AnalysisServices.Deployment utility lets you start the Microsoft SQL Server Analysis Services deployment engine from the command prompt. As input file, the utility uses the XML output files generated by building an Analysis Services project in SQL Server Data Tools (SSDT).


QUESTION 3
You need create the data source view for the StandardReports project.
What should you do?

A. Generate a relational schema from the dimensions and cubes by using the Schema Generation wizard.
B. Create a data source, connect it to the data warehouse, and then use the Data Source View wizard.
C. Execute the Import from Table wizard and then use the Data Source View wizard.
D. Create a new data source view and then use the Import from Table wizard.

Answer: B


QUESTION 4
You need to ascertain why Marc did not receive his reports.
What should you do?

A. Search the ReportServerService_<timestamp>.log file for errors.
B. Search the registry for errors.
C. Use the Windows Event Viewer to search the Application log for errors.
D. Use SQL Server Management Studio to search the SQL Server logs for errors.

Answer: B


QUESTION 5
You need to create a measure for DOD sales.
What should you do? (Each correct answer presents part of the solution. Choose all that apply.)

A. Specify a date table by using a Mark as Date table.
B. Use the Data Analysis Expressions (DAX) PARALLELPERIOD() function.
C. Use the Business Intelligence Wizard to define time intelligence.
D. Use the Multidimensional Expressions (MDX) LAG() function.

Answer: A,C

Explanation: * From scenario:
A measure must be created to calculate day-over-day (DOD) sales by region based on order date.
A: Specify Mark as Date Table for use with Time Intelligence (SSAS Tabular)
In order to use time intelligence functions in DAX formulas, you must specify a date table and a unique identifier (datetime) column of the Date data type. Once a column in the date table is specified as a unique identifier, you can create relationships between columns in the date table and any fact tables.
C: The time intelligence enhancement is a cube enhancement that adds time calculations (or time views) to a selected hierarchy. This enhancement supports the following categories of calculations:
Period to date.
Period over period growth. Moving averages.
Parallel period comparisons.

Click here to view complete Q&A of 70-470 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-470 Training at certkingdom.com

03.21
16

Exam 70-345 Designing and Deploying Microsoft Exchange Server 2016 (beta)

by admin ·

Published: January 8, 2016
Languages: English
Audiences: IT professionals
Technology: Microsoft Exchange Server 2016
Credit toward certification: MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft
Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Plan, deploy, manage, and troubleshoot mailbox databases (15–20%)
Plan, deploy, and manage mailbox databases
Plan for database size and storage performance requirements, plan mailbox database capacity and placement, plan archive mailboxes capacity and placement, plan modern public folder capacity and placement, plan for storage architecture (SAN, DAS, RAID, JBOD), plan file system requirements, plan for auto reseed, plan for virtualization requirements and scenarios, validate storage design by running JetStress, create and configure mailbox databases, manage mailbox databases, configure transaction log properties and file placement
Plan, deploy, and manage high-availability solutions for mailbox databases
Identify failure domains; plan a solution that meets SLA requirements around scheduled downtime; plan for software updates and server maintenance; plan for change management; create, configure, and manage Database Availability Groups (DAGs); create, configure, and manage DAG networks; create, configure, and manage proper placement of a file share witness (FSW); create and configure mailbox database copies; create, configure, and manage Azure file share witness (FSW); create, configure, and manage Azure DAG members
Plan, deploy, and manage a site-resilient Database Availability Group (DAG)
Recommend quorum options with given customer requirements; plan, create, and configure cross-site DAG configuration; plan, deploy, and configure Datacenter Activation Coordination (DAC); configure and manage proper placement of an alternate file share witness (FSW); test and perform site recovery
Monitor and troubleshoot mailbox databases
Monitor mailbox database replication and content indexing, troubleshoot mailbox database replication and replay, troubleshoot mailbox database copy activation, troubleshoot mailbox database performance, troubleshoot database failures (e.g., repair, defrag, recover), resolve quorum issues, troubleshoot data center activation
Plan, deploy, and manage backup and recovery solutions for mailbox databases
Plan most appropriate backup solution that meets SLA requirements of recovery point objectives and recovery time objectives; deploy, configure, and manage lagged mailbox database copies; recover an Exchange Server, mailbox database, mailbox, public folder, or mail item; recover the public folder hierarchy; perform a dial tone restore

Plan, deploy, manage, and troubleshoot client access services (15–20%)
Plan, deploy, and manage client access services
Plan namespaces for client connectivity; plan proxy and redirection requirements; plan and deploy certificates; plan and configure authentication (including FBA, Basic, NTLM, and Kerberos); plan, deploy, and configure Autodiscover, Outlook Anywhere, Outlook MAPI over HTTP, Exchange Web Services, Outlook on the Web, Exchange Admin Center, Exchange ActiveSync, POP3, and IMAP4; plan, deploy, and configure Office Online Servers (OOS); plan, create, and configure Offline Address Book (OAB); plan, create, and configure hierarchical address lists; plan, deploy, and configure address book policies
Plan, deploy, and manage mobility solutions
Plan, deploy, and configure OWA for Devices, Outlook for the Web policies, and mobile device mailbox policies; plan, deploy, and configure Allow Block Quarantine (ABQ); plan, deploy, and configure Office Apps
Plan, deploy, and manage load balancing
Configure namespace load balancing, plan for differences between layer seven and layer four load balancing methods
Monitor and troubleshoot client connectivity
Troubleshoot Outlook Anywhere connectivity, troubleshoot Outlook MAPI over HTTP connectivity, troubleshoot Exchange Web Services (EWS), troubleshoot Outlook on the Web, troubleshoot POP3 and IMAP4, troubleshoot authentication, troubleshoot Autodiscover, troubleshoot Exchange ActiveSync, troubleshoot proxy and redirection issues
Plan, deploy, and manage a site-resilient client access services solution
Plan site-resilient namespaces, configure site-resilient namespace URLs, perform and test steps for site failover and switchover, plan certificate requirements for site failovers, manage expected client behavior during a failover and switchover

Plan, deploy, manage, and troubleshoot transport services (15–20%)
Plan, deploy, and manage transport services
Plan a solution that meets SLA requirements around message delivery; plan inter-site mail flow; plan inter-org mail flow; plan, deploy, and configure redundancy for intra-site scenarios; plan and configure for SafetyNet; plan and configure for shadow redundancy; plan and configure for redundant MX records; plan, create, and configure TLS transport, Edge transport, Send/Receive connectors, transport rules, accepted domains, email address policies, and Address Rewriting
Troubleshoot and monitor transport services
Interpret message tracking logs and protocol logs; troubleshoot a shared namespace environment; troubleshoot SMTP mail flow; given a failure scenario, predict mail flow and identify how to recover; troubleshoot TLS; troubleshoot the new transport architecture
Plan, deploy, and manage message hygiene
Plan and configure malware filtering, plan and configure connection filtering, plan and configure spam filtering, plan and configure recipient filtering, plan and configure Sender Policy Framework, plan and configure Spam Confidence Level (SCL) thresholds
Plan, deploy, and manage site resilience transport services
Plan, create and configure MX records for failover scenarios; manage resubmission and reroute queues; plan, create, and configure Send/Receive connectors for site resiliency; test and perform steps for transport failover and switchover

Plan, deploy, and manage an Exchange infrastructure, recipients, and security (15–20%)
Plan and configure Active Directory (AD) Domain Services for Exchange and Organizational settings
Plan the number of domain controllers, plan placement of Global Catalog (GC), plan and configure DNS changes required for Exchange, plan for schema changes required for Exchange, prepare AD for Exchange, prepare domains for Exchange, plan and configure Active Directory site topology, plan and configure throttling policies
Create and configure mail-enabled objects
Create and configure mailboxes, create and configure resource mailboxes and scheduling, create and configure shared mailboxes, create and configure mail-enabled users and contacts, create and configure distribution lists, configure moderation, create and configure linked mailboxes, create and configure modern public folders
Manage mail-enabled object permissions
Determine when to use Send-As and Send-On-Behalf permissions, configure mailbox folder permissions, configure mailbox permissions, set up room mailbox delegates, configure auto-mapping, create and configure public folder permissions
Plan, deploy, manage, and troubleshoot Role Based Access Control (RBAC)
Determine appropriate RBAC roles and cmdlets, limit administration using existing role groups, evaluate differences between RBAC and Active Directory split permissions, plan and configure a custom-scoped role group, plan and configure delegated setup, plan and create unscoped top-level roles, troubleshoot RBAC, plan and configure user assignment policies
Plan an appropriate security strategy
Plan and configure BitLocker, plan and configure S/MIME
Plan, deploy, manage, and troubleshoot IRM with Active Directory Rights Management Services (AD RMS) or Azure RMS
Plan and configure Information Rights Management (IRM) in Exchange, create an RMS template, plan and create transport protection rules, plan and create Outlook protection rules, plan and configure journal report decryption, plan and configure IRM for eDiscovery, plan and configure pre-licensing for client access, troubleshoot failed IRM protection

Plan, deploy, and manage compliance, archiving, eDiscovery, and auditing (10–15%)
Plan and configure Data Loss Prevention (DLP) solutions
Plan a DLP solution to meet business requirements, plan and configure pre-built rules, plan and create custom rules, plan and configure custom DLP policies, plan and configure DLP fingerprinting
Plan, configure, and manage Archiving and Message Records Management (MRM)
Plan and configure retention policies; plan, create, and configure custom tags; assign policies to users; plan and configure the Managed Folder Assistant; remove and delete tags; plan and configure online archiving (Office 365); plan and create archive policies; plan and configure in-place archiving
Plan, configure, and perform eDiscovery
Plan and delegate RBAC roles for eDiscovery; enable a legal/litigation hold; perform a query-based InPlace hold; perform multi-mailbox searches in Exchange Administration Center (EAC) and Exchange Management Shell; integrate InPlace federated searches with Microsoft SharePoint Discovery center
Plan, configure, and manage a compliance solution
Plan and configure MailTips; plan, create, configure, and deploy message classifications; plan and configure transport rules to meet specified compliance requirements; plan and configure journaling
Plan, manage, and use mailbox and administrative auditing
Plan and configure mailbox audit logging, plan and configure administrative audit logging, search and interpret all audit logs

Implement and manage coexistence, hybrid scenarios, migration, and federation (10–15%)
Plan, deploy, and troubleshoot coexistence with Office 365 (Exchange Online)
Plan, deploy, and manage hybrid configuration; evaluate limitations of the Hybrid Configuration Wizard; plan and manage hybrid deployment OAuth-based authentication; plan and configure certificate and firewall requirements for Exchange Hybrid setup; troubleshoot transport with Exchange Online; troubleshoot client access with Exchange Online; troubleshoot directory synchronization
Plan, deploy, manage, and troubleshoot Exchange federation
Plan, create, and manage federation trusts with Microsoft federation gateways; manage sharing policies; manage organization relationships; plan and create certificate and firewall requirements for federation; troubleshoot Exchange federation trust and organization relationships; troubleshoot cross-forest availability
Plan, deploy, and troubleshoot on-premises coexistence with earlier supported versions of Exchange
Plan, create, and configure namespaces for coexistence; plan and configure proxy redirect; plan firewall configuration for coexistence; plan and configure for mail flow requirements; plan for mailbox migrations; troubleshoot transport in coexistence; troubleshoot client access in coexistence
Migrate from earlier supported versions of Exchange
Determine transition paths to Exchange, migrate to modern public folders, migrate mailboxes, plan for discontinued features, transition and decommission servers, troubleshoot Mailbox Replication Services

Who should take this exam?
This exam is designed for candidates who have a minimum of three years of experience designing and managing Exchange Server and who are responsible for the Exchange Server 2016 messaging environment in an enterprise environment. They are IT consultants or senior administrators who act as the technical lead over a team of administrators. Candidates should be familiar with the requirements for integrating Microsoft Exchange Server with Skype for Business and Office 365.

Click here to view complete Q&A of 70-345 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-345 Training at certkingdom.com

03.16
16

Exam 70-334 Core Solutions of Microsoft Skype for Business 2015 (beta)

by admin ·

Exam 70-334 Core Solutions of Microsoft Skype for Business 2015 (beta)

Published: July 31, 2015
Languages: English
Audiences: IT professionals
Technology: Skype for Business
Credit toward certification: MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Plan and design Skype for Business (30-35%)
Plan Skype for Business site topology
Evaluate user distribution for central and branch site design; associate workloads to business requirements; analyze business requirements and capacity requirements; plan Skype for Business architecture; analyze and design Skype for Business SIP domains including shared SIP namespaces(Split Domain); plan for Skype for Business Online dependencies
Plan Skype for Business Server support infrastructure
Define certificate requirements for internal servers; analyze and design load balancing, plan for DNS, SQL, AD DS, and file store; assess network requirements including ExpressRoute; plan for optimal conferencing traffic, capacity, and QoS support; estimate network usage and capacity including internal network and Skype for Business Online service requirements
Plan Skype for Business Servers
Define server roles; analyze hardware requirements; determine storage requirements for archiving and monitoring; determine operating system version requirements; determine operating system dependencies; define virtualization requirements
Design a Skype for Business Server high availability/disaster recovery (HA/DR) solution
Design a strategy for central and branch office scenarios, resiliency, SQL mirroring, SQL AlwaysOn Failover Clustering Instances and SQL AlwaysOn Availability Groups, Persistent Chat, load balancing, and Geo DNS; define failover scenarios
Design conferencing
Design dial-in conferencing including conference access numbers and conferencing regions, conferencing lifecycle, conferencing policies, video interoperability server (VIS), Office Online Server (OOS), and Skype Meeting Broadcast
Design Skype for Business remote and external access using Edge Services
Design federation including Skype consumer connectivity, Skype for Business Online, and XMPP; design for mobility; design for directors; design for remote user access; define certificate requirements for remote servers; analyze and design firewall requirements, load balancing, DNS, and reverse proxy, split tunneling strategies
Plan for Skype for Business clients and user experiences
Plan contact list management, client version control, privacy, Address Book web search/download, Skype for Business mobility, client authentication options, Skype for Business users for VDI, and corporate access to Skype for Business Online; design for client UI experience; plan for Skype for Business room system
Plan migration and upgrade from previous versions
Plan the migration sequence; plan for in-place upgrade; decommission old servers; monitoring and archiving server roles; plan for co-existence with previous server versions; upgrade from mirroring to AlwaysOn

Deploy and configure Skype for Business (30-35%)
Configure and publish topology
Create Skype for Business roles; create gateways and trunks; add/remove server features; deploy Edge Server; deploy SQL HA options, create Office Online Server
Configure conferencing
Create PIN policy, regions and conference dial-in access numbers, meeting configuration, conference policies, mediation server co-location, and trunks and gateways; configure Skype Meeting Broadcast
Configure Skype for Business remote and external access
Configure federation, including Skype consumer connectivity, Skype for Business Online, and XMPP; configure mobility policies and remote user access policies; configure load balancing, DNS, and reverse proxy
Deploy and configure clients
Configure Skype for Business client features, client policies, and client security options; deploy Skype for Business users for VDI; deploy Skype for Business room system
Migrate and upgrade from previous versions and/or Skype for Business Online
Consolidate servers to a supported single version; move users; migrate Response Groups or LIS; move CMS or File Share Data; transition to SQL AlwaysOn; perform in-place upgrade; configure clients for Skype for Business Online; enable or move users to Skype for Business Online; migrate user settings; migrate to Skype for Business Online
Configure HA/DR
Configure pool pairing, configure Geo DNS for site failover, configure SQL HA
Deploy and configure monitoring and archiving services
Deploy monitoring reports; configure CDR and Quality of Experience; configure archiving storage; configure archiving and eDiscovery with Exchange including Exchange Online, archiving policies, Media Quality Dashboard (MQD), and server-side conversation history
Deploy and configure Persistent Chat servers
Implement chat history, room management URLs, HA and DR, user policies, room design, and ethical boundaries

Manage and troubleshoot Skype for Business (30-35%)
Manage and troubleshoot conferencing and application sharing
Manage and troubleshoot Conferencing Auto Attendant (CAA), Conference Announcement Service (CAS), contact objects, and conference directories; troubleshoot web scheduler, multipoint control unit (MCU) health, simple URLs (join launcher), UC add-in for Microsoft Outlook; manage and troubleshoot multi-party video, server resources, media relay, and third-party interop; troubleshoot Microsoft PowerPoint presentation connections, Office Web App server configurations, and dataproxy; troubleshoot Skype Meeting Broadcast.
Manage and troubleshoot sign-in, presence, and client configuration
Manage and troubleshoot DNS, certificates, registration, network connectivity including ExpressRoute, authentication, and auto-discover; manage and troubleshoot aggregation (OOF, calendar, machine, and user), enhanced privacy, subscriptions, contact list, and privacy relationship; manage and troubleshoot file transfer, policy assignment, URL filtering, client version filtering, GPO, and Skype for Business Online
Manage and troubleshoot federation and remote access
Manage and troubleshoot federation, including Skype consumer connectivity, XMPP, and Skype for Business Online federation types (open, direct, and enhanced), federation policy, and legacy interop; troubleshoot mobile auto-discover issues, mobile device usage issues, mobile callback feature, push notification, call establishment, and mobile conference data
Manage and troubleshoot Address Book
Configure Address Book; troubleshoot normalization, local versus web lookup, internal file download, external file download, Address Book generation, and contact merge
Manage and troubleshoot high availability and resiliency
Manage and troubleshoot the backup service, server storage replication, and file share replication by using DFS; manage single server failure (Skype for Business, SQL); manage data center failure, including CMS and branch survivability; backup and restore application service data; manage filestore data and contacts; maintain and recover Skype for Business topology; recover CMS
Identify issues by using troubleshooting tools
Interpret Skype for Business monitoring reports, and identify potential issues; configure synthetic transactions; test connectivity with PowerShell Test cmdlets; configure core reliability and media quality monitoring; verify service health and CMS replication; recover from failed server build; analyze event viewer; enable Best Practice Analyzer; verify name resolution; identify issues using CLSlogging Scenarios; use Snooper for log analysis; identify issues using a network packet analyzer, CLS Logger, Event Viewer, and Performance Monitor; analyze signaling and media call flow for Skype for Business for online users; validate connectivity for online users; use Microsoft Online Services Diagnostics and Logging Support Toolkit
Manage and troubleshoot topology and dependent infrastructure
Enable or move Skype for Business users; configure role-based access control (RBAC); manage and troubleshoot DNS; manage RGS delegated administration; troubleshoot database synchronization issues, including SQL HA and LYSS replication, topology replication, IIS, user placement, and RBAC rights assignment; troubleshoot certificates
Manage and troubleshoot Persistent Chat servers
Manage categories, scope, chat rooms, room access, compliance, and add-ins

Preparation options
Instructor-led training
From the community

Who should take this exam?
Candidates for this exam are IT consultants and telecommunications consulting professionals who design, plan, deploy, and maintain solutions for unified communications (UC). Candidates should be able to translate business requirements into technical architecture and design for a UC solution. Candidates should have a minimum of two years of experience with Skype for Business technologies and should be familiar with supported migration scenarios. Candidates should be proficient in deploying Skype for Business solutions for end users, endpoint devices, telephony, audio/video and web conferences, security, and high availability. Candidates should also know how to monitor and troubleshoot Skype for Business using Microsoft tools. In addition, candidates should be proficient with Active Directory Domain Services, data networks, and telecommunications standards and components that support the configuration of Skype for Business. Candidates should be familiar with the requirements for integrating Skype for Business with Microsoft Exchange Server and Office 365.

 

Click here to view complete Q&A of 70-334 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-334 Training at certkingdom.com

 

05.16
15

Exam 70-337 Enterprise Voice & Online Services with Microsoft Lync Server 2013

by admin ·

Exam 70-337
Enterprise Voice & Online Services with Microsoft Lync Server 2013

Published: 06 November 2012
Languages: English, Japanese
Audiences: IT professionals
Technology: Microsoft Lync Server 2013
Credit towards certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Design Enterprise Voice (27%)

Design Enterprise Voice topology

Design mediation server collocation or placement, gateways, trunks, voice resiliency, mediation server dependencies, and voice usage and traffic

Design call routing

Design dial plans, routes, normalisation, voice policies, basic emergency dialling and notification, and PSTN usages

Design voice interoperability to PSTN

Define SIP trunk capacity requirements; design multiple media gateway support, trunk configuration; define outbound translation rules, inbound dial plan; qualify technology options from UCOIP

Design voice applications

Design call park, response group delegation model, response group workflows; determine correct usage of private line and vacant number announcements

Design unified messaging

Design UM dial plans, normalisation rules, UM auto-attendant, subscriber access, UM outbound dialling, and UM placement and capacity

Preparation resources

Planning for Enterprise Voice
Enterprise Voice and Online Services with Lync Server 2013: (03) Designing Exchange Server 2013 unified messaging integration
Guidelines for integrating on-premises unified messaging and Lync Server 2013

Design and configure network services (26%)

Design for network optimisation

Assess network requirements; plan for optimal conferencing traffic, capacity, Edge placement, QOS support; estimate network usage

Plan network services for Lync

Plan Location Information Services (LIS), Call Admission Control (CAC) for voice, Call Admission Control (CAC) for video; define port requirements for internal and external services; plan for Media Bypass

Configure network services for Lync

Configure Location Information Services (LIS), Call Admission Control (CAC) for voice, Call Admission Control (CAC) for video, DHCP for phone edition, QOS, and media bypass

Preparation resources

Network infrastructure requirements
Network planning for Lync Server
Enterprise Voice and Online Services with Lync Server 2013: (07a) Networking, Part 1

Configure Enterprise Voice (26%)

Configure voice applications

Configure call park, Response Group workflows, Response Group queues, private line, and vacant number announcements

Configure call routing

Configure dial plans, routes, trunks; apply voice policies, PSTN usages, and emergency dialling

Configure unified messaging for Lync

Configure UM dial plans, the normalisation rules, UM auto-attendant, subscriber access, and call answering rules

Preparation resources

Deploying Enterprise Voice
Microsoft Lync Server 2013 dial plan and voice routing deep dive
Enterprise Voice and Online Services with Lync Server 2013: (02) Configuring basic Enterprise Voice functionality

Plan and configure a Lync Online hybrid solution (21%)

Plan Lync Online hybrid solution

Plan for Lync Online hybrid dependencies, SIP namespace, corporate access to Lync Online, and capacity (network and Lync Online service); configure Edge server for federation with Lync Online; analyse business and user requirements

Migrate to Lync Online
Configure clients for Lync Online; enable or move users to Lync Online; create a hybrid voice dial plan; migrate user settings to Lync Online; administer Lync Online native and Lync Online hybrid

Diagnose connectivity in a Lync Online hybrid environment
Confirm DNS records; choose test CMDLETs; analyse signalling and media call flow; validate connectivity; use Microsoft Online Services Diagnostics and Logging Support Toolkit

Administer online UM
Configure DNS Records; configure Edge Server for integration; create and configure UM dial plan; manage and assign Hosted Voice Mail policies; enable users for Hosted Voice Mail; create Contact Objects for Hosted Voice Mail

Preparation resources
Planning for Lync Server 2013 hybrid deployments
Steps to prepare and deploy Lync Server 2013 hybrid environment
Move users to Lync Online


MCTS Training, MCITP Trainnig

Best Microsoft MCSE Certification, Microsoft 70-337 Training
and Microsoft MCP at certkingdom.com

 


QUESTION 1
You have an Active Directory domain named contoso.com. Your company has a Microsoft Office
365 subscription. Twenty users are enabled for Microsoft Lync Online. The users frequently travel.
The users report that they receive the following error message when they attempt to sign in to
Microsoft Lync from the office:
“Cannot sign in because the server is temporarily unavailable. If the problem continues, please
contact your support team.”
You verify that the users can sign in to Lync when they connect from the Internet. You need to
ensure that all of the users can sign in to Lync. Which alias (CNAME) record should you create in
the internal DNS domain?
To answer, select the appropriate record name and the appropriate record target in the answer
area.

Hot Area:

Answer:


QUESTION 2
Your network contains the servers shown in the following table. You configure the infrastructure
to use hosted Exchange Unified Messaging (UM). You need to create a new contact object for the
hosted UM auto attendant. What should you do?

A. From Server1, run ocsumutil.exe.
B. From Server3, run the exchucutil.ps1 script.
C. From Server3, run the New-MailContact cmdlet.
D. From Server1, run the New-CsExUmContact cmdlet.

Answer: D


QUESTION 3
You purchase a Microsoft Office 365 subscription and configure the pilot users to use the
@contoso.onmicrosoft.com UPN suffix. You need to ensure that the pilot users can perform the
following actions:
? Join meetings.
? Use a SIP address that has the @online.contoso.com suffix.
? Communicate with users who are hosted on Lync Server 2013.
Which three tasks should you perform? (Each correct answer presents part of the solution. Choose
three.)

A. From the Lync Online Control Panel, set up federation to contoso.com.
B. From the Lync Server Control Panel, set up federation to online.contoso.com.
C. From the Lync Server Control Panel, set up federation to contoso.onmicrosoft.com.
D. From the Lync Server Control Panel, update the user SIP addresses of the users to
@online.contoso.com.
E. From the Lync Online Control Panel, update the SIP addresses of the users to
@online.contoso.com.

Answer: ABE


QUESTION 4
Your company has a Microsoft Office 365 subscription and uses Microsoft Lync Online. After a long
network outage, some users reports that they cannot sign in to the Microsoft Lync client and they
receive the following error message:
“Cannot sign in to Lync. You may have entered your sign-in address, user name, or password
incorrectly, or the authentication service may be incompatible with this version of the program. If
your sign-in information is correct and the problem persists, please contact your system
administrator.”
You confirm that other users can sign in successfully. You need to ensure that all of the users can
sign in to Lync Online. Which file should you delete on the users’ client computer?
To answer, select the appropriate file in the answer area.
Hot Area:

Answer:


QUESTION 5
Your company has a Microsoft Office 365 subscription. The company uses Microsoft Lync Online.
You need to ensure that Lync Online users can use dial-in conferencing. The solution must minimize
costs. What should you do?

A. Deploy an Edge Server and add a hosting provider to the server.
B. Deploy an Edge Server and configure the A/V Edge service on the server.
C. Deploy an A/V Conferencing pool.
D. Set up an account with a third-party audio conferencing provider.

Answer: D

03.28
14

70-414 Implementing an Advanced Server Infrastructure

by admin ·

QUESTION 1
In order to adhere to the visualization requirements, what user role should you sign to the ABC1
group when you implement the delegation of the virtual environment?

A. You should consider utilizing the Activity Implementers user role profile for the ABC1 group.
B. You should consider utilizing the Problem Analyst and Self-Service User role profiles for the
ABC1 group.
C. You should consider utilizing the Administrators User Role Profile.
D. You should consider utilizing the Incident Resolvers and Administrators user role profiles for the
ABC1 group.

Answer: C

Explanation:
User role profiles – http://technet.microsoft.com/en-us/library/ff461011.aspx


QUESTION 2
In order to adhere to the visualization requirements, which of the following should be utilized when
you implement the virtual machine template which will be utilized by the Web server which hosts
the ABC Engineers applications?

A. You should consider utilizing a .bin file with the accompanying .cue file.
B. You should consider utilizing virtual hard disk (VHD) files.
C. You should consider utilizing a virtual machines and Windows PowerShell scripts.
D. You should consider utilizing .iso images and virtual machines.

Answer: B

Explanation:


QUESTION 3
In order to adhere to the visualization requirements, which optional Microsoft System Center 2012
features should you add when you implement Microsoft System Center 2012 Virtual Machine
Manager (VMM) to the network infrastructure?

A. You should consider adding the Microsoft System Center Orchestrator.
B. You should consider adding the Microsoft System Center App Controller.
C. You should consider adding the Microsoft System Center Data Protection Manager.
D. You should consider adding the Microsoft System Center Operations Manager.

Answer: D

Explanation: System center products – http://www.windowsitpro.com/article/systemcenter/
system-center-2012-suite-141827


QUESTION 4
In order to adhere to the visualization requirements, how would you update the virtualization
hosts?

A. You should consider using WSUS and System Center Updates Publisher 2011.
B. You should consider using Microsoft System Center Operations Manager.
C. You should consider using Cluster-Aware Updating.
D. You should consider using Cluster-Aware Updating and Microsoft System Center App
Controller.

Answer: C

Explanation: System center products – http://www.windowsitpro.com/article/systemcenter/
system-center-2012-suite-141827


QUESTION 5
In order to adhere to the visualization requirements and in order to allow the ABC2 group to
perform their functions, what should you consider creating?

A. You should consider creating sites and organizational units (OU).
B. You should consider creating collections and host groups.
C. You should consider creating organizational units and host groups.
D. You should consider creating a host group.

Answer: D

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCSE 2003 Certification, Microsoft 70-414 Training at certkingdom.com