Archive for November, 2011

Microsoft Surface 2 Goes on Pre-Order

Microsoft Surface, the uber-cool, yet incredibly bulky technology that supports touch and device interaction was trimmed down earlier this year at CES 2011 to become the super svelte Microsoft Surface 2.0. Now its Samsung incarnation, the SUR40 is ready for pre-order in 23 countries (including the U.S.) and could arrive in stores, hospitals, restaurants and more by early 2012.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com

An innovative and exciting device when it first arrived on the scene in 2007, Microsoft Surface is a touch-screen on steroids. In its first incarnation, the coffee-table-sized Microsoft Surface used a combination of cameras, computers and touch sensitivity to allow multiple people to interact with on-screen activities. In a demonstration I saw in 2008, Microsoft representatives placed a smartphone on the screen, which Microsoft Surface then recognized, displayed information about the device and let me set about choosing different model options. Other demonstrations included a customer and sales rep working together on Microsoft Surface to design a custom skateboard.

Samsung’s version, officially called “Samsung SUR 40 for Microsoft Surface” drops the cameras and puts all the Microsoft Surface technology inside one large — still coffee table surface sized — 40-inch LCD touch screen. The secret sauce is the “PixelSense Technology” that lets the LCD panel “see” without using a camera. Earlier this year, Microsoft explained that this means “Every pixel is acting as a camera, so the surface of the PC can actually see.” Among the things it can see is up to 50-points of simultaneous interaction. In other words, Microsoft Surface 2.0 could support a bar game with up to five — all-fingers-on — participants. Samsung SUR 40 for Microsoft Surface is, essentially, a powerful computer with table legs. Underneath the Gorilla Glass screen is an AMD Athlon™ II X2 Dual-Core Processor 2.9GHz paired with a powerful graphics processor.

Though recognized as one of Microsoft’s sexiest innovations, Microsoft Surface has never been headed for the home. Instead, it has ended up in hospitals, manufacturing, retail and casinos. Part of it could be the price, which is estimated at between $10,00 and $15,000 per unit. Update: Microsoft reps confirmed with Mashable that the price in the U.S is $8,900. Outside the U.S. “pricing will vary based on country-specific duties, taxes and fees.”

For those anxious to build custom apps for the the Samsung SUR 40, there is, naturally, a developers’ kit available for download at the Surface Developers Center. Check out our gallery from Microsoft Surface 2.0′s CES 2011 introduction and then, in the comments below, lets imagine all the cool ways we can use this innovative technology.

Free Avaya 6401-1 Exam Q & A / Study Guide

Cisco CCNA Training, Cisco CCNA Certification

Best Avaya Certification Training and Avaya Exams Training  and more Avaya exams log in to Certkingdom.com


 

 

 

QUESTION 1
You want to install ContactStore on a PC separate from the VoiceMail Pro PC . Which three steps
would you need to complete for ContactStore to function separately? (Choose three.)

A. Verify that the Voice Recording Library on the VoiceMail Pro server is shared on the customer’s network.
B. Verify that the ContactStore service has read and write permissions to the Voice Recording Library Share.
C. Verify that the ContactStore registry settings have been updated to see the Voice Recording Library share.
D. Verify that the VoiceMail Pro registry settings have been updated to point to the Voice Recording Library share.
E. Verify that the ContactStore licenses have been loaded onto the PC running the ContactStore application.

Answer: A,B,E

Reference: http://www.carrollcommunications.com/contact_store.html


QUESTION 2
A remote user wants to gain access to the network when using the RAS server.
Under which two conditions would you create an IP route? (Choose two.)

A. when the remote user’s dial-up connection method contains a DHCP address that is on a different subnet
B. when the user is on the same subnet as the IP Office
C. when the remote user’s dial-up connection method contains a static IP address that is on a different subnet
D. when the IP Office’s DHCP mode is set to Server or Dial In and the PC connection method is set to obtain an IP Address Automatically

Answer: A,C

Explanation:


QUESTION 3
A user (ext. 199) reports that their IMS client displays an error message when attempting to ring a
phone. What are three reasons that would prevent the IMS program from calling the phone?
(Choose three.)

A. The user profile in Manager has “199″ entered as the user name.
B. The phone is set for “Do Not Disturb”.
C. The user’s “Multi Line Option” is set to “Answer Pre-select”.
D. The user mailbox is set to “Blank” under Outlook Tools/Integrated Messaging.
E. The user’s profile has “System Phone” is set to “On”.

Answer: A,B,D

Explanation:


QUESTION 4
Click the Exhibit button.

A customer has two sites, each with an IP Office linked via a private digital line (E1/T1). The head
office is connected to the public network through a digital exchange line. The remote site gains
access to the public network via the head office.
How should Clock Quality be set in the IP Office on the lines marked X and Y in the exhibit?

A. X – Network — Y – Fallback
B. X ?Fallback — Y – Fallback
C. X ?Network — Y – Unsuitable
D. X ?Fallback — Y – Unsuitable

Answer: A
Reference: http://support.avaya.com/elmodocs2/ip_office/R3.1/maintenance.pdf(page 20)


QUESTION 5
Which two are used to turn on Small Community Networking within the main IP Office 500?
(Choose two.)

A. RAS
B. FastStart
C. Voice Networking
D. Professional License Enabled

Answer: C,D

Explanation:


QUESTION 6
How much space does a recording in VoiceMail Pro use on a hard drive?

A. 1MB per minute
B. 500KB per minute
C. 2MB per minute
D. 1.5MB per minute

Answer: A

Explanation:


QUESTION 7
Which two e-mail protocols are used by VoiceMail Pro to perform voicemail to e-mail? (Choose two.)

A. POP 3
B. SMTP
C. MAPI
D. IMAP

Answer: B,C

Explanation:


QUESTION 8
A customer is receiving calls to a hunt group and the callers are reporting that they are being
forced to wait much longer than VoiceMail Pro reported to them during the queued message. What
is a possible cause for this?

A. The hunt group has a priority set to 1.
B. The hunt group has a priority set to 3.
C. There are two routes going to the hunt group. Each has different priorities set.
D. Users in the hunt group have inconsistent priority settings. The users with a priority set to 3 are always busy.

Answer: C

Explanation:


QUESTION 9
What information do you need from a customer to be able to reproduce a call park problem?
(Choose three.)

A. accurate description of the problem
B. a System Monitor trace of the problem
C. a Network Assessment
D. the system configuration
E. information on the phones and lines being used

Answer: A,D,E

Explanation:


QUESTION 10
When using Small Community Networking which two features require the Small Community
Advanced License to function? (Choose two.)

A. Hot Desking
B. Hot Desking across the SCN
C. playing queued announcements
D. Break Out dialing

Answer: B,D

Explanation:

 

Cisco CCNA Training, Cisco CCNA Certification

Best Avaya Certification Training and Avaya Exams Training  and more Avaya exams log in to Certkingdom.com

RIM moves to higher mobile ground with BlackBerry Mobile Fusion: Is it too late?

The new plan for RIM revolves around focusing on what it does best for mobile device management software—asset management, configuration, security policies, group administration and centralized management.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

 

Research in Motion on Tuesday outlined plans to launch BlackBerry Mobile Fusion, enterprise software designed to manage a bevy of mobile devices including the iPhone and Android smartphones.

With RIM’s smartphone share taking its knocks, the company can’t afford to rely on selling a complete mobile stack—BlackBerry device, BlackBerry Enterprise Server and RIM management software—-any more. BlackBerry Mobile Fusion will be available in March 2012.

The new plan for RIM revolves around focusing on what it does best for mobile device management software—asset management, configuration, security policies, group administration and centralized management. The challenge for RIM here is obvious: There are multiple mobile device management software providers and the BlackBerry Enterprise Server doesn’t have the lock-in it once did.

RIM appears to be trying to thread the needle between the bring your own device movement and selling its BlackBerry stack of mobile hardware and software.

How will this turn out? Here are three scenarios:

Best case: RIM’s focus on security and enterprise management puts it at the top of the mobile stack. RIM brings its security and enterprise management knowhow to a bevy of devices. RIM’s enterprise foothold gives it a leg up.

Middle-of-the-road case: RIM’s BlackBerry Mobile Fusion effort is a bit late, but manages to keep the company relevant even as it fades on smartphones. Companies loyal to the BlackBerry Enterprise Server naturally gravitate to Mobile Fusion. Other CIOs, however, look to other mobile device management suites offered by Sybase, Good and a bevy of other players that include Microsoft and Google.

Worst case: BlackBerry Mobile Fusion is viewed as a Hail Mary pass that comes too late. Technology executives begin to wonder why they need RIM as a mobile device management middleman when employees aren’t bringing BlackBerry devices to work.

It’s unclear how this BlackBerry Mobile Fusion effort will pan out. All of the cases outlined above are likely to have an equal probability of actually happening.

RIM’s move does remind me of a Clayton Christensen talk about innovation. Christensen, a Harvard professor, outlines innovation conundrums through the years. The common theme in multiple examples is how companies cede the lower ground in a market to move upstream to higher margin products. If you follow profit margin religion, you’re likely to outsource and give up on tough markets. The higher ground always looks better. The issue is that companies eventually run out of headroom and nothing is left. See Smart Planet: Clay Christensen: 5 observations on innovation

It’s a bit of a stretch to argue that RIM is ceding the device market in a bid to move up the mobile stack, but the writing—beginning with Mobile Fusion—may be on the wall.

Google’s new ad space: Chrome

Google just found another digital billboard for online ads: its Chrome Web browser.

I just started noticing the ads on one of my computers yesterday, and I’m not the only one to see them. Right now, the ads tout Google’s Chrome OS-powered Chromebooks, which not coincidentally happen to be on sale for the holidays.

The ads don’t interrupt ordinary Web browsing by pushing aside Web page content and don’t compete with regular Web page ads. Rather, they appear in a yellow-tinted box at the top of the new-tab page in Chrome.

That page is typically a mere way station for users on their way to other destinations, but it’s getting more important as a hub for Chrome Web Store apps and as the home screen for Chrome OS.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

The ad reminded me most of the occasional promotions Google puts on its otherwise spartan Google.com home. They’re not obnoxious flashing distractions, but they stand out against amid the uncluttered field.

You can’t blame Google for wanting to take advantage of a chance to make money. But as the Spiderman saying goes, with great power comes great responsibility.

When Google launched Chrome in September 2008, it made it clear that the browser was a secondary mechanism for making money. The company wanted people to see Web pages faster and to enable programmers to build more advanced Web applications–like Google Docs, for example.
Google Chrome logo

And as we’ve seen since then, Google likes using Chrome as a vehicle to bring new Web-app features to market–a new experimental interface to let Chrome extensions use a speech-to-text conversion, for example–and to encourage would-be Google standards such as SPDY networking, WebM video, and WebP images.

I’m going to go out on a limb here and predict that Chrome’s new-tab page ads will likely remain like Google’s home-page ads. They’re chiefly used to promote Google services, and occasionally to offer important information such as links to natural-disaster response pages. But Google doesn’t sell the ad space the way Yahoo does with its main page.

There’s nothing stopping Google from plastering its entire browser with ads. But the moment it did so, it would start annoying users who already have plenty of other strong choices in the browser market right now. And in the long run, I believe Google will make a lot more money using browsers to advance Web services and to drive people to Google search ads than it will selling banners in its browser.

How to bulletproof your website

‘Tis the season to begin ramping up online shopping activity, and for retailers that means doing all they can to ensure their websites are up, highly available and able to handle peak capacity. Looming in many IT managers’ minds is the cautionary tale of Target, whose website crashed twice this fall after it was inundated by an unprecedented number of online shoppers when the retailer began selling clothing and accessories from high-end Italian fashion company Missoni.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

“We are working around the clock to ensure that our site is operating efficiently and delivering an exceptional guest experience that’s reflective of Target’s brand,” said a Target spokesperson in an email, but declined to give specifics on the measures the company has taken.

One company’s hardship is often another company’s gain, and those that face well-publicized failures tend to become de facto role models, retail industry watchers say. Take what happened to Best Buy in 2005: Its website experienced what some have called a catastrophic holiday failure and customers were unable to make online purchases. That same year, competitor Circuit City saw a huge spike in traffic, says Dave Karow, senior product manager of Web performance and testing at Keynote, a firm that monitors and tests mobile and Internet performance.

“There’s nothing like falling flat on your face to give you the conviction to do right thing going forward. That was an extremely effective wakeup call for Best Buy,” he says, adding that the retailer now conducts several load tests throughout the year.

Web retailers should be shooting for 99.5% availability, otherwise “they’re not cutting it,” Karow maintains. “Ninety-nine percent is not acceptable because if you achieve that, you’re still one percent unavailable.” That has a significant impact since it means more than one percent of potential transactions didn’t occur — and likely won’t going forward, he says.

This holiday season, more than ever, Web retailers need to be prepared for the onslaught, since a growing number of consumers will be using mobile devices to shop. A report recently released by mobile ad network InMobi claims an estimated 60 million mobile users are planning to use their devices to shop during the Black Friday/Cyber Monday holiday weekend, with over 21 million intending to make purchases from those devices.
Prepare, test and review

Online shoe retailer Zappos conducts load testing early in the fall to ensure its site stays up and highly available during the holiday season, says Kris Ongbongan, senior manager, technical operations and systems engineering. Every year they follow the same procedure, he says: estimate load.

“We have our finance and planning departments give us sales predictions and we take a multiple of that to see what traffic we can absorb and test to that,” typically beginning in September, Ongbongan says. That gives them enough time to make changes and add any necessary infrastructure.
Website uptime

Retailers should go through their transaction volume testing and validation in the September/October timeframe and then code lock their systems until about January 15th, suggests Michael Ebert, a partner in IT Advisory Services at KPMG. During that period, “retailers typically freeze their systems … and don’t do updates unless absolutely necessary to avoid performance issues,” he says.

Another practice the very large Internet retailers tend to employ is having distributed networks in order to route traffic to make sure transactions are balanced around the U.S., Ebert says. That way, if one site gets too busy the customer will automatically be routed to another. “So make sure you have multiple points of your Internet presence around the U.S.” A data center “may be slow to respond, but at least I’m up and running,” he adds. “There’s always a percentage of business you never regain if someone leaves the site.”

Another metric that retailers need to be concerned with is latency, or the response time for how long it takes a page to load and for the payment transaction to be completed. “I expect we’ll see some latency concerns” or other problems during the check-out step during this holiday season, predicts Greg Girard, program director, IDC Retail Insights. That’s because there are throughput bottleneck issues at the gateway to the credit card processing network, he says.

“The micro-economic problem is that it costs money to maintain capacity that you utilize only at the peak time, which is only very infrequently during the year. It’s an economical tradeoff you have to make.”
Over-provisioning via cloud

For a lot of smaller online retailers, it’s hard to justify the return on investment for increasing the capacity they need to handle 12 hours of peak usage on one day of the year, says Girard. “That’s where cloud comes into play, and we’re seeing some retailers adopt cloud strategies. That’s really going to progress going forward.” Retailers will be able to get additional peak capacity at an incremental cost by moving to the cloud, he says.

Zappos’ Ongbongan says they handle all network functions internally and do not use cloud providers. “We have instrumentation around every transaction point on the website, from search pages to product detail pages to checkout,” he says, “so we can look at each individually to see if there’s any slowness or problems in any of those areas.”

But no matter how prepared you are, problems can still occur, especially when you outsource to third-party vendors. “Nothing is fully bulletproof, so really what [online retailers] need to try and achieve is fault tolerance,” says Mike Gualtieri, a principal at Forrester Research. He recalls a retailer he worked with that uses an external credit card service that went down one year on Cyber Monday, so the company’s orders couldn’t be processed.

“Their e-commerce system is in-house, so they had planned for volumes — searching and shopping the site — but they have a service level agreement with a credit card service processing service that said, ‘We can handle that volume.’ So they did all the right things for their own systems and planned for the [increased] volume on Cyber Monday, but were held hostage by this particular provider,” Gualtieri says.

He says he recommended that the retailer re-architect its site so if the payment processor were to go down again the company could still collect the order and payment information and process payments at a later time. That’s particularly useful for small retailers, he says, who may not be able to invest in technologies like an online shopping cart and have to rely on third parties for the functionality.

Regardless of their size, Gualtieri says, retailers need to examine every component of their systems and assign a confidence level between one and five. “Every online retailer should look at their entire ecommerce architecture and all the components they use: shopping cart, products search, account registration–whatever they have–and rate their confidence level.

“Don’t assume that everything will go right,” Gualtieri says. “Assign a confidence level and don’t fret too much, but have a mitigation strategy and backup plan.”
Optimize for traffic

Among the lessons Karmaloop learned during the 2010 holiday season were that its content delivery network configuration was not optimized for the traffic it was going to experience on Cyber Monday, says Joseph Finsterwald, CTO at the online retailer of alternative street fashion for men and women. “We worked with our CDN vendor Akamai to come up with a configuration that was a better fit for us,” he says. The firm also discovered problems with parallel processes on the network and synchronization issues when servicing up Web pages, which was corrected by rewriting code.

Revenues are growing 50% to 70% year over year, Finsterwald says, so Karmaloop is using Keynote’s LoadPro Web load-testing services to ensure its site is not strained. Because its CDN network was not optimized to handle this level of traffic in past years, the site experienced “frequent” network outrages, he said, although he declined to provide specifics.

“It gives you peace of mind that we can come up with a reasonable facsimile under peak load,” Finsterwald says. “Load testing is an inelegant science; you’re trying to simulate user traffic, but you’re integrating a lot of third-party components.” If a test is done on a quiet day, a third party may be able to scale to handle that, but all bets might be off when they’re handling multiple clients.

This year, when conducting load testing, Karmaloop scaled its systems to a high enough load to trigger a problem for the vendors to address proactively. “We saw performance degradation with some of our vendors,” says Finsterwald, “so we’re following up with them to make sure they’re doing what they need to do.”

Keynote’s Karow concurs. “Load testing done right has to be a very close representation of what real users are going to do, so it takes real thinking about what people do and the various systems involved and are you stressing those systems?”
Talk to your stakeholders

Also critical to the success of keeping systems up and highly available is making sure everyone is on the same page. “Everybody needs to be involved in the planning and predictive process,” says Zappos’ Ongbongan. At Zappos, that means everyone from brand marketing to financial planning to warehouse staff is involved in planning for peaks in site traffic.

One thing his group learned from talking with other departments was that their peak traffic typically occurs in mid-December, as opposed to right after Thanksgiving or right before Christmas.

Forrester’s Gualtieri says it’s a definitely a problem when a marketing group doesn’t let IT know what it’s doing that might cause site traffic to spike. He says he worked with a large Midwestern insurance company that spent a couple of million dollars on its first TV ad during a football game. When the ad aired, the company’s site went down “almost instantly,” because the company’s marketing department didn’t tell IT it was running the ad. “So IT had no idea they were going to expect 500 times the normal amount of traffic,” he says, and they ended up wasting their money on the ad.

Despite all the proactive measures retailers may be taking, Gaultieri predicts there will still be “some high-profile outages” this holiday season. “One, two or several will happen. I also think a lot will happen that you’ll never hear about … I don’t think this problem is going to go away.”

Although companies are becoming savvier about bulletproofing their sites, crashes will inevitably occur due to continuous changes made to enhance the online shopping experience, he says. “You can’t just put a site up and have it be static; there are lots of moving parts and it creates complexity, and there’s fallout.”

Free Microsoft 70-291 Q & A / Study Guide Part II

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


 

 

 

QUESTION 1:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
print server named Certkingdom -PR01 that has a built-in network interface.
A Certkingdom.com user named Andy Reid is a member of the Research and
Development department. Andy Reid complains that he cannot print to a print
device attached to Certkingdom -PR01.
You have received instruction to ensure that Andy Reid can print to the print
device. First you verify that the IP address for Certkingdom -PR01 is correct and that
the latest drivers for the print device are installed. You now want to verify that the
print jobs are being sent to the correct MAC address for Certkingdom -PR01.
What should do?

A. On Certkingdom -PR01, run the net session command.
B. On Certkingdom -PR01, run the netstat command.
C. On Certkingdom -PR01, run the netsh command.
D. On Certkingdom -PR01, run the netcap command.

Answer: D

Explaination: Netstcap.exe is a command line tool that could be used to capture the
network traffic. A filter can be created to be used during the capture to determine the
MAC address the print jobs are being sent to. The Network Monitor Capture Utility (
Netcap.exe) can be used to capture network traffic in Network Monitor. Netcap provides
capture abilities only from a command prompt; to open the resulting capture (.cap) files,
you must use the full Network Monitor interface. Netcap is installed when you install the
Support tools that are on the Windows XP CD-ROM. Netcap provides capture abilities
that are similar to the version of Network Monitor that is included with the Windows
Server products; however, you must use Netcap at a command prompt. Netcap installs
the Network Monitor driver and binds it to all adapters when you first run the Netcap command.
Incorrect Options:
A: The net session command can be used to view the computer names and user names of
users on a server, to see if users have files open, and to see how long each user’s session
has been idle. Net session manages server computer connections – used without
parameters, net session displays information about all sessions with the local computer.
B: The netstat command is not a utility to use when troubleshooting NetBIOS names, but
is used to display TCP/IP and port information.
C: The Network Shell utility (Netsh.exe) can perform a wide range of system
configuration tasks. You can use commands in the Netsh Interface IP context to
configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and
WINS servers) and to display configuration and statistical information.
Reference:
Microsoft Knowledge Base: 306794: How to Install the Support Tools from the Windows
XP CD-ROM Network Monitor is provided with Windows Server products and
Microsoft Systems Management Server (SMS). Microsoft Corporation, 2004
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd & Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, pp. 686, 854-856,
926


QUESTION 2:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of two subnets. All servers on the Certkingdom.com network run
Windows Server 2003 and all client computers run Windows XP Professional. All
servers are located in a central data center that uses a single IP subnet and all client
computers are located in one subnet.
The data center contains two routers named Certkingdom -SR01 and
Certkingdom -SR02, two domain controllers named Certkingdom -DC01 and
Certkingdom -DC02, and two file servers named Certkingdom -SR03 and
Certkingdom -SR04. The IP addresses of these servers are indicated in the table
below.

Host name IP address
Certkingdom-DC01 10.10.10.1
Certkingdom -DC02 10.10.10.2
Certkingdom -SR01 10.10.1.1
Certkingdom -SR02 10.10.1.2
Certkingdom -SR03 10.10.11.1
Certkingdom -SR04 10.10.11.2

You have received instruction from the CIO to install a new database server in the
data center. You install Windows Server 2003 on a new server computer named
Certkingdom -DB01 and hand it over to a database administrator named Dean
Austin. Dean Austin installs Microsoft SQL Server 2005 and makes some changes to
the TCP/IP settings on Certkingdom -DB01 as shown in the following table.

Parameter Value
IP address 10.10.1.3
Subnet mask 255.255.255.0
Default gateway 10.10.1.2

Later, Dean Austin complains that Certkingdom -DB01 cannot communicate with the
other servers in the data center. All other servers in the data center can
communicate with the other servers as well as the client computers. You log on to
Certkingdom -DB01 and attempt to ping Certkingdom -DC01 but you receive the
following error message: “Destination host unreachable”.
What should you do to ensure that Certkingdom -DB01 can communicate with the
other computers in the Certkingdom.com network?

A. Configure Certkingdom -DB01 with a default gateway of 10.10.1.1.
B. Configure Certkingdom -DB01 with a subnet mask of 255.255.0.0.
C. Configure Certkingdom -DB01 with an IP address of 10.10.10.3.
D. Configure Certkingdom -DB01 with an IP address of 10.10.11.3.

Answer: B

Explaination: Large networks are subdivided to create smaller subnetworks to reduce
overall network traffic by keeping local traffic on the local subnet and sending all
nonlocal traffic to the router. In order to create a subnetwork, we need to have a system
for addressing that allows us to use the network ID and host ID within the class-based
system. This is accomplished through the use of a subnet mask. To determine the
appropriate custom subnet mask (typically referred to simply as subnet mask) for a
network, you must first:
1. Determine the number of host bits to be used for subnetting.
2. Determine the new subnetted network IDs.
3. Determine the IP addresses for each new subnet.
4. Determine the appropriate subnet mask.
Incorrect Answers:
A: You need to assign the correct subnet mask to ensure connectivity.
C, D: The problem in this scenario is not a faulty IP address. It is the appropriate subnet
mask that has to be determined to enable connectivity.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, p. 57


QUESTION 3:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of two subnets named Subnet A and Subnet B. Subnet A and
Subnet B are connected by a router. All computers on the Certkingdom.com network
are configured with static IP addresses. All network servers run Windows Server
2003 and all client computers run Windows XP Professional.
Certkingdom.com hires a new Sales manager named Amy Wilson. You install a new
client computer named Certkingdom -WS291 for Amy Wilson. You then add
Certkingdom -WS291 to Subnet A. The relevant portion of the network is configured
as shown in the exhibit.

However, Amy Wilson complains that Certkingdom -WS291 cannot communicate
with other hosts on the network.
What should you do to ensure that Certkingdom -WS291 can communicate with all
local and remote computers on the Certkingdom.com network?

A. Configure Certkingdom -WS291 with a default gateway of 192.168.28.84.
B. Configure Certkingdom -WS291 with a default gateway of 192.168.2.1.
C. Configure Certkingdom -WS291 with a subnet mask of 255.255.255.128.
D. Configure Certkingdom -WS291 with a subnet mask of 255.255.255.192.

Answer: C

Explaination: It is evident from the exhibit that the file server and
Certkingdom -WS291 have a different subnet mask. This is the reason why they
cannot communicate with each other. You must therefore change the subnet mask
of Certkingdom -WS291 to 255.255.255.128.
Incorrect Answers:
A, B: The problem is not the gateway IP address that is faulty, but rather the subnet
mask.
D: This option suggests the correct object that has to be changed, but it gives the wrong
subnet mask.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, p. 57


QUESTION 4:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com
Certkingdom.com has its headquarters in Chicago and branch offices in Dallas and
Miami. All servers on the Certkingdom.com network run Windows Server 2003 and all
client computers run Windows XP Professional. You work in the Miami branch
office.
The network at the Miami branch office consists of 25 different subnets, each with a
maximum of six computers. The network administrator at headquarters has
allocated the 192.168.3.0/24 network address to the Miami branch office.
You install a new server named Certkingdom -SR21 in the Miami branch office. You
need to configure the Internet Protocol (TCP/IP) properties for Certkingdom -SR21.
You configure Certkingdom -SR21 with an IP address of 192.168.3.44. What subnet
mask should you use?

A. A subnet mask of 255.255.255.0.
B. A subnet mask of 255.255.255.128.
C. A subnet mask of 255.255.255.192.
D. A subnet mask of 255.255.255.240.
E. A subnet mask of 255.255.255.248.

Answer: E

Explaination: The network address is: 192.168.2.0/24, which means
11111111.11111111.11111111.0 in binary.
Therefore, you can use the last octet to configure the 30 subnets and 6 hosts in each
subnet
You need only six host PCs. When you convert to binary, it is: 00000111. As a result,
you use 3 bits.
This leaves 5 bits for the subnets 11111000 converted to decimal:
128+64+32+16+8=248, therefore the subnet mask will be: 255.255.255.248.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, p.57


QUESTION 5:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com
Certkingdom.com has its headquarters in Chicago and a branch office in Dallas. All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. You work in the Dallas branch office.
The network at the Dallas branch office consists of a single subnet that contains 150
client computers and 12 servers. The network administrator at headquarters has
allocated the 10.10.0.0/16 network address to the Dallas branch office.
You have received instruction from your manager to place all servers at the Dallas
branch office into a separate subnet that uses the 192.168.10 public addressing
scheme. Your manager asks you to make allowance for a maximum of 30 servers in
the new subnet.
Which subnet mask should you use for the new subnet?

A. 255.255.255.224
B. 255.255.255.240
C. 255.255.255.248
D. 255.255.255.252
E. 255.255.255.254

Answer: A

Explaination: A 255.255.255.224 subnet mask gives five host address bits, so the
maximum number of host addresses is 2 ^ 5 – 2 = 30 host addresses. Thus
255.255.255.224 is the only subnet mask that will allow for sufficient IP addresses in
case of further growth, whilst still conserving as many current addresses as possible.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, p. 62


QUESTION 6:

DRAG DROP
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
You have installed a new server named Certkingdom -SR06 on the network. The
relevant portion of the network is shown on the exhibit.

You want to configure Certkingdom -SR06 with a valid static IP configuration.
Certkingdom -SR06 must be able to communicate with all hosts on the network and
on the internet. You also need to configure Certkingdom -SR06 to use the DNS server
on the local subnet for name resolution. In addition, you must configure redundancy
for name resolution.
How should you configure Certkingdom -SR06?
To answer drag the appropriate IP addresses and Subnet masks to the appropriate
places.

Answer:

Explaination:
The Class C address 192.168.0.100 has to be the IP address to enable
Certkingdom -SR06 to communicate with all hosts on the network and on the internet
as 192.168.0.1, 192.168.0.2 and 192.168.0.110 are already in use. 192.168.5.2 and
192.168.5.100 are on the wrong subnet, and besides, 192.168.5.12 is already in use.
The subnet mask for this Class C address is 255.255.255.0. The default gateway
should be 192.168.0.1. To configure redundancy for name resolution, configure the
preferred DNS server/primary address as 192.168.0.2, and the alternate DNS
server/secondary address as 192.168.5.2.
Reference:
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291):
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network
Infrastructure, Part 1, Chapter 2, pp. 80-116


QUESTION 7:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. Certkingdom.com has its headquarters in
Chicago and branch offices in Dallas and Miami. You work in the Miami branch
office.
The Miami branch office has a file server named Certkingdom -SR25 that hosts
critical documents. Certkingdom -SR25 is configured with a DHCP client reservation.
Certkingdom.com users from all three offices download documents from
Certkingdom -SR25.
One day Certkingdom.com users complain that they cannot access the documents on
Certkingdom -SR25. You discover that the DHCP server has failed. The DHCP server
is located at headquarters.
You have received instruction from the CIO to ensure that Certkingdom -SR25 is
available even if it is unable to obtain or renew a lease from the DHCP server.
How could you accomplish this task?

A. On the DHCP server, increase the DHCP lease period.
B. Configure alternate IP settings for Certkingdom -SR25 on the Alternate Configuration
tab of the Internet Protocol (TCP/IP) properties.
C. Configure the DHCP scope in the 169.254.0.1. – 169.254.255.254 range.
D. On the DHCP server, configure the DHCP 001 Resource Location Servers reservation
option for Certkingdom -SR25.

Answer: B

Explaination: Windows Server 2003 includes the Alternate Configuration feature.
The Windows Server 2003 servers can be configured to use an alternate static IP
configuration if a DHCP server is unavailable. When a DHCP client determines that
the DHCP server is unavailable, it will automatically change over and also configure
the TCP/IP stack with the static address information specified on the Alternate
Configuration tab of the Internet Protocol (TCP/IP) properties.
Incorrect Answers:
A: Increasing the lease period would result in DHCP clients requesting leases less
frequently, but won’t guarantee that Certkingdom -SR25 will be available when the DHCP
server is down.
C: Modifying the DHCP scope to the 169.254.0.1. – 169.254.255.254 range will still be
reliant on the DHCP server.
D: Configuring the DHCP 001 Resource Location Servers reservation option for
Certkingdom -SR25 on the DHCP server will not ensure that Certkingdom -SR25 will
receive an IP address or have the IP address renewed.
Reference:
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291):
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network
Infrastructure, Part 1, Chapter 2, pp. 114, 117


QUESTION 8:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
server named Certkingdom -SR34. Certkingdom -SR34 is configured as a DHCP server
and has been authorized in Active Directory. The Telnet service has been installed
and started on Certkingdom -SR34.
One day Certkingdom.com users complain that they cannot access network resources.
Your investigations reveal that the DHCP Server service on Certkingdom -SR34 has
stopped. You install the administrative tools on a client computer named
Certkingdom -WS291 and log on to the computer. When you open the DHCP console
on Certkingdom -WS291 and attempt to connect to Certkingdom -SR34, you receive an
error message that states: “Cannot find the DHCP Server.” You then attempt to
ping Certkingdom -SR34 but fail.
How can you connect to the DHCP Server service on Certkingdom -SR34 by using the
DHCP console on Certkingdom -WS291?

A. Establish a Telnet session to Certkingdom -SR34 and then run the net start dhcp
command.
B. Establish a Telnet session to Certkingdom -SR34 and then run the net start dhcpserver
command.
C. Establish a Telnet session to Certkingdom -SR34 and then run the ipconfig /renew
command.
D. On Certkingdom -WS291, run the netsh dhcp server\\ Certkingdom -SR34 show server
command.

Answer: B

Explaination: You can start the DHCP Server service by executing the Net Start
Dhcpserver command at the command prompt.
Telnet is a protocol that enables an Internet user to log on to and enter commands on a
remote computer linked to the Internet, as if the user were using a text-based terminal
directly attached to that computer. Telnet is part of the TCP/IP suite of protocols. The
term telnet also refers to the software (client or server component) that implements this
protocol.
Given the fact that you can ping Certkingdom -SR34 you should then establish a Telnet
session to Certkingdom -SR34 and then run the appropriate command.
Reference:
J. C. Mackin & Ian McLean, MCSA/MCSE self-paced training kit (exam 70-291):
implementing, managing, and maintaining a Microsoft Windows Server 2003 network
infrastructure, Microsoft Press, Redmond, 2004, p. 7-23


QUESTION 9:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
server named Certkingdom -SR51 that is configured as a print server for a print
device that has a built-in network interface. The print device is used by the Sales
department to print Sales reports.
A Certkingdom.com user named Clive Allen is a member of the Sales department. Clive
Allen complains that he cannot print to the print device attached to
Certkingdom -SR51.
You verify that the IP address for Certkingdom -SR51 is correct and that the correct
drivers for the print device are installed. You now want to verify that the print jobs
are being sent to the correct MAC address for Certkingdom -SR51.
You log on to Certkingdom -SR51. What should you do next?

A. Run the net session command.
B. Run the netstat command.
C. Run the netsh command.
D. Run the netcap command.

Answer: D

Explaination: Netstcap.exe is a command line tool that could be used to capture the
network traffic. A filter can be created to be used during the capture to determine the
MAC address the print jobs are being sent to. The Network Monitor Capture Utility (
Netcap.exe) can be used to capture network traffic in Network Monitor. Netcap provides
capture abilities only from a command prompt; to open the resulting capture (.cap) files,
you must use the full Network Monitor interface. Netcap is installed when you install the
Support tools that are on the Windows XP CD-ROM. Netcap provides capture abilities
that are similar to the version of Network Monitor that is included with the Windows
Server products; however, you must use Netcap at a command prompt. Netcap installs
the Network Monitor driver and binds it to all adapters when you first run the Netcap
command.
Incorrect Options:
A: The net session command can be used to view the computer names and user names of users
on a server, to see if users have files open, and to see how long each user’s session has
been idle. Net session manages server computer connections – used without parameters,
net session displays information about all sessions with the local computer.
B: The netstat command is not a utility to use when troubleshooting NetBIOS names, but
is used to show what ports your computer is listening on.: -R is used to reload your
LMHOSTS file located in %systemroot%\system32\drivers\etc., -r will show you which
name resolutions have been answered via broadcasts, and which have been answered via
a NetBIOS name server, -RR switch of the command utility refreshes your NetBIOS
name with a configured WINS server.
C: The Network Shell utility (Netsh.exe) can perform a wide range of system
configuration tasks. You can use commands in the Netsh Interface IP context to
configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and
WINS servers) and to display configuration and statistical information.
Reference:
Microsoft Knowledge Base: 306794: How to Install the Support Tools from the Windows
XP CD-ROM Network Monitor is provided with Windows Server products and
Microsoft Systems Management Server (SMS). Microsoft Corporation, 2004
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd & Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, pp. 686, 854-856,
926


QUESTION 10:

Network Topology Exhibit:

LAN Settings Exhibit:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
Microsoft Internet Security and Acceleration (ISA) Server computer named
Certkingdom -SR01, a DNS server named Certkingdom -SR02, a DHCP server named
Certkingdom -SR03, a file server named Certkingdom -SR21, and a Web server named
Certkingdom-SR25. Certkingdom -SR25 also serves as a central antivirus server.
Certkingdom -SR21 is located on the 10.10.11.0 subnet and Certkingdom -SR25 is
located in the perimeter network. Certkingdom -SR21 contains antivirus software
that checks for new virus definitions on Certkingdom -SR25 every hour. You can also
access Certkingdom -SR25 through a virus update Web page to perform manual
virus definition updates.
Certkingdom -SR03 suffers a catastrophic failure and is removed from the network.
Due to budgetary constraints, a replacement for Certkingdom -SR03 will only be
acquired in the next financial year. You need to redesign network addressing
scheme, and change the IP addresses for Certkingdom -SR01 to the addresses shown
in the Network Topology exhibit.
Certkingdom -SR02 contains the new host (A) resource records for
Certkingdom -SR01.
You receive reports about a new virus threat and want to protect the network
immediately by manually downloading the new virus definitions to
Certkingdom -SR21. you log on to Certkingdom -SR21 but discover that you cannot
access the virus update Web page on Certkingdom -SR25. The static TCP/IP
configuration on Certkingdom -SR21 uses Certkingdom -SR02 as the preferred DNS
server.
You confirm that Certkingdom -SR01 is configured properly. On Certkingdom -SR21,
you view the Internet Explorer LAN settings that are shown in the LAN Settings
exhibit.
What should you do to allow Certkingdom -SR21 to connect to Certkingdom -SR25?

A. At a command prompt on Certkingdom -SR21, run the ipconfig /flushdns command.
B. In the LAN settings of Internet Explorer on Certkingdom -SR21, select the
Automatically detect settings check box.
C. At a command prompt on Certkingdom -SR01, run the ipconfig / flushdns command.
D. At a command prompt on Certkingdom -SR01, run the ipconfig /registerdns command.

Answer: A

Explaination: Running the ipconfig /flushdns command will flush and reset the DNS
resolver cache which is necessary to allow connection. Run this command on
Certkingdom -SR21 to connect to Certkingdom -SR25.
Incorrect Answers:
B: Selecting the “Automatically detect settings” checkbox is not going to allow
Certkingdom -SR21 to connect to WWW.
C: The ipconfig /flushdns command flushes and resets the DNS resolver cache. This is
not what is necessary.
D: The ipconfig /registerdns command refreshes all DHCP leases and registers any related
DNS names. This option is available only on Windows 2000 and newer computers that
run the DHCP Client service. This is not going to allow Certkingdom -SR21 to connect to
WWW when it is run on Certkingdom -SR01.
Reference:
James Chellis, Paul Robichaux and Matthew Sheltz, MCSA/MCSE: Windows Server
2003 Network Infrastructure Implementation, Management, and Maintenance Study
Guide, p. 311


QUESTION 11:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
DHCP server named Certkingdom -SR15 that is configured with a single scope.
Certkingdom.com hires a new Sales manager named Andy Reid. You install a new client
computer named Certkingdom -WS291 for Andy Reid. You connect
Certkingdom -WS291 to the network by plugging the network cable into the network
adapter on Certkingdom -WS291 and attempt to connect to Certkingdom -SR25.
However, you cannot access any of the servers on the network. When you open a
command prompt on Certkingdom -WS291 and run the ipconfig /renew command,
you receive the following response.

You log on to a client computer named Certkingdom -WS292 and run the ipconfig
/renew command successfully.
What should you do to ensure that Certkingdom -WS291 can receive its IP address
configuration from the Certkingdom -SR25?

A. Restart the DHCP service on Certkingdom -SR25.
B. Restart Certkingdom -WS291.
C. Restart Certkingdom -SR25.
D. Add additional IP addresses to the scope on Certkingdom -SR25.

Answer: B

Explaination: It is probable that the TCP/IP stack has a problem because the
computer is unable to send a DHCP discover broadcast packet. This can happen
when you insert a network cable after the PC has been started. You should restart
the client PC to successfully obtain a new IP address.
Incorrect Answers:
A, C, D: This is unnecessary because Certkingdom -WS292 did obtain an IP address from
the DHCP server, thus indicating that the DHCP server configuration is not the issue.
Reference:
Deborah Littlejohn Shinder and Dr. Thomas W. Shinder, MCSA/MCSE Exam 70-290:
Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD
Training System, p. 629


QUESTION 12:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. Certkingdom.com has its headquarters in
Chicago and branch offices in Dallas and Miami. The Certkingdom.com network
contains a DHCP server named Certkingdom -SR01. The relevant portion of the
network is shown in the following network diagram.

You work at headquarters. A Certkingdom.com employee named Andy Booth is one of
three employees that are relocated to headquarters from the Dallas office. Andy
Booth uses a portable client computer named Certkingdom -WS291. Andy Booth
complains that when he plugs Certkingdom -WS291 into the LAN connection in his
new cubicle, he cannot connect to network resources on the LAN or the Internet.
None of the other employees are experiencing the same problem.
When you run the ipconfig command from a command prompt on
Certkingdom -WS291, you see the output as shown in the exhibit.

What should you do to allow Certkingdom -WS291 to connect to network resources
on the LAN or the Internet?

A. Configure Certkingdom -WS291 with a subnet mask of 255.255.240.0.
B. Configure Certkingdom -WS291 with a default gateway of 192.168.3.12.
C. Configure Certkingdom -WS291 with a primary DNS suffix of Certkingdom.com
D. Configure Certkingdom -WS291 to automatically lease an IP address from
Certkingdom -SR01.

Answer: D

Explaination: The client computers on the subnet use DHCP to obtain their IP
configurations. Certkingdom -WS291 has a static IP address, and therefore cannot
obtain a valid IP configuration from the DHCP server.
Incorrect Answers:
A: By changing the subnet mask you will not ensure that Certkingdom -WS291 will
connect to other computers and the Internet.
B: Changing the default gateway will not enable Certkingdom -WS291 LAN connection.
Besides, 192.168.3.12 is the IP address of the DHCP server.
C: Adding a primary DNS suffix means that only domain names listed in that window
will be tried for resolution purposes. Both the connection-specific and primary DNS
suffix are ignored.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
Implementing, Managing, and Maintaining a Windows Server 2003 Network
Infrastructure Guide & DVD Training System, p. 515


QUESTION 13:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows 2000 Professional. Certkingdom.com has headquarters in
London and branch offices in Paris, Berlin, Milan, Madrid, Stockholm, Warsaw,
Minsk, and Athens. Each branch office has a server that provides DHCP Server
services and between two to twenty client computers. A client computer in each
branch office is configured with a shared dial-up connection. You work at
headquarters.
The Berlin branch office has only two client computers named Certkingdom -WS291
and Certkingdom -WS292. A Certkingdom.com user named Kara Lang works in the
Berlin office. One morning Kara Lang complains that the shared dial-up connection
on Certkingdom -WS291 is no longer working.
Your investigation reveals that Certkingdom -WS292 can connect to shared folders
on Certkingdom -WS291 and that Certkingdom -WS291 can connect to the network at
headquarters. However, Certkingdom -WS292 cannot connect to resources on the
network at headquarters.
What should you do to ensure that both Certkingdom -WS291 and
Certkingdom -WS292 can connect to resources on the network at headquarters?

A. Reconfigure Internet Connection Sharing on Certkingdom -WS291.
B. Configure the shared dial-up connection on Certkingdom -WS291 so that automatic
dialog is enabled.
C. Configure Certkingdom -WS292 to receive an IP lease from a DHCP server.
D. Configure Certkingdom -WS292 to use Certkingdom -WS291 for DNS name resolution.

Answer: C.

Explaination: The problem is most likely caused by an incorrect or non-existent
default gateway setting on Certkingdom -WS292. If you configure
Certkingdom -WS292 to use DHCP to obtain IP addressing information,
Certkingdom -WS292 will receive the correct settings from the ICS service on
Certkingdom -WS291.
Incorrect Answers:
A: The question refers to a shared dial-up connection on Certkingdom -WS291 not
working. If the dial-up connection is shared, then Internet Connection Sharing is enabled
already.
B: The question states that Certkingdom -WS291 automatically connects to the network at
the main office whenever the user on Certkingdom -WS291 attempts to access resources
located on the main office network. This indicates that automatic dial-up is already
configured.
D: Certkingdom -WS291 is not a DNS server. The ICS service has a DNS proxy that
would pass DNS requests to whichever DNS server Certkingdom -WS291 is using.
Reference:
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291):
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network
Infrastructure, Part 1, Chapters 1 & 2, pp. 45, 124


QUESTION 14:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows NT Workstation 4.0. The network contains 2,500 client
computers that are configured with static IP addresses.
Certkingdom.com issues a new network policy that requires all network computers to
have dynamically assigned IP configurations. You enable the DHCP Server service
on a member server named Certkingdom -SR25. Three network support technicians
have been instructed to configure the IP properties on all client computers to
receive a DHCP lease from Certkingdom -SR25.
It is estimated that the change over will take two weeks to complete. You need to
ensure that the DHCP server will not lease an IP address that is statically
configured on a computer that the network support technicians have not yet seen to.
What should you do?

A. On Certkingdom -SR25, configure Conflict detection attempts to 1.
B. On Certkingdom -SR25, configure Conflict detection attempts to 3.
C. On Certkingdom -SR25, configure client reservations for each client computer’s MAC
address.
D. On Certkingdom -SR25, activate and reconcile the scopes.

Answer: A

Explaination: When conflict detection attempts are set, the DHCP server uses the
Packet Internet Groper (ping) process to test available scope IP addresses before
including these addresses in DHCP lease offers to clients. A successful ping means
that the IP address is in use on the network. This results in the DHCP server not
offering to lease the address to a client.
If the ping request fails and times out, it indicates that the IP address is not in use on the
network. In this case, the DHCP server offers to lease the address to a client. Each
additional conflict detection attempt delays the DHCP server response by a second while
waiting for the ping request to time out. This in turn increases the load on the server. A
value of no greater than two (2) is recommended for ping attempts.
Incorrect Answers:
B: Due to the latency involved in ping attempts, the higher the conflict detection value is
set, the longer the lease process will be for every client that uses the DHCP server.
C: Configuring client reservations for each client computer MAC address will involve a
physical visit to each and every client computer if you do not ping it successfully.
D: The scope would already be activated in this scenario.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
Implementing, Managing, and Maintaining a Windows Server 2003 Network
Infrastructure Guide & DVD Training System, pp. 208-209


QUESTION 15:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and client
computers run Windows XP Professional, Windows 2000 Professional, or Windows
NT Workstation. All client computers are configured with default settings.
The Certkingdom.com network contains a server named Certkingdom -SR31 that
functions as a DHCP and DNS server, and a server named Certkingdom -SR38 that
contains antivirus server software. All DNS zones on Certkingdom -SR31 are enabled
for DNS dynamic updates. The computer account for each client computer is the
owner of its own DNS host record. No other server provides DNS services.
What must you do to ensure that Certkingdom -SR38 can contact client computers by
using fully qualified domain names (FQDNs) to propagate virus definition updates?

A. On Certkingdom -SR31, modify the Dynamically update DNS A and PTR records only
if requested by the DHCP clients option.
B. On Certkingdom -SR38, modify the Always dynamically update DNS A and PTR
records option.
C. On Certkingdom -SR31, modify the Discard A and PTR records when lease is deleted
option.
D. On Certkingdom -SR31, modify the Dynamically update DNS A and PTR records for
DHCP clients that do not request dynamic updates (for example, clients running
Windows NT 4.0) option.

Answer: D

Explaination: Dynamically Update DNS A And PTR Records For DHCP Clients That
Do Not Request
Updates – This checkbox lets you handle these older clients graciously by making the
updates using a separate mechanism. When checking this check box you will ensure that
Certkingdom -SR38can resolve FQDNs for all client computers on the network under the
given circumstances and the role that Certkingdom -SR31 plays.
Incorrect Answers:
A: Dynamically Update DNS A And PTR Records Only If Requested By The DHCP
Clients – This radio button (which is on by default) tells the DHCP server to register the
update only if the DHCP client asks for DNS registration. When this button is active,
DHCP clients that aren’t hip to DDNS won’t have their DNS records updated. However,
Windows 2000, XP, and Server 2003 DHCP clients are smart enough to ask for the
updates.
B: Always Dynamically Update DNS A And PTR Records – This radio button forces the
DHCP server to register any client to which it issues a lease. This setting may add DNS
registrations for DHCP-enabled devices that don’t really need them, like printer servers;
however, it allows other clients (like Mac OS, Windows NT, and Linux machines) to
have their DNS information automatically updated. This is not what is required.
C: Discard A And PTR Records When Lease Is Deleted – When a DHCP lease expires,
what should happen to the DNS registration? Obviously, it would be nice if the DNS
record associated with a lease vanished when the lease expired; when this checkbox is
checked (as it is by default), that’s exactly what happens. If you uncheck this box, your
DNS will contain entries for expired leases that are no longer valid; when a particular IP
address is reissued on a new lease, the DNS will be updated, but in between leases you’ll
have incorrect data in your DNS-always something to avoid.
Reference:
James Chellis, Paul Robichaux and Matthew Sheltz, MCSA/MCSE: Windows Server
2003 Network Infrastructure Implementation, Management, and Maintenance Study
Guide, p. 246

 

 

 

MCTS Training, MCITP Trainnig

 

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Apple’s ‘Black Friday’ sale cuts Mac prices up to 10%

Apple today cut Mac prices up to 10% in a repeat of the last two years’ stingy “Black Friday” deals, which authorized resellers again trumped.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com

 

For the second year in a row, Apple also sold the iPad at a discount.

Apple’s one-day sale reduced most Mac prices by $101, a 10% cut on the entry-level 11-in. MacBook Air, which sold for $898 on Friday. The across-the-board $101 translated into discounts of 6%-8% for 13-in. MacBook Airs, 4%-8% for MacBook Pros and 5%-8% for iMacs.

The Mac Mini and the Mac Pro were not included in the deals.

Apple’s Mac discount was identical to those of the last two years’ Black Friday sales, although unlike in 2010, Apple did not exclude its lowest-priced notebooks this year.

“The most popular Apple Mac product this holiday season will be the MacBook Air,” predicted analyst Brian White of Ticonderoga Securities, in a message to clients today.

The iPad 2 was reduced between $41 and $61 depending on the model, a discount of between 8% and 9%, and for the priciest iPads, slightly more than in 2010. Apple also dropped the price of the iPod Touch between $21 and $41, and cut prices for the iPod Nano by $11.

Apple’s prices were good at both its online and brick-and-mortar stores through the day. Many of the latter opened at 6 a.m. local time in the U.S., several hours earlier than usual.

Some rival online sellers, however, beat Apple’s sale prices.

Amazon.com, for example, listed the least-expensive 11-in. MacBook Air at $849.99 and the entry-level 21.5-in. iMac for $1,049.99.

Apple also discounted several software packages today, including the three-license edition of Microsoft’s Office for Mac Home & Student 2011, which was priced at $128. But others beat Apple’s sales price on that product, too: Amazon listed the application suite at $99.99, or 33% below list.

Facebook Help Center Community Forum overrun with spam

Spammers have attacked the Facebook Help Center Community Forum over the Thanksgiving holiday weekend in the US. Most of the spam consists of links for live streaming American sporting events.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

The Facebook Help Center’s page for asking questions about various help topics has been overrun with spam. All 22 sections of the Community Forum, as well as each of their subsections, have been attacked by spammers.

There are multiple Facebook accounts being used in the attack: some are asking questions and others are answering them. It’s not yet clear if these are bogus accounts created for just this purpose or if the perpetrators have compromised already-existing Facebook accounts.

The spammers are trying to lure users with the usual nonsense: most are links for streaming live sports matches (boxing, football, hockey, and so on), but the usual weight loss offers are also present. Some of them are just text, but most include a link to a third-party website.

Almost all of the links lead to a webpage asking you for your e-mail address, although some just take you to a bogus website with ads. It doesn’t appear any of these webpages contain malware, but spammers can always change where the links redirect you to. Do not click on any of these links.

It’s possible the spammers are taking advantage of the Thanksgiving holiday weekend in the US. I’m not sure whether more users check out the Community Help Topics during this time, but it’s very likely Facebook has fewer staff working to get rid of threats like this one.

This attack has rendered the self-help support community effectively useless. Legitimate questions are being pushed down towards the bottom; on most of the sections, the first page only contains spam. I have contacted Facebook with this issue and will update you if I hear back.

Update: “Protecting the people who use Facebook from spam and malicious content is a top priority for us, and we are always working to improve our systems to isolate and remove material that violates our terms,” a Facebook spokesperson said in a statement. “Recently, our Help Center Community Forum experienced an increase in spam claiming to offer streaming video of American sporting events. We are taking steps to address the issue and encourage people to protect themselves by never clicking on strange or suspicious links.”

Cool mobile solutions for 2012

It’s difficult to imagine a world more technologically advanced than the one we live in today. Until we remember saying the same thing ten—even five—years ago. Up until recently, limited bandwidth prevented most people from enjoying streaming videos, but today a system that can’t handle streaming content is considered obsolete. Technology can and does change that quickly.

Cisco CCNA Training, Cisco CCNA Certification

Best HP Certification Training and HP Exams Training  and more Cisco exams log in to Certkingdom.com

The technology we might see in the next ten years is mostly speculation, so for now we’ll focus on what to expect in 2012.

Mobile solutions for the mobile worker

We’ve been able to access documents on-the-go for a while, but printing those documents while out of the office has often been a challenge—until now.

“HP’s history of innovation runs deep, and we continue to leverage 1110_SMB_spurl_2012_lazymanchairs601171712352.9254that legacy and build on it for future growth,” said Vyomesh Joshi, executive vice president, Imaging and Printing Group, HP. “While printing in the traditional sense will continue to be integral to what we bring to the world, we are disrupting the market with leading innovations beyond the page as well.”

HP ePrint allows you to email office documents, presentations, and photos directly to HP ePrint-enabled printers—like the HP Officejet Pro 8600 e-All-in-One Printer—using any device with email capabilities. [1] All HP ePrint-enabled printers have their own email address, so you, your coworkers, or even your clients can email print jobs directly to the printer without installing any drivers or software from across the room to across the country.

Having the ability to work while you’re on the move is a luxury. Having the power to complete that work shouldn’t be. Products like HP’s line of EliteBook Notebook PCs are designed for powerful computing, as well as demanding workstation applications and essential security. You’ll work confidently—and fast—with a mobile workstation that enables your business to work more efficiently.
Store and print—in the cloud

One of the hot topics in the computing world these days is cloud storage. Quite simply, cloud storage allows data to be stored on multiple virtual servers—freeing up the need to have physical storage devices either on- or off-site.

The choice to implement a cloud computing solution is different for every organization. Some important things to consider:

Security measures whether corporate and customer data is secure in the cloud.
Open infrastructure provides a choice in cloud delivery models without adding complexity.
Automation improves the speed and efficiency of your cloud services.1110_SMB_spurl_2012_googlecloudprint777306327656.4817
Resilient technologies meet defined service levels for cloud availability, quality and performance.
Seamless integration combines public and private clouds with traditional delivery to create a unified IT service portfolio.
Cost considerations must be met in order to provide the best return on investment.

With HP ePrint-enabled printers and Google Cloud Print, all you need is the cloud to print—no drivers, no PC connection and no software. [2] Cloud Print is part of HP’s ePrint mobile-printing portfolio, enabling you to print where life and business happen.
Scan more than just flat objects

The HP TopShot LaserJet Pro Multifunction Printer M275 is 1110_SMB_spurl_2012_topshot17557713128.632412HP’s first web-connected color laser multi-function printer with the power to scan 3D objects. These objects can be scanned and used to create unique artwork and presentations. Click here to learn more.

In addition to 3D objects, converting your paper documents into electronic form allows you to store, share, and use them more effectively. Considering document management with
scanners like the HP Scanjet 5590 is just smart business.
Less clutter and higher efficiency

Improvements in technology aren’t all about processor speed and the amount of memory. Computers and peripherals now need fewer cables than ever before, freeing your desktop from clutter so you can get back to business.

Other benefits of an All-in-One (AIO) solution are:

Less packaging = lower shipping costs. With the rise in shipping costs, one of the easiest ways for businesses to save is to ship less. HP AIO PCs ship in a single box, enabling significant cost and time savings. Fewer boxes and cables make it easier for businesses to manage their IT investment.
Higher efficiency = lower energy bills. A typical PC and monitor can use up to 250 watts per day. HP AIO PCs use as little as 34 watts. HP AIO PCs won’t eat up your energy budget like typical PCs, leaving more resources for the things that really matter.
Just one cord to plug in. Traditional PCs require a nest of cables just to get started. Simplify your life with the HP AIO PC’s elegant out-of-the-box experience.

While we couldn’t imagine some of this technology a few years ago, we can certainly understand how to apply it to our daily work lives. Whether it’s printing on-the-go, scanning 3D objects, or implementing an AIO solution, it’s hard to argue that technology is heading in the right direction.
Slate 2.0

Don’t forget about HP’s newest Tablet PC. Ideal for people with jobs that frequently take them away from traditional desks, yet need to remove productive in a familiar Windows environment. Optimized for Windows® 7 Professional, the HP Slate 2 Tablet PC is also intended for those who use custom applications that must operate in a Windows® environment.

Free Microsoft 70-536 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 



QUESTION 1
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You are in the process of storing numerical values up to 2,100,000,000 into a variable and may
require storing negative values using a .NET Framework 2.0 application. You are required to
optimize memory usage
What should you do?

A. Int32
B. UInt16
C. UInt32
D. Int16

Answer: A

Explanation:
The Int32 type should be used in the scenario as it can be used to store positive and negative
numerical values from -2,147,483,648 to +2,147,483,647.
Incorrect Answers:
B: The UINT32 and UInt16 type should not be used in the scenario because they are used to store
only unsigned positive numbers.
Reference types
C: The UINT32 and UInt16 type should not be used in the scenario because they are used to store
only unsigned positive numbers.
Attributes
D: The Int16 type should not be used as you will only be allowed to store values from -32768 to
+32768.


QUESTION 2
You work as an application developer at CertKingdom.com. You are currently in the process of
creating a class that stores data about CertKingdom.com’s customers.
CertKingdom.com customers are assigned unique identifiers and various characteristics that may
include aliases, shipping instructions, and sales comments. These characteristics can change in
both size and data type.
You start by defining the Customer class as shown below:
public class Customer
{
private int custID;
private ArrayList attributes;
public int CustomerID
{
get {return custID;}
}
public Customer (int CustomerID)
{
this.custID = CustomerID;
this.attributes = new ArrayList ();
}
public void AddAttribute (object att)
{
attributes.Add (att);
}
}
You have to create the FindAttribute method for locating attributes in Customer objects no matter
what the data type is.
You need to ensure that the FindAttribute method returns the attribute if found, and you also need
to ensure type-safety when returning the attribute.
What should you do?

A. Use the following code to declare the FindAttribute method:
public T FindAttribute (T att)
{
//Find attribute and return the value
}
B. Use the following code to declare the FindAttribute method:
public object FindAttribute (object att)
{
//Find attribute and return the value
}
C. Use the following code to declare the FindAttribute method:
public T FindAttribute <T> (T att)
{
//Find attribute and return the value
}
D. Use the following code to declare the FindAttribute method:
public string FindAttribute (string att)
{
//Find attribute and return the value
}

Answer: C

Explanation:
This code declares the method FindAttribute and specifies an argument named att using the T
placeholder as the argument and return data type. To ensure the FindAttribute method accepts
arguments of different types, you should specify an argument using a generic placeholder. The
argument att in this generic method will accept any valid data type and ensures type-safety by
returning that same data type.
Incorrect Answers:
A: You should not use this code because it does not declare the placeholder T. when declaring a
generic method, you have to use the < > bracketsto declare the place holder before using it.
B: You should not use this code because it does not guarantee type-safery.
D: You should not use this code because it will only accept a string argument and return a string
argument.
Generic types


QUESTION 3
You work as an application developer at CertKingdom.com. You are creating a custom exception
class named ProductDoesNotExistException so that custom exception messages are displayed in
a new application when the product specified by users is unavailable.
This custom exception class will take the ProductID as an argument to its constructor and expose
this value through the ProductID. You are now in the process of creating a method named
UpdateProduct. This method will be used to generate and manage the
ProductDoesNotExistException exception if the ProductID variable contains the value 0.
You need to ensure that use the appropriate code for the UpdateProduct method.
What should you do?

A. Make use of the following code:
public void UpdateProduct ()
{
try
{
if (ProductID == 0)
throw new ProductDoesNotExistException (ProductID);
}
catch (ProductDoesNotExistException ex)
{
MessageBox.Show (“There is no Product” + ex. ProductID);
}
}
B. Make use of the following code:
public void UpdateProduct ()
{
try
{
if (ProductID = = 0)
throw new Exception (“Invalid ProductID”);
}
catch (ProductDoesNotExistException ex)
{
MessageBox.Show (ex.Message);
}
}
C. Make use of the following code:
public void UpdateProduct ()
{
if (ProductID = = 0)
throw new ProductDoesNotExistException (ProductID);
}
D. Make use of the following code:
public void UpdateProduct ()
{
if (ProductID = = 0)
throw new Exception (“Invalid ProductID”);
}

Answer: A

Explanation:
This code verifies the value of the ProductID variable by using the if statement. If the ProductID
variable contains a value of 0, this code generates an exception of type
ProductDoesNotExistException . To explicitly generate an exception, you are required to use the
throw statement. The exception generated by using the throw statement can be handled by the
try…catch block. This code generates the custom exception by calling the constructor of the
custom exception class named ProductDoesNotExistException . The constructor argument is the
ProductID attached to the ProductDoesNotExistException object. This code then handles the
custom exception named ProductDoesNotExistException by using a catch block, which handles
exceptions by using a variable named ex of the type ProductDoesNotExistException . This code
displays the ” There is no Product ” error message by using the MessageBox.Show method and
concatenating the ex. ProductID to it.
Incorrect Answers:
B: You should not use the code that generates an exception of the type Exception and handles the
exception of the type ProductDoesNotExistException in the catch block. This code is incorrect
because you are required to generate a custom exception named ProductDoesNotExistException.
C: You should not use the codes that do not use a try…catch block because the application an
unhandled exception.
D: You should not use the codes that do not use a try…catch block because the application an
unhandled exception.


QUESTION 4
You work as the application developer at CertKingdom.com. CertKingdom.com uses Visual Studio.NET
2005 as its application development platform.
You have recently finished development of a class named TestReward and package the class in a
.NET 2.0 assembly named TestObj.dll. After you ship the assembly and it is used by client
applications, you decide to move the TestReward class from TestObj.dll assembly to the
TestRewardObj.dll Assembly. You are to ensure when you ship the updated TestObj.dll and
TestRewardObj.dll assemblies that the client applications continue to work and do not require
recompiling.
What should you do?

A. The TypeForwardedTo attribute should be used
B. The TypeConvertor.ConvertTo method should be used
C. The InternalsVisibleTo attribute should be used
D. The Type Convertor.ConvertFrom method should be used

Answer: A

Explanation:
The statement used for you to add a type from one assembly into another assembly is the
TypeForwardTo attribute which enables you not to have the application recompiled.
Incorrect Answers:
B: The TypeConverter class provides a unified way of converting different types of values to other
types and can not be used to move a type.
C: The method in question here specifies all nonpublic types in an assembly are visible to other
assemblies but can not be used to move types.Part 2: Manage a group of associated data in a
.NET Framework application by using collections. (Refer System.Collections namespace)
D: The TypeConverter class provides a unified way of converting different types of values to other
types and can not be used to move a type.


QUESTION 5
You work as an application developer at CertKingdom.com. You have recently created a custom
collection class named ShoppingList for a local supermarket. This custom class will include
ShoppinItem objects that have the public properties listed below.
* Name
* AisleNumber
* OnDiscount
You are required to enable users of your class to iterate through the ShoppingList collection, and
to list each product name and aisle number using the foreach statement.
You need to achieve this by declaring the appropriate code.
What code should you use?

A. public class ShoppingList : ICollection
{
// Class implementation
}
B. public class ShoppingList : IEnumerator, IEnumerable
{
// Class implementation
}
C. public class ShoppingList : Ilist
{
// Class implementation
}
D. public class ShoppingList : Enum
{
// Class implementation
}

Answer: B

Explanation:
You should implement the IEnumerable and IEnumerator interfaces of the System.Collections
namespace to ensure that your collection class supports foreach iteration. The IEnumerable
interface defines only one method named GetEnumerator that returns an object of type
IEnumerator of the System.Collections namespace and is used to support iteration over a
collection. The IEnumerator interface supports methods, such as Current , MoveNext , and Reset
to iterate through a collection. The Current method returns the current element of the collection.
The Move method positions the enumerator to the next available element of the collection. The
Reset method positions the enumerator before the first element of the collection.
Incorrect Answers:
A: You should not use the code that implements the ICollection interface because this interface is
used to define properties in a collection. Implementing this interface will not ensure that your
collection class supports foreach iteration because it does not inherit the IEnumerator interface.
C: You should not use the code that implements the Ilist interface because this interface is used to
define properties of a non-generic list of items accessed by index. Implementing this interface will
not ensure that your collection class supports foreach iteration because it does not inherit the
IEnumerator interface.
D: You should not use the code that inherits the Enum because this structure is used as a base
class for those classes that provide enumeration values. Inheriting the Enum structure will not
ensure that your collection class supports foreach iteration.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Go to Top