MCTS

Microsoft Certifications 2014 can you a JOB

With the new technologies coming in the market every other day, life has become advanced these days. In this modern era, you have to be on your toes all the time especially if your career in related to the field of IT: one has to stay updated with all the latest programs and their features in order to stay ahead of his peers. For instance, there was a time when Gramophone was the invention of the century but then it was replaced with mobile phones. Similarly, the invention of television and radio created quite a heap in the early 20th century but later on, the thunder was stolen by computers in the late 20th century.

In this day and age, computers and internet have become the center of attention. Consequently, IT has become the most popular field. IT experts are quite in demand these days; but with the emergence of new programs every other day, they have to keep up with the latest technology in order to stay ahead in the race. One way of staying ahead is the certification courses. These courses ensure that the candidate has attained all the latest knowledge and is ready to roll in the world of technology.

This article will discuss some of the most popular certification courses offered by Microsoft.

Microsoft Technology Associate

This is a certification course designed for the starters: people who want to start their line of business in the field of technology. Accordingly, it tests the fundamentals of IT and validates that the candidates have a basic understanding of the essentials. This course has been divided into three tracks and the candidates can choose any one of the tracks, depending on their preference. The tracks are: IT infrastructure, Database Design and Developer.

Microsoft MCSA- Windows Server 2008
This exam is designed for the IT personnel and it validates their skills in Server Networking management. IT professionals and System Administrators are suggested to take MCSA- Windows Server 2008 exam especially if they are looking forward to earning their MCSE certification.

Microsoft MCSA- Windows Server 2012
This certification exam is an advanced level exam which validates that the candidates have sufficient knowledge of Windows Server 2012 for its proper installation, configuration and working. MCSA- Windows Server 2012 certified can easily get the position of Network Administrator, Computer Systems Administrator or Computer Network Analyst.

Microsoft MCSE- Server Infrastructure
This certification course is designed for IT experts and it will get you the title of ‘Solutions Expert’. It tests individual’s skills in effectively and efficiently running a modern data center with some experience in virtualization storage and networking, identity management and systems management.

Microsoft MCSE- Desktop Infrastructure
This course validates that the individuals can manage desktops and devices, while maintaining their security and integrity, from anywhere around the globe. It also tests individuals’ expertise in application and desktop virtualization together with remote desktop services. With this certification in hand, you can easily qualify for a job of Data and Application Manager or Desktop and Device Support Manager.

Microsoft MCSE- Messaging
This certification is an expert level certification and it validates that the applicant has relevant skills in order to increase user productivity and flexibility. It also validates that the person has sufficient knowledge as to how to improve data security and reduce data loss. After passing this certification exam, candidates can easily qualify for the position of Network and Computer System Administrator.

Microsoft  MCSE- Communication
This certification validates candidates’ expertise in using Lync Server to create an effective communication path that can be accessed from all around the globe. This certification is also an expert level certification and you can easily qualify for the position of Network and Computer System Administrator with it.

Microsoft  MCSE- SharePoint

This Microsoft Certified Solutions Expert certification course verifies that the candidates have the necessary expertise to share, synchronize and organize the data across the organization. SharePoint 2013 is the updated version of Microsoft Office, and passing this certification can get you a job of Systems or Network Analyst.

Microsoft MCSD- SharePoint Application

This Microsoft Certified Solutions Developer certification course is another of expert level certification courses which validates individuals’ expertise in web programming. It also requires the individuals to design and develop applications with Microsoft SharePoint. With this certification, you can easily secure the position of Software Developer or Web Developer.

Microsoft Private Cloud

MCSE- Private Cloud certification course tests candidates’ expertise to manage Private Cloud computer technologies. It also verifies that the candidate can implement these technologies in a way to optimize service delivery. You can easily get the position of Server Administrator and Network Manager with this certification on your resume.

Microsoft System Center Configuration Manager
Microsoft System Center Certification focuses on the skills to manage computer and clients. The candidates should be able to configure, administer and deploy System Center 2012 in order to pass this exam. You can earn the title of Microsoft Certified Technology Specialist through this certification.

Microsoft Server Virtualization
This certification verifies that the candidate is familiar with Server Virtualization, both on Windows Server and System Center. This course expands individual’s expertise and skills in order for him to meet the rapidly modernizing technological business needs, and it can get him the title of Microsoft Specialist in no time.

Microsoft Office Certifications
Microsoft offers many certifications that verify candidates’ skills in handling and using Microsoft Office Applications. These certifications start from beginners level and go up to the master level. Microsoft Office Specialist is a beginner level certification whereas Microsoft Office Specialist Expert is an advanced level certification. Last but not the least; Microsoft Office Specialist Master is a master level certification.

Microsoft MCSA- Office 365
This course focuses on individual’s skills in handling Office 365 together with productivity tools and cloud-based collaboration. This certification can easily get you the position of Cloud Application Administrator or SaaS Administrator.

Microsoft Dynamics

This Microsoft Certified Technology Specialist certification confirms an individual’s expertise in Microsoft dynamics: a specific module can be chosen for this certification. However, this certification will be withdrawn from the market, at the end of this year, and replaced with the new ones.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

70-464 Developing Microsoft SQL Server 2012 Databases

QUESTION 1
You have been instructed to make sure that the auditing requirements of usp_UpdateArtistName
are supported by ABC-SR13.
Which of the following actions should you take?

A. You should consider including the Distributed Transaction Coordinator (DTC) in the solution.
B. You should consider including the Kernel Transaction Manager Resource Manager in the
solution.
C. You should consider including the Remote Procedure Call (RPC) service (RpcSs) in the
solution.
D. You should consider including the Component Object Model (COM) in the solution.

Answer: A

Explanation:


QUESTION 2
You have received instructions to make sure that server-side paging is supported by the
usp_SelectArtistsByName stored procedure. You want to make sure that actual development is
reduced as much as possible.
Which of the following actions should you take?

A. You should consider including an OFFSET-FETCH clause.
B. You should consider including a DISTINCT clause.
C. You should consider including and COLLATE clause.
D. You should consider including a ROLLUP clause.

Answer: A

Explanation:


QUESTION 3
You are in the process of writing code to create a table, named Performers. The table will include
a stored procedure, named usp_ PerformersReport.
You have to make sure that the code allows for a reduction in the length of time required for usp_
PerformersReport to complete.
Which of the following should be included in the code?

A. The nvarchar data type.
B. The bit data type.
C. The int data type.
D. The char data type.

Answer: A

Explanation:


QUESTION 4
You are writing code to create two tables, named Sets and Artists. You need to make sure that
referential integrity exists between the two tables.
Which of the following should be included in the code?

A. You should consider including a primary-key constraint.
B. You should consider including a foreign-key constraint.
C. You should consider including a unique-key constraint.
D. You should consider including a CHECK constraint.

Answer: B

Explanation:


QUESTION 5
You are writing code to add a column, named Verified, to the Performers table. The column should
allow for disk space usage to be reduced, and have a default value of False.
Which of the following actions should you take?

A. You should consider adding an int column.
B. You should consider adding a bit column.
C. You should consider adding a char column.
D. You should consider adding an nvarchar column.

Answer: B

Explanation:

Scenario 2
Application Data
You are employed as a database administrator at ABC.com. The ABC.com network consists of a
single domain named ABC.com.
A current ABC.com application is configured to host item information, which is saved in XML
format, will be transformed into mechanical drawings for engineering purposes. This process will
be facilitated by making use of a newly developed Microsoft .NET Framework assembly, named
ProcessItems.dll, which was generated via the use of the ProcessItem.es source code file.
ProcessItems.dll includes a single class, named ProcessItem, and a method, named Transform().
Furthermore, the drawings are to be stored as illustrations.
You are informed that every XML should include a single item with a root element, named Item.
You have generated a schema for the items xml, named Production.ItemSchema. The items xml is
configured to have a product type of eleven characters.
•The first five characters reference the category of the product.
•The last six characters refer to the subcategory of the item.
You are planning to create a new database on a server running SQL Server 2012 to support the
application. You have, however, detected that the application includes a number of performance
and security concerns. You are planning to create two tables, named Items and
ManufacturingStages. The Items table will include the following columns:
•ItemID, which is configured as the primary key.
•ItemType
•ItemName
•CreationDate
•ItemSpecifics
The ManufacturingStages table will include the following columns:
•ManufacturingStagesID
•ItemID
•Manufacturing Code
A sequence, named Production.ItemID_Seq, will also be added. You are also planning to generate
a certificate, named ABCItemsCert, in master and a certificate, named ABCDBCert in
ABCItemsCert.
ABC.com wants an application to be configured to perform dynamic T-SQL statements against the
new database.
Application Prerequisites
You are required to make sure that all stored procedures are signed, and that the original item
specifics are stored in the database. You also have to make sure that an XML schema is
employed to authenticate the item specifics, and that the assembly is accessible via T-SQL
commands.
You have been informed that a table-valued function should be created to search products by
type, and that dynamic T-SQL statements should be converted to stored procedures. You have
also been informed that indexes should be boosted from time to time according to their fragmentation.
You need to configure the highest level of encryption to safeguard backups. Furthermore, you
have to make sure that the manufacturing stages stored in the ManufacturingStages table relates
to an item via an identical identifier employed by the Items table
Lastly, you have to make sure that the consumption of disk space and administrative effort is kept to a minimum.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

MCTS training – Justifying the credentials in the IT industry

Microsoft has come out with so many product and solutions that it has become important for the organizations to hire professionals with the right certifications, so that they can take care of these products and come up with the right solutions. Therefore, it is important for the candidates to undergo a well structured and comprehensive training program that would help them to complete the MCTS training and to help them to get good paying jobs.

What is the MCTS Certification?
Microsoft has come up with an important and highly accredited IT program for the candidates to undergo, which is known popularly as the MCTS course. This program, when completed from a reputed training institute like The Knowledge Academy, can bring wonders to the organization and help candidates to derive in huge benefits. It validates the individuals’ knowledge and ensures that their level of expertise is enhanced, so that they can get a better future and plenty of opportunities. On the successful completion of the MCTS training program, the candidates are able to be proficient in their work and be in a position to handle different types of job roles, like that of the database administrator or messaging administrator. However, a detailed profile could include designing, building, deploying, operating and optimizing the different types of technologies. The candidates are also expected to design, prepare technological decisions that would be necessary for ensuring the successful implementation of the projects.

Why the MCTS Certification is required?
In this age of specialization and intense competition, it is a must for the candidates to undergo advanced programs like the MCTS course, which would keep them ahead of the others in competition. The MCTS is rather, a complete technical program based on the Microsoft products. The full form of MCTS is Microsoft Certified Technology specialist. On the successful completion of this program, the candidates are provided with better job opportunities. But this would require them to get better grades in the exam and be equipped with the latest techniques and tools that this program has to impart. It can be stated that the MCTS training program is a better way to have the required knowledge to become a complete professional, so that they are able to perform different types of tasks properly, when employed.

Moreover, the MCTP program is integrated with various modules, which comprise of a detailed and comprehensive concept, for giving the candidates a proper insight and thorough knowledge of the program. It also helps them to meet their goals and objectives with ease and justifies their credibility in the industry.

The different methods followed in the MCTS Certification program
The candidates in order to get hold of the much coveted certification in MCTS can undergo the program from regular classroom or online sessions. Whatever be the mode of training that they undergo, it is necessary on their part to get a thorough knowledge of the program, so that they are considered for better positions in the industry and given a responsible profile, with a good hike in their salary.


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

70-642 Q&A / Study Guide / Testing Engine

QUESTION 1
ABC.com has a forest with a domain named ABC.com. A server named ABC-SR05 is configured
as the DNS server. During a routine security check you discover a number of outdated resource
records in the ABC.com zone. You successfully set up the DNS service to do scavenging on ABCSR05
but after a month ABC-SR05 was clogged up with the same stale resource records again.
What action should you take to take away all outdated resource records?

A. You should execute the dnscmd ABC-SR05 /AgeAllRecords command.
B. You should disable the DNS service on ABC-SR05 and manually start scavenging stale
records.
C. You should execute the dnscmd ABC-SR05 /StartScavenging command.
D. You should enable the DNS scavenging utility on the us.ABC.com zone.
E. You should execute the dnscmd /zonerefresh command.
F. You should increase the Expires After setting of the Start of Authority (SOA) record.

Answer: D

Explanation:
You again noticed the same stale resource records still lay na.contoso.com even after enabled
DNS scavenging on Server1 because the Server1 may not have na.contoso.com zone integrated
with AD DS and loaded at the server.
To ensure that the stale resource records are removed from na.contoso.com, you need to enable
DNS scavenging on the na.contoso.com zone. The aging and scavenging can be configured for
specified zones on the DNS server to make sure that the stale records are removed from the
specified zone.
Reference: Enable Aging and Scavenging for DNS

http://technet2.microsoft.com/windowsserver2008/en/library/7972082c-22a1-44fc-8e39-

841f7327b6051033.mspx?mfr=true


QUESTION 2
You work as the enterprise administrator at ABC.com. The ABC.com network uses the public
namespace ABC.com. All servers on the ABC.com network run Microsoft Windows Server 2008.
The ABC.com CIO does not want user to have the ability to copy the public DNS zone records.
You must make sure that the zone transfers are restricted to DNS servers that are listed in the
Name Servers option without affecting the operation of the public name resolution.
How will you comply with the CIO’s requirement?

A. Check the Service Locator (SRV) resource record enabled option on all ABC.com domain
controllers.
B. Configure the priority value for the SRV records on all the domain controllers of us.ABC.com to
1.
C. Check the Allow zone transfers only to servers listed on the Name Servers option on ABC.com.
D. Uncheck the DNS scavenging option on the us.ABC.com zone.

Answer: C

Explanation:
To ensure that public DNS zone records cannot be copied without impacting the functionality of
public DNS name resolutions, you need to configure the Allow zone transfers only to servers listed
on the Name Servers option on ABC.com. This setting allows you to restrict zone transfers only to
DNS servers listed in the Name Servers resource option on ABC.com.
Reference: DNS Zones

http://books.google.co.in/books?id=pL89TOMFcHsC&pg=RA1-PA244&lpg=RA1-

PA244&dq=Allow+zone+transfers+only+to+servers+listed+on+the+Name+Servers+option+&sourc
e=web&ots=StFz29rSf5&sig=0wRSARkgYxCy2ohweQs4QUDMqEQ&hl=en#PRA1-PA243,M1


QUESTION 3
You work as the enterprise administrator at ABC.com. The ABC.com network has a domain
named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all client
computers run Windows Vista.
The ABC.com network has two Servers named ABC-SR05 and ABC-SR06. ABC-SR05 is a
domain controller that is configured as DNS server. ABC-SR06 is configured to run a legacy
application. You receive an instruction from the CIO to include parameters like Service, Weight
Protocol, and Port number for the legacy application on ABC-SR05.
What action should you take to accomplish this?

A. You must create a Host Info (HINFO) record on ABC-SR05.
B. You must create a Well-Known Service (WKS) record on ABC-SR05.
C. You must create a Service Locator (SRV) record on ABC-SR05.
D. You must create a Pointer (PTR) resource record on ABC-SR05.
E. You must create a Start of Authority (SOA) record on ABC-SR05.

Answer: C

Explanation:
Your best option in this scenario would be to create a Service Locator (SRV) record. To configure
DNS on ABC-SR05 to include the parameters such as Service, Priority, Weight Protocol, Port
number, and Host offering this service for the custom application, you need to configure Service
Locator (SRV) records. An SRV record or Service record is a category of data in the Internet
Domain Name System specifying information on available services. Service locator (SRV)
resource record. Allows multiple servers providing a similar TCP/IP-based service to be located
using a single DNS query operation. This record enables you to maintain a list of servers for a
well-known server port and transport protocol type ordered by preference for a DNS domain name.
References: SRV Record

http://en.wikipedia.org/wiki/SRV_record

Resource records reference / SRV

http://technet2.microsoft.com/windowsserver/en/library/9b561e1b-9a0d-43e5-89a8-

9daf07afac0d1033.mspx?mfr=true


QUESTION 4
You work as the network administrator at ABC.com. The ABC.com network has a forest with two
domains named us.ABC.com and uk.ABC.com.
All servers on the ABC.com network run Windows Server 2008 and all client computers run
Windows Vista. Users in the us.ABC.com zone complain that it takes a long time to access
resources in the uk.ABC.com zone.
What action should you take to reduce the resolution response times? (Each correct answer
presents part of the solution. Choose TWO.)

A. You should create and configure a GPO with DNS Suffix Search List option to uk.ABC.com,
us.ABC.com.
B. You should configure the priority value for the SRV records on all the domain controllers of
us.ABC.com to 5.
C. You should apply the policy to all user workstations in the us.ABC.com zone.
D. You should enable Scavenge Stale resource records in the Zone Aging /Scavenging Properties
dialog box of every workstation.
E. You should create and configure a GPO with the Local-Link Multicast Name Resolution feature
enabled.
F. You should execute the dnscmd /zonerefresh command on the workstations in uk.ABC.com.

Answer: A,C

Explanation:
To configure the user workstations in the us.ABC.com zone to improve the name resolution
response time for resources in the uk.ABC.com zone you need to configure a new GPO that
configures the DNS Suffix Search List option to us.ABC.com, us.ABC.com. Thereafter the policy
can be applied to all user workstations in the us.ABC.com zone.
A customized DNS suffix search lists to ensures that clients can locate services and other
computers when they perform single-label name queries.
Link-Local Multicast Name Resolution cannot be used because it allows IPv6 hosts on a single
subnet without a DNS server to resolve each other names. Therefore it need not be used here.
DNS SRV records cannot be used because they are the service records, which are a type of DNS
entry that specify information on a service available in a domain. They are typically used by clients
who want to know the location of a service within a domain. When multiple hosts are configured
for the same service, the priority determines which host is tried first.
Reference: Create a Disjoint Namespace / Update the DNS suffix search list

http://technet2.microsoft.com/windowsserver2008/en/library/afe94bc3-41fb-4817-84b5-

5517c38a0d391033.mspx?mfr=true
Reference: Introducing MS Windows Vista/ Learning about Dual Stack and IP Management
Enhancements

http://download.microsoft.com/download/5/7/8/578cbb95-c42e-4b9f-9989-

93ffdeae8af4/Introducing_Windows_Vista.pdf
Reference: Understanding DNS SRV records and SIP

http://blog.lithiumblue.com/2007/07/understanding-dns-srv-records-and-sip.html


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

What is the Microsoft 70-291 Exam All About?

The 70-291 is the other name for the Microsoft certification exam MCDBA – Managing and Preserving a Microsoft Windows Server 2003 Environment. The MCSA (Microsoft Certified Systems Administrator) on Windows Server 2003 credential (or 70-291 exams) is meant for IT professionals employed in generally complicated computing atmosphere of medium and huge businesses.

To be eligible for taking component in this exam, you will need at least six to 12 months of expertise in managing network and client operating systems in environments getting the following characteristics.

o Network sources and solutions like intranet, messaging facilities, file and print, proxy server, database, firewall, Web, client pc management and remote access.
o 3 and far more physical addresses.
o Connectivity necessities like the need to hyperlink corporate networks to the internet &amp person customers and branch offices in remote places to their corporate network.
o 250 to 5,000 users and much more.
o Three or much more than three domain controllers.

The 70-291 tests assess the capability of the candidates to run and sustain a Windows Server 2003 environment. If you are preparing for the 70-291 exams, you can try creating use of 70-291 Test Questions and 70-291 Practice Exams offered on the world wide web. You can also locate a lot of free demos for the 70-291 exams (MCDBA – Implementing Secure Converged Wide Location Networks) on the net. You can also visit microsoft.com for more info on this exam.

There are simulation tests offered for 70-291 which are created to match with the actual test. These sample exams that arrive with a comprehensive Inquiries and Answers collection, are very good adequate to help you to pass the exam with out difficulty without the require for further study materials or having to take part in pricey preparation classes. Also, passing the exam in the first attempt itself saves a lot of time and stress.

At the finish of this post, I advise to use 70-291 practice exam guide and 70-291 pdf for exam preparation which are developed by Exams Specialist with funds back guarantee incase you fail in exam.


MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 3000+
Exams with Life Time Access Membership at http://www.actualkey.com

 

70-236 Microsoft Exchange Server 2012

Contents
Preface xvii
Foreword xxi
1 Introduction 1
1.1 A decade and counting of Exchange deployments 1
1.1.1 The way we were 2
1.1.2 The protocol wars 2
1.1.3 Ever increasing mobility 4
1.1.4 Third-party products and management 6
1.1.5 Some interesting projects 6
1.1.6 The not so good points 7
1.1.7 Exchange’s connection with the Active Directory 10
1.1.8 Reviewing predictions made in 1996 11
1.2 Microsoft’s themes for Exchange 2007 12
1.2.1 The happy prospect of a migration 18
1.3 Preparing for Exchange 2007 20
1.4 Installing Exchange 2007 22
1.4.1 Modifying and removing servers 27
1.4.2 Validating the installation 27
1.4.3 Third-party software 28
1.5 Server roles 28
1.5.1 Services 32
1.6 Licensing 36
1.6.1 Version numbers 40
1.6.2 32-bit Exchange 2007? 41
1.7 Support 42
1.8 Challenges for Exchange 2007 42
1.9 Into the future 45
vi Contents
2 Exchange, Windows, and the Active Directory 47
2.1 Active Directory and Exchange 47
2.1.1 Domain Designs 48
2.2 Active Directory replication 50
2.2.1 Replication basics 51
2.2.2 When Active Directory replication happens 53
2.2.3 Active Directory naming contexts 55
2.2.4 Transforming Domain controllers into
Global Catalogs 58
2.2.5 USNs and replication 60
2.2.6 Urgent replication 64
2.2.7 Intrasite and Intersite replication 65
2.2.8 High-watermark vector and up-to-date vector tables 68
2.2.9 Changes in Active Directory replication in Windows 2003 70
2.3 Exchange’s Active Directory Topology service 71
2.3.1 DSAccess (or ADAccess) 72
2.3.2 How many Global Catalog servers do I need? 75
2.3.3 Where are my Global Catalogs? 76
2.4 Recovering deleted Active Directory accounts 78
2.5 Exchange and the Active Directory schema 80
2.5.1 Updating the schema with an installation 80
2.5.2 Changing the schema 82
2.5.3 Active Directory custom attributes for Exchange 85
2.5.4 Updating the schema to allow Ambiguous
Name Resolution 86
2.5.5 Exchange-specific permissions 87
2.5.6 Exchange property sets 88
2.6 Longhorn and Exchange 2007 90
2.7 The very important LegacyExchangeDN attribute 91
2.8 Brain surgery for the Active Directory: ADSIEDIT 93
2.8.1 LDP and LDIFDE 96
2.8.2 Active Directory for Exchange 98
3 The Basics of Managing Exchange 2007 99
3.1 Exchange Management Console 100
3.1.1 The importance of filters 104
3.1.2 Managing mixed organizations 109
3.1.3 Running EMC remotely or on a workstation 112
3.1.4 No more AD Users and Computers 113
3.1.5 Changing columns 115
Contents vii
Contents
3.1.6 Visual effects 116
3.2 Why some options have disappeared from EMC 118
3.2.1 Coping with change 122
3.3 Changes in the Exchange delegation model 124
3.4 Customized Recipient Management 128
3.4.1 Adieu RUS 130
3.4.2 Recipient types 132
3.5 Moving users 133
3.5.1 Moving mailboxes 134
3.5.2 Logging mailbox moves 138
3.6 Using distribution groups 140
3.6.1 Forming groups 142
3.6.2 Group changes in Exchange 2007 145
3.6.3 Expanding distribution lists 147
3.6.4 How many objects can I have in a group? 148
3.6.5 Managing group membership 149
3.6.6 Protected groups (and users) 152
3.7 Using groups for permissions 154
3.7.1 Managing distribution groups from Outlook 154
3.8 Dynamic distribution groups 156
3.8.1 Changing filters and conditions for dynamic
distribution groups 157
3.8.2 A note on OPATH 159
3.8.3 A new UI for dynamic groups 160
3.8.4 Creating New dynamic groups 162
3.8.5 Using dynamic Distribution groups 167
3.9 Mailbox quotas 168
3.9.1 Setting mailbox quotas 170
3.10 Email address policies 173
3.10.1 Mailbox moves and email address policies 178
3.10.2 Queries that drive email address policies 178
3.11 Address lists 183
3.11.1 Upgrading Address Lists to Exchange 2007 format 187
3.12 User naming conventions 188
3.13 Server naming conventions 192
3.14 Moving from the basics 194
4 The Exchange Management Shell 195
4.1 EMS: Exchange’s management shell 197
4.1.1 Working with PowerShell commands 199
4.1.2 Exchange shell commands 204
viii Contents
4.1.3 Command editing 208
4.1.4 Getting at more information about something 210
4.1.5 Using common and user-defined variables 214
4.1.6 Identities 217
4.1.7 Working in a multi-domain forest 219
4.1.8 Profiles 221
4.1.9 PowerShell in batch 223
4.1.10 Execution policies 224
4.1.11 Sending email from the shell 226
4.2 Learning from EMC 229
4.3 Using EMS to work with mailboxes 232
4.3.1 Creating a new mailbox with a template 232
4.3.2 Setting and retrieving mailbox properties 234
4.3.3 Other ways of interacting with mailboxes 244
4.3.4 Get-Recipient 245
4.3.5 Moving mailboxes 245
4.3.6 Accessing another user’s mailbox 249
4.3.7 Different commands and different properties 251
4.3.8 Contacts 252
4.4 Working with distribution groups 253
4.4.1 Working with dynamic distribution groups 257
4.4.2 Advanced group properties 262
4.5 Delegation through the shell 265
4.6 Creating efficient filters 267
4.7 Bulk updates 270
4.7.1 Creating sets of mailboxes 273
4.8 Reporting mailbox data 275
4.8.1 Special properties 282
4.9 Using the shell for other management tasks 284
4.10 Command validation 287
4.11 Working with remote servers 290
4.12 Working with non-Exchange 2007 servers 291
4.13 Testing Exchange 2007 292
4.13.1 Client connections 294
4.13.2 Mail Flow 295
4.13.3 Miscellaneous test commands 297
4.14 PowerShell for Exchange administrators 297
5 The Store 301
5.1 Introducing the Store 301
5.2 Differences in the Exchange 2007 Store 306
Contents ix
Contents
5.2.1 Are 64 bits that important? 307
5.2.2 Trading memory for I/O 312
5.2.3 The decrease in storage costs 317
5.3 No more streaming database 318
5.4 Tables and items 320
5.5 Storage groups 323
5.5.1 Creating a new storage group and database 327
5.5.2 Working with storage groups and databases 329
5.6 Transaction logs 331
5.6.1 Circular logging 335
5.6.2 Creating new transaction logs 337
5.6.3 Reserved logs 338
5.6.4 Transactions, buffers, and commitment 339
5.6.5 Transaction log I/O 341
5.6.6 Protecting transaction logs 341
5.6.7 Transaction log checksum 342
5.6.8 Maximum database size 343
5.7 Database portability 345
5.7.1 Zero database pages 349
5.8 MAPI connections and logons 349
5.9 The Deleted Items cache 350
5.9.1 Cleaning the Deleted Items cache 356
5.9.2 Recovering items and mailboxes 357
5.10 Background maintenance 360
5.10.1 Background tasks 364
5.10.2 Tracking background maintenance 367
5.11 Fixing failed databases 368
5.12 Exchange 2007 content indexing 375
5.12.1 Using content indexing 380
5.13 Public folders 383
5.13.1 Public folders and Exchange 2007 384
5.13.2 Changes in public folders administration since
Exchange 2003 386
5.13.3 Calming replication storms 388
5.13.4 Managing public folders with Exchange 2007 392
5.13.5 Permissions on top-level folders 405
5.13.6 Referrals 405
5.13.7 Migrating public folder content 406
5.14 Removing database size limits 408
5.15 Backups 408
5.15.1 NTBackup 410
x Contents
5.15.2 Other commercial backup products 410
5.15.3 Creating a backup strategy 413
5.15.4 Backups and storage groups 415
5.15.5 Checkpoint file 421
5.15.6 The future of streaming backups 426
5.16 Moving from the Store 427
6 Exchange Transport and Routing 429
6.1 The evolution of routing 429
6.2 Change through experience 430
6.2.1 Hidden administrative and routing groups 433
6.3 Exchange 2007 transport architecture 435
6.3.1 The critical role of hub transport servers 438
6.3.2 Receive connectors 440
6.3.3 Send connectors 447
6.3.4 Linking Exchange 2003 and Exchange 2007 453
6.3.5 Multiple routes into Exchange 2003 458
6.3.6 Decommissioning Exchange 2003 routing groups 458
6.3.7 Handling Exchange 2003 link state updates
during migration 458
6.3.8 Foreign connectors 459
6.3.9 Authorization 460
6.3.10 Accepted domains 460
6.3.11 Transport storage 461
6.4 Routing ABC 464
6.4.1 Resolving multiple paths 467
6.4.2 Most specific connector 467
6.4.3 Connector cost 469
6.4.4 Closest proximity 469
6.4.5 The role of hub routing sites 470
6.4.6 Site link costs versus routing costs 471
6.4.7 Instructing mailbox servers 472
6.4.8 Bypassing some connections 472
6.4.9 Protocol logging 473
6.4.10 X.400 support 474
6.4.11 Bifurcation 475
6.4.12 Header firewalls 476
6.5 Transport configuration 476
6.5.1 Transport configuration file 481
6.5.2 Routing logs 483
6.6 Queues 485
Contents xi
Contents
6.6.1 The Queue Viewer 488
6.6.2 The Unreachable queue 491
6.6.3 Poison messages 493
6.7 Back Pressure 494
6.8 Delivery Status Notifications 496
6.8.1 Customizing DSNs 501
6.8.2 Postmaster addresses 504
6.9 Transport agents 505
6.10 Transport summary 506
6.11 Edge servers 506
6.11.1 Edge or hub? 508
6.11.2 Basic Edge 510
6.11.3 Edge Synchronization 511
6.11.4 Basic Edge security 518
6.11.5 Fighting spam and email viruses 518
6.11.6 Defense in depth 522
6.11.7 Microsoft’s approach to mail hygiene 523
6.11.8 Forefront for Exchange 528
6.11.9 Mail Hygiene Agents 533
6.11.10 Agent logs 535
6.11.11 Connection filtering 536
6.11.12 Sender filtering 538
6.11.13 Address Rewrite agent 539
6.11.14 Sender ID agent 541
6.11.15 Content filtering 547
6.11.16 Content Filter updates 550
6.11.17 Per-user SCL processing 553
6.11.18 Safelist Aggregation 554
6.11.19 Sender reputation 557
6.11.20 Recipient filtering 559
6.11.21 Blocking file attachments 560
6.11.22 Attachment filtering 562
6.11.23 Edge transport rules 563
6.11.24 Available Edge 565
6.12 Client-side spam suppression 567
6.12.1 Outlook’s Junk Mail Filter 568
6.12.2 Postmarks 573
6.12.3 Restricting OOF and other notifications 574
6.13 Routing onwards 580
xii Contents
7 Clients 581
7.1 Outlook 583
7.1.1 Outlook web services 585
7.1.2 Understanding Outlook’s relationship with Exchange 591
7.1.3 Deploying cached Exchange mode 596
7.1.4 Address caching 599
7.1.5 MAPI compression and buffers 600
7.1.6 Conflict resolution 602
7.1.7 Preventing MAPI clients from connecting 603
7.1.8 Outlook 2007 and Exchange 5.5 607
7.2 Offline and personal Stores 608
7.2.1 Personal folders 609
7.2.2 Mail delivery to personal folders 611
7.2.3 Configuring PSTs 615
7.2.4 PST archiving 617
7.3 Offline folder files 619
7.3.1 OST synchronization 621
7.3.2 When things go wrong with your OST 623
7.4 Out of Office changes 624
7.4.1 The big question: Is Outlook 2007 worth the upgrade? 625
7.5 The Offline Address Book (OAB) 626
7.5.1 Downloading the OAB 627
7.5.2 OAB files on the PC 628
7.5.3 The evolving OAB format 630
7.5.4 OAB and cached Exchange mode 632
7.5.5 OAB generation and distribution 634
7.5.6 Creating a customized OAB 640
7.5.7 Allocating OABs to users 642
7.6 Outlook Anywhere 645
7.7 Outlook Web Access 650
7.7.1 New features in Outlook Web Access 2007 652
7.7.2 Outlook Web Access Light 658
7.7.3 International versions 662
7.7.4 Accessing legacy data 664
7.7.5 Managing Outlook Web Access 666
7.7.6 Authentication 667
7.7.7 Segmentation 671
7.7.8 Notifications 675
7.7.9 Controlling attachments 677
7.7.10 Themes 680
7.7.11 Client settings 684
Contents xiii
Contents
7.8 Internet client access protocols 684
7.8.1 IMAP4 685
7.8.2 The Exchange 2007 IMAP server 689
7.9 Mobile clients 694
7.9.1 Selecting mobile devices 696
7.9.2 Server-based ActiveSync 698
7.10 Windows Mobile 6.0 and Exchange 2007 702
7.10.1 ActiveSync policies 706
7.10.2 Managing mobile devices through EMC 711
7.10.3 Moving mailboxes to Exchange 2007 and ActiveSync 713
7.10.4 Estimating network traffic for mobile devices 715
7.10.5 Analyzing ActiveSync logs 717
7.10.6 Wiping mobile devices 719
7.10.7 Debugging synchronization 721
7.11 Comparing Windows Mobile and BlackBerry 723
7.11.1 Processing the mail 725
7.11.2 Other messaging options for Windows Mobile 730
7.11.3 Power management 731
7.11.4 Input flexibility 732
7.12 Unified Communications 735
7.13 Unified Messaging 737
7.13.1 Client Access to voicemail 741
7.13.2 Dealing with voicemail 745
7.13.3 Voice synthesis 747
7.13.4 Pure voicemail 748
7.13.5 The magic of SIP 749
7.13.6 Speech Grammars 752
7.13.7 Phonetic names 754
7.13.8 Cross-forest UM 756
7.14 Special mailboxes 756
7.15 Clients and users 759
8 Managing Users 761
8.1 Room and equipment mailboxes 762
8.1.1 Managing properties of room and equipment mailboxes 765
8.1.2 Converting old mailboxes to rooms 770
8.2 Helping users to use email better 771
8.2.1 Eliminating bad habits 771
8.2.2 Disclaimers 779
8.2.3 Out-of-Office Notifications 781
8.2.4 The last few bad email habits 781
xiv Contents
8.3 Customizing display templates 782
8.4 Exchange 2007 and compliance 787
8.4.1 The growing need for compliance 789
8.4.2 Transport rules 792
8.4.3 Using a rule to add disclaimer text to outgoing messages 794
8.4.4 Capturing selected messages 795
8.4.5 Becoming more complicated 797
8.4.6 Creating an ethical firewall 800
8.4.7 Transport rule storage 803
8.4.8 Rules and the shell 804
8.4.9 Journal rules 808
8.5 Messaging Record Management 815
8.5.1 Managing default folders 818
8.5.2 Managing custom folders 824
8.5.3 Allocating managed folders with policies 826
8.5.4 Applying policies to users 827
8.5.5 The Managed Folder Assistant 829
8.5.6 Logging Managed Folder activity 831
8.5.7 Using Managed Folders 833
8.5.8 Harvesting information from managed folders 835
8.6 Message classifications 837
8.6.1 Adding intelligence to classification through rules 844
8.7 Copying user mailboxes 848
8.7.1 Auditing 853
8.8 Free and busy 853
8.8.1 Looking at free and busy data 855
8.8.2 Free and busy in Exchange 2007 861
8.8.3 Changes in Outlook 2007 863
8.8.4 Cross-forest free and busy 866
9 Hardware and Performance 867
9.1 Moving toward 64-bit Exchange 867
9.2 Buying servers for Exchange 2007 870
9.3 The storage question 876
9.4 RPC pop-ups 881
9.5 Clusters and Exchange 882
9.6 Continuous replication and Exchange 2007 888
9.6.1 Concepts 889
9.7 Deploying Local Continuous Replication (LCR) 892
9.7.1 How LCR works 897
9.7.2 LCR operations 900
Contents xv
Contents
9.7.3 LCR restrictions 903
9.7.4 LCR database transition 904
9.8 Deploying Cluster Continuous Replication (CCR) 906
9.8.1 Comparing CCR and traditional clusters 910
9.8.2 CCR in practice 912
9.8.3 CCR failovers 915
9.8.4 Lost Log Resilience 919
9.8.5 The transport dumpster 921
9.8.6 Standby Continuous Replication 924
9.9 Continuous Log Replication: Good or bad? 924
9.10 Virtual Exchange 925
10 More useful things to Know about Exchange 929
10.1 Automated analysis 929
10.1.1 SSCP 932
10.1.2 Microsoft’s Release to Web (RTW) strategy 933
10.2 The Exchange Toolbox 935
10.2.1 Updates 936
10.2.2 Database Recovery Management 937
10.2.3 Database Troubleshooter 942
10.2.4 Mail Flow Troubleshooter 943
10.3 Messaging tracking logs 945
10.3.1 Generating message tracking logs 947
10.3.2 Log sizes and ages 950
10.3.3 Keeping track of message subjects 951
10.3.4 Accessing message tracking logs 951
10.3.5 Using the Troubleshooting Assistant to track messages 952
10.3.6 Tracking messages with EMS 956
10.3.7 Message delivery latency 959
10.4 Management frameworks 959
10.5 Utilities 963
10.5.1 Performance testing 963
10.5.2 The MFCMAPI utility 965
10.5.3 MDBVU32 968
10.5.4 ExMon—Exchange User Monitor 968
10.5.5 PFDavAdmin 971
10.5.6 LogParser 973
10.5.7 Outlook Spy 978
10.6 Bits and pieces 978
10.6.1 Where the Exchange team hangs out 978
10.6.2 Online Forums 979
xvi Contents
10.7 Conferences 979
10.7.1 Magazines 980
10.7.2 How Exchange uses registry keys 980
10.8 Good reference books 981
A Appendix 983
A.1 Message Tracking Log Format 983
A.2 Events noted in Message Tracking Logs 985
B Important Exchange PowerShell commands 987
B.1 Recipient management commands 987
B.2 Exchange server administrative Commands 990
B.3 Databases and Storage Groups 993
B.4 Address Lists and Email Policies 995
B.5 Queues and Messages 995
B.6 Edge Synchronization 996
B.7 Routing 997
B.8 ActiveSync 998
B.9 Public folders 999
B.10 Transport and journal rules 1000
B.11 IMAP and POP 1001
B.12 Active Directory commands 1002
B.13 Testing Exchange 2007 1003
B.14 Basic PowerShell 1004
B.15 PowerShell control commands 1005

Preface

By their very nature, every book that seeks to describe how technology works face challenges during its creation. Dealing with beta software and attempting to resolve the difference between how the software works and how the developers say it will work in the final version is a problem faced by any author, which is one reason why it is often best to wait to finalize text after you have a chance to work with released software. Looking back at this project, in some ways, this has been the hardest book of the seven that I have written about Exchange. I think that there are four reasons why this might be so. First, Exchange 2007 marks the boundary for substantial architectural change within the product, so it is similar to the degree of change that we experienced when we moved from Exchange 5.5 to Exchange 2000. Second, the nature of software is that it becomes more complex over time as the developers add new features and this is certainly true of Exchange 2007. The new features have to be considered, probed, and documented, all of which takes time. Third, the Exchange development team has done an excellent job since 2004 to document all aspects of Exchange in a more comprehensive manner than ever before.

The Exchange 2007 help file, TechNet, MSDN, and the excellent Exchange team blog at http://msexchangeteam.com/ default.aspx are interesting and productive hoards of information for authors to mine. Unfortunately, there is often too much material (a good complaint to have) and the material needs to be interpreted and analyzed in the light of your own experience with Exchange. Engineers write great blogs, but the scourge of cognitive dissonance often means that they omit some detail that makes all the difference to a newcomer in understanding why a component works the way that it does. Last but not least, you should not underestimate the degree of cultural change that Microsoft has incorporated into Exchange 2007 in the transition from a predominantly GUI-centric approach to server management to the use of the PowerShell scripting language as the basis of many management operations. The need to understand and appreciate the change has to occur before you can adequately document and describe the benefits and this increases the effort required to write the book. I must admit that it took me time to realize the full benefit of interacting with Exchange through the shell, but now I am at the point where I wonder why Microsoft never provided such a powerful interface in the past! The degree of change that exists in Exchange 2007 means that it is diffi- cult to cover everything in one book. I have therefore elected to cover the parts of Exchange that I think are of most interest to the majority of administrators and have left other components for you to discover through the material that Microsoft publishes or perhaps another book, written by me or someone else. Please accept my apology if I have not covered something that you think is important and treat this as a challenge and opportunity for you to write about the topic yourself. There are many magazines, blogs, and other ways of spreading information about Exchange. From time to time, I wander back down the path to consider some aspect of Exchange 2003. While this book is firmly focused on Exchange 2007, the vast majority of companies that will deploy Exchange 2007 will do so by migrating from Exchange 2003 and will therefore run both products alongside each other for some period. For large organizations, the period might extend to a year or more as it is unlikely that few will complete their migration to a pure Exchange 2007 environment quickly. With this in mind, it is fair and reasonable to document how things work with Exchange 2003, especially when these servers operate with Exchange 2007. So what is in the book? To set the context, Chapter 1 starts with an overview of the development of Exchange from 4.0 to 2007 and then describes the themes that Microsoft employed to focus the development priorities for Exchange 2007 and some of the changes that occur in this release. All successful deployments of Exchange since Exchange 2000 operate on a solid Active Directory foundation, so Chapter 2 reviews some of the critical intersection points between Exchange and the Active Directory including replication, the schema, and Global Catalogs. Chapter 3 goes into the basics of managing Exchange 2007 through the Exchange Management Console. Chapter 4 takes the management topic further by exploring the ins and outs of the new Exchange Management Shell, perhaps the most fundamental change to the product that Microsoft has made in Exchange 2007. Chapter 5 goes to the heart of Exchange and reviews how the Store works including topics such as databases, storage groups, and transaction logs to content indexing and backups. Chapter 6 looks at how the new transport system routes messages and includes topics such as the Edge server and anti-spam protection. Chapter 7 explains how clients from Outlook to Outlook Web Access to mobile devices allow users to work with their mailboxes. Chapter 8 then moves on to consider some elements of user management, including the important topic of compliance and records management. Chapter 9 addresses one of the more


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

70-483 Q&A / Study Guide / Videos / Testing Engine


QUESTION 1
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of
the Queue <T> collection type.
Which of the following is TRUE with regards to the Queue <T>collection type?

A. It represents a first in, first out (FIFO) collection of objects.
B. It represents a last in, first out (LIFO) collection of objects.
C. It represents a collection of key/value pairs that are sorted by key based on the associated
IComparer<T> implementation.
D. It represents a list of objects that can be accessed by index.

Answer: A

Explanation:


QUESTION 2
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You have written the following code segment:
int[] filteredEmployeeIds = employeeIds.Distinct().Where(value => value !=
employeeIdToRemove).OrderByDescending(x => x).ToArray();
Which of the following describes reasons for writing this code? (Choose two.)

A. To sort the array in order from the highest value to the lowest value.
B. To sort the array in order from the lowest value to the highest value.
C. To remove duplicate integers from the employeeIds array.
D. To remove all integers from the employeeIds array.

Answer: A,C

Explanation:


QUESTION 3
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of a
method that moves the SqlDataReader on to the subsequent record.
Which of the following is the SqlDataReader method that allows for this?

A. The Read method.
B. The Next method.
C. The Result method.
D. The NextResult method.

Answer: A

Explanation:


QUESTION 4
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You have received instructions to create a custom collection for Certkingdom.com. Objects in the
collection must be processed via a foreach loop.
Which of the following is TRUE with regards to the required code?

A. The code should implement the ICollection interface.
B. The code should implement the IComparer interface.
C. The code should implement the IEnumerable interface.
D. The code should implement the IEnumerator interface.

Answer: C

Explanation:


QUESTION 5
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of LINQ queries.
Which of the following is NOT considered a distinct action of a LINQ query?

A. Creating the query.
B. Obtaining the data source.
C. Creating the data source.
D. Executing the query.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-483 Q&A / Study Guide / Testing Engine / Videos


QUESTION 1
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of
the Queue <T> collection type.
Which of the following is TRUE with regards to the Queue <T>collection type?

A. It represents a first in, first out (FIFO) collection of objects.
B. It represents a last in, first out (LIFO) collection of objects.
C. It represents a collection of key/value pairs that are sorted by key based on the associated
IComparer<T> implementation.
D. It represents a list of objects that can be accessed by index.

Answer: A

Explanation:


QUESTION 2
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named
Certkingdom.com.
You have written the following code segment:
int[] filteredEmployeeIds = employeeIds.Distinct().Where(value => value !=
employeeIdToRemove).OrderByDescending(x => x).ToArray();
Which of the following describes reasons for writing this code? (Choose two.)

A. To sort the array in order from the highest value to the lowest value.
B. To sort the array in order from the lowest value to the highest value.
C. To remove duplicate integers from the employeeIds array.
D. To remove all integers from the employeeIds array.

Answer: A,C

Explanation:


QUESTION 3
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of a
method that moves the SqlDataReader on to the subsequent record.
Which of the following is the SqlDataReader method that allows for this?

A. The Read method.
B. The Next method.
C. The Result method.
D. The NextResult method.

Answer: A

Explanation:


QUESTION 4
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named
Certkingdom.com.
You have received instructions to create a custom collection for Certkingdom.com. Objects in the
collection must be processed via a foreach loop.
Which of the following is TRUE with regards to the required code?

A. The code should implement the ICollection interface.
B. The code should implement the IComparer interface.
C. The code should implement the IEnumerable interface.
D. The code should implement the IEnumerator interface.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

70-417 Q&A / Study Guide / Testing Engine / Videos


QUESTION 1
You work as a Network Administrator at Certkingdom.com. The network contains a single Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
All servers in the network have Windows Remote Management (WinRM) enabled.
You use a Windows 7 Enterprise client computer named Certkingdom-Admin1.
You are currently logged in to Certkingdom-Admin1. From your client computer, you want to obtain the IP
address of a Windows Server 2012 member server named Certkingdom-File1.
Which command or commands should you use?

A. Telnet Certkingdom-File1 ipconfig.
B. NSLookup > Server Certkingdom-File1 > ipconfig
C. WinRM –r:Certkingdom-File1 ipconfig
D. WinRS –r:Certkingdom-File1 ipconfig

Answer: D

Explanation:


QUESTION 2
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-Win12Admin runs Windows Server 2012. You use Certkingdom-Win12Admin to
administer the Windows Server 2012 servers in the domain.
A newly installed domain member server named Certkingdom-SRV06 runs a Server Core Installation of
Windows Server 2012.
You need to configure Certkingdom-SRV06 to enable you to use the Server Manager console on CertkingdomWin12Admin
to manage Certkingdom-Win12Admin.
How should you configure Certkingdom-SRV06?

A. You should install the Remote Server Administration Tools on Certkingdom-SRV06.
B. You should install the Server Manager console on Certkingdom-SRV06.
C. You should enable Windows Remote Management (WinRM) on Certkingdom-SRV06.
D. You should use the Enable-NetFirewallRule cmdlet to configure the firewall on Certkingdom-SRV06.

Answer: D

Explanation:


QUESTION 3
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-Win12Admin runs Windows Server 2012. You use Certkingdom-Win12Admin to
administer the Windows Server 2012 servers in the domain.
You want to use Server Manager on Certkingdom-Win12Admin to manage the Window Server 2008 R2
SP1 servers in the domain.
What should you do?

A. You should run the Configure-SMRemoting.exe –Enable cmdlet on the Windows Server 2008 R2 SP1 servers.
B. You should add the computer account for Certkingdom-Win12Admin to the RAS and IAS Servers group in Active Directory.
C. You should install the Microsoft .NET Framework 4.0 and Windows Management Framework 3.0 on the Windows Server 2008 R2 SP1 servers.
D. You should install the Remote Server Administration Tools on Certkingdom-Win12Admin.

Answer: C

Explanation:


QUESTION 4
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-File1 runs the File and Storage Services server role. Certkingdom-File1 hosts
shared folders on the D: drive. Users access the shared folders from their Windows 7 client
computers.
A user attempts to recover a previous version of a file in a shared folder on Certkingdom-File1 but
discovers that there is no previous versions option.
How can you ensure that users can recover files using the Previous Versions function?

A. By modifying the Share Properties of each shared folder.
B. By enabling Shadow Copies on the D: drive of Certkingdom-File1.
C. By adding a condition to the shared folders on Certkingdom-File1.
D. By modifying the settings of the Recycle Bin on Certkingdom-File1.

Answer: B

Explanation:


QUESTION 5
You work for a company named Certkingdom.com. Your role of Network Administrator includes the
management of the company’s physical and virtual infrastructure.
The network includes servers running Windows Server 2008 R2 Service Pack 1 (SP1) and
Windows Server 2012.
Virtual machines (VMs) are hosted on Windows Server 2012 servers running the Hyper-V role.
You install a new Windows Server 2012 Hyper-V host server named Certkingdom-HVHost12. CertkingdomHVHost12
has four Fiber Channel host bus adapters (HBAs) and connects to two Fiber Channel
SANs using two HBAs per SAN.
You plan to create VMs on Certkingdom-HVHost12 that will need to access one of the SANs.
How should you configure Certkingdom-HVHost12?

A. By creating a Virtual Switch in Hyper-V.
B. By installing an additional host bus adapter (HBA).
C. By creating a virtual Fiber Channel SAN in Hyper-V.
D. By creating a virtual iSCSI SAN in Hyper-V.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

MCTS Certification Training At No. 1 Online Training Site Certkingdom.com

MCITP for Exchange Server Certification

 

The Microsoft Certified IT Professional (MCITP) certification helps validate that an individual has the comprehensive set of skills necessary to perform a particular job role, such as database administrator or enterprise messaging administrator. MCITP certifications build on the technical proficiency measured in the Microsoft Certified Technology Specialist (MCTS) certifications. Therefore, you will earn one or more MCTS certifications on your way to earning an MCITP certification

On This Page

 

MCITP: MCTS Certification Training

MCITP: MCITP Certification Training

 

 

 

 

Cisco CCNA Training, Cisco CCNA Certification

Best Microsoft Free MCTS Certification Training,Microsoft Free MCITP Certification Training at MCTS-MCITP.com

 

 

 

 

 

Enterprise Messaging Administrator 2010

 

When you earn the MCITP: Enterprise Messaging Administrator certification, you demonstrate your professional expertise in using Microsoft Exchange Server 2010 to excel in a specific job role.

 

This certification helps validate the knowledge and skills that are associated with performing as the lead engineer for messaging solutions within an enterprise organization, as well as the ability to design and deploy messaging solutions with Exchange Server 2010.

 

To achieve the MCITP: Enterprise Messaging Administrator certification, you must successfully complete exams by the best training of certkingdom.com

 

Required exams

 

Exam 70-662

TS: Microsoft Exchange Server 2010, Configuring

 

Exam 70-663

Pro: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

 

 

Enterprise Messaging Administrator 2007

 

When you earn the MCITP: Enterprise Messaging Administrator certification, you demonstrate your professional expertise in using Microsoft Exchange Server 2007 to excel in a specific job role.

 

This certification helps validate the knowledge and skills that are associated with performing as the lead engineer for messaging solutions within an enterprise organization, as well as the ability to design and deploy messaging solutions with Exchange Server 2007.

 

To achieve the MCITP: Enterprise Messaging Administrator certification, you must successfully complete three exams: one Microsoft Certified Technology Specialist (TS) on Microsoft Exchange Server 2007 prerequisite exam and two Professional Series (PRO) exams.

 

Required exams

 

Exam 70-236

TS: Exchange Server 2007, Configuring

 

Exam 70-237

PRO: Designing Messaging Solutions with Microsoft Exchange Server 2007

 

Exam 70-238

PRO: Deploying Messaging Solutions with Microsoft Exchange Server 2007

Go to Top