Exam 70-980 Recertification for MCSE: Server Infrastructure

0

Published: September 12, 2014
Languages: English, Japanese
Audiences: IT professionals
Technology: Windows Server 2012
Credit toward certification: MCP, MCSE

This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Plan and deploy a server infrastructure
Plan and deploy Virtual Machine Manager services
Design Virtual Machine Manager service templates, define operating system profiles, configure hardware and capability profiles, manage services, configure image and template libraries, manage logical networks
Plan and implement file and storage services
Planning considerations, including iSCSI SANs, Fibre Channel SANs, Virtual Fibre Channel, storage spaces, storage pools, and data deduplication; configure the iSCSI Target server; configure the Internet Storage Name server (iSNS); configure Network File System (NFS); install Device Specific Modules (DSMs)

Design and implement network infrastructure services
Design a name resolution solution strategy
Design considerations, including secure name resolution, DNSSEC, DNS Socket Pool, cache locking, disjoint namespaces, DNS interoperability, migration to application partitions, IPv6, Single-Label DNS Name Resolution, zone hierarchy, and zone delegation
Design and manage an IP address management solution
Design considerations, including IP address management technologies, such as IPAM, Group Policy based, and manual provisioning, and distributed versus centralized placement; configure role-based access control; configure IPAM auditing; migrate IPs; manage and monitor multiple DHCP and DNS servers; configure data collection for IPAM

Design and implement network access services
Design a VPN solution
Design considerations, including certificate deployment, firewall configuration, client/site to site, bandwidth, protocol implications, and VPN deployment configurations using Connection Manager Administration Kit (CMAK)
Design a DirectAccess solution
Design considerations, including topology, migration from Forefront UAG, DirectAccess deployment, and enterprise certificates
Design a Web Application Proxy solution
Design considerations, including planning for applications, authentication, and authorization, Workplace Join, devices, multifactor authentication, multifactor access control, single sign-on (SSO), certificates, and planning access for internal and external clients
Implement a scalable remote access solution
Configure site-to-site VPN, configure packet filters, implement packet tracing, implement multi-site Remote Access, configure Remote Access clustered with Network Load Balancing (NLB), configure DirectAccess
Design and implement a network protection solution
Design considerations, including Network Access Protection (NAP) enforcement methods for DHCP, IPSec, VPN, and 802.1x, capacity, placement of servers, firewall, Network Policy Server (NPS), and remediation network, configure NAP enforcement for IPsec and 802.1x, monitor for compliance

Design and implement an Active Directory infrastructure (logical)
Design a Group Policy strategy
Design considerations, including inheritance blocking, enforced policies, loopback processing, security, and WMI filtering, site-linked Group Policy Objects (GPOs), slow-link processing, group strategies, organizational unit (OU) hierarchy, and Advanced Group Policy Management (AGPM)

Design and implement an Active Directory infrastructure (physical)
Design a domain controller strategy
Design considerations, including global catalog, operations master roles, Read-Only Domain Controllers (RODCs), partial attribute set, and domain controller cloning
Design and implement a branch office infrastructure
Design considerations, including RODC, Universal Group Membership Caching (UGMC), global catalog, DNS, DHCP, and BranchCache; implement confidential attributes; delegate administration; modify filtered attributes set; configure password replication policy; configure hash publication

Manage and maintain a server infrastructure
Design a monitoring strategy
Design considerations, including monitoring servers using Audit Collection Services (ACS), performance monitoring, centralized monitoring, and centralized reporting; implement and optimize System Center 2012 – Operations Manager management packs; plan for monitoring Active Directory
Implement automated remediation
Create an Update Baseline in Virtual Machine Manager; implement a Desired Configuration Management (DCM) Baseline; implement Virtual Machine Manager integration with Operations Manager; configure Virtual Machine Manager to move a virtual machine (VM) dynamically, based on policy; integrate System Center 2012 for automatic remediation into your existing enterprise infrastructure

Plan and implement failover clustering

Plan and implement failover clustering
Plan for multi-node and multi-site clustering; design considerations, including redundant networks, network priority settings, resource failover and failback, heartbeat and DNS settings, Quorum configuration, and storage placement and replication
Plan and implement highly available network services
Plan for and configure NLB; design considerations, including fault-tolerant networking, multicast versus unicast configuration, state management, and automated deployment of NLB using Virtual Machine Manager service templates
Plan and implement highly available storage solutions
Plan for and configure storage spaces and storage pools; design highly available, multi-replica DFS namespaces; plan for and configure multi-path I/O, including Server Core; configure highly available iSCSI Target and iSNS Server
Plan and implement highly available roles
Plan for a highly available Dynamic Host Configuration Protocol (DHCP) Server, Hyper-V clustering, Continuously Available File Shares, and a DFS Namespace Server; plan for and implement highly available applications, services, and scripts using Generic Application, Generic Script, and Generic Service clustering roles
Plan and implement a business continuity and disaster recovery solution
Plan a backup and recovery strategy; planning considerations, including Active Directory domain and forest recovery, Hyper-V replica, domain controller restore and cloning, and Active Directory object and container restore using authoritative restore and Recycle Bin

Plan and implement a server virtualization infrastructure
Plan and implement virtualization hosts
Plan for and implement delegation of virtualization environment (hosts, services, and VMs), including self-service capabilities; plan and implement multi-host libraries, including equivalent objects; plan for and implement host resource optimization; integrate third-party virtualization platforms
Plan and implement virtual machines
Plan for and implement highly available VMs; plan for and implement guest resource optimization, including shared VHDx; configure placement rules; create Virtual Machine Manager templates
Plan and implement virtualization networking
Plan for and configure Virtual Machine Manager logical networks, including virtual switch extensions and logical switches; plan for and configure IP address and MAC address settings across multiple Hyper-V hosts, including network virtualization; plan for and configure virtual network optimization; plan and implement Windows Server Gateway; plan and implement VLANs and pVLANs; plan and implement virtual machine networks; plan and implement converged networks
Plan and implement virtualization storage
Plan for and configure Hyper-V host clustered storage; plan for and configure Hyper-V virtual machine storage, including virtual Fibre Channel, iSCSI, and shared VHDx; plan for storage optimization; plan and implement storage using SMB 3.0 file shares
Plan and implement virtual machine movement
Plan for and configure live and storage migration between Hyper-V hosts; plan for and manage P2V and V2V; plan and implement virtual machine migration between clouds
Manage and maintain a server virtualization infrastructure
Manage dynamic optimization and resource optimization, integrate Operations Manager with System Center Virtual Machine Manager and System Center Service Manager, update virtual machine images in libraries, plan for and implement backup and recovery of virtualization infrastructure by using System Center Data Protection Manager (DPM)

Design and implement identity and access solutions
Design and implement a federated identity solution
Plan for and implement claims-based authentication, including planning and implementing Relying Party Trusts; plan for and configure Claims Provider and Relying Party Trust claim rules; plan for and configure attribute stores, including Active Directory Lightweight Directory Services (AD LDS); plan for and manage Active Directory Federation Services (AD FS) certificates; plan for and implement Identity Integration with cloud services; integrate Web Application Proxy with AD FS
Design and implement Active Directory Rights Management Services (AD RMS)
Plan for highly available AD RMS deployment, plan for AD RMS client deployment, manage Trusted User Domains, manage Trusted Publishing Domains, manage Federated Identity support, upgrade or migrate AD RMS, decommission AD RMS

QUESTION 1
You implement and authorize the new DHCP servers. You import the server configurations and the scope configurations from PA1 and AM1.
You need to ensure that clients can obtain DHCP address assignments after you shut down PA1 and AM1. The solution must meet the technical requirements.
What should you do?

A. Run the Get-DhcpServerv4Lease cmdlet and the Remove-DhcpServerv4Lease cmdlet. Run the Windows Server Migration Tools.
B. Run the Get-DhcpServerv4Lease cmdlet and the Add-DhcpServerv4Lease cmdlet. Activate the scopes.
C. Run the Get-DhcpServerv4FreeIPAddress cmdlet and the Invoke-DhcpServerv4FailoverReplication cmdlet. Run the Windows Server Migration Tools.
D. Run the Get-DhcpServerv4FreeIPAddress cmdlet and the Invoke-DhcpServerv4FailoverReplication cmdlet Activate the scopes.

Answer: B


QUESTION 2
You need to recommend a management solution for the GPOs. The solution must meet the technical requirements. What should you include in the recommendation?

A. Microsoft Baseline Security Analyzer (MBSA)
B. Microsoft Desktop Optimization Pack (MDOP)
C. Microsoft System Center 2012 Operations Manager
D. Microsoft System Center 2012 Data Protection Manager (DPM)

Answer: B

Explanation:

D:\Documents and Settings\useralbo\Desktop\1.jpg
Microsoft Desktop Optimization Pack
Windows Vista Enterprise helps global organizations and enterprises with complex IT infrastructures lower IT costs, reduce risk, and stay connected. The Microsoft Desktop Optimization Pack for Software Assurance further extends this value by reducing application deployment costs, enabling delivery of applications as services, and allowing for better management and control of enterprise desktop environments. Together these technologies deliver a highly cost-effective and flexible Windows desktop management solution.
What is the Microsoft Desktop Optimization Pack?
The Microsoft Desktop Optimization Pack (MDOP) for Software Assurance is an add-on subscription license available to Software Assurance customers. It uses innovative technologies to help reduce the total cost of ownership (TCO) of the Windows desktop by accelerating operating system and application management and enhancing IT responsiveness and end-user uptime. It will enable you to better control the desktop, accelerate and simplify desktop deployments and management, and create a dynamic infrastructure by turning software into centrally managed services.
MDOP facilitates accelerated deployment and manageability of Windows through these innovative technologies— available only to Windows Software Assurance customers. http://technet.microsoft.com/en-us/library/cc507880.aspx


QUESTION 3
You are planning the decommissioning of research.contoso.com.
You need to ensure that an administrator named Admin5 in the research department can manage the user accounts that are migrated to contoso.com. The solution must minimize the number of permissions assigned to Admin5.
What should you do before you migrate the user accounts?

A. Run the New-Object cmdlet, and then run the Add-ADPrincipalGroupMembershipcmdlet.
B. Create a new organizational unit (OU), and then add Admin5 to the Account Operators group.
C. Create a new organizational unit (OU), and then run the Delegation of Control Wizard.
D. Run the New-Object cmdlet, and then run the Add-ADCentralAccessPolicyMembercmdlet.

Answer: C

Explanation:

D:\Documents and Settings\useralbo\Desktop\1.jpg
http://technet.microsoft.com/en-us/library/dd145344.aspx


QUESTION 4
You need to recommend changes to the DNS environment that support the implementation of the sales.contoso.com domain. The solution must ensure that the users in all of the
domains can resolve both Internet names and the names of the servers in all of the internal domains.
What should you recommend?

A. On the DNS servers in contoso.com, configure a reverse lookup zone. On the DNS servers in sales.contoso.com, configure a conditional forwarder to contoso.com.
B. On the DNS servers in contoso.com, add a conditional forwarder to the sales.contoso.com zone. On the DNS servers in sales.contoso.com, add a forwarder to the DNS servers of the company’s ISP.
C. On the DNS servers in contoso.com, create a zone delegation in the contoso.com zone. On the DNS servers in sales.contoso.com, add a forwarder to the contoso.com DNS servers.
D. On the DNS servers in contoso.com, configure a conditional forwarder to sales.contoso.com. On the DNS servers in sales.contoso.com, configure a reverse zone.

Answer: C

Explanation:

D:\Documents and Settings\useralbo\Desktop\1.jpg


QUESTION 5
You are evaluating the implementation of data deduplication on the planned Windows Server 2012 file servers.
The planned servers will have the identical disk configurations as the current servers.
You need to identify which volumes can be enabled for data deduplication.
Which volumes should you identify? (Each correct answer presents part of the solution. Choose all that apply.)

A. C
B. D
C. E
D. The CSV
E. DATA

Answer: C,E

Click here to view complete Q&A of 70-980 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-980 Training at certkingdom.com

Exam 70-981 Recertification for MCSE: Private Cloud

Published: August 13, 2014
Languages: English, Japanese
Audiences: IT professionals
Technology: Windows Server 2012
Credit toward certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Configure data center process automation
Implement workflows
Implement SCO Runbook automation; automate remediation of incidents, including resolution of System Center Virtual Machine‒based incidents; design and build end-to-end automation, incorporating System Center 2012 technologies; implement change control and problem resolution workflows
Implement service offerings
Add a new service offering to the service catalog, create a custom workflow using the Service Manager console, reference Orchestrator workflows in Service Manager, implement self-service provisioning of virtual machines

Deploy resource monitoring
Deploy end-to-end monitoring
Deploy agents, discover and deploy network device monitoring, import and configure management packs, deploy and configure monitoring of a heterogeneous virtualization infrastructure
Configure end-to-end monitoring
Configure overrides, create synthetic transactions, configure Outside-In monitoring, configure application performance monitoring (APM), create distributed application models, integrate the monitoring infrastructure with Global Service Monitor (GSM)
Create monitoring reports and dashboards
Implement service-level tracking; implement reports, including chargeback reports and System Center Manager data warehouse reports; implement dashboards

Configure and maintain service management
Implement service level management
Define service level objectives (SLOs) and service level agreements (SLAs); implement SLA management and escalation; maintain SLAs, including planning for future growth; analyze SLAs (reporting)
Manage problems and incidents
Customize problem management, link incidents to problems, and resolve problems; raise, assign, and resolve incidents; perform root cause analysis/diagnosis; integrate problem and incident resolution with change management; create and manage a knowledge base
Manage cloud resources
Deploy new applications to private and public clouds; deploy virtual machine (VM)/service (applications, SQL, roles), deploy multi-tier applications by using service templates, manage applications in private and public clouds, manage VM hardware (CPUs, dynamic memory), manage self service

Configure the fabric
Configure the storage fabric
Classification and pools, providers, arrays, file server cluster, storage pools, file shares
Configure the network fabric
Logical networks; VM networks; IP/MAC resource pools; VIP templates; load balancing; logical switches; network isolation, including network virtualization with Windows Server Gateway; private VLANs and VLANs
Configure and manage the deployment and update servers
Integrate a Windows Server Update Services (WSUS) server into the Virtual Machine Manager fabric; configure and manage a library server; integrate Windows Deployment Services (WDS)/PXE into the Virtual Machine Manager fabric, including virtualization host deployment using Windows Deployment Services (WDS)
Configure clouds and virtualization hosts
Clouds and host groups, configure and deploy virtualization hosts

Configure System Center integration
Configure private cloud integration
Configure Operations Manager connectors; Orchestrator integration packs; Service Manager connectors; SharePoint integration; configure IP Address Management (IPAM) server integration, configure AppController
Configure integration of private and public clouds
Configure Service Provider Framework (SPF), configure Windows Azure Pack for Windows Server

QUESTION 1
You need to implement a solution to meet the IM requirements for the help desk users.
What should you do?

A. Install Unified Communications Managed API 3.0 Runtime on LON-SM1.
B. Install the Lync 2010 client on LON-SM1.
C. Create a Service Manager workflow.
D. Create an IM channel.

Answer: B

Explanation:
Ref: http://technet.microsoft.com/en-us/library/hh495482.aspx


QUESTION 2
You need to implement the alert notifications. The solution must meet the technical requirements. A Lync Server administrator enables an account named ADATUM\IMUser for Unified Communications. What should you do next?

A. Configure ADATUM\IMUser as a Run As Account. Install the Lync Management Pack. Create a notification subscriber and an IM channel.
B. Create a mailbox for the ADATUM\IMUser account Install the Exchange Server Management Pack. Create a notification subscriber and an SMTP channel.
C. Create a mailbox for the ADATUM\IMUser account. Install Microsoft Visual C++ 2008 Runtime. Create a notification subscriber and an SMTP channel.
D. Configure ADATUM\IMUser as a Run As Account. Install Unified Communications
Managed API 3.0 Runtime. Create a notification subscriber and an IM channel.

Answer: D


QUESTION 3
You need to recommend a solution to remediate the Exchange Server 2010 service failures. The solution must meet the technical requirements.
What should you include in the recommendation?

A. Create a service request workflow that triggers a dependent activity.
B. Create an incident event workflow that triggers a dependent activity.
C. Create an incident event workflow that triggers a runbook activity.
D. Create a service request workflow that triggers a runbook activity.

Answer: C


QUESTION 4
You need to recommend a solution to meet the monitoring requirements for App2.
What should you include in the recommendation? (More than one answer choice may achieve the goal. Select the BEST answer.)

A. An aggregate rollup monitor
B. A distributed application
C. A dependency rollup monitor
D. Service monitors

Answer: B


QUESTION 5
You need to recommend a solution to ensure that the sales department managers can create instances of App1 in Cloud1.
What should you include in the recommendation?

A. A subscription in App Controller and a task in Service Manager
B. A dashboard in Operations Manager and a distributed application
C. A task in Operations Manager and a distributed application
D. A service offering in Service Manager and a runbook in Orchestrator

Answer: D

Click here to view complete Q&A of 70-981 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-981 Training at certkingdom.com

Exam 70-692 Upgrading Your Windows XP Skills to MCSA Windows 8

Published: November 3, 2014
Languages: English
Audiences: IT professionals
Technology: Windows 8.1
Credit toward certification: MCP, MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Exam 70-687
Install and upgrade to Windows 8.1 (25–30%)
Install Windows 8.1
Choose between an upgrade and a clean installation; determine which SKU to use, including Windows RT; determine requirements for particular features, including Hyper-V, Miracast display, pervasive device encryption, virtual smart cards, and Secure Boot
Migrate and configure user data
Migrate user profiles; configure folder location; configure profiles, including profile version, local, roaming, and mandatory

Preparation resources
Install, deploy, and migrate to Windows 8
Windows 8 and Windows 8.1 upgrade paths
Getting started with the User State Migration Tool (USMT)

Configure hardware and applications (25–30%)
Install and configure desktop apps and Windows Store apps
Install and repair applications by using Windows Installer, configure default program settings, modify file associations, manage access to Windows Store
Configure Hyper-V
Create and configure virtual machines, including integration services; create and manage checkpoints; create and configure virtual switches; create and configure virtual disks; move a virtual machine’s storage

Preparation resources
Try it out: Sideload Windows Store Apps
Client Hyper-V

Configure remote access and mobility (20–25%)
Configure mobility options
Configure offline file policies, configure power policies, configure Windows To Go, configure sync options, configure Wi-Fi Direct
Configure security for mobile devices
Configure BitLocker and BitLocker To Go, configure startup key storage

Preparation resources

Deploy Windows To Go in your organization
Understanding Wi-Fi Direct in Windows 8
BitLocker Group Policy settings

Configure system and data recovery options (20–25%)
Configure system recovery
Configure a recovery drive, configure system restore, perform a refresh or recycle, perform a driver rollback, configure restore points

Preparation resources
Deploy Push-Button Reset features
Windows 8 Jump Start module 6: Recovery and security

Exam 70-688
Support operating system and application installation (30-35%)

Support operating system installation
Support Windows To Go; manage boot settings, including native virtual hard drive (VHD) and multiboot; manage desktop images; customize a Windows installation by using Windows Preinstallation Environment (PE)
Support desktop apps
Desktop app compatibility using Application Compatibility Toolkit (ACT), including shims and compatibility database; desktop application co-existence using Hyper-V, RemoteApp, and App-V; installation and configuration of User Experience Virtualization (UE-V); deploy desktop apps by using Microsoft Intune
Support Windows Store and cloud apps
Install and manage software by using Office 365 and Windows Store apps; sideload apps by using Microsoft Intune; sideload apps into online and offline images; deep link apps by using Microsoft Intune; integrate Microsoft account, including personalization settings and Trusted PC

Preparation resources
Deployment considerations for Windows To Go
ACT deployment options
Microsoft Office 365 management and deployment

Support resource access (30-35%)
Support data storage
Distributed File System (DFS) client, including caching settings; storage spaces, including capacity and fault tolerance; optimizing data access by using BranchCache; OneDrive

Preparation resources
Deploy BranchCache

Support Windows clients and devices (30-35%)
Support mobile devices
Support mobile device policies, including security policies, remote access, and remote wipe; support mobile access and data synchronization, including Work Folders and Sync Center; support broadband connectivity, including broadband tethering and metered networks; support Mobile Device Management by using Microsoft Intune, including Windows RT, Windows Phone 8.1, iOS, and Android
Support client compliance
Manage updates by using Windows Update and Microsoft Intune, including non-Microsoft updates; manage client security by using Windows Defender, Microsoft Intune Endpoint Protection, or Microsoft System Center 2012 Endpoint Protection; manage Internet Explorer 11 security; support Group Policy application, including Resultant Set of Policy (RSoP), policy processing, and Group Policy caching
Manage clients by using Microsoft Intune
Manage user and computer groups, configure monitoring and alerts, manage policies, manage remote computers

Preparation resources
Enabling mobile device management with Windows Intune
How to: Set up and use File History on Windows 8
Manage software with Windows Intune


QUESTION 1
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows 8.1 Pro.
You need to choose the methods that do not require the manual entry of a product key during the upgrade.
Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.)

A. Extract the contents of the Windows 8.1 .iso image file to a new shared folder and run the setup program from that folder.
B. Use the Microsoft Deployment Toolkit.
C. Use the Windows 8.1 online upgrade tool.
D. Use Group Policy to assign the Windows 8 installation file to the client computers.

Answer: A,B


QUESTION 2
You manage computers that run Windows 8.1.
You plan to install a desktop app named MarketingApp on one of the client computers.
You need to display a progress bar to the user while installing the app.
Which command should you run?

A. msiexec /i marketingapp.msi /qn
B. msiexec /x marketingapp.msi /qb
C. msiexec /x marketingapp.msi /qn
D. msiexec /i marketingapp.msi /qb

Answer: B


QUESTION 3
You plan to purchase new Windows 8.1 tablets for your company network.
You need to ensure that tablet users are able to use the Windows 8.1 Snap feature.
Which hardware specifications should you meet in choosing tablets?

A. Monitor that supports at least five simultaneous touches
B. Monitor and video adapter that support a minimum screen resolution of 1024 x 768
C. Monitor and video adapter that support a minimum screen resolution of 1366 x 768
D. Monitor that supports at least three simultaneous touches

Answer: D


QUESTION 4
You support Windows 8.1 Enterprise computers that are members of a workgroup.
Users are able to download and install any app from Windows Store.
You need to ensure that only approved apps can be installed from Windows Store.
What should you do?

A. Configure a Software Restriction Policy Certificate rule.
B. Configure an AppLocker Publisher rule.
C. Enable Windows SmartScreen and select the Get administrator approval before running an unrecognized app from the Internet option.
D. Configure an AppLocker Packaged app rule.

Answer: D

Click here to view complete Q&A of 70-692 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-692 Training at certkingdom.com

 

Exam 70-688 Supporting Windows 8.1

Published: January 18, 2013
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows 8.1
Credit toward certification: MCP, MCSA, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of January 2014, this exam includes content covering Windows 8.1.

Support operating system and application installation (30–35%)
Support operating system installation
Support Windows To Go; manage boot settings, including native virtual hard disk (VHD) and multiboot; manage desktop images; customize a Windows installation by using Windows Preinstallation Environment (PE)
Support desktop apps
Desktop app compatibility using Application Compatibility Toolkit (ACT), including shims and compatibility database; desktop application co-existence using Hyper-V, RemoteApp, and App-V; installation and configuration of User Experience Virtualization (UE-V); deploy desktop apps by using Windows Intune
Support Windows Store and cloud apps
Install and manage software by using Office 365 and Windows Store apps; sideload apps by using Windows Intune; sideload apps into online and offline images; deep link apps by using Windows Intune; integrate Microsoft account, including personalization settings and Trusted PC

Preparation resources
Deployment considerations for Windows To Go
ACT deployment options
Windows upgrade and migration considerations

Support resource access (30–35%)
Support network connectivity
IPv4 and IPv6, including transition technologies; names resolution, including Peer Name Resolution Protocol (PNRP) and Domain Name System Security Extensions (DNSSECs); wireless networks and connections; network security, including Windows Firewall and IP security
Support remote access
Virtual private network (VPN), including Connection Manager Administration Kit (CMAK); Remote Desktop Protocol (RDP), including Remote Desktop Services Gateway access; DirectAccess; remote administration; Network Access Protection (NAP)
Support authentication and authorization
Multi-factor authentication, including certificates, virtual smart cards, picture passwords, and biometrics; workgroup versus domain, homegroup, computer and user authentication, including secure channel, account policies, credential caching, and Credential Manager; local account versus Microsoft account; Workplace Join
Support data storage
Distributed File System (DFS) client, including caching settings; storage spaces, including capacity and fault tolerance; optimizing data access by using BranchCache; OneDrive
Support data security
Permissions, including share, NTFS, and Dynamic Access Control (DAC); Encrypting File System (EFS), including Data Recovery Agent; access to removable media; BitLocker and BitLocker To Go, including Data Recovery Agent and Microsoft BitLocker Administration and Monitoring (MBAM)

Preparation resources
Windows authentication overview
Choosing a BranchCache design

Support Windows clients and devices (35–40%)
Support operating system and hardware
Resolve hardware and device issues, including STOP errors and Reliability Monitor; optimize performance by using Windows Performance Toolkit (WPT), including Xperf.exe, Xbootmgr.exe, XperfView.exe, and Windows Performance Recorder (WPR); monitor performance by using Data Collector Sets, Task Manager, and Resource Monitor; monitor and manage printers, including NFC Tap-to-Pair and printer sharing; remediate startup issues by using the Diagnostics and Recovery Toolkit (DaRT)
Support mobile devices
Support mobile device policies, including security policies, remote access, and remote wipe; support mobile access and data synchronization, including Work Folders and Sync Center; support broadband connectivity, including broadband tethering and metered networks; support Mobile Device Management by using Windows Intune, including Windows RT, Windows Phone 8, iOS, and Android
Support client compliance
Manage updates by using Windows Update and Windows Intune, including non-Microsoft updates; manage client security by using Windows Defender, Windows Intune Endpoint Protection, or Microsoft System Center 2012 Endpoint Protection; manage Internet Explorer 11 security; support Group Policy application, including Resultant Set of Policy (RSoP), policy processing, and Group Policy caching
Manage clients by using Windows Intune
Manage user and computer groups; configure monitoring and alerts; manage policies; manage remote computers

Preparation resources
Microsoft Virtual Academy: Endpoint protection in System Center 2012 SP1
Repair and recovery


QUESTION 1
You administer Windows 8.1 Pro tablets that are members of an Active Directory domain. Your company policy allows users to download and install only certain few Windows Store apps.
You have created a new AppLocker Packaged Apps policy to help enforce the company policy.
You need to test the new AppLocker Packaged Apps policy before you implement it for the entire company.
What should you do?

A. Open PowerShell and run the Get-AppLockerPoIicy -Effective cmdlet to retrieve the AppLocker effective policy.
B. Open Group Policy Management console and run the Group Policy Modeling Wizard.
C. Open Group Policy Management console and run the Group Policy Results Wizard.
D. Open Group Policy Management console and enforce the new AppLocker policy in Audit Only mode.

Answer: D


QUESTION 2
You have client computers that run Windows 8 Pro.
You need to recommend a solution to roll back the Windows Defender engine and the malware signature files on the computers. The solution must minimize administrative effort.
What should you include in the recommendation?

A. File History
B. the Program and Features Control Panel item
C. Windows 7 File Recovery
D. System Restore points

Answer: D


QUESTION 3
You administer Windows 8.1 Enterprise laptops. All of the computers are members of an Active Directory domain.
When traveling, users access the corporate network by using a virtual private network (VPN).
You need to implement two-factor authentication.
Which of the following should you use?

A. EAP-TLS
B. MS-CHAP v2
C. 802.1X
D. RADIUS
E. PPTP
F. L2TP/IPSEC
G. IPSEC/IKEv2
H. SSTP

Answer: D


QUESTION 4
You support desktop computers that run Windows 8 Pro and are used as guest terminals in a reception area. They are connected to the Internet and are configured with automatic logon by using a local user account.
You discover new applications on the Start screen of the computers.
You need to restrict access to Windows Store for local user accounts on the computers.
What should you do?

A. From Local Computer Policy, navigate to App Package Deployment and disable All Trusted Apps to Install.
B. From Local Computer Policy, select Store and enable Turn off the Store application.
C. From Local Computer Policy, select Store and disable Turn off Automatic Downloads for
Updates.
D. From Local Computer Policy, select Store and disable Allow Store to install apps on Windows To Go workspaces.

Answer: B


QUESTION 5
You manage client computers that run Windows 8 and are part of a workgroup.
These computers are configured to use Microsoft Update. Updates are downloaded every day at 10:00 and installed automatically.
Users report that their computers sometimes reboot without any interaction.
You need to prevent unplanned automatic reboots of the computers.
What should you do?

A. Enable the Reschedule Automatic Updates scheduled installations policy setting.
B. Disable the Re-prompt for restart with scheduled installations policy setting.
C. Enable the Automatic Updates detection frequency policy setting.
D. Enable the No auto-restart with logged on users for scheduled automatic updates installations policy setting.

Answer: D

 

Click here to view complete Q&A of 70-688 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-688 Training at certkingdom.com

Exam 70-687 Configuring Windows 8.1

Published: September 17, 2012
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows 8.1
Credit toward certification: MCP, MCSA, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of January 2014, this exam includes content covering Windows 8.1.

Install and upgrade to Windows 8.1 (10–15%)
Evaluate hardware readiness and compatibility
Choose between an upgrade and a clean installation; determine which SKU to use, including Windows RT; determine requirements for particular features, including Hyper-V, Miracast display, pervasive device encryption, virtual smart cards, and Secure Boot
Install Windows 8.1
Install as Windows To Go, migrate from previous versions of Windows to Windows 8.1, upgrade from Windows 7 or Windows 8 to Windows 8.1, install to VHD, install additional Windows features, configure Windows for additional languages
Migrate and configure user data
Migrate user profiles; configure folder location; configure profiles, including profile version, local, roaming, and mandatory

Preparation resources
Utility spotlight: Are you compatible with Windows 8?
Install, deploy, and migrate to Windows 8
Windows 8 upgrade paths

Configure hardware and applications (10–15%)
Configure devices and device drivers
Install, update, disable, and roll back drivers; resolve driver issues; configure driver settings, including signed and unsigned drivers; manage driver packages
Install and configure desktop apps and Windows Store apps
Install and repair applications by using Windows Installer, configure default program settings, modify file associations, manage access to Windows Store
Control access to local hardware and applications
Configure application restrictions, including Software Restriction Policies and AppLocker; manage installation of and access to removable devices; configure Assigned Access
Configure Internet Explorer 11 and Internet Explorer for the desktop
Configure compatibility view; configure Internet Explorer 11 settings, including add-ons, downloads, security, and privacy
Configure Hyper-V
Create and configure virtual machines, including integration services; create and manage checkpoints; create and configure virtual switches; create and configure virtual disks; move a virtual machine’s storage

Preparation resources
Device drivers and deployment
Managing client access to the Windows Store

Configure network connectivity (15–20%)
Configure IP settings
Configure name resolution, connect to a network, configure network locations
Configure networking settings
Connect to a wireless network, manage preferred wireless networks, configure network adapters, configure location-aware printing
Configure and maintain network security
Configure Windows Firewall, configure Windows Firewall with Advanced Security, configure connection security rules (IPsec), configure authenticated exceptions, configure network discovery
Configure remote management
Choose the appropriate remote management tools; configure remote management settings; modify settings remotely by using MMCs or Windows PowerShell; configure Remote Assistance, including Easy Connect

Preparation resources
Managing the new wireless network (IEEE 802.11) policies settings
Windows Firewall with advanced security and IPsec
Deploy remote server administration tools

Configure access to resources (10–15%)
Configure shared resources
Configure shared folder permissions, configure HomeGroup settings, configure libraries, configure shared printers, set up and configure OneDrive
Configure file and folder access
Encrypt files and folders by using Encrypting File System (EFS), configure NTFS permissions, configure disk quotas, configure file access auditing
Configure authentication and authorization
Configure user rights, manage credentials, manage certificates, configure biometrics, configure picture password, configure PIN, set up and configure Microsoft account, configure virtual smart cards, configure authentication in workgroups or domains, configure User Account Control (UAC) behavior

Preparation resources
Microsoft Virtual Academy: Windows 8 security insights: Module 7—SmartScreen filtering
Windows authentication overview

Configure remote access and mobility (10–15%)
Configure remote connections
Configure remote authentication, configure Remote Desktop settings, configure virtual private network (VPN) connections and authentication, enable VPN reconnect, configure broadband tethering
Configure mobility options
Configure offline file policies, configure power policies, configure Windows To Go, configure sync options, configure WiFi direct
Configure security for mobile devices
Configure BitLocker and BitLocker To Go, configure startup key storage

Preparation resources
Windows 8 VPN get connected
Deploy Windows To Go in your organization
BitLocker Group Policy settings

Monitor and maintain Windows clients (10–15%)
Configure and manage updates
Configure update settings, configure Windows Update policies, manage update history, roll back updates, update Windows Store apps
Manage local storage
Manage disk volumes and file systems, manage storage spaces
Monitor system performance
Configure and analyze event logs, configure event subscriptions, configure Task Manager, monitor system resources, optimize networking performance, configure indexing options

Preparation resources
Windows Update PowerShell module
Windows Performance Monitor
Windows 8: Task Manager retuned

Configure system and data recovery options (10–15%)

Configure system recovery
Configure a recovery drive, configure system restore, perform a driver rollback, perform a refresh or recycle, configure restore points
Configure file recovery
Restore previous versions of files and folders, configure file history, recover files from OneDrive

Preparation resources
Repair and recovery
How to: Set up and use file history on Windows 8
Windows 8 Jump Start Module 6: Recovery and security

QUESTION 1
A company has 100 client computers that run Windows 8.1.
You need to assign static IPv6 addresses to the client computers.
Which Windows Powershellcmdlet should you run?

A. Set-NetTCPSetting
B. Set-NetIPInterface
C. Set-NetlPv6Protocol
D. set-NetIPAddress

Answer: D
Explanation:
http://technet.microsoft.com/en-us/library/hh826151.aspx
Set-NetIPAddress
The Set-NetIPAddress cmdlet modifies IP address configuration properties of an existing IP address.
To create an IPv4 address or IPv6 address, use the New-NetIPAddress cmdlet.


QUESTION 2
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1.
Portable client computers no longer connect to the corporate wireless network.
You need to ensure that when the corporate wireless network is available, the computers always connect to it automatically.
Which two actions would achieve the goal? (Each correct answer presents a complete solution. Choose two.)

A. Create a Group Policy object (GPO) to configure a wireless network policy. Link the GPO to the organizational unit that contains the computers.
B. Configure the corporate wireless network as an unmetered network.
C. Configure the corporate wireless network as a preferred network.
D. Manually connect to the corporate wireless network and select the option to connect automatically to that network.

Answer: C,D
Explanation:

Answer:
Configure the corporate wireless network as a preferred network.
Manually connect to the corporate wireless network and select the option to connect
automatically to that network.
http://blogs.technet.com/b/canitpro/archive/2014/03/05/windows-8-1-tips-manage-wireless-
network-profiles.aspx
Windows 8.1 tips: Managing Wireless Network Profiles
And finally, if you wanted to change the preferred order for your machine to connect to
specific wireless network, you could move a network up in the priority list by using the
command: set profileorder name=goose interface=”Wi-Fi” priority=1


http://www.eightforums.com/tutorials/20152-wireless-networks-priority-change-windows-8-
a.html
How to Change Connection Priority of Wireless Networks in Windows 8 and 8.1
Windows usually connects to networks in this priority order:
? Ethernet
? WiFi (wireless)
? Mobile broadband
When you connect to a new WiFi network, it’s added to the list, and Windows will connect to that network while it’s in range. If you connect to another WiFi network while in range of the first network, Windows will prefer the second network over the first one.
Mobile broadband networks are treated differently. If you manually connect to a mobile
broadband network when there is a WiFi network in range, the mobile broadband network is preferred just for that session. The next time you’re in range of both networks, the WiFi network is preferred. This is because mobile broadband networks typically are metered.
If you want to force your PC to prefer a mobile broadband network over WiFi, tap or click the WiFi network in the list of networks, and then click Disconnect. Windows won’t automatically connect to that WiFi network.


QUESTION 3
A company has client computers that run Windows 8.1. The corporate network is configured for IPv4 and IPv6.
You need to disable Media Sensing for IPv6 on the client computers without affecting IPv4 communications.
What should you do on each client computer?

A. Run the Disable-NetAdapterBinding Windows PowerShell cmdlet.
B. Run the Disable-NetAdapter Windows PowerShell cmdlet.
C. Run the Set-NetlPv6Protocol Windows PowerShell cmdlet.
D. Run the Set-NetlPv4Protocol Windows PowerShell cmdlet.

Answer: C
Explanation: http://technet.microsoft.com/en-us/library/hh826144.aspx Set-NetIPv6Protocol
Set-NetIPv6Protocol -DhcpMediaSense<DhcpMediaSense>
Specifies a value for Media Sense. The cmdlet modifies the value for this setting.
Media Sense provides a mechanism for the network adapter to notify the protocol stack of media connect and disconnect events. These events trigger the DHCP client to take an action, such as attempting to renew a DHCP lease or removing routes that are related to a disconnected network. When Media Sense is enabled, the network parameters on the laptop of a roaming user are automatically and transparently updated without requiring a restart when the user moves from one location to another. The acceptable values for this parameter are:
— Enabled
— Disabled
The default value is Enabled.
Further information: Disable-NetAdapterBinding
The Disable-NetAdapterBinding cmdlet disables a binding to a network adapter. Running this cmdlet causes loss of network connectivity depending on the binding that is disabled. Note: Disabling some adapter bindings can automatically enable other network adapter bindings.
Disable-NetAdapter
The Disable-NetAdapter cmdlet disables a network adapter. A network adapter must be enabled to connect to a network. This cmdlet causes loss of network connectivity of the specified network adapter. Note: Do not disable the network adapter being used to manage a remote computer. By default the user will be prompted to confirm the network adapter should be disabled
Set-NetlPv4Protocol
Is not a valid cmdlet.


QUESTION 4 DRAG DROP
A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Two computers named COMPUTER1 and COMPUTER2 are connected to one network switch and joined to the domain. Windows Firewall is turned off on both computers.
You are planning a remote management solution.
You have the following requirements:
? Ensure that COMPUTER2 can run remote commands on COMPUTER1.
? Test the solution by successfully running a command from COMPUTER2 that
executes on COMPUTER1.
You need to select the commands to run on COMPUTER1 and COMPUTER2 to meet the remote management requirements.
Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)


Answer:


QUESTION 5
A company has 100 client computers that run Windows 8.1. The client computers are members of a workgroup.
A custom application requires a Windows Firewall exception on each client computer.
You need to configure the exception on the client computers without affecting existing firewall settings.
Which Windows PowerShell cmdlet should you run on each client computer?

A. New-NetFirewallRule
B. Set-NetFirewallSetting
C. Set-NetFirewallRule
D. Set-NetFirewallProfile
E. New-NetIPSecMainModeRule

Answer: A
Explanation:
http://technet.microsoft.com/en-us/library/jj554908.aspx
New-NetFirewallRule
The New-NetFirewallRule cmdlet creates an inbound or outbound firewall rule and adds the rule to the target computer.
Further information: Set-NetFirewallSetting
The Set-NetFirewallSetting cmdlet configures properties that apply to the firewall and IPsec settings, regardless of which network profile is currently in use. This cmdlet allows the administrator to specify global firewall behavior.
Set-NetFirewallRule
The Set-NetFirewallRule cmdlet modifies existing firewall rule properties.
Set-NetFirewallProfile
The Set-NetFirewallProfile cmdlet configures options for the profiles, including domain, public, and private, that are global, or associated with the input rules.
New-NetIPSecMainModeRule
The New-NetIPsecMainModeRule cmdlet creates an IPsec main mode rule.
A main mode rule contains a set of local and remote end points to determine the peers to which it applies. When an application on the local computer attempts to communicate with one of these specified remote hosts, the computer attempts to establish a security association (SA) with the remote server.

 

Click here to view complete Q&A of 70-687 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-687 Training at certkingdom.com

Exam 70-686 Windows 7, Enterprise Desktop Administrator

Published: November 20, 2009
Languages: English
Audiences: IT professionals
Technology: Windows 7
Credit toward certification: MCP, Specialist, MCITP

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Planning and managing a client life cycle strategy (16%)
Plan and manage client licensing and activation

Applications and operating systems; activation method; KMS vs. MAK; prerequisites; choosing a SKU; licensing infrastructure; licensing compliance audits; inventory audits; virtualization licensing considerations; making recommendations for licensing strategy and compliance

Plan and manage software updates

Application updates and operating system updates; evaluating and approving software updates; enterprise applications; designing an update strategy; choosing an update tool; planning and deploying a service pack; schedule considerations; network considerations; test updates; auditing for security compliance

Plan and manage a physical hardware and virtualization strategy

Analyzing existing hardware environment; determining which systems meet minimum requirements; tradeoffs of physical vs. VDI environment; network load considerations; disk space; direct connection vs. brokered connection; determining a VHD strategy; choosing 32 bit vs. 64 bit

Preparation resources
Licensing and volume activation
Application management and preparing for a Windows 7 deployment
Microsoft desktop virtualization strategy and product offerings

Designing a standard image (17%)

Design an image creation strategy

Identifying operating system and enterprise applications that will be included with the standard image; thick, thin, or hybrid; role-based or geographic-based images vs. single core image; image localization

Design a custom image

Identifying applications to be installed; identifying features and components to be enabled or disabled; testing the customized image

Define an image update strategy

Performance optimization; security considerations; efficiency; offline servicing vs. online or post-image updates; re-creating; recapturing

Preparation resources
Choosing an image strategy and building Windows 7 system images
Phase 3: Preparing and customizing your Windows image
Phase 5: Managing and servicing your Windows image

Designing client configurations (17%)
Design standard system settings

Choosing methods, including logon scripts, startup scripts, and Group Policy; designing profiles; designing error reporting; designing audit policy

Define client security standards

Application control policies; encryption; stopping unnecessary services; designing firewall rules; defining anti-malware settings; changes to Kerberos and NTLM; configuring user rights; defining UAC policy; designing a security template for system lockdown; defining account policies; designing security standards for removable storage

Define Windows Internet Explorer settings

Defining security zones; cache location; branding; in-private mode; restricting or allowing plug-ins; add-ons; privacy policy; browser protected mode

Preparation resources
Local Group Policy editor
Windows Firewall with Advanced Security design guide
Change Internet Explorer security settings

Designing a Windows 7 client deployment (15%)

Analyze the environment and choose appropriate deployment methods

Building the infrastructure; advantages of lite-touch vs. zero-touch vs. local install; capacity and scale considerations; determining required changes to the infrastructure

Design a lite-touch deployment strategy

Unicast vs. multicast; auto-cast vs. scheduled-cast; staggered deployment; scheduling considerations; network load considerations; choosing a client boot method for deployment; unattended answer files; restricting who can receive images; choosing a delivery mechanism

Design a zero-touch deployment strategy

Designing and configuring task sequencing; unattended answer files; scheduling considerations; staggered deployment; network load considerations; restricting who can receive images

Design a user state migration strategy

Determining which user data and settings to preserve; local vs. remote storage considerations; determining mitigation plan for non-migrated applications; securing migrated data; testing designed strategy; wipe-and-load migration vs. side-by-side migration

Preparation resources
Choose the right Microsoft deployment tool
Lite-Touch, High-Volume Deployment
Zero-Touch, High-Volume Deployment

Designing application packages for deployment (17%)
Design a delivery or deployment strategy

Auditing for prerequisites and minimum requirements; choosing a deployment method such as virtualized, Remote Desktop Services, Group Policy, or software distribution; server-based or client-based install; scheduling considerations; staggered deployment; network considerations; package creation standards

Manage application compatibility

Testing incompatibility; choosing a method for resolving incompatibility, such as upgrading, Remote Desktop Services, shim, or VDI; auditing incompatible software

Preparation resources
Choosing a deployment strategy
Application compatibility
Application compatibility for Windows 7: Unlocking the power of Application Shims

Identifying and resolving deployment and client configuration issues (19%)

Identify and resolve Internet Explorer issues

Security zones; Web applications; advanced settings; Group Policy restrictions; certificates

Identify and resolve Group Policy issues

Delegation; inheritance; policies are not effective; blocking; permissions; loopback processing; user vs. computer settings; filtering; performance

Identify and resolve networking issues

Wireless; remote access; VPN; certificates; performance; IP communication; Windows Firewall

Identify and resolve authentication and authorization issues

User rights; distinguishing between client-based and server-based issues; time synchronization (Kerberos)

Preparation resources
Troubleshooting
Windows Firewall with Advanced Security troubleshooting guide: Diagnostics and tools
Windows 7: Troubleshooting and support


QUESTION 1
You are planning to upgrade Internet Explorer. You have the following requirements:
* Create a report that identifies which computers are successfully upgraded.
* Do not install additional software on the client computers.
You need to design a deployment method that meets the requirements. What should you do?

A. Use Windows Server Update Services (WSUS).
B. Use Internet Explorer Administration Kit (IEAK) and Group Policy.
C. Use Microsoft System Center Configuration Manager.
D. Use Microsoft System Center Essentials.

Answer: A


QUESTION 2
Your company has a single Active Directory Domain Services (AD DS) domain with Windows Server
2008 R2 member servers and 1,000 Windows 7 client computers. You are designing the
deployment of a custom application. You have the following requirements:
* The application must be available to only users who need it.
* Minimize network traffic during deployment.
You need to design a deployment strategy that meets the requirements. Which deployment
method should you use?

A. Microsoft Application Virtualization (App-V)
B. Microsoft System Center Configuration Manager 2007
C. RemoteApp and Desktop Connections
D. software installation in Group Policy

Answer: C


QUESTION 3
Your network consists of an Active Directory Domain Services (AD DS) forest with 1,000 client
computers that run Windows XP. Nine hundred of the computers are on the local area network.
One hundred computers are portable computers that connect to the main office only once every
few months. You are planning to deploy Windows 7. You need to generate a report of the software
that is installed on all client computers. You need this information as soon as possible. What should
you use?

A. Microsoft System Center Data Protection Manager
B. Microsoft Desktop Optimization Pack
C. Microsoft System Center Essentials
D. Microsoft System Center Operations Manager

Answer: B


QUESTION 4
Your network has client computers that run Windows Vista. You are planning to deploy Windows
7. You need to detect and analyze the compatibility of an application that requires elevated
privileges. What should you do?

A. Use the Standard User Analyzer (SUA) Wizard.
B. Run a virtual version of the Setup Analysis Tool (SAT).
C. Use the Standard User Analyzer (SUA) tool.
D. Run a stand-alone version of the Setup Analysis Tool (SAT).

Answer: C


QUESTION 5
Your company’s network has client computers that run Windows 7. Multiple users share the
computers in the shipping department. These computers reside in the Shipping Computers
organizational unit (OU). The company wants to deploy a new application. The application is not
packaged. You have the following requirements:
* Deploy the application to all computers in the shipping department.
* Perform the deployment from a central location.
You need to plan the software deployment process to meet the requirements. Which two actions
should you include in the process? (Each correct answer presents part of the solution. Choose two.)

A. Using Microsoft System Center Configuration Manager, create a collection that contains the
shipping department computers, and assign the package to the collection.
B. Create a package by using Microsoft System Center Configuration Manager.
C. Create a Group Policy object (GPO) and add a software installation policy under the Computer
Configuration container.
D. In the Group Policy Management Console, link the software installation policy to the Shipping
Computers OU.
E. Using Microsoft System Center Configuration Manager, create a collection that contains the
shipping department users, and assign the package to the collection.

Answer: A,B

Click here to view complete Q&A of 70-686 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-686 Training at certkingdom.com

Exam 70-685 Windows 7, Enterprise Desktop Support Technician

Published: November 27, 2009
Languages: English, German, Japanese
Audiences: IT professionals
Technology: Windows 7
Credit toward certification: MCP, Specialist

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Identifying cause of and resolving desktop application issues (20-25%)
Solve software installation escalations
Installation permissions; local administrator requirement; licensing restrictions; digital signing
Solve software failure escalations
Checking the logs; checking whether the application runs in Safe mode; running the application in a previous version of Windows; repairing the installation; checking recently added programs; restoring or reimaging the system

Preparation resources
Help with Windows 7 compatibility problems
Five steps to Windows 7 application readiness
Performance monitoring getting started guide

Identifying cause of and resolving networking issues (20-25%)
Solve enterprise logon issues
Hardware vs. network; password expiration; trust relationships with machine accounts; determining logon context; logon hours compliance
Solve enterprise network connectivity issues
Determining scope of issue; determining whether it’s a PC or a network connectivity issue; TCP/IP; hardware and cabling; proxies; default gateway
Solve enterprise names resolution issues
Checking which DNS is assigned; flushing the DNS cache; nslookup to DNS server; checking the DHCP scopes
Solve enterprise network printer issues
Hardware failure; server issues; printer failure; network issues; driver issues

Preparation resources
Windows 7: Troubleshooting connections
Open the printer troubleshooter

Managing and maintaining systems that run Windows 7 client (20-25%)
Identify and/or resolve performance issues
Analyzing system and application logs; analyzing started services; setting power management; checking hard drive space; optimizing virtual memory
Solve hardware failure issues
Identifying bad sectors; diagnosing memory issues; recommending replacement hardware; updating the BIOS; determining which component is broken

Preparation resources
Check a drive for errors
Learn best practices for optimizing the virtual memory configuration
Run diagnostics to check your system for memory problems

Supporting mobile users (15-20%)
Solve enterprise wireless connectivity issues
Signal strength; encryption types; encryption keys; wireless profiles; mobile devices
Solve enterprise remote access issues
VPN client not connecting; IPv6 support; access and authentication to network resources

Preparation resources
Wired and wireless network problems
Troubleshoot Remote Desktop problems
Why am I having problems with my VPN connection?

Identifying cause of and resolving security issues (15-20%)
Solve Windows Internet Explorer security issues
Adding trusted sites; advanced settings; installing plug-ins; identifying group policy restrictions; certificates
Solve enterprise issues due to malicious software
Analyzing services; analyzing programs; analyzing processes; analyzing browser helper add-ons; user account control
Solve enterprise storage security issues
Requirements for installing; recovering encryption keys; key management
Solve enterprise software update issues
Identifying software update level; checking whether client is receiving regularly scheduled updates; identifying incompatibility of update with other applications

Preparation resources
Change Internet Explorer 9 security settings
Troubleshoot problems with installing updates
Security monitoring and attack detection planning guide


QUESTION 1
The chief financial officer (CFO) releases new guidelines that specify that only users from finance are allowed to run FinanceApp1.
Users in the Marketing OU report that they can run FinanceApp1.
You need to ensure that only users in the Finance OU can run FinanceApp1.
What should you do?

A. In the AllComputers GPO, create a new AppLocker executable rule.
B. In the Desktops GPO and the Laptops GPO, create a new Windows Installer rule.
C. In the AllComputers GPO, create a software restriction policy and define a new hash rule.
D. In the Desktops GPO and the Laptops GPO, create a software restriction policy and define a new path rule.

Answer: A

Explanation:
Chapter 10 p 467- 468
Understanding the difference between SRP and AppLocker
You might want to deploy application control policies onto Windows operating systems earlier than Windows
Server2008R2 or Windows7. You can use AppLocker policies only on the supported editions of Windows
Server2008R2 and Windows7, but you can use SRP on supported editions of Windows beginning with
Windows Server2003 and WindowsXP. http://technet.microsoft.com/en-us/library/ee460955(WS.10).aspx http://technet.microsoft.com/en-us/library/dd548340(WS.10).aspx


QUESTION 2
Users in the ERPApp1 pilot project report intermittent application issues.
You need to consolidate all application events for the users in a central location.
What should you do?

A. Configure event subscriptions.
B. Configure the Advanced Audit Policy Configuration settings.
C. Create a custom view in Event Viewer.
D. Create a user-defined Data Collector Set.

Answer: A


QUESTION 3
The help desk reports that users in the Marketing OU print draft documents, e-mails, and
other miscellaneous documents on Printer2.
You need to recommend a solution so that marketing users print documents to Printer1 by default.
What should you do?

A. Enable printer pooling.
B. Configure Group Policy Preferences.
C. Modify the priorities of the shared printers.
D. Modify the permissions of the shared printers.

Answer: B


QUESTION 4
The Office1 network link is brought offline for emergency maintenance.
Users in Office2 and Office3 report that they cannot connect to the wireless network.
You need to recommend changes to ensure that users in all offices can connect to the wireless network if a WAN link fails.
What should you recommend?

A. that redundant DHCP scopes be created
B. that additional RADIUS servers be deployed
C. that universal group caching be implemented
D. that additional default gateways be configured

Answer: B


QUESTION 5
The company is deploying a new application.
When users attempt to install the application, they receive an error message indicating that they need administrative privileges to install it.
You need to recommend a solution to ensure that users can install the application. The solution must adhere to the corporate security guidelines. What should you recommend?

A. Publish the application by using a Group Policy.
B. Disable User Account Control (UAC) by using a Group Policy.
C. Add all domain users to the local Power Users group by using Restricted Groups.
D. Add the current users to the local Administrators group by using Group Policy preferences.

Answer: A

Explanation:
http://magalan.co.uk/install_software_via_group_policy.html

 


Click here to view complete Q&A of 70-685 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-685 Training at certkingdom.com

 

70-680 Exam Windows 7, Configuring

Published: April 1, 2009
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil), Russian, Spanish, Turkish
Audiences: IT professionals
Technology: Windows 7
Credit toward certification: MCP, Specialist

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Installing, upgrading, and migrating to Windows 7 (10–15%)
Perform a clean installation
Identifying hardware requirements; setting up as the sole operating system; setting up as dual boot; installation methods; boot from the source of installation, preparing the installation source: USB, CD, network share, WDS
Upgrade to Windows 7 from previous versions of Windows
Upgrading from Windows Vista; migrating from Windows XP; upgrading from one edition of Windows 7 to another edition of Windows 7
Migrate user profiles
Migrating from one machine to another; migrating from previous versions of Windows; side-by-side vs. wipe and load

Preparation resources
Upgrade and migration
Utility spotlight: Windows 7 installation simplified
Deployment and user profiles

Deploying Windows 7 (10–15%)
Capture a system image
Preparing system for capture; creating a WIM file; automated capture; manual capture
Prepare a system image for deployment
Inserting an application into a system image; inserting a driver into a system image; inserting an update into a system image; configuring tasks to run after deployment
Deploy a system image
Automated deployment methods; manually deploying a customized image
Configure a VHD
Creating, deploying, booting, mounting, and updating VHDs; offline updates; offline servicing

Preparation resources
Deploy Windows 7
Choosing an image strategy and building Windows 7 system images
Phase 4: Deploying your Windows image

Configuring hardware and applications (10–15%)
Configure devices
Updating, disabling, and uninstalling drivers; signed drivers; conflicts between drivers; configuring driver settings; resolving problem device driver
Configure application compatibility
Setting compatibility mode; implementing shims; compatibility issues with Internet Explorer
Configure application restrictions
Setting software restriction policies; setting application control policies; setting through group policy or local security policy
Configure Internet Explorer
Configuring compatibility view; configuring security settings; configuring providers; managing add-ons; controlling InPrivate mode; certificates for secure websites

Preparation resources
Configuring device properties
Application compatibility
Configuring Internet Explorer 8

Configuring network connectivity (10–15%)
Configure IPv4 network settings
Connecting to a network; configuring name resolution; setting up a connection for a network; network locations; resolving connectivity issues; APIPA
Configure IPv6 network settings
Configuring name resolution; connecting to a network; setting up a connection for a network; network locations; resolving connectivity issues; link local multicast name resolution
Configure networking settings
Adding a physically connected (wired) or wireless device; connecting to a wireless network; configuring security settings on the client; set preferred wireless networks; configuring network adapters; configuring location-aware printing
Configure Windows Firewall
Configuring rules for multiple profiles; allowing or denying an application; network-profile-specific rules; configuring notifications; configuring authenticated exceptions
Configure remote management
Remote management methods; configuring remote management tools; executing PowerShell commands

Preparation resources
Windows 7 and network connectivity
Configure network connections
Remote management of Windows 7 with Windows PowerShell

Configuring access to resources (10–15%)
Configure shared resources
Folder virtualization; shared folder permissions; printers and queues; configuring HomeGroup settings
Configure file and folder access
Encrypting files and folders by using EFS; configuring NTFS permissions; resolving effective permissions issues; copying files vs. moving files
Configure user account control (UAC)
Configuring local security policy; configuring admin vs. standard UAC prompt behaviors; configuring Secure Desktop
Configure authentication and authorization
Resolving authentication issues; configuring rights; managing credentials; managing certificates; smart cards with PIV; elevating user privileges; multifactor authentication
Configure BranchCache
Distributed cache mode vs. hosted mode; network infrastructure requirements; configuring settings; certificate management

Preparation resources
Accessing local and network resources in Windows 7
Authorization and access control technologies
Deploying BranchCache with remote access technologies

Configuring mobile computing (10–15%)
Configure BitLocker and BitLocker To Go
Configuring BitLocker and BitLocker To Go policies; managing Trusted Platform Module (TPM) PINs; configuring startup key storage; data recovery agent support
Configure DirectAccess
Configuring client side; configuring authentication; network infrastructure requirements
Configure mobility options
Configuring offline file policies; transparent caching; creating and migrating power policy
Configure remote connections
Establishing VPN connections and authentication; enabling a VPN reconnect; advanced security auditing; NAP quarantine remediation; dial-up connections; remote desktop; published apps

Preparation resources
Windows 7 BitLocker: Configuration and deployment
DirectAccess Configuration, tips, tricks, and best practices
Configuring VPN remote access connections to use NAP based quarantine

Monitoring and maintaining systems that run Windows 7 (10–15%)
Configure updates to Windows 7
Configuring update settings; determining source of updates; configuring Windows Update policies; reviewing update history; checking for new updates; rolling back updates
Manage disks
Managing disk volumes; managing file system fragmentation; RAID; removable device policies
Monitor systems
Configuring event logging; filtering event logs; event subscriptions; data collector sets; generating a system diagnostics report
Configure performance settings
Configuring page files; configuring hard drive cache; updated drivers; configuring networking performance; configuring power plans; configuring processor scheduling; configuring desktop environment; configuring services and programs to resolve performance issues; mobile computing performance issues; configuring power

Preparation resources
Manage disks
Windows performance monitor
Configure power plans

Configuring backup and recovery options (10–15%)
Configure backup
Creating a system recovery disk; backing up files, folders, or full system; scheduling backups
Configure system recovery options
Configuring system restore points; restoring system settings; last known good configuration; complete restore; driver rollback
Configure file recovery options
Configuring file restore points; restoring previous versions of files and folders; restoring damaged or deleted files by using shadow copies; restore user profiles

Preparation resources
Create and use backups using the Backup and Restore Center
Restore system files and settings
System restore

QUESTION
01
You have a dual boot PC running both Vista and Windows 7 on partitions on the computer.
Which file would you edit to force the PC to book Vista by default?

A. boot.ini
B. ntfsboot.cfg
C. bcdedit.exe
D. system.cfg

Answer: C


QUESTION 02
Which of the following steps will keep a Microsoft Word shortcut icon on the Taskbar after the next
reboot?

A. Copy and paste a Microsoft Word icon to the Taskbar.
B. Right click on the Microsoft Word icon and choose, “Staple to Superbar”.
C. Right click on the Microsoft Word icon and choose, “Pin this programm to taskbar”.
D. Open Microsoft Word. While the Icon is on the Taskbar, right click the icon and choose, “Pin
this program to taskbar”.

Answer: D


QUESTION 03
You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 is
used to remotely manage Computer2. From Computer1, you need to verify that the Windows
Remote Management (WinRM) service started on Computer2. What should you do?

A. At the command prompt, run Winrs -r:computer2 query.
B. At the command prompt, run Winrm id -remote:computer2.
C. From Windows Powershell, run Get -PSSession Computer2.
D. From Windows Powershell, run Get -PSSessionConfiguration Computer2.

Answer: A


QUESTION 04
You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1
attempts to access a Web page. User1 fails to access the Web page and receives an error message
stating that the page does not have a rating. You need to configure Internet Explorer to allow User1
to access Web pages that do not have a rating. Which settings should you modify?

A. Content Advisor
B. InPrivate Filtering
C. Parental Controls
D. Restricted Sites

Answer: A


QUESTION 05
You are installing a 64-bit edition of Windows 7. During the installation, you receive an error
message when you attempt to add mass storage driver. You need to complete the installation of
Windows 7. You start the computer from the Windows 7 installation media. What should you do
next?

A. From the Install Windows dialog box, click RESCAN.
B. From the Install Windows dialog box, click DRIVE OPTIONS (ADVANCED).
C. From the Advanced Boot options menu, select SAFE MODE.
D. From the Advanced Boot options menu, select DISABLE DRIVER SIGNATURE ENFORCEMENT.

Answer: B


QUESTION 06
You have a computer that runs windows 7. You need to configure the monitor on the computer to
turn off after 30 minutes of inactive. What should you do?

A. From personalization, change the theme.
B. From display, change display settings.
C. From action center, change the Action Center settings.
D. From power options, change the current power plan settings.

Answer: D


QUESTION 07
You have a computer that runs windows 7. The windows experience index displays the subscores
in the following:
* Component Subscore
* Processor 6.9
* Memory (RAM) 5.3
* Graphics 3.2
* Gaming graphics 4.1
* Primary hard disk 4.5
You need to increase the Windows Experience Index base score. What should you do?

A. Add more RAM.
B. Add a second hard disk.
C. Upgrade the video adapter.
D. Upgrade to a faster processor.

Answer: C


QUESTION 08
You have a virtual hard disk (VHD) file. You need to view the files in the VHD. The solution must
prevent users that log on to your computer from modifying files in the VHD. What should you do?

A. From Disk Management, attach the VHD as read-only.
B. From Disk Management, convert the VHD to a GPT disk.
C. From Windows Explorer, modify the permissions of the VHD file.
D. From Windows Explorer, modify the read-only attribute of the VHD file.

Answer: A


QUESTION 09
Your computer running Windows 7 Enterprise has two internal hard disks. System protection is
configured by default on the C: drive, which holds the operating system and installed applications.
The D: drive is a 500 GB hard disk formatted with the NTFS filing system, and you use it to store
your personal files. You want to store previous versions going back several months and therefore
intend to reserve 200 GB of this disk for system protection. You are not using either of your internal
disks for backup; instead, you store your backups on a 1 TB external USB hard disk. How do you
configure system protection on your D: drive? (Choose all that apply; each answer forms a part of
the complete solution.)

A. Select Restore System Settings And Previous Versions Of Files.
B. Select Only Restore Previous Versions Of Files.
C. Set the Max Usage slider control to 40 percent.
D. Set the Max Usage slider control to 4 percent.

Answer: BC


QUESTION 10
An employee who works from home telephones your help desk. A virus attack has deleted his
computer’s single internal hard disk. He carried out a System Image backup on his computer three
months ago and automatically backs up his personal files every night. He uses an external USB hard
drive formatted with the NTFS file system to hold his backups. All his personal files are in his
Documents library. What do you advise? (Choose all that apply; the answers form a complete solution.)

A. Carry out a System Image restore.
B. Carry out a system restore.
C. Use Restore Previous Versions to restore his Documents library from a shadow copy.
D. Use Restore My Files in the Backup And Restore console to restore his Documents library folder.

Answer: AD

Click here to view complete Q&A of 70-680 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-680 Training at certkingdom.com

Exam 70-673 TS: Designing, Assessing, and Optimizing Software Asset Management (SAM)

Published: November 4, 2008
Languages: English
Audiences: IT professionals
Technology: Windows Server 2008
Credit toward certification: MCTS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Assess software asset management (SAM) programs by using the SAM Optimization Model (18%)
Define the scope of a SAM program assessment
Identify infrastructure groups and locations, estimated quantity of hardware and software assets, functional descriptions for each group, and key points of contact
Assess SAM processes throughout an organization
Assess infrastructure groups for the existence of documented SAM procedures, roles, and responsibilities
Assign maturity levels according to the 10 components of the SAM Optimization Model
Assign one of four maturity levels to each component
Perform a gap analysis between the current maturity level and the desired maturity level
Review assigned maturity levels, compare assigned maturity levels with desired maturity levels

Preparation resources
Software Asset Management Assessment
Microsoft inventory and assessment tools
SAM Assessment report workbook

Perform software license reviews (21%)

Collect and manage complete hardware and software inventories
Review an organization’s hardware and software inventory collection processes and data to ensure completeness
Validate inventory accuracy
Normalize software inventories and reconcile them against other data sources to verify the accuracy of specified license metrics, such as user counts based on HR employee records
Collect, validate, and manage license entitlement records
Gather, store, normalize, and validate license entitlement records; provide reports as needed
Perform a periodic reconciliation of software inventories and license entitlements
Reconcile software inventory data against software license entitlements data to determine and report license compliance status

Preparation resources
SAM and licensing
Taking inventory
Software and hardware spreadsheet template

Coordinate data collection technologies (21%)
Manage data collection
Identify machine type, agent installation requirements, collection schedules, and discrepancies between inventories; define data schemas; identify data storage locations; normalize the collected data
Coordinate data collection between operations groups
Facilitate data transfer and synchronization between various IT groups, validate data between these groups, and ensure that overall SAM processes are being followed
Manage data interfaces between disparate data sources
Identify the process of matching common fields, cross-referencing, determine whether an individual record in one data source requires the updating of other data sources by using manual or automated techniques; manage the data transfer process
Manage reporting
Gather requirements for general user and executive reports, generate and maintain periodic reports, maintain the infrastructure necessary for ad-hoc reporting requests

Preparation resources
Managing your data-collection packages

Design and manage a SAM program (19%)
Secure executive sponsorship
Identify stakeholders, create proposal materials, and obtain explicit executive authorization
Secure funding
Estimate operational costs in both consulting hours and employee time, create a project plan and budget, and obtain from each infrastructure group funding for each task that is associated with managing a SAM program
Design a SAM program
Identify resources and objectives for a SAM program, align resources with customer requirements and schedules, and coordinate acquisition strategies that may include optimization methods, such as software as a service (SaaS) and application virtualization
Implement a SAM program
Create a SAM stakeholder group to oversee the project; assess and benchmark the current state of SAM; implement technologies to support asset discovery; enhance purchasing processes to include storage and retrieval of license entitlement information; perform an initial license reconciliation; create policies, processes, and procedures to support SAM efforts; secure support from all associated departments; educate employees
Maintain a SAM program
Monitor adherence to the policies, processes, and procedures of an organization’s SAM life cycle; standardize SAM processes across all domains and organizational units; perform periodic license reconciliation; and provide ongoing SAM awareness training
Create and manage a SAM program improvement plan
Incorporate SAM analytical data into strategic IT and business unit planning; create detailed metrics and reports to measure SAM adoption, maturity, and adherence to plan; report return on investment (ROI), cost avoidance, and end-user satisfaction to all stakeholders; evangelize SAM maturity benefits

Preparation resources
Creating policies and procedures
Microsoft Licensing suggestions table
Maintaining SAM

Manage the software asset life cycle (21%)
Manage the acquisition process
Identify and manage approved and unapproved purchasing processes within an organization, identify suppliers, and manage software approval and receiving processes
Manage the deployment process
Validate the availability of software and licenses, select the correct media, specify the software identification characteristics, and track the deployment of software
Maintain assets
Manage software and hardware during the install, move, add, change (IMAC) processes throughout the software asset life cycle
Manage the retirement process
Identify hardware for retirement, retire software, harvest software licenses, decommissioning or destruction of storage media

Preparation resources
SAM Optimization Model
Software acquisition policy
Software use policy


QUESTION 1
How many years of experience do you have designing, assessing, and optimizing Software Asset Management (SAM)?

A. I have not done this yet.
B. Less than 3 months
C. 3-6 months
D. More than 6 months but less than 1 year
E. 1-2 years
F. 2-3 years
G. 3 or more years

Answer: A

Explanation:


QUESTION 2
Rate your level of proficiency with assessing SAM programs by using the SAM Optimization Model, including defining scope, assessing SAM processes throughout an organization, assigning maturity levels according to the 10 components of the SAM Optimization Model, and performing gap analysis between current and desired maturity levels.

A. Very High
B. High
C. Moderate
D. Low
E. Very Low

Answer: A

Explanation:


QUESTION 3
Rate your level of proficiency with performing software license reviews, including conducting inventories, validating and managing license entitlement records, and reconciling software inventories and report license compliance status.

A. Very High
B. High
C. Moderate
D. Low
E. Very Low

Answer: A

Explanation:


QUESTION 4
Rate your level of proficiency with coordinating technologies, including managing data collection, data interfaces between disparate data sources, and reporting.

A. Very High
B. High
C. Moderate
D. Low
E. Very Low

Answer: A

Explanation:


QUESTION 5
Rate your level of proficiency with designing, implementing, and managing a SAM program, including securing executive sponsorship and funding.

A. Very High
B. High
C. Moderate
D. Low
E. Very Low

Answer: A

Explanation:

Click here to view complete Q&A of 70-673 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-673 Training at certkingdom.com

Exam 70-646 Windows Server 2008, Server Administrator

Published: April 3, 2008
Languages: English, German, Japanese
Audiences: IT professionals
Technology: Windows Server 2008
Credit toward certification: MCP, MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Planning for server deployment (15–20%)
Plan server installations and upgrades
Windows Server 2008 edition selection; rollback planning; Bitlocker implementation requirements
Plan for automated server deployment
Standard server image; automation and scheduling of server deployments
Plan infrastructure services server roles
Address assignment; name resolution; network access control; directory services; application services; certificate services
Plan application servers and services
Virtualization server planning; availability, resilience, and accessibility
Plan file and print server roles
Access permissions; storage quotas; replication; indexing; file storage policy; availability; printer publishing

Preparation resources
Guide for upgrading to Windows Server 2008
Installing Windows Server 2008
Install Windows Server 2008 server roles with Server Manager

Planning for server management (20–25%)
Plan server management strategies
Remote administration; remote desktop; server management technologies; Server Manager and ServerManagerCMD; delegation policies and procedures
Plan for delegated administration
Delegate authority; delegate Active Directory objects; application management
Plan and implement group policy strategy
GPO management; GPO backup and recovery; group policy troubleshooting; group policy planning

Preparation resources
Server Manager step-by-step guide: Scenarios
Delegating authority in Active Directory
Group policy planning and deployment guide

Monitoring and maintaining servers (20–25%)
Implement patch management strategy
Operating system patch level maintenance; Windows Server Update Services (WSUS); application patch level maintenance
Monitor servers for performance evaluation and optimization
Server and service monitoring; optimization; event management; trending and baseline analysis
Monitor and maintain security and policies
Remote access; monitor and maintain NPAS; network access, server security, firewall rules, and policies; authentication and authorization; data security; auditing

Preparation resources
Next-generation patch management: Introducing Windows Server Update Services
Performance and reliability monitoring getting started guide for Windows Server 2008
Server security policy management in Windows Server 2008

Planning application and data provisioning (15–20%)
Provision applications
Presentation virtualization; terminal server infrastructure; resource allocation; application virtualization alternatives; application deployment; System Center Configuration Manager
Provision data
Shared resources; offline data access

Preparation resources
Presentation virtualization with enhanced terminal services
Terminal services and Windows System Resource Manager

Planning for business continuity and high availability (15–20%)
Plan storage
Storage solutions; storage management
Plan high availability
Service redundancy; service availability
Plan for backup and recovery
Data recovery strategy; server recovery strategy; directory service recovery strategy; object level recovery

Preparation resources
Windows Server 2008—File and storage solutions
Windows Server 2008 high availability program
Backup and recovery overview for Windows Server 2008


QUESTION 1
You work as the Enterprise administrator at ABC.com. The ABC.com network has a domain
named ABC.com. The servers on the ABC.com network run Windows Server 2008 and all client
computers run Windows Vista.
The ABC.com network contains more than 3,000 computers. ABC.com wants to make use of
Windows Server Update Services (WSUS) updates. You thus need to setup the appropriate
storage mechanism so that it provides high availability.
Where should you store the WSUS updates?

A. In a storage subsystem as a RAID 10.
B. In a network load balancing cluster.
C. In a newly created Group Policy.
D. In a Distributed File System (DFS) link that is configured to utilize several replicating targets.

Answer: D

Explanation: You need to keep the updates on a Distributed File System (DFS) link that uses
multiple replicating targets. This will ensure that the updates highly available. The DFS contain the
following capabilities: views of folders and files, that is a virtual organization where those files
physically reside in a network.
Reference: Step 4: Set up a DFS share
http://technet.microsoft.com/en-us/library/cc708533.aspx


QUESTION 2
You work as the Enterprise administrator at ABC.com. The ABC.com network has forest with two
domains named us.ABC.com and uk.ABC.com. The functional level of the forest is set at Windows
Server 2008.
A new ABC.com security policy requires that the local guest accounts and administrator accounts
should be renamed. You have to ensure that the local guest accounts are disabled after it has
been renamed.
How can this be achieved?

A. By using a custom network profile.
B. By using a Group Policy object (GPO) for every domain.
C. By using a folder redirection on all the root domain controllers.
D. By using a ServerManagerCMD tool for the root main.

Answer: B

Explanation: You need to use Group Policy object (GPO) for every domain. With this you can
rename administrator accounts as well as renaming and disabling the local guest accounts.
Windows Server 2003 also permits you to modify the administrator account and guest account
names with a Group Policy.
Reference: HOW TO: Rename the Administrator and Guest Account in Windows Server 2003
http://support.microsoft.com/kb/816109


QUESTION 3
You work as the Enterprise administrator at ABC.com. The ABC.com network consists of a single
Active Directory domain named ABC.com. All servers on the ABC.com network run Windows
Server 2008 and all client computers run Windows Vista.
ABC.com has its headquarters in Chicago where you are located and a branch office in Dallas that
employs a number of helpdesk staff. You have to implement a new server named ABC-SR10 in
the Dallas office. The setup policy of ABC.com states that all helpdesk staff have the necessary
permissions to manage services. The helpdesk staff should also be able to configure server roles
on ABC-SR10. You need to accomplish this ensuring that the helpdesk staff have the least
amount of permissions.
How can this be achieved?

A. You should make the helpdesk staff, members of the global security group.
B. You should make the helpdesk staff, members of the Server Operators group on ABC-SR10.
C. You should make the helpdesk staff, members of the Account Operators group on ABC-SR10.
D. You should make helpdesk staff, members of the Administrators group on ABC-SR10.

Answer: D

Explanation: To add the helpdesk staff to the Administrators local group will give full
administrative access to an individual computer or a single domain. The user must be a member
of the Administrators group to change accounts or stop and start services or install server roles.
Reference: Using Default Group Accounts
http://technet.microsoft.com/en-us/library/bb726982.aspx
Reference: Securing the Local Administrators Group on Every Desktop
http://www.windowsecurity.com/articles/Securing-Local-Administrators-Group-Every-Desktop.html


QUESTION 4
You work as the Enterprise administrator at ABC.com. The ABC.com network has a domain
named ABC.com. The servers on the ABC.com network are configured to run Windows Server
2008 and the client computers run Windows Vista.
ABC.com has its headquarters in Paris and branch offices in London and Stockholm. You are in
the process of devising a file sharing policy to ensure standardization throughout the network.
Your policy needs to ensure that the ABC.com offices are able to access the files using the
universal Naming Convention (UNC) path. In the event of a server failure files should still be
accessible and the minimum bandwidth needs to be utilized.
You need to determine the components that need to be added to your policy?

A. You should add a DFS namespace that is domain-based and uses replication.
B. You should add the Hyper-V feature to your policy.
C. You should use failover clusters with three servers, one for each office.
D. You should add a DFS namespace that is server-based and uses replication.

Answer: A

Explanation: To comply with the CIO’s request, you need to use domain-based DFS namespace
that uses replication. To implement domain-based DFS namespace, the servers need to members
of the Active Directory domain. Furthermore, domain-based DFS enables multiple replications.
Multiple DFS replicas also provide some fault tolerance.


QUESTION 5
You work as the Enterprise administrator at ABC.com. The ABC.com network has a domain
named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all client
computers run Windows Vista.
The ABC.com network contains a Windows Server 2008 failover cluster that in turn hosts a
database application. During routine monitoring you discover that the database application make
use of almost half of processor and memory usage allocated for it. You want to make sure that the
level of performance is maintained on the cluster.
How can this be achieved? (Choose TWO. Each answer forms part of the solution.)

A. By using the Windows System Resource Manager (WSRM)
B. The using event subscriptions.
C. By using the Microsoft System Center Configuration Manager (SCCM)
D. By establishing a resource-allocation policy for process-based management.
E. By establishing Performance Monitor alerts.

Answer: A,D

Explanation: You need to use Windows System Resource Manager (WSRM) and set up a
resource-allocation policy for process-based management. The Windows System Resource
Manager (WSRM) enables the allocation of resources, including processor and memory
resources, among multiple applications based on business priorities. You can set the CPU and
memory allocation policies on applications. Furthermore, Windows System Resource Manager
(WSRM) does not manage address windowing extensions (AWE) memory. It also does not
manage large page memory, locked memory, or OS pool memory.
Reference: Windows System Resource Manager Fast Facts
http://www.microsoft.com/windowsserver2003/techinfo/overview/wsrmfastfacts.mspx

Click here to view complete Q&A of 70-646 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-646 Training at certkingdom.com

Go to Top