Archive for May, 2015

MB2-701 Extending Microsoft Dynamics CRM 2013

MB2-701 Extending Microsoft Dynamics CRM 2013

Published: 29 January 2014
Languages: English, Chinese (Simplified), French, German, Japanese, Spanish
Audiences: Developers
Technology: Microsoft Dynamics CRM 2013
Credit towards certification: MCP, Microsoft Specialist

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Plan the deployment of Microsoft Dynamics CRM (15 – 20%)

Describe the Microsoft Dynamics CRM application framework

Describe the Microsoft Dynamics CRM extensibility platform; describe Portable Business Logic functionality; explain the Application, Platform and Database layers; describe the differences between the Microsoft Dynamics CRM application framework on-premises and online

Identify the considerations for deploying Microsoft Dynamics CRM

Describe the deployment model, identify support for Outlook clients, identify the extensibility points, identify types of reporting, identify the web resources

Plan for user interface customisation

Describe the Web Application Navigation and Nav bars, customise the Site Map and command bar, describe the entity command bar templates, describe how customisations impact Microsoft Outlook, edit the custom actions and command definitions, describe Nav bar enable and display rules, describe how to use localised labels with command bars, describe URL-addressable forms and views

Perform common platform operations (15 – 20%)

Explain the Discovery Service

Describe Discovery Service authentication and authorisation, explain the differences between the Discovery Service Web Service on-premises and online

Explain the Organisation Service

Describe Organisation Service authentication and authorisation, describe entity information, explain the RetrieveAttributeRequest and RetrieveAttributeResponse methods

Describe how to use data types, methods and classes

Explain the different data types; describe how to use the Create, Retrieve, Update, Delete and RetrieveMultiple methods; describe how to use early- and late-bound classes

Describe Windows Communication Foundation (WCF) web services

Describe integration of Microsoft Dynamics CRM and WCF; describe how to handle WCF faults; use and specify Open Data Protocol (OData) elements when querying Microsoft Dynamics CRM data

Perform advanced platform operations (10 – 15%)

Identify different ways to query data

Explain QueryExpression, QueryByAttribute, LINQ queries and filtered views; explain how to save queries; explain FetchXML and custom SQL Server Reporting Services (SSRS) reporting in relation to Microsoft Dynamics CRM; describe the integration of Microsoft Azure with Microsoft Dynamics CRM

Identify how to use requests and responses

Identify how to use the Execute() method, use entity-specific and non-entity specific requests, use simple generic request messages; pass optional parameters in messages

Explain the Metadata web service

Describe the metadata layer, explain the Read and Write actions possible with metadata, use metadata from custom applications

Implement business processes (10 – 15%)

Describe workflows

Describe workflow process architecture, describe custom workflow activities and custom XAML workflows (declarative workflows), describe workflow rules and binding rules to events

Describe dialogs

Explain input arguments in dialogs; describe dialog rules, events, pages, prompts, responses, actions and conditions

Create and manage custom workflows

Set up custom workflow activity assemblies; create, configure and debug custom workflow activities; create and modify workflows in Windows Workflow Foundation (WF); describe business process flows

Create plug-ins (15 – 20%)

Describe plug-ins

Explain plug-ins and when to use them; describe cascading events; explain the information available in plug-ins; describe plug-in isolation, trusts and statistics; describe impersonation in plug-ins; describe how to register and deploy plug-ins; describe how to debug plug-ins

Describe the event framework

Describe the key features of the event framework, describe the event execution pipeline, describe how to use Entity classes in plug-ins

Implement application events (15 – 20%)

Describe application events

Describe the use of JavaScript libraries to customise Microsoft Dynamics CRM; describe form and field events, including OnChange, OnLoad, OnSave, TabStateChange and OnReadyStateComplete; implement IFRAMES in entity forms

Implement client-side code

Describe using JavaScript for client-side events, debug client-side code, request external data, pass parameters, access Microsoft Dynamics CRM 2013 web services

Implement form types

Describe the different form types, implement the Xrm.Page object, implement Xrm.Utility, explain how to test form types, describe the form event handler execution context

Describe global variables and functions

Explain how to set dependencies and pass parameters, define the allowed query string parameters, add and handle form parameters, explain the getQueryStringParameters method

Implement web resources (10 – 15%)

Explain how to use the different types of web resources

Define webpage (HTML), style sheet (CSS), script (JavaScript), data (XML), images (PNG, JPG, GIF, ICO), Silverlight (XAP) and style sheet (XSL) web resources; create web resources; identify the limitations of each web resource; implement the passing of parameters between web resources; reference web resources; implement JavaScript libraries for code reuse across multiple applications

Explain how to use REST, OData and JSON in Microsoft Dynamics CRM

Explain Representational State Transfer (REST); use EST in AJAX and JavaScript, explain JavaScript Object Notation (JSON), explain how to use the XMLHttpRequest object, use OData and JavaScript to create and update an account record

Explain how to use JQuery in Microsoft Dynamics CRM

Explain JQuery and how to use the JQuery object, use JQuery with a web resource, use JQuery to interact with the CRM form


MCTS Training, MCITP Trainnig

Best Microsoft MCP Certification, Microsoft MB7-701 Training at certkingdom.com

 


QUESTION 1
You work as a Systems Administrator at ABC.com. The company has recently deployed a
Microsoft Dynamics NAV 2013 system.
You have been handed a list of Microsoft Dynamics NAV 2013 system users. You need to
configure the Microsoft Dynamics NAV 2013 system to record when the users in the list log on to
the system and the amount of time the users are logged on for.
How should you configure the Microsoft Dynamics NAV 2013 system?

A. By modifying the options in the User Setup page.
B. By modifying the options in the Users page.
C. By running the Get-NAVServerUserPermissionSet cmdlet.
D. By modifying the options in the Application Setup page.

Answer: A

Explanation:


QUESTION 2
Your role as Systems Administrator includes the management of the company’s Microsoft
Dynamics NAV 2013 system.
A new user in the Accounts department asks you what the Reason Codes on Sales Documents
and Purchase Documents are used for.
Which of the following statements is correct?

A. You can assign different reason codes to the individual purchase and sales lines.
B. A reason code indicates where an entry was created.
C. The reason code is used when locating items using a location code.
D. The reason code is used for analysis purposes and is copied to each general ledger, customer,
and vendor entry.

Answer: D

Explanation:


QUESTION 3
Your role as Systems Administrator includes the management of the company’s Microsoft
Dynamics NAV 2013 system.
A new user in the Accounts department asks you about posting to a general ledger account in a
customer posting group containing the general ledger account.
Which of the following describes G/L account posting in a customer posting group?

A. Direct posting is usually disabled in the G/L accounts.
B. Indirect posting only is allowed.
C. Direct posting only is allowed.
D. Manual posting is prevented using the Blocked field in the G/L account.

Answer: A

Explanation:


QUESTION 4
Your role as Systems Administrator includes the management of the company’s Microsoft
Dynamics NAV 2013 system.
A new user in the Accounts department receives the following error message:
“COGS Account must have a unique value in General Posting Setup: Gen.Bus.Posting
Group=NATIONAL, Gen. Prod. Posting Group=RETAIL. It cannot be zero or empty.”
The user reports that the error occurred when he attempted to post a sales order.
How can you resolve the error message?

A. By navigating to the COGS Account Field in the Inventory Posting Setup page and entering a
ledger account number.
B. By navigating to the COGS Account Field in the General Business Posting Group page and
entering a ledger account number.
C. By navigating to the COGS Account Field in the General Posting Setup page and entering a
ledger account number.
D. By navigating to the COGS Account Field in Fixed Asset Posting Group page and entering a
ledger account number.
E. By navigating to the COGS Account Field in General Product Posting Group page and entering
a ledger account number.

Answer: C

Explanation:

350-018 CCIE Security

350-018 CCIE Security

CCIE Security
Exam Number 350-018 CCIE Security
Associated Certifications CCIE Security
Duration 120 minutes (90 – 110 questions)

Exam Description
The Cisco CCIE® Security Written Exam (350-018) version 4.0 is a 2-hour test with 90–110 questions. This exam tests the skills and competencies of security professionals in terms of describing, implementing, deploying, configuring, maintaining, and troubleshooting Cisco network security solutions and products, as well as current industry best practices and internetworking fundamentals.

Topics include networking fundamentals and security-related concepts and best practices, as well as Cisco network security products and solutions in areas such as VPNs, intrusion prevention, firewalls, identity services, policy management, and device hardening. Content includes both IPv4 and IPv6 concepts and solutions.

The exam is closed book, and no outside reference materials are allowed.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Infrastructure, Connectivity, Communications, and Network Security 20%
1.1 Network addressing basics
1.2 OSI layers
1.3 TCP/UDP/IP protocols
1.4 LAN switching (for example, VTP, VLANs, spanning tree, and trunking)
1.5 Routing protocols (for example, RIP, EIGRP, OSPF, and BGP)
1.5.a Basic functions and characteristics
1.5.b Security features
1.6 Tunneling protocols
1.6.a GRE
1.6.b NHRP
1.6.c IPv6 tunnel types
1.7 IP multicast
1.7.a PIM
1.7.b MSDP
1.7.c IGMP and CGMP
1.7.d Multicast Listener Discovery
1.8 Wireless
1.8.a SSID
1.8.b Authentication and authorization
1.8.c Rogue APs
1.8.d Session establishment
1.9 Authentication and authorization technologies
1.9.a Single sign-on
1.9.b OTPs
1.9.c LDAP and AD
1.9.d RBAC
1.10 VPNs
1.10.a L2 vs L3
1.10.b MPLS, VRFs, and tag switching
1.11 Mobile IP networks

2.0 Security Protocols 15%
2.1 RSA
2.2 RC4
2.3 MD5
2.4 SHA
2.5 DES
2.6 3DES
2.7 AES
2.8 IPsec
2.9 ISAKMP
2.10 IKE and IKEv2
2.11 GDOI
2.12 AH
2.13 ESP
2.14 CEP
2.15 TLS and DTLS
2.16 SSL
2.17 SSH
2.18 RADIUS
2.19 TACACS+
2.20 LDAP
2.21 EAP methods (for example, EAP-MD5, EAP-TLS, EAP-TTLS, EAP-FAST, PEAP, and LEAP)
2.22 PKI, PKIX, and PKCS
2.23 IEEE 802.1X
2.24 WEP, WPA, and WPA2
2.25 WCCP
2.26 SXP
2.27 MACsec
2.28 DNSSEC

3.0 Application and Infrastructure Security 10%
3.1 HTTP
3.2 HTTPS
3.3 SMTP
3.4 DHCP
3.5 DNS
3.6 FTP and SFTP
3.7 TFTP
3.8 NTP
3.9 SNMP
3.10 syslog
3.11 Netlogon, NetBIOS, and SMB
3.12 RPCs
3.13 RDP and VNC
3.14 PCoIP
3.15 OWASP
3.16 Manage unnecessary services

4.0 Threats, Vulnerability Analysis, and Mitigation 10%
4.1 Recognize and mitigate common attacks
4.1.a ICMP attacks and PING floods
4.1.b MITM
4.1.c Replay
4.1.d Spoofing
4.1.e Backdoor
4.1.f Botnets
4.1.g Wireless attacks
4.1.h DoS and DDoS attacks
4.1.i Virus and worm outbreaks
4.1.j Header attacks
4.1.k Tunneling attacks
4.2 Software and OS exploits
4.3 Security and attack tools
4.4 Generic network intrusion prevention concepts
4.5 Packet filtering
4.6 Content filtering and packet inspection
4.7 Endpoint and posture assessment
4.8 QoS marking attacks

5.0 Cisco Security Products, Features, and Management 20%
5.1 Cisco Adaptive Security Appliance (ASA)
5.1.a Firewall functionality
5.1.b Routing and multicast capabilities
5.1.c Firewall modes
5.1.d NAT (before and after version 8.4)
5.1.e Object definition and ACLs
5.1.f MPF functionality (IPS, QoS, and application awareness)
5.1.g Context-aware firewall
5.1.h Identity-based services
5.1.i Failover options
5.2 Cisco IOS firewalls and NAT
5.2.a CBAC
5.2.b Zone-based firewall
5.2.c Port-to-application mapping
5.2.d Identity-based firewalling
5.3 Cisco Intrusion Prevention Systems (IPS)
5.4 Cisco IOS IPS
5.5 Cisco AAA protocols and application
5.5.a RADIUS
5.5.b TACACS+
5.5.c Device administration
5.5.d Network access
5.5.e IEEE 802.1X
5.5.f VSAs
5.6 Cisco Identity Services Engine (ISE)
5.7 Cisco Secure ACS Solution Engine
5.8 Cisco Network Admission Control (NAC) Appliance Server
5.9 Endpoint and client
5.9.a Cisco AnyConnect VPN Client
5.9.b Cisco VPN Client
5.9.c Cisco Secure Desktop
5.9.d Cisco NAC Agent
5.10 Secure access gateways (Cisco IOS router or ASA)
5.10.a IPsec
5.10.b SSL VPN
5.10.c PKI
5.11 Virtual security gateway
5.12 Cisco Catalyst 6500 Series ASA Services Modules
5.13 ScanSafe functionality and components
5.14 Cisco Web Security Appliance and Cisco Email Security Appliance
5.15 Security management
5.15.a Cisco Security Manager
5.15.b Cisco Adaptive Security Device Manager (ASDM)
5.15.c Cisco IPS Device Manager (IDM)
5.15.d Cisco IPS Manager Express (IME)
5.15.e Cisco Configuration Professional
5.15.f Cisco Prime

6.0 Cisco Security Technologies and Solutions 17%
6.1 Router hardening features (for example, CoPP, MPP, uRPF, and PBR)
6.2 Switch security features (for example, anti-spoofing, port, STP, MACSEC, NDAC, and NEAT)
6.3 NetFlow
6.4 Wireless security
6.5 Network segregation
6.5.a VRF-aware technologies
6.5.b VXLAN
6.6 VPN solutions
6.6.a FlexVPN
6.6.b DMVPN
6.6.c GET VPN
6.6.d Cisco EasyVPN
6.7 Content and packet filtering
6.8 QoS application for security
6.9 Load balancing and failover

7.0 Security Policies and Procedures, Best Practices, and Standards 8%
7.1 Security policy elements
7.2 Information security standards (for example, ISO/IEC 27001 and ISO/IEC 27002)
7.3 Standards bodies (for example, ISO, IEC, ITU, ISOC, IETF, IAB, IANA, and ICANN)
7.4 Industry best practices (for example, SOX and PCI DSS)
7.5 Common RFC and BCP (for example, RFC2827/BCP38, RFC3704/BCP84, and RFC5735)
7.6 Security audit and validation
7.7 Risk assessment
7.8 Change management process
7.9 Incident response framework
7.10 Computer security forensics
7.11 Desktop security risk assessment and desktop security risk management


 

Cisco CCNA Training, Cisco CCNA Certification

Best CCNA Training and CCIE Certification
and more Cisco 350-018 Exams log in to Certkingdom.com

 


QUESTION 1
In order to reassemble IP fragments into a complete IP datagram, which three IP header fields are
referenced by the receiver? (Choose three.)

A. don’t fragment flag
B. packet is fragmented flag
C. IP identification field
D. more fragment flag
E. number of fragments field
F. fragment offset field

Answer: C,D,F

Explanation:


QUESTION 2
Which VTP mode allows the Cisco Catalyst switch administrator to make changes to the VLAN
configuration that only affect the local switch and are not propagated to other switches in the VTP
domain?

A. transparent
B. server
C. client
D. local
E. pass-through

Answer: A

Explanation:


QUESTION 3
Which type of VPN is based on the concept of trusted group members using the GDOI key
management protocol?

A. DMVPN
B. SSLVPN
C. GETVPN
D. EzVPN
E. MPLS VPN
F. FlexVPN

Answer: C

Explanation:


QUESTION 4
Based on RFC 4890, what is the ICMP type and code that should never be dropped by the firewall
to allow PMTUD?

A. ICMPv6 Type 1 – Code 0 – no route to host
B. ICMPv6 Type 1 – Code 1 – communication with destination administratively prohibited
C. ICMPv6 Type 2 – Code 0 – packet too big
D. ICMPv6 Type 3 – Code 1 – fragment reassembly time exceeded
E. ICMPv6 Type 128 – Code 0 – echo request
F. ICMPv6 Type 129 – Code 0 – echo reply

Answer: C

Explanation:


QUESTION 5
A firewall rule that filters on the protocol field of an IP packet is acting on which layer of the OSI
reference model?

A. network layer
B. application layer
C. transport layer
D. session layer

Answer: A

Explanation:

Exam 70-489 Developing Microsoft SharePoint Server 2013 Advanced Solutions

Exam 70-489 Developing Microsoft SharePoint Server 2013 Advanced Solutions

Published: 20 November 2013
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: Developers
Technology: Microsoft SharePoint Server 2013
Credit towards certification: MCP, MCSD

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Design and implement search (15–20%)

Query search

This objective may include but is not limited to: build search queries using FAST Query Language (FQL) and Keyword Query Language (KQL), execute search queries using client-side object model (CSOM), Web Services and REST

Customise search results

This objective may include but is not limited to: create custom result sources, create display templates, create result types, create custom refiner definitions, implement query rules

Customise content processing

This objective may include but is not limited to: feed external content types, implement content processing extensions (entity extraction), configure out-of-the box content processing, create content mappings

Preparation resources

Building search queries in SharePoint 2013
Customising search results in SharePoint 2013
Custom content processing with the Content Enrichment web service callout

Implement Business Connectivity Services (BCS) (10–15%)

Create a model

This objective may include but is not limited to: optimise queries for performance and throttling, use naming conventions, use batching, create filters, implement methods, create associations

Create external content types

This objective may include but is not limited to: use SQL data sources, use Windows Communication Foundation (WCF) Web Services, use OData, use .NET connector

Implement authorisation and authentication

This objective may include but is not limited to: use pass-through, use BCS Identity and User Identity, use a custom model

Create custom connectors

This objective may include but is not limited to: implement methods (including Search), implement security trimming, implement configuration properties, implement caching, implement external event receiver

Access BCS data

This objective may include but is not limited to: use BCS Web Parts, use BCS data in workflows, use BCS CSOM, use the server-side object model, use BCS REST

Implement client-side BCS

This objective may include but is not limited to: use caching, use Microsoft Office apps, use Microsoft Visual Studio Tools for Office, use SQL replication, implement authorisation and authentication

Preparation resources

Business Connectivity Services in SharePoint 2013
External content types in SharePoint 2013
BCS client object model reference for SharePoint 2013

Implement user profiles and customise social workload (15–20%)

Manage user profile properties

This objective may include but is not limited to: create and update user profile properties, update privacy filters, map properties to external data, use managed metadata term sets, update profile picture

Manage feeds

This objective may include but is not limited to: use CSOM to follow documents, people, sites, get feeds, create posts, and manage like, reply, mention, tag, link, add pictures

Access user profile data

This objective may include but is not limited to: use CSOM, use the object model, use REST, use Web Services

Preparation resources

Work with user profiles in SharePoint 2013
How to: Learn to read and write to the social feed by using the REST service in SharePoint 2013
Data access options for apps in SharePoint 2013

Implement Enterprise Content Management (ECM) and Web Content Management (WCM) (15–20%)

Implement a multilingual site

This objective may include but is not limited to: submit a page or batch of pages for translation, publish pages, create source and target labels, create channels, implement multi-language site navigation

Implement e-discovery

This objective may include but is not limited to: create a new hold, integrate with Microsoft Exchange Web Services, specify content sources and Search criteria, export discovery sets, manage permissions for hold

Implement Search Engine Optimization (SEO)

This objective may include but is not limited to: create a site map, customise a site map, maintain SEO configuration properties, maintain robots.txt file, maintain SEO properties on term

Implement content management

This objective may include but is not limited to: create information management policies, create content organiser rules, create document sets, create document ID providers

Implement a publishing page

This objective may include but is not limited to: add field controls to a page layout, add web parts to a page layout, create a publishing page layout, inherit content types

Preparation resources

eDiscovery in SharePoint 2013
How to: Create a page layout in SharePoint 2013
Plan web content management in SharePoint Server 2013

Design for performance and troubleshooting (15–20%)

Design solutions to handle a high-traffic site

This objective may include but is not limited to: combine images, implement caching, minimise number of queries, optimise JavaScript loading, use Content Delivery Networks (CDNs), create a scalable aggregator

Design client applications for performance

This objective may include but is not limited to: leverage health score rules, optimise number of batch server requests, use client-side cache, minimise amount of data requested

Monitor and mitigate performance and scalability issues

This objective may include but is not limited to: diagnose application stability issues, debug the server side and app code on the client side, create application diagnostics, measure and test application performance

Preparation resources

Plan for performance and capacity management in SharePoint Server 2013
Solving problems and troubleshooting in SharePoint 2013
Plan for caching and performance in SharePoint Server 2013

Implement Managed Metadata Service (MMS) (15–20%)

Manage term sets

This objective may include but is not limited to: import and export term sets, create multilingual labels, reuse terms, manage term properties, perform translation, create groups and assign permissions

Create solutions by using MMS

This objective may include but is not limited to: use Profile Pages, use the Product Catalog, use cross-site publishing, integrate with Search, implement metadata-driven navigation

Use an MMS API

This objective may include but is not limited to: use CSOM in client applications, use REST in client applications, use managed fields, use server-side object model

Preparation resources

Managed metadata and navigation in SharePoint 2013
SharePoint 2013: Import a term set from an external source
Cross-site publishing in SharePoint 2013


MCTS Training, MCITP Trainnig

Best Microsoft MCP Certification, Microsoft 70-489 Training at certkingdom.com


 

QUESTION 1
You have been tasked with configuring filtering as per the prerequisites.
Which of the following actions should you take?

A. You should consider making use of the itemCategory;category filtering option.
B. You should consider making use of the itemID;num filtering option.
C. You should consider making use of the itemCategory;itemID filtering option.
D. You should consider making use of the itemID;itemCategory filtering option.

Answer: D

Explanation:


QUESTION 2
You are preparing to establish the reason for an error message being presented when adding the
custom Visual Web Part to a SharePoint site.
Which of the following actions should you take?

A. You should consider making use of the Get-SPLogEvent cmdlet.
B. You should consider making use of the New-SPUsageLogFile cmdlet.
C. You should consider making use of the New-SPLogFile cmdlet.
D. You should consider making use of the Get-SPLogLevel cmdlet.

Answer: A

Explanation:


QUESTION 3
You are preparing to write code to create the tool that supports social connections.
Which of the following is a class of the Microsoft.SharePoint.Client.Social namespace that should
be included in the code?

A. The SocialFollowingManager class.
B. The SocialFeedManager class.
C. The SocialActorInfo class.
D. The SocialPostActorInfo class.

Answer: C

Explanation:


QUESTION 4
You are preparing to configure caching in keeping with the prerequisites.
Which of the following actions should you take?

A. You should consider making use of the System File Cache option.
B. You should consider making use of the Cache API option.
C. You should consider making use of the Windows Server AppFabric Cache option.
D. You should consider making use of the Page Output Cache Cache option.

Answer: C

Explanation:


QUESTION 5
You are preparing to make sure that those users who access the site via their Windows phones,
receive notification regarding the newly created Windows phone app.
Which of the following actions should you take FIRST?

A. You should consider modifying the Phone master page.
B. You should consider modifying the Tablet master page.
C. You should consider modifying the Default master page.
D. You should consider setting the IncludedChannels property to Default.

Answer: C

Explanation:

70-341: Core Solutions of Microsoft Exchange Server 2013

70-341: Core Solutions of Microsoft Exchange Server 2013
Published: 15 January 2013
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Microsoft Exchange Server 2013
Credit towards certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

From July 2014, the questions on this exam include content covering Microsoft Exchange Server 2013 Service Pack 1.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Plan, install, configure and manage transport (25%)

Plan a high availability solution for common scenarios

Set up redundancy for intra-site scenarios; plan for SafetyNet; plan for shadow redundancy; plan for redundant MX records

Design a transport solution

Design inter-site mail flow; design inter-org mail flow; plan for Domain Secure/TLS; design Edge transport; design message hygiene solutions; design shared namespace scenarios

Configure and manage transport

Configure Edge servers; configure Send/Receive connectors; configure transport rules; configure accepted domains; configure email policies; configure Address Rewriting

Troubleshoot and monitor transport

Interpret message tracking logs and protocol logs; troubleshoot a shared namespace environment; troubleshoot SMTP mail flow; given a failure scenario, predict mail flow and identify how to recover; troubleshoot Domain Secure/TLS; troubleshoot the new transport architecture

Configure and manage hygiene

Manage content filtering; manage recipient filtering; manage SenderID; manage connection filtering; manage Spam Confidence Level (SCL) thresholds; manage anti-malware

Preparation resources

Transport high availability
Use an Edge Transport Server in Exchange 2013
Hygiene management

Install, configure and manage the mailbox role (25%)

Plan the mailbox role

Plan for database size and storage performance requirements; plan for virtualisation requirements and scenarios; plan mailbox role capacity and placement; design public folder placement strategy; validate storage by running JetStress

Configure and manage the mailbox role

Create and configure Offline Address Book (OAB); create and configure public folders; deploy mailbox server roles; design and create hierarchical address lists

Deploy and manage high availability solutions for the mailbox role

Create and configure a Database Availability Group (DAG); identify failure domains; manage DAG networks; configure proper placement of a file share witness; manage mailbox database copies

Monitor and troubleshoot the mailbox role

Troubleshoot database replication and replay; troubleshoot database copy activation; troubleshoot mailbox role performance; troubleshoot database failures; monitor database replication and content indexing

Develop backup and recovery solutions for the mailbox role and public folders

Manage lagged copies; determine most appropriate backup solution/strategy; perform a dial tone restore; perform item-level recovery; recover the public folder hierarchy; recover a mailbox server role

Create and configure mail-enabled objects

Configure resource mailboxes and scheduling; configure team mailboxes; configure distribution lists; configure moderation; configure a linked mailbox

Manage mail-enabled object permissions

Configure mailbox folder permissions; configure mailbox permissions; set up room mailbox delegates; set up team mailbox membership; set up auto-mapping; determine when to use Send As and Send On Behalf permissions

Preparation resources

Mailbox server
Database availability groups
Perform a dial tone recovery

Plan, install, configure and manage client access (25%)

Plan, deploy and manage a Client Access Server (CAS)

Design to account for differences between legacy CAS and Exchange CAS/CAF; configure Office web application

Plan and configure namespaces and client services

Design namespaces for client connectivity; configure URLs; plan for certificates; configure authentication methods; implement auto-discover for a given namespace

Deploy and manage mobility solutions

Deploy OWA for Devices; configure OWA policies; configure mobile device mailbox policies; configure Allow Block Quarantine (ABQ); deploy and manage Office Apps

Implement load balancing

Configure namespace load balancing; configure Session Initiation Protocol (SIP) load balancing; plan for differences between layer seven and layer four load balancing methods; configure Windows Network Load Balancing (WNLB)

Troubleshoot client connectivity

Troubleshoot Outlook Anywhere connectivity; troubleshoot POP/IMAP; troubleshoot authentication; troubleshoot web services; troubleshoot AutoDiscover; troubleshoot mobile devices

Preparation resources

Client access server
Clients and mobile
Load balancing

Design and manage an Exchange infrastructure (25%)

Plan for impact of Exchange on Active Directory services

Plan the number of domain controllers; plan placement of Global Catalogue (GC); determine DNS changes required for Exchange; prepare domains for Exchange; evaluate impact of schema changes required for Exchange; plan around Active Directory site topology

Administer Exchange workload management

Configure user workload policies; configure system workload policies; monitor system workload events; monitor user workload events

Plan and manage Role Based Access Control (RBAC)

Determine appropriate RBAC roles and cmdlets; limit administration using existing role groups; evaluate differences between RBAC and Active Directory split permissions; configure a custom-scoped role group; configure delegated setup

Design an appropriate Exchange solution for a given SLA

Plan for updates; plan for change management; design a solution that meets SLA requirements around scheduled downtime; design a solution that meets SLA requirements around RPO/RTO; design a solution that meets SLA requirements around message delivery

Preparation resources

Prepare Active Directory and domains
Exchange workload management
Planning for role-based access control


 

MCTS Training, MCITP Trainnig

Best Microsoft MCSE Certification, Microsoft 70-337 Training
and Microsoft MCP at certkingdom.com

 


QUESTION 1
You need to prepare the environment for the implementation of phase 1.
What changes must be made to the environment before you can install Exchange Server 2013?

A. The operating system or service pack level of TexDC1 needs to be upgraded.
B. The Windows 2008 R2 domain controllers in Washington and Boston need to be upgraded.
C. A server running Exchange Server 2007 or Exchange Server 2010 needs to be installed in
Texas.
D. The PDC emulator role needs to be transferred to a domain controller in Washington or Boston.

Answer: A

Explanation:


QUESTION 2
You are evaluating whether the proposed Exchange solution will meet the current and future
capacity requirements.
You want to gather statistics about the current Exchange environment.
Which of the following tools would you use to determine the number of emails sent to and received
by the current users?

A. Remote Server Administration Tools.
B. Microsoft Exchange Server Profile Analyzer.
C. Microsoft Exchange Server Deployment Assistant.
D. ESEUtil.exe.
E. Microsoft Exchange Server Jetstress.

Answer: B

Explanation:


QUESTION 3
You need to apply the required size restriction to the mailboxes in the new environment.
Which of the following commands should you run?

A. Get-MailboxDatabase | Set-MailboxDatabase –ProhibitSendReceiveQuota
B. Get-MailboxDatabase | Set-Mailbox –ProhibitSendReceiveQuota
C. Get-Mailbox | Set-Mailbox –ProhibitSendReceiveQuota
D. Get-MailboxDatabase | Get-Mailbox | Set-Mailbox –ProhibitSendReceiveQuota

Answer: A

Explanation:


QUESTION 4
You are evaluating whether the proposed Exchange solution will meet the current and future
capacity requirements.
You want to gather statistics about the current Exchange environment.
Which of the following tools would you use to determine the number of IOPS (Input/Output
Operations Per Second) required for the mailbox database storage?

A. ESEUtil.exe.
B. Microsoft Exchange Server Jetstress.
C. Microsoft Exchange Server Deployment Assistant.
D. Exchange Mailbox Server Role Requirements Calculator.
E. SQL Server Analysis Services.

Answer: D

Explanation:


QUESTION 5
You need to install and configure anti-spam and antimalware filtering.
Which servers should you install the anti-spam agents and enable the anti-spam and antimalware
filtering? (Choose two).

A. You should install the anti-spam agents on the Client Access Servers only.
B. You should install the anti-spam agents on the Mailbox serversonly.
C. You should install the anti-spam agents on the Client Access Servers and the Mailbox Servers.
D. You should enable antimalware filtering on the Client Access Serversonly.
E. You should enable antimalware filtering on the Mailbox serversonly.
F. You enable antimalware filtering on the Client Access Servers and the Mailbox Servers.

Answer: B,E

Explanation:

Exam 70-332 Advanced Solutions of Microsoft SharePoint Server 2013

Exam 70-332
Advanced Solutions of Microsoft SharePoint Server 2013

Published: 01 February 2013
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Microsoft SharePoint Server 2013
Credit towards certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Plan business continuity management (21%)
Plan for SQL high availability and disaster recovery
Plan for SQL Server mirroring; plan for SQL Server clustering; plan for SQL Server AlwaysOn; plan for SQL Server Log Shipping; plan for storage redundancy; plan for login replication
Plan SharePoint high availability
Plan for service distribution; plan for service instance configuration; plan for physical server distribution; plan for network redundancy; plan for server load balancing; plan for SQL Server aliases

Plan backup and restore
Establish a SharePoint backup schedule; establish an SQL Server backup schedule; plan a non-production environment content refresh; plan for farm configuration recovery; plan for service application recovery; plan for content recovery

Plan for high availability and disaster recovery for SharePoint 2013
Tuning SQL Server 2012 for SharePoint 2013: (04) SQL Server and SharePoint availability
Plan for backup and recovery in SharePoint 2013

Plan a SharePoint environment (20%)
Plan a social workload
Plan communities; plan My Sites; plan social permissions; plan user profiles; plan activity feeds; plan connections
Plan and configure a search workload
Plan and configure search result relevancy; plan and configure index freshness; plan and configure result sources; plan and configure the end-user experience; plan and configure a search schema; analyse search analytics reports

Plan and configure a Web Content Management (WCM) workload

Plan and configure channels; plan and configure product catalogue and topic pages; plan and configure Design Manager; plan and configure content deployment; plan and configure display templates; plan and configure variations

Plan an Enterprise Content Management (ECM) workload

Plan and configure E-Discovery; plan and configure document routing; plan and configure co-authoring; plan and configure record disposition and retention; plan large document repositories; plan and configure software boundaries

Plan for SharePoint 2013
Capacity planning for SharePoint Server 2013
Module 9: SharePoint 2013 ECM and WCM considerations

Upgrade and migrate a SharePoint environment (20%)

Evaluate content and customisations

Perform migration pre-check tasks; analyse content database test results; configure web application authentication for upgrade; resolve orphan objects; resolve missing file system components; resolve configuration conflict issues

Plan an upgrade process

Plan removal of servers in rotation; configure a parallel upgrade; configure read-only access for content; configure upgrade farms; measure upgrade performance; plan an installation sequence

Upgrade site collection

Perform a health check; analyse and resolve health check results; plan and configure available site collection modes; plan and configure site collection upgrade availability; plan and configure EVAL mode; plan and configure site collection upgrade throttling

Upgrade and migrate to SharePoint 2013 (IT pros)
Plan for upgrade to SharePoint 2013
Upgrade a site collection to SharePoint 2013

Create and configure service applications (21%)
Create and configure app management

Create and configure the App Store; create and configure subscriptions; configure marketplace connections; configure DNS entries; configure wildcard certificates

Create and configure productivity services

Create and configure Microsoft Excel Services, Microsoft Access services, Microsoft Visio services, Microsoft Word Automation services, Microsoft PowerPoint Conversion services, and Translation Services

Configure service application federation

Plan services to federate; perform a certificate exchange; manage trusts; manage service application permissions; publish service applications; consume service applications

Create and configure a Business Connectivity Service (BCS) and Secure Store application

Import and configure BCS models; configure BCS model security; configure BCS for search; generate a Secure Store master key; manage Secure Store target application permissions; create Secure Store target applications

Preparation resources

Module 6: SharePoint 2013 service application architecture and individual service applications
Configure services and service applications in SharePoint 2013
Configure business connectivity services solutions for SharePoint 2013

Manage SharePoint solutions, BI, and systems integration (18%)

Manage SharePoint solutions and applications

Manage sandbox solution quotas; configure sandbox solution management; deploy farm solutions; upgrade farm solutions; deploy Apps; upgrade Apps

Plan and configure a BI infrastructure

Plan and configure Performance Point; plan and configure reporting services; plan and configure PowerPivot; plan and configure Excel Services; plan and configure PowerView; plan and configure BI security

Create and configure work management

Configure a connection to Exchange; configure a connection to Microsoft Project Server; manage trusts; plan Exchange configuration for E-Discovery

Preparation resources
Install and manage solutions for SharePoint 2013
Business intelligence scenarios and solutions
SharePoint 2013: Work management service application


MCTS Training, MCITP Trainnig

Best Microsoft MCPCertification, Microsoft 70-332 Exam at certkingdom.com


 

 

QUESTION 1
You are instructed to make sure that the prerequisites with regards to the MyABC.ABC.com site
and the creation of site collections are suitably met.
You have Setup My Sites setting for the User Profile service application to make use of the URL of
the My Site host site collection.
Which of the following actions should you take NEXT?

A. You should consider configuring the Explicit exclusion type.
B. You should consider configuring the Explicit inclusion type.
C. You should consider configuring the Wildcard exclusion type.
D. You should consider configuring the Wildcard inclusion type.

Answer: B

Explanation:


QUESTION 2
You are preparing to configure authentication for the ABC360.ABC.com site as per the
requirements.
Which of the following actions should you take FIRST?

A. You should consider creating a new PerformancePoint target application.
B. You should consider creating a new Secure Store target application.
C. You should consider creating a new PerformancePoint target application.
D. You should consider creating a new Word Automation target application.

Answer: B

Explanation:


QUESTION 3
You have been instructed to make sure that language support meets the prerequisites.
Which of the following actions should you take?

A. You should consider creating one label and setting the locale to English (US).
B. You should consider creating one label and setting the locale to Dutch (HOL).
C. You should consider creating one label and setting the locale to French (FRA).
D. You should consider creating two labels and setting the locale of one label to English (US) and
the other to Dutch (HOL).

Answer: A

Explanation:


QUESTION 4
You have been asked to make sure that developers are assigned the correct permissions as per
the prerequisites.

A. You should consider making use of the Set Metadata Store Permissions option to assign the
Full permissions.
B. You should consider making use of the Set Metadata Store Permissions option to assign the
Read permissions.
C. You should consider making use of the Set Metadata Store Permissions option to assign the
Edit permissions.
D. You should consider making use of the Set Metadata Store Permissions option to assign the
Write permissions.

Answer: C

Explanation:


QUESTION 5
You are preparing to configure Excel Services to meet the prerequisites.
Which of the following actions should you take?

A. You should consider adding a Trusted Data Connection Library to the ABC360.ABC.com site.
B. You should consider adding an Unattended Service Account to the ABC360.ABC.com.
C. You should consider adding the User-defined functions allowed option to the
ABC360.ABC.com.
D. You should consider adding a trusted file location to the ABC360.ABC.com site.

Answer: D

Explanation:

Preparation To The MCTS Examination online 2015

The children live in a world of examinations. And they have to be aware of selecting these examinations as it can make their life verse or best. And the adults must show them the right path as it is their responsibility. If not they will make it worse. But at present Microsoft has jumped up to show the children the right examination which suited to them. And they have introduced a set of examinations which can be taken by them around the world for a low price. Among those examinations MCTS is a highlighted examination as it is a result oriented job guaranteed examination.

MCTS examination is also known as Microsoft Certified Technology Specialist. By following this certification the candidate has the ability to gain sufficient knowledge about the Information Technology.

How To Prepare For The MCTS examination
The candidate has to choose their interested subject and according to that he has to gain information about the relevant field. The accurate information can be taken from the official website of Microsoft. When going through the information the scholar has to study information such as objectives, course structure, exam conductance procedures.

The candidate must join in the online classes as it provides the candidate with much information. And he can gain updated information. Although the candidate can use traditional books as study materials, it is not much efficient. Therefore the most valid source of information is the internet.
MCTS

Studying the techniques of MCTS

When get used for the MCTS examination the scholar has to be in a free mind. He has to be with free of stress. Therefore follow the steps which can reduce the mental stress of the candidate. And it is better to be with another scholar who is preparing for the examination. It would make everything easy as both of the scholars can discuss the course content and release their problems. As well as it is easy to share the studying materials too. This is the best way to reduce the stress of the scholar. And it will also reduce the chance to be bored. It is a must to get an enough to sleep and rest as it keeps the scholar healthy.

From these facts the candidate might be able to prepare for the examination in a successful manner. And he will be able to finish the examination in a successful manner.
Conclusion

Finally we can conclude that the MCTS examination is a most highlighted certification in the field of Information Technology. It is important to pass this examination if somebody wishes to be a professional in Information Technology.


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Microsoft Exam 70-576: Get PRO at Designing and Developing Microsoft SharePoint Applications

Exam Code : 70-576
Exam Title : PRO: Designing and Developing Microsoft SharePoint 2010 Applications

Microsoft Exam 70-576: Get PRO at Designing and Developing Microsoft SharePoint Applications
Microsoft certification 70-576 exam is all about designing and developing SharePoint application. It was designed in English language on July 12, 2010. It targeted towards Developers and made using the technology of Microsoft SharePoint Server.OLYMPUS DIGITAL CAMERA

Candidate Profile
The Microsoft 70-576 holder will be responsible for designing custom code projects for SharePoint Servers. This will include selecting technology from a number of ways to build code of SharePoint. Also ensuing that the development team’s environment is configures, creating the best strategy for code deployment, structuring, configuration and versioning. The candidate is also suppose to lead a team of SharePoint developers, has a minimum of 2 years of experience of SharePoint development and 3 years of ASP.NET development experience.

Skills Being Measured
This exam will determine your skills and knowledge in the below mentioned key area. The percentage in front of each key area is the weight that particular major topic. However, the topics are not limited to this list and can be changed.

Creating an Application Design (19%)
Evaluating application data access
Identifying artifacts from application requirements
Selection of deployment model
Selecting the appropriate execution method

Designing UX (17%)
Determining the presentation page type
Determining SharePoint visual components
Planning branding strategy
Designing application customization strategy
Designing navigation strategy

Managing Application Development (18%)
Designing for localization and globalization
Developing a security approach
Defineing application configuration approach

Optimizing SharePoint Application Design (15%)
Optimizing page performance
Optimizing data access
Designing for logging and exception handling
Identifying and Resolving deployment issues
Analyzing memory utilization

Designing SharePoint Composite Applications (13%)
Designing external application integration
Determining data capturing approach
Designing SharePoint information architecture

Designing SharePoint Solutions and Features (18%)
For acquiring best result you need to avail all the training offers provided by Microsoft. From classroom training to e-learning they have it all. They provide teaching material and press books. You can join their chat rooms, newsgroups and forums and talk to Microsoft team. You can join Microsoft Learning Community, this is a community where you can connect to forums and ask your peers for suggestions about training resources and take their advice on this course. It is highly recommended by Microsoft that you purchase the learning material for best results.

 


 

MCTS Training, MCITP Trainnig

Best Microsoft MCITP Training , Microsoft 70-575 Training at certkingdom.com

Containers vs. virtual machines: How to tell which is the right choice for your enterprise

There’s a lot more to it than just how many apps you can put in a box

Name a tech company, any tech company, and they’re investing in containers. Google, of course. IBM, yes. Microsoft, check. But, just because containers are extremely popular, doesn’t mean virtual machines are out of date. They’re not.

Yes, containers can enable your company to pack a lot more applications into a single physical server than a virtual machine (VM) can. Container technologies, such as Docker, beat VMs at this part of the cloud or data-center game.

VMs take up a lot of system resources. Each VM runs not just a full copy of an operating system, but a virtual copy of all the hardware that the operating system needs to run. This quickly adds up to a lot of RAM and CPU cycles. In contrast, all that a container requires is enough of an operating system, supporting programs and libraries, and system resources to run a specific program.

What this means in practice is you can put two to three times as many as applications on a single server with containers than you can with a VM.

In addition, with containers you can create a portable, consistent operating environment for development, testing, and deployment. That’s a winning trifecta.

If that’s all there was to containers vs. virtual machines then I’d be writing an obituary for VMs. But, there’s a lot more to it than just how many apps you can put in a box.
Container problem #1: Security

The top problem, which often gets overlooked in today’s excitement about containers, is security. As Daniel Walsh, a security engineer at Red Hat who works mainly on Docker and containers puts it: Containers do not contain. Take Docker, for example, which uses libcontainers as its container technology. Libcontainers accesses five namespaces — Process, Network, Mount, Hostname, and Shared Memory — to work with Linux. That’s great as far as it goes, but there’s a lot of important Linux kernel subsystems outside the container.

These include all devices, SELinux, Cgroups and all file systems under /sys. This means if a user or application has superuser privileges within the container, the underlying operating system could, in theory, be cracked.

That’s a bad thing.
Now, there are many ways to secure Docker and other container technologies. For example, you can mount a /sys file system as read-only, force container processes to write only to container-specific file systems, and set up the network namespace so it only connects with a specified private intranet and so on. But, none of this is built in by default. It takes sweat to secure containers.

The basic rule is that you’ll need to treat containers the same way you would any server application. That is, as Walsh spells out:

Another security issue is that many people are releasing containerized applications. Now, some of those are worse than others. If, for example, you or your staff are inclined to be, shall we say, a little bit lazy, and install the first container that comes to hand, you may have brought a Trojan Horse into your server. You need to make your people understand they cannot simply download apps from the Internet like they do games for their smartphone.

OK, so if we can lick the security problem, containers will rule all, right? Well, no. You need to consider other container aspects.

Rob Hirschfeld, CEO of RackN and OpenStack Foundation board member, observed that: “Packaging is still tricky: Creating a locked box helps solve part of [the] downstream problem (you know what you have) but not the upstream problem (you don’t know what you depend on).”
Breaking deployments into more functional discrete parts is smart, but that means we have MORE PARTS to manage. There’s an inflection point between

To this, I would add that while this is a security problem, it’s also a quality assurance problem. Sure, X container can run the NGINX web server, but is it the version you want? Does it include the TCP Load Balancing update? It’s easy to deploy an app in a container, but if you’re installing the wrong one, you’ve still ended up wasting time.

Hirschfeld also pointed that out container sprawl can be a real problem. By this he means you should be aware that “Breaking deployments into more functional discrete parts is smart, but that means we have MORE PARTS to manage. There’s an inflection point between separation of concerns and sprawl.”

Remember, the whole point of a container is to run a single application. The more functionality you stick into a container, the more likely it is you should been using a virtual machine in the first place.

So how do you go about deciding between VMs and containers anyway? Scott S. Lowe, a VMware engineering architect, suggests that you look at the “scope” of your work. In other words if you want run multiple copies of a single app, say MySQL, you use a container. If you want the flexibility of running multiple applications you use a virtual machine.

In addition, containers tend to lock you into a particular operating system version. That can be a good thing: You don’t have to worry about dependencies once you have the application running properly in a container. But it also limits you. With VMs, no matter what hypervisor you’re using — KVM, Hyper-V, vSphere, Xen, whatever — you can pretty much run any operating system. Do you need to run an obscure app that only runs on QNX? That’s easy with a VM; it’s not so simple with the current generation of containers.

So let me spell it out for you.
Do you need to run the maximum amount of particular applications on a minimum of servers? If that’s you, then you want to use containers — keeping in mind that you’re going to need to have a close eye on your systems running containers until container security is locked down.

If you need to run multiple applications on servers and/or have a wide variety of operating systems you’ll want to use VMs. And if security is close to job number one for your company, then you’re also going to want to stay with VMs for now.

In the real world, I expect most of us are going to be running both containers and VMs on our clouds and data-centers. The economy of containers at scale makes too much financial sense for anyone to ignore. At the same time, VMs still have their virtues.

As container technology matures, what I really expect to happen, as Thorsten von Eicken, CTO of enterprise cloud management company RightScale, put it is that VM and containers will come together to form a cloud portability nirvana. We’re not there yet, but we will get there.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Go to Top