Friday, January 27, 2012

Apple iPod Touch Awesome Highlights Which Can Amaze You

Should you take a glance all around, you will observe folks having their netbooks, mobile phones, and iPods. As a result, what is making use of these units which render it fundamental within the every day lifestyles of folks? Fundamentally, these devices generate items a lot easier. And, it's fun to experience and definitely will definitely entertain you wherever you go.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



Currently, the iPod Touch is often a fresh electronic device from Apple. This particular device produces a large amount of individuals need to have one of their own as this is dubbed to become the true computer system. Essentially, the Apple iPod Touch is a multimedia player. This kind of device will enable you to store and perform your favorite music and video lessons while you are out and about.

However, the iPod touch can do in addition to that, which can be fundamentally why persons need to have one. Therefore, what's so specific in regards to the iPod Touch that anybody seems to want one?

For starters, itouch new generation iPod is included using the multi touch display expertise. Instead of the click wheel that many men and women are accustomed to using the previous versions of iPod, this type of iPod employs touch screen technology to help you to communicate with the unit. Right now, you will need to admit that your function alone is very desirable and is sufficient to enable you to want one of your personal.


Nonetheless, this is precisely the beginning of more features to come using the iPod Touch. In contrast to some other iPods, the iPod Touch will enable you to connect to the web while using the built-in WiFi mobile program. As long as you are in a very WiFi hotspot, which you can easily find nowadays, you'll be able gain access to the web on your iPod Touch. With this particular tool, it is possible to evaluate your own emails, browse the internet, examine your MySpace account, and you will even make your favorite videos on YouTube.

Consequently you no longer have to lose out on important emails as the iPod itouch allow for you go on the internet everywhere as long as you are inside WiFi hotspot.

With a 3.5 inch multi-touch screen LCD, you will see that looking at movies listed here is a lot more fun than earlier types of iPods that can be able to play videos. The improved electric battery system is furthermore another key come with of the iPod Touch. Able to long lasting up to 22 several hours for trying to play music and 5 hrs for playing video clips, you will notice that you will have lot of fun for a period of time before you need to recharge the batteries of your iPod Touch again.


Itouch new generation ipod is likewise designed with a large information storage space capacity. With variants amounting up to 32 gigabytes of safe-keeping, you can be certain that you will never run out of space when it comes to saving your favorite music and videos. Of course, on this kind of safe-keeping capacity, you may also store and play with a lot of iPod Touch games.

Weighing only roughly 120 grams and measuring at only 4.3 by 2.4 by 0.31 inch, transportability is unquestionably one of the key features of this device.

Therefore, if you prefer a real laptop or computer that can enable you to admittance online, play songs and films, play your preferred games, and one that will easily fit in your pocket, the iPod Touch certainly is the gadget for you personally.

Wednesday, January 25, 2012

Will Apple’s success kill the Mac as we know it?

With Apple this week announcing its best quarter ever for Mac sales (5.2 million units) and tens of thousands of Apple fans gathering for the weekend’s annual Macworld Expo in San Francisco, surely this moment must be one of the greatest for Mac users in the platform’s 28 year history. But many longtime professional users of the Mac are worried — very worried — by the smoke signals coming out of Cupertino. They wonder whether Apple will make a computing solution for the rest of us or for all of us.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com




With Apple this week announcing its best quarter ever for Mac sales (5.2 million units) and tens of thousands of Apple fans gathering for the weekend’s annual Macworld Expo in San Francisco, surely this moment must be one of the greatest for Mac users in the platform’s 28 year history. But many longtime professional users of the Mac are worried — very worried — by the smoke signals coming out of Cupertino. They wonder whether Apple will make a computing solution for the rest of us or for all of us.

I’ve spoken to a number of Mac developers and longtime professional Mac users in the past half a year that see continuing signs of a Mac apocalypse, just as sales of Macs keep climbing. It’s not about the platform, after all, there were more Macs sold in this quarter that once were sold in a year. What worries them is Apple’s commitment to the technology that supports its creative professional market.

Here are a few of the worrying signs:

App Sandbox. As of this March, all apps submitted for the popular Mac App Store must support Apple’s Sandboxing requirements. This access control technology is designed to improve security and enforced at the kernel level: apps are limited in their access to outside system resources and user data.

Now, this only applies to software that comes from the Mac App Store and everyone can just load a plug-in or whatever software they want, right? Well, that is exactly the worry. What if Apple tells developers that all apps must go through the store and users can’t load software they want onto their Macs. Or perhaps Apple won’t support systems with non-approved software. We don’t know, it’s a worry.

Support for AppleScript Scripting. One of the technologies often used in professional content workflows is scripting, which lets customers pass data between applications from various vendors and the Finder. Most applications and certainly applications aimed at pro content creation workflows, have long supported these AppleScript additions. This events technology lets customers of Mac applications leverage products from other, small developers that may provide a unique tool to accomplish a specific job.

But will Apple continue to support AppleScript? We don’t know. The Sandboxing requirement appears to be in conflict with it.

Andy Ihnatko at Macworld wrote about this:

Do I fret needlessly? You tell me. Recently I had an idea for a tool that would make my life much easier and it required some scripting of the Preview app. In all my years of avid scripting, I’ve never done anything with that app before and so it came as a surprise when I tried to open its dictionary with the AppleScript editor and I discovered that it had none.

Horrors! Apple touted Preview as a shining example of a super-sandboxed Lion app. Was this a sign that sandboxed apps can’t and shouldn’t be scripted?

Nope. I searched the boards of various scripting sites and was reminded why I’d never tried to script Preview before: because it’s unscriptable. It doesn’t support even the AppleScript equivalent of tourist-level French, and it never has.

Preview is one of OS X’s core utilities! It’s well-represented in Automator, but why on Earth wouldn’t Apple’s own utility for viewing, modifying, and converting images and PDFs be a superstar of scriptable apps?!?

Another worry for professional content workflows.

The Final Cut Pro X experience. Apple last spring said it would totally revamp its Final Cut Pro post production editing software and this summer released a totally rewritten product, Final Cut Pro X. The new software is amazing and comes with an amazing new, lower price: $299.99. So, it’s the professional video editing software for the rest of us.

However, the new version doesn’t do things in the same way as Final Cut Pro 7. People have workflows with the older software and the new version doesn’t support those workflows. And some video editors say that the update leaves out a number of important features.

I’m not saying who’s right or wrong here, but Apple appears comfortable supporting more customers and abandoning customers with existing workflows.

It’s a worry.

The Mac/iOS Merger. Some worry over the changes made in Mac OS X Lion that resemble iOS. I’m not talking about the addition of multi-finger gestures for input, which is useful for everyone that can use 1, 2 and 3 fingers reliably. Rather, I’m talking about the iOSification of the Mac OS.

Take for example, the window styles of Lion’s Address Book and iCal applications. The window elements are similar to an iPad’s apps, the buttons aren’t standard Mac buttons and the interface can’t be customized. I don’t see that there’s much usability gained with this interface change, such as a stitched leather emulation. Mac window elements used to be standardized and that standardization meant something to users, folks who supported Mac users, and developers.

The Ars Techica review of Lion discusses these apps in detail and deconstructs many of their problems.

The trouble is, the new iCal looks so much like a familiar physical object that it’s easy to start expecting it to behave like one as well. For example, iCal tries very hard to sell the tear-off paper calendar illusion, with the stitched binding, the tiny remains of already-removed sheets, and even a page curl animation when advancing through the months. But can you grab the corner of a page with your mouse and tear it off? Nope, you have to use the arrow buttons or a keyboard command, just like in the previous version of iCal. Can you scribble in the margins? Can you cross off days with a pen? Can you riffle through the pages? No, no, and no.

Not to sugarcoat the experience, I find these apps useless, they’ve been dumbed-down way too far. I use FileMaker’s Bento as a front end to Address Book and a similar way, I use BusyMac’s BusyCal as a front end to iCal. Okay, some readers might say that Apple is providing a third-party opportunity to its developers. But it’s a worrisome trend.

There is a rumor floating around the developer community that Apple wanted more iOS integration in Lion. The thinking in Cupertino they say is to have one single OS that will run on handheld, tablet and portable/desktop. One IDE and one OS. This would be a disaster.

What users want are OSes and applications that can express the best performance on their respective hardware. What works on one computing platform may not work as well on another larger or smaller one, or one with more expansion or network connections or power. Users also want flexibility in the OS and apps to have different ways to do things, something that the Mac user interface has previously prided itself on.

But there is little flexibility in iOS as there is on a Mac.

It is natural for a small tablet like the iPad to have a modal interface with everything packed into the app and screen rather than a layered multi-windowed environment like the Mac OS. Power users can take advantage of multiple screens, or just one big screen, to place various pieces of content, files and other resources. It lets users eyeball the elements.

However, the iPad’s single screen interface is finding its way into Lion and Mac apps. Now, the app is supposed to keep everything in its modal window, which wants to encompass the entire screen. Items on the desktop, the windows of other apps, moveable palettes with tools are seen as distractions.

This change is not an advance. Having the Lord of the Rings approach — OS to bind them all — would be a wrong path for developers and Mac users.

There are more worries, such as support for Mac OS X Server, Xgrid and more. We will see what holds in the year ahead for them.

Apple’s success is thrilling to a longtime Mac user. We can only hope that the company will remember it was the loyal base of Mac customers, many in professional content creation fields, who sustained the Mac during the darker, leaner days in the 1990s and early part of this decade. Not everyone is a consumer market or enterprise customer.

Monday, January 23, 2012

Blackberry Bold 9780- very much popular and still going strong

It has been quite some time, and still, Blackberry’s Blackberry Bold 9780 is as popular as it was at the time of its launch. This is due to its brilliant make and the touch of perfection by Blackberry. On checking out the list of Blackberry Phones- the number of phones of and by Blackberry comes to a magnificent sixty-one. This shows the commitment of Blackberry… Here, in this article- let us check out the Blackberry Bold 9780 from the users’ perspective.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


To begin with- let us first understand the dimensions and weight of this phone; as that happens to be the primary concern of the users of mobile phones. The dimensions of this phone are just 109 x 60 x 14 mm and the weight is a mere 122 gms. The next concern of the potential customers is the display of any mobile phone. The display of this phone comes as a TFT, supported by 65k colours. The size is 2.44 inches and the resolution is 480 x 360 pixels. And, it also comes with a QWERTY keyboard and a Touch-sensitive optical trackpad. The next area of concern happens to be the camera. There is a primary camera, which comes as a 5 MP camera and the features that are associated with it, are- a resolution of 2592x1944 pixels, auto-focus and LED Flash. The other areas of concern happen to be the memory and the battery life. The internal memory comprises of 256 MB storage, 512 MB RAM; whereas the external memory is expandable up to 32 GB, which is possible through a microSD card; and it also comes with a 2 GB card included along with. And, while checking out the battery life; we find that the stand-by time is up to 528 h (2G) / up to 408 h (3G); whereas the talk time is up to 6 h (2G) / up to 6 h (3G).


After checking out the phone; it is required that we check out some economical Blackberry 9780 Deals- so that the users can get the maximum benefit out of them. There are three deals in the market of UK, offered by the leading Network Providers, which are possible due to their tie-ups with Blackberry. These Blackberry 9780 deals are namely, the contract deals, pay as you go deals and SIM free deals. In the contract deals, the users are required to enter in a contract with the Network Provider of their choice. They are provided with a handset and a Network Connection and they are required to pay some pre-decided amount along with the usage charges at frequent intervals.

The only draw-back is that the users are bound by the contract and cannot switch the services of the Network Provider till the end of the contract period.In the pay as you go deals, the users are required to pay some money in advance for the usage balance that they are provided with. This balance can be renewed as and when it gets used up.In the SIM free deals, the users are required to purchase a handset without a SIM. There are no restrictions like the contract deals- and the users are free to switch their Network Provider at any point of time, whenever they feel unsatisfied with the services.


Christmas Presents - PrePayMania.co.uk is one of the leading online retailer Company of Mobile Phones like Samsung Galaxy S2, BlackBerry Bold 9780, Samsung Galaxy Note & Mobile accessories in UK. Glance through the extensive range of Best Christmas Gift Ideas that can make your special one happy which we have categorized just according to your requirements. The Xmas gifts in 2011 won't have you struggling to find the perfect gift.

Thursday, January 19, 2012

Microsoft Q2 revenue up 5%, net income slightly down

Microsoft revenue rose in the second fiscal quarter, while its profits dipped a bit.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Revenue for the quarter, ended Dec. 31, hit $20.89 billion, up 5 percent compared with 2010's second fiscal quarter, which included recognition of $224 million of deferred revenue related to the Office 2010 technology guarantee program.

Net income came in at $6.62 billion, or $0.78 per share, down from $6.63 billion, or $0.77 per share.

CEO Steve Ballmer called the results "solid" in a statement and predicted that business will accelerate in the new fiscal year starting in July as a result of upcoming product and service launches.

Microsoft missed on the consensus revenue expectation of $20.93 billion from financial analysts polled by Thomson Reuters, but exceeded their earnings per share forecast of $0.76.

The company's Business Division generated $6.28 billion in revenue, up 3 percent year-on-year, and up 7 percent excluding the Office 2010 recognition of deferred revenue. Almost 200 million licenses of Office 2010 have been sold since its launch 18 months ago, the company said. Exchange and SharePoint revenue grew 10 percent, while revenue from Lync and Dynamics CRM grew more than 30 percent.

The Server & Tools business had $4.77 billion in revenue, up 11 percent, and was helped by "double-digit revenue growth" from Windows Server and SQL Server premium editions and by more than 20 percent growth in System Center revenue.

Revenue shrank 6 percent at the Windows & Windows Live Division to $4.74 billion. More than 525 million Windows 7 licenses have been sold since its launch.

The Online Services Division's revenue grew 10 percent to $784 million, while the Entertainment & Devices Division had revenue of $4.24 billion, up 15 percent. There are now about 66 million Xbox 360 consoles in the market, along with 18 million Kinect sensors. Xbox Live memberships increased 33 percent to 40 million.

Looking ahead, Microsoft is revising downward its operating expense guidance to a range of between $28.5 billion and $28.9 billion for the full year ending June 30.

Monday, January 16, 2012

World's youngest Microsoft Certified Professional passes at 16

Arfa Karim became the youngest Microsoft Certified Professional at 9, and has now passed away after spending 26 days in hospital.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



According to News Pakistan, Arfa Karim, the world’s youngest Microsoft Certified Professional, has passed away in hospital.

On December 22nd, the technological prodigy suffered from an epileptic seizure and went in to cardiac arrest, resulting in a coma from that moment.

Arfa passed away yesterday in Lahore, Pakistan, at only 16.

Although Pakistan is not generally associated with technological advances, Arfa revealed herself as a future star before her 10th birthday. By the time she was nine, she had mastered technologies that many years her senior struggled to grapple with — resulting in the award of becoming the world’s youngest Microsoft Certified Professional at a mere age nine.

In 2005, aged 10, she met Bill Gates whilst on a Microsoft campus visit after the Microsoft chairman acknowledged and took an interest in the the young girl’s rare display of talent. Not only that, Arfa received certification and permission to fly a plane through Dubai in the same year for a flying club.

Arfa was also conferred by the Pakistan Government for the Fatimah Jinnah Gold Medal in the field of science and technology, presented to her by the then Prime Minister of Pakistan. In the same year, she also received the Salaam Pakistan Youth Award, and Presidential Award for pride of Performance.

As a cherished talent in both the Pakistani and international community, her loss will no doubt be cast with regret.

After passing away at such a young age, we are left to wonder what this young girl could have achieved within an IT and technology industry in which she obviously had such talent for.

Friday, January 13, 2012

70-448 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a database administrator at Certkingdom.com. The Certkingdom.com network contains a SQL Server
2008 database server named ABC-DB01, which hosts the SQL Server 2008 Reporting Services
(SSRS) instance.
During routine monitoring, you discover that this instance does not render any extensions for
Microsoft Office Word.
How would you modify the instance to render these extensions?

A. The Report Server database should be modified on ABC-DB01.
B. The RSReportServer.config file should be modified on ABC-DB01.
C. The XML configuration file should be modified onABC-DB01.
D. The Web.config file should be modified on ABC-DB01.

Answer: B

Explanation:


QUESTION 2
You work as a database administrator for Certkingdom.com. The Certkingdom.com network contains a SQL
Server 2008 database server named ABC-DB03.
You are in the process of designing a SQL Server 2008 Integration Services (SSIS) package for
the Certkingdom.com network. Certkingdom.com has informed you that ABC-DB03 will be hosting the package.
You receive an instruction from the CIO to devise a plan of action in the event that ABC-DB03
becomes inactive.
How can this be achieved?

A. The master database should be backed up.
B. You should back up ABC-DB03.
C. You should execute an incremental backup on a weekly basis.
D. The SSIS package should be backed up.

Answer: A

Explanation:


QUESTION 3
You work as a database administrator at Certkingdom.com. You are responsible for managing a SQL
Server 2008 database server named ABC-DB01.
You receive instruction that the SQL Server 2008 Reporting Services model needs to be deployed
on ABC-DB01 to support a data source that contains 800 tables for the Marketing division. You
have been tasked with developing a report model.
Which of the following options will make sure that the Marketing division is only able to access 10
tables? (Choose two)

A. A data source view should be developed.
B. The marketing division should be denied access to the other tables.
C. The tables and views the marketing division will not be using should be highlighted.
D. The tables and views the marketing division will use should be indicated.
E. The Dynamic Management View should be properly modified.

Answer: A,D

Explanation:


QUESTION 4
You work as a database administrator at Certkingdom.com. The Certkingdom.com network contains a SQL Server
2008 database server named ABC-DB01. ABC-DB01 is configured to host the SQL Server
Analysis Services (SSAS) role.
There is a dimension named Housing in ABC-DB01 that contains three properties named Slabs,
Cement and Bricks. The relationship between the properties is nonflexible. Currently a data source
is used that indicates the changes between the affiliations of the properties. You receive an
instruction from the CIO to ensure that any modifications will be reflected.
Identify the command that will help you to accomplish your task?

A. The ProcessDefault command
B. The ProcessAdd command.
C. The ProcessFull command.
D. The ProcessClear command.
E. The ProcessNone command.

Answer: A,D

Explanation:


QUESTION 5
You work as a database administrator at Certkingdom.com. Your duties include administering a SQL
Server 2008 Analysis Services (SSAS) sample named ABC-DB01.
You receive an instruction from the CIO to log all queries. You then decide to make the necessary
changes to the QueryLogconnection String feature.
What should your next step be?

A. You should modify the connection string to the default value.
B. A valid connection string should be set on ABC-DB01.
C. The source attribute should be set to 20.
D. You should set the default value using Discover_Query.

Answer: B

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Oracle to patch 79 DB server vulnerabilities

The most serious of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.

Cisco CCNA Training, Cisco CCNA Certification

Best Oracle Certification Training and Oracle Exams Training and more Cisco exams log in to Certkingdom.com



Oracle’s first batch of critical patch updates for 2012 will be super-sized: 79 new security vulnerability fixes across hundreds of Oracle products.

The security fixes, scheduled for next Tuesday (January 17, 2012), will cover holes in the flagship Oracle Database 11g, Oracle Fusion Middleware 11g, Oracle Application Server 10g and numerous additional products and components.

The most serious of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.

Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply Critical Patch Update fixes as soon as possible.

More details on the affected products and severity risks available in this advance notice from Oracle.

Wednesday, January 11, 2012

Avaya SMB collaboration platform gets robust new mobile client

Android and Apple iPhone devices will get a richer conferencing and unified communications experience with Avaya IP Office 8.0.

MCTS Certification, MCITP Certification


Best Avaya Certification Training and Avaya Exams Training and more Cisco exams log in to examkingdom.com


The latest version of Avaya’s unified communications platform for small and midsize businesses boasts two major changes: a robust mobile application and the ability to integrate communications features into certain key business applications.

The mobile component of Avaya IP Office 8.0 is called one-X Mobile Preferred for IP Office. Initially available for Android devices (Apple iPhone is coming soon), the application allows users to manage who is on a conference call — allowing them to invite, view, mute or drop participants. The mobile application is recognized by the IP Office presence application, so that people can tell when you are available or shouldn’t be disturbed. There also is a “geopresence” feature that broadcasts where someone is located. (Part of me can see the usefulness of this feature, but it also smacks a little bit of employee babysitting.)

one-X Mobile Preferred is an extension of Avaya’s Essential Mobility technology.

The other major enhancement to Avaya’s latest SMB unified communications platform update comes in the form of new plug-ins to widely used business productivity applications. For example, small businesses can use the Avaya platform to make or receive a call from within a Salesforce.com page; they can also go to a single location to view Google Talk and IP Office contact lists.

Saturday, January 7, 2012

70-432 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

QUESTION 4
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance. The SQL Server 2008 instance hosts quite a few applications. ABC also has a server
named ABC-SR43 that is used to store log files.
You have to set up a new job that stores log files on ABC-SR43. You create a new account
ABC\Log_Account. You set it up to be run by the SQL Server Agent Services.
However, your job fails to store any log files on ABC-SR43. After some investigation you notice
that the job does not have permissions to store files on ABC-SR43.
How should you remedy the situation? Select the best option.

A. You should set up ABC\Log_Accoun as a Remote Service account.
B. You should set up ABC\Log_Accoun as a Domain service account.
C. You should set up ABC\Log_Accoun as a Local Service account.
D. You should set up ABC\Log_Accoun as a Local System account.
E. You should set up ABC\Log_Accoun as a Network Service account.
F. You should set up ABC\Log_Account as a Domain account.

Answer: F

Explanation:
The service startup account defines the Microsoft Windows account in which SQL Server Agent
runs and its network permissions. SQL Server Agent runs as a specified user account. For
compatibility with earlier versions of SQL Server, SQL Server Agent can also run as the Local
System account.
In this scenario you should select a Domain account, which allows sufficient permissions and
improved security.


QUESTION 5
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance that has a table named ABC_Training. ABC_ Training contains a column named
ABC_Distance. A new Certkingdom.com training policy states that the training (ie. The ABC_Distance
column in the ABC_Training table) cannot be increased or decreased by more than 3%.
How should you implement the ABC Training Policy?

A. You should consider developing a view which rolls back non-compliant Certkingdom.com policy
changes to ABC_Distance.
B. You should consider developing a stored procedure which rolls back non-compliant Certkingdom.com
policy compliant changes to the ABC_Distance column.
C. You should consider developing a primary key constraint to the ABC_training table which only
contains valid values on ABC_Distance.
D. You should consider developing a create trigger which rolls back non-compliant Certkingdom.com
policy changes to the ABC_Distance column.
E. You should consider developing an update trigger which rolls back non-compliant Certkingdom.com
policy changes to the ABC_Distance column.
F. You should consider developing a delete trigger which rolls back non-compliant Certkingdom.com policy
changes to the ABC_Distance column.

Answer: E

Explanation:


QUESTION 6
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance that contains a database named ABC_DB. Certkingdom.com contains a lot of customer data
which is processed by the Web application. You need to keep the customer information safe since
it is confidential. This information includes files of data, backups, and log files.
How can this be achieved and still keep the performance and functionality of the web application?
Select one or two.

A. You should consider adding a transaction Log on ABC_DB, and set the information to be
encrypted for a fixed time.
B. Use BitLocker Drive Encryption on the hard drives on the SQL Server.
C. Use EFS (Encrypting File System) on the hard drives on the SQL Server.
D. You should consider enabling the Transparent Database Encryption on ABC_DB and back up
the transaction log.
E. You should consider enabling the Transparent Database Encryption on ABC_DB and enabling
the Transparent Database Encryption on master database.
F. Use cell-level encryption for the specific data that needs to be kept safe.

Answer: D

Explanation:
With the introduction of transparent data encryption (TDE) in SQL Server 2008, users now have
the choice between cell-level encryption as in SQL Server 2005, full database-level encryption by
using TDE, or the file-level encryption options provided by Windows. TDE is the optimal choice for
bulk encryption to meet regulatory compliance or corporate data security standards. TDE works at
the file level, which is similar to two Windows® features: the Encrypting File System (EFS) and
BitLocker™ Drive Encryption, the new volume-level encryption introduced in Windows Vista®,
both of which also encrypt data on the hard drive. TDE does not replace cell-level encryption,
EFS, or BitLocker.


QUESTION 7
You work as a database administrator at Certkingdom.com. Certkingdom.com is using two SQL Server 2008
sample named ABCSmp1 and ABCSmp2. Furthermore, ABCSmp1 contains a database named
ABC_DB. A Certkingdom.com user named Mia Hamm uses her logon MiaHamm to log on to the database
on ABCSmp1. During the week you have transferred ABC_DB to ABCSmp2. You manually
recreate the Mia Hamm login on ABCSmp2. However, when she tries to login on ABC_DB at
ABCSmp2, she received an error message stating that she is not allowed access. Mia Hamm
needs to access ABC_DB and you need to make it happen.
What T-SQL code should you use? (Each correct option is part of the answer. Choose TWO)

A. Use Certkingdom.com;
B. Use ABC_DB; *
C. Use ABCSmp1;
D. Use ABCSmp2;
E. ALTER LOGIN MiaHamm WITH DEFAULT_DATABASE = ABC_DB;
F. CHANGE LOGIN MiaHamm WITH DEFAULT_DATABASE = ABC_DB;
G. ALTER LOGIN MiaHamm WITH PASSWORD = 'pwd1234' UNLOCK;
H. CHANGE LOGIN MiaHamm WITH PASSWORD = 'pwd1234' UNLOCK;
I. CHANGE USER MiaHamm WITH LOGIN = MiaHamm;
J. ALTER USER MiaHamm WITH LOGIN = MiaHamm; *
K. ALTER LOGIN MiaHamm ENABLE;
L. CHANGE LOGIN MiaHamm ENABLE;

Answer: B,J

Explanation:


QUESTION 8
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008 instance.
Your junior assistant is curious about on how to move a table, such as ABC_table, from its current
scheme (scheme1) to another scheme (scheme2)
How can you accomplish this in T-SQL?

A. You should consider using the following:
ALTER TABLE Schema1.ABC_Table SWITCH TO Schema2.ABC_table;

B. You should consider using the following:
ALTER AUTHORIZATION ON Schema1.ABC_Table TO Schema2;

C. You should consider using the following:
ALTER SCHEMA schema2 TRANSFER schema1.ABC_table;

D. You should consider using the following:
ALTER SCHEMA schema1 TRANSFER schema2.ABC_table;

E. You should consider using the following:
ALTER USER Schema1 WITH DEFAULT_SCHEMA = Schema2;

F. You should consider using the following:
MOVE ABC_Table FROM SCHEMA schema1 TO schema2

G. You should consider using the following:
MOVE ABC_Table FROM schema1 TO schema2

Answer: C

Explanation:
ALTER SCHEMA can only be used to move securables between schemas in the same database.
To change or drop a securable within a schema, use the ALTER or DROP statement specific to
that securable.


QUESTION 9
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance. You have received instructions from management to allow the users at Certkingdom.com on the
SQL Server sample to use the OPENROWSET() function to search remote information sources.
You study incomplete code in the exhibit carefully. (Line numbers are used for reference purposes only)
Exhibit:
01. sp_configure 'show advanced options', 1
02. RECONFIGURE
03.
04. RECONFIGURE
05. GO
06.
07. SELECT a.*
08. FROM OPENROWSET('SQLNCLI', 'Server=Madrid;Trusted_Connection=yes;',
09. 'SELECT GroupName, Name, DepartmentID
10. FROM AdventureWorks.HumanResources.Department
11. ORDER BY GroupName, Name') AS a;
12. GO
Which T-SQL statement should you insert at line 03 to make the batch meet the requirement in
this scenario?

A. sp_configure 'Router control', 1
B. sp_configure 'Router control', 0
C. sp_configure 'Transaction Logs', 1
D. sp_configure 'Transaction Logs', 0
E. sp_configure 'Ad Lib Distributed Queries ', 1
F. sp_configure 'Ad Lib Distributed Queries ', 0
G. sp_configure 'Ad Hoc Distributed Queries', 1
H. sp_configure 'Ad Hoc Distributed Queries', 0

Answer: G

Explanation:
By default, SQL Server does not allow ad hoc distributed queries using OPENROWSET and
OPENDATASOURCE. When this option is set to 1, SQL Server allows ad hoc access. When this
option is not set or is set to 0, SQL Server does not allow ad hoc access.
Ad hoc distributed queries use the OPENROWSET and OPENDATASOURCE functions to
connect to remote data sources that use OLE DB. OPENROWSET and OPENDATASOURCE
should be used only to reference OLE DB data sources that are accessed infrequently. For any
data sources that will be accessed more than several times, define a linked server.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, January 5, 2012

70-431 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server. CERTKINGDOM-DB01
contains a database named CKD_Sales.
CertKingdom.com intends migrating CERTKINGDOM-DB01 to SQL Server 2005 in the near future. To
prepare for the migration, you decide to install SQL Server 2005 Express on a server named
CERTKINGDOM-SR31. You verify that CERTKINGDOM-SR31 exceeds the minimum recommended
hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-SR31 to Windows Sever 2003 and install Service Pack 1.
B. Install and run the SQL Server Upgrade Advisor on CERTKINGDOM-SR31.
C. Install SQL Server 2000 on CERTKINGDOM-SR31.
D. Download and install the .NET Framework 2.0.

Answer: D

Explanation:
SQL Server 2005 requires the.NET Framework 2.0. This is automatically installed when SQL
Server 2005 is installed but is not automatically installed when SQL Server 2005 Express is installed.

Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-SR31 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 Express can be installed on Windows 2000 Server. You will need to install
Service Pack 4 for Windows 2000 Server though.
B: You should run the SQL Server Upgrade Advisor when you want to upgrade an instance of a
SQL Server 2000 database to SQL Server 2005.
C: You do not need to install SQL Server 2000 before installing SQL Server 2005 Express.

Reference: Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server
Express, before installing


QUESTION 2
You work as a database administrator at CertKingdom.com. The CertKingdom.com network consists of a
single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003 with the latest Service Packs and Hotfixes, while the client computers
run Windows XP Professional, Windows 98 Second Edition, and Novell NetWare 6.5.
You install SQL Server 2005 on a member server named CERTKINGDOM-SR21. CERTKINGDOMSR21
will host a database named CKD_Sales. All CertKingdom.com users must be able to connect to
CERTKINGDOM-SR21 by computer name. A CertKingdom.com network administrator named Rory Allen
must ensure that the client computers will be able to connect to CERTKINGDOM-SR21.
Which protocols can CertKingdom.com users use to CERTKINGDOM-SR21?

A. TCP/IP and Named Pipes
B. TCP/IP and IPX/SPX
C. Virtual Interface Adapter (VIA)
D. Shared Memory

Answer: A

Explanation:
By default, clients have TCP and Named Pipes as available protocols. You can manipulate the
protocol ordering by using the SQL Server Client utility. The client application uses the protocols
in the order specified on the client computer. If you are using SQL Server 2005, the protocol order
is stored in the ProtocolOrder registry entry under the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0
Incorrect Answers:
B: SQL Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as
NetWare 6.5, support TCP/IP which makes it the common protocol for all clients.
C: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.
D: Shared Memory can only be used on the local computer and cannot be used as a network protocol.

Reference:Microsoft SQL Server 2005 Books Online (2006), Index: client connections
[SQL Server], about client network connections, choosing a network protocol


QUESTION 3
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server. CERTKINGDOM-DB01
contains a database named CKD_Sales.
CertKingdom.com intends migrating CERTKINGDOM-DB01 to SQL Server 2005 in the near future. To
prepare for the migration, you decide to install SQL Server 2005 Express on a server named
CERTKINGDOM-SR23. CERTKINGDOM-SR31 was used for previously used by application developer
and contains Microsoft Visual Studio 2003, .NET Framework 1.2 and Internet Explorer 5.5. You
verify that CERTKINGDOM-SR23 exceeds the minimum recommended hardware requirements for
SQL Server 2005.
What should you do next? (Each correct answer provides part of the solution. Choose THREE.)

A. Upgrade CERTKINGDOM-SR23 to Windows Sever 2003 and install Service Pack 1 for Windows Sever 2003.
B. Install Service Pack 4 for Windows 2000 Sever on CERTKINGDOM-SR23.
C. Upgrade the .NET Framework 1.2 to .NET Framework 2.0 on CERTKINGDOM-SR23.
D. Uninstall the .NET Framework 1.2 and install the .NET Framework 2.0 on CERTKINGDOM-SR23.
E. Upgrade Internet Explorer 5.5 to Internet Explorer 6.0 and install Service Pack 1 for Internet
Explorer 6.0 on CERTKINGDOM-SR23.
F. Upgrade Microsoft Visual Studio 2003 to Microsoft Visual Studio 2005 and install Service Pack
1 for Microsoft Visual Studio 2005 on CERTKINGDOM-SR23.

Answer: B,D,E

Explanation:
SQL Server 2005 requires Service Pack 4 for Windows 2000 Sever, Internet Explorer 6.0 with
Service Pack 1 and the .NET Framework 2.0. The .NET Framework 2.0 is automatically installed
with other versions of SQL Server 2005 but is not automatically installed with SQL Server 2005
Express. You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET
Framework 2.0 but .NET Framework 1.2 must be uninstalled first.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-SR31 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 Express can be installed on a Windows 2000 Server once you install Service
Pack 4 for Windows 2000 Server.
C: You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET Framework
2.0 but .NET Framework 1.2 must be uninstalled first.
F: SQL Server 2005 Express does not require any version of Microsoft Visual Studio.
Reference:Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server
Express, before installing


QUESTION 4
You work as a database administrator at CertKingdom.com. The CertKingdom.com network consists of a
single Active Directory domain named CertKingdom.com.
You have received instruction from the CIO to prepare a new installation of SQL Server 2005. The
new SQL Server 2005 database server is named CERTKINGDOM-DB01. A CertKingdom.com user
named Mia Hamm is a member of the Marketing department. You instruct her to identify the
protocols that the client computers might use to connect to the server. Mia Hamm needs to identify
the protocols that are needed to accomplish this goal.
What should she identify? (Choose all that apply)

A. She should use the Multiprotocol.
B. Mia Hamm should use the Named Pipes.
C. She should use the Shared Memory.
D. She should use the TCP/IP
E. Mia Hamm should use the Virtual Interface Adapter (VIA).

Answer: B,D

Explanation:
The clients have by default TCP and Named Pipes as available protocols. You can make use of
the SQL Server Client utility to manipulate the protocol ordering. The client application uses the
protocols in the order specified on the client computer. When you make use of the SQL Server
2005, the protocol order is stored in the ProtocolOrder registry entry under the following registry
subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0
Incorrect Answers:
C: Shared Memory can only be used on the local computer and cannot be used as a network
protocol.
E: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.Reference:Microsoft SQL
Server 2005 Books Online (2006), Index: client connections [SQL Server], about client network
connections, choosing a network protocol


QUESTION 5
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server Service Pack 4.
CERTKINGDOM-DB01 contains a database named CKD_Trading.
CertKingdom.com wants to migrate CERTKINGDOM-DB01 to SQL Server 2005 but wants to retain the
CKD_Trading database with the same instance name. You decide to perform an in-place upgrade to
SQL Server 2005. You verify that CERTKINGDOM-DB01 exceeds the minimum recommended
hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-DB01 to Windows Sever 2003 Service Pack 1.
B. Run the SQL Server Upgrade Advisor on CERTKINGDOM-DB01.
C. Detach the CKD_Trading database on CERTKINGDOM-DB01.
D. Run the SQL Server 2005 Setup utility.

Answer: B

Explanation:
Before you perform an in-place upgrade of an existing database, you should run the SQL Server
Upgrade Advisor. The SQL Server Upgrade Advisor produces a list of items that must be
addressed before and after performing the upgrade. This list of items is specific to the existing
installation.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-DB01 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 can be installed on Windows 2000 Server with Service Pack 4.
C: You need to detach a database when you need to move the database to another database
instance or another database server. You do not need to detach the database before performing
an in-place upgrade.
D: You should run the SQL Server Upgrade Advisor before you run the SQL Server 2005 Setup
utility. The SQL Server Upgrade Advisor produces a list of items that must be addressed before
and after performing the upgrade. This list of items is specific to the existing
installation.Reference:Microsoft SQL Server 2005 Books Online (2006), Index: updating
databases, detaching and attaching databases


QUESTION 6
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 7.0 database server
named CERTKINGDOM-DB01 that runs on Windows 2000 Server. Service Pack 4 for Windows 2000
Server id installed on CERTKINGDOM-DB01.
CertKingdom.com wants to migrate CERTKINGDOM-DB01 to SQL Server 2005. You decide to perform
an in-place upgrade to SQL Server 2005. You verify that CERTKINGDOM-DB01 exceeds the
recommended hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-DB01 to Windows Sever 2003.
B. Install Service Pack 4 for SQL Server 7.0 on CERTKINGDOM-DB01.
C. Upgrade SQL Server 7.0 on CERTKINGDOM-DB01 to SQL Server 2000.
D. Run the SQL Server 2005 Setup utility on CERTKINGDOM-DB01 and upgrade directly to SQL
Server 2005.

Answer: B

Explanation:
You can upgrade from SQL Server 7.0 with Service Pack 4 directly to SQL Server 2005. Thus you
need only install Service Pack 4 for SQL Server 7.0.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-DB01 to Windows Sever 2003 as SQL Server 2005
can be installed on Windows 2000 Server with Service Pack 4.
C: You do not need to upgrade CERTKINGDOM-DB01 to SQL Server 200 as SQL Server 7.0 with
Service Pack 4 can be upgraded directly to SQL Server 2005. Besides, you will need to install
Service Pack 3 for SQL Server 2000 before you can upgrade it to SQL Server 2005.
D: You need to install Service Pack 4 for SQL Server 7.0 before you can upgrade it directly to SQL
Server 2005.Reference:Microsoft SQL Server 2005 Books Online (2006), Index: upgrading SQL
Server, upgrading to SQL Server 2005


QUESTION 7
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003 and all client computers run Windows XP Professional. The
CertKingdom.com network contains two SQL Server 2000 database servers named CERTKINGDOMDB01
and CERTKINGDOM-DB02 that are configured for log shipping. CERTKINGDOM-DB01 is the
primary server and hosts a database named CKD_Trading. Both CERTKINGDOM-DB01 and
CERTKINGDOM-DB02 have Service Pack 3 for SQL Server 2000 installed.
CertKingdom.com wants to upgrade CERTKINGDOM-DB01 and CERTKINGDOM-DB02 to SQL Server
2005 Enterprise Edition but the CKD_Trading database must remain available during the upgrade
process. You verify that both CERTKINGDOM-DB01 and CERTKINGDOM-DB02 exceed the
recommended hardware requirements for SQL Server 2005 Enterprise Edition. You then install
Service Pack 1 for Windows Server 2003 on CERTKINGDOM-DB01 and CERTKINGDOM-DB02.
What should you do next?

A. Install Service Pack 4 for SQL Server 2000 on both database servers.
B. Enable failover in the SQL Server 2000 log shipping configuration and upgrade CERTKINGDOMDB02
to SQL Server 2005.
C. Run the Database Maintenance Plan Wizard on CERTKINGDOM-DB01 to upgrade it to SQL
Server 2005.
D. Upgrade CERTKINGDOM-DB02 to SQL Server 2005 and then upgrade CERTKINGDOM-DB01 to
SQL Server 2005.

Answer: B

Explanation:
SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral to
log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL
Server 2000 log shipping configuration directly to SQL Server 2005. To upgrade log shipping to
SQL Server 2005, you must migrate the database servers to SQL Server 2005. If you want the
database to remain available during the migration process, you must migrate with failover. To
migrate with failover you must enable failover and upgrade CERTKINGDOM-DB02. Then you need
to failover to CERTKINGDOM-DB02 and upgrade CERTKINGDOM-DB01. Then configure log shipping
with the CERTKINGDOM-DB02 becoming the primary server and CERTKINGDOM-DB01 becoming the
secondary server.
Incorrect Answers:
A: You do not need to install Service Pack 4 for SQL Server 2000 on the database servers as SQL
Server 2000 with Service Pack 3 can be upgraded to SQL Server 2005. However, SQL Server
2005 does not support the Database Maintenance Plan Wizard which was integral to log shipping
in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL Server 2000
log shipping configuration directly to SQL Server 2005.
C: SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral
to log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a
SQL Server 2000 log shipping configuration directly to SQL Server 2005.
D: Removing log shipping from CERTKINGDOM-DB02 and upgrading CERTKINGDOM-DB01 to SQL
Server 2005 will not ensure that the CKD_Trading database remains available. Reference:Microsoft
SQL Server 2005 Books Online (2006), Index: log shipping [SQL Server], upgrading


QUESTION 8
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003. The CertKingdom.com network contains a Domain Controller named
CERTKINGDOM-DC01 and a member server named CERTKINGDOM-SR21.
CertKingdom.com wants to implement a SQL Server 2005 database that will store sales data. All
CertKingdom.com users will require access to the Sales_DB database. You have been instructed to
install SQL Server 2005 on CERTKINGDOM-SR21 and to create a database named Sales_DB. You
need to ensure that CertKingdom.com users and applications can connect to the database instance by
using only the computer name.
What should you do during the installation of SQL Server 2005 on CERTKINGDOM-SR21?

A. Select the Named Instance and use MSSQLSERVER as the instance name.
B. Select the Named Instance and use CERTKINGDOM-DC01 as the instance name.
C. Select the Default Instance and accept the default instance name.
D. Select the Named Instance and use CERTKINGDOM-SR21 as the instance name.

Answer: C

Explanation:
To ensure that users and applications can connect to the instance using the computer name, you
should select the Default Instance and accept the default instance name, MSSQLSERVER.
Incorrect Answers:
A: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.
B: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.
D: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.


QUESTION 9
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run on Windows Server2003 while the client computers run Windows XP Professional, Windows
98 Second Edition, and Novell NetWare 6.5. All computers are members of the CertKingdom.com
Active Directory domain. The CertKingdom.com network contains a SQL Server 2005 database server
named CERTKINGDOM-DB01 that hosts a database instance named MSSQLSERVR.
CertKingdom.com wants to implement another SQL Server 2005 instance for a database named
Sales_DB. Sales_DB will store sales data for the company. All CertKingdom.com users will require
access to the Sales_DB database. You have been instructed to create the SQL Server 2005
instance for the Sales_DB database. You need to ensure that all users will be able to connect to
the Sales_DB database. You cannot make configuration changes to the client computers. Your
solution must optimize network traffic.
What should you do?

A. Install the instance as a Named Instance and configure it to support Mixed Mode
Authentication. The enable TCP/IP for the instance.
B. Install the instance as a Default Instance and configure it to support Windows Authentication.
The enable TCP/IP for the instance.
C. Install the instance as a Named Instance and configure it to support SQL Authentication. The
enable IPX/SPX for the instance.
D. Install the instance as a Default Instance and configure it to support Windows Authentication.
The enable IPX/SPX for the instance.

Answer: A

Explanation:
The default instance is named MSSQLSERVER. This instance name is already in use; therefore
you should use a Named Instance. You should use Mixed Mode Authentication to support
NetWare users.
Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use. Furthermore, you need to use Mixed Mode Authentication as Windows
Authentication does not support NetWare users.
C: You can use SQL Authentication, but this will require that you create SQL Logins for all users
and groups. It would be easier to use Windows Authentication for clients that user Windows XP
Professional and Windows 98 SE, and create SQL Logins for the NetWare 6.5 users. Also, SQL
Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as NetWare 6.5,
support TCP/IP which makes it the common protocol for all clients.
D: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use. Furthermore, you need to use Mixed Mode Authentication as Windows
Authentication does not support NetWare users. Also, SQL Server 2005 does not support
IPX/SPX. The newer versions of NetWare, such as NetWare 6.5, support TCP/IP which makes it
the common protocol for all clients.


QUESTION 10
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run on Windows Server2003 and all client computers run Windows XP Professional. The
CertKingdom.com network contains two SQL Server 2005 database servers that are configured in a
cluster with two nodes named NodeA and NodeB. NodeA hosts a default database instance
named MSSQLSERVR.
CertKingdom.com wants to implement another SQL Server 2005 instance for a database named
Sales_DB. Sales_DB will store sales data for the company. All CertKingdom.com users will require
access to the Sales_DB database. You have been instructed to create the SQL Server 2005
instance for the Sales_DB database on Node
A. You need to ensure that all users will be able to
connect to the Sales_DB database.
What should you do?

A. Run the SQL Server 2005 Setup utility on NodeA and select a Named Instance for the
Sales_DB database.
B. Run the SQL Server 2005 Setup utility on NodeA and select the Default Instance for the
Sales_DB database.
C. Move the existing instance from NodeA to NodeB. Run the SQL Server 2005 Setup utility on
Node
A. Select the Default Instance and accept the default instance name
D. Run the SQL Server 2005 Setup utility on NodeB and select a Named Instance for the
Sales_DB database.

Answer: A

Explanation:
The default instance is named MSSQLSERVER. This instance name is already in use on NodeA;
therefore you should use a Named Instance.
Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use.
C: You do not need to move the existing instance as you can install up to 50 instances on a SQL
Server 2005 database server.
D: You need to install the instance on NodeA not NodeB. You can install a new instance on
NodeA if you use a Named Instance.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Wednesday, January 4, 2012

Speeding up the computer running on Windows 7

Windows 7 have numerous design, performance and security enhancements over its predecessors. Still new or old computers running on Windows 7 face sluggishness in their performance. Be n number of reasons if an old computer is working slowly but what for a new one. A Windows OS have numerous performance settings, which are set to default in a new machine. In this write up, we will discuss how you can speed up a computer running on Windows 7. Let us have a look upon them.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Low RAM
The first and foremost thing about the performance is hardware configuration. Make sure to have an adequate amount of RAM in the computer. If it seems low then you can also think to upgrade it. The minimum required RAM to install Windows 7 is 1GB but it is recommended to have 3GB RAM for optimal performance. If you working as a photographic professional or facing slow computer problem then have a look at this option too. You can consult an expert at Windows 7 Tech Support to know the minimum amount of RAM required as per your configuration and requirements.


Limiting the startup
Almost each application is designed to load at startup with the Windows automatically in order to have maximum use and fast launch. However, this option lets the Windows to start the computer slowly. The bottom right corner of your screen nearby the clock is the system tray. Here, all the programs loading on startup will appear. You can also click the arrow icon to see the hidden programs.

One can use Microsoft Startup System Configuration utility or Autoruns to block the programs from loading on startup. Blocking unnecessary applications can decrease the startup time but selecting the system default utilities can stop the proper functioning of associated programs. Therefore, it is recommended to have expert assistance for limiting the startup.

Cleaning up the junk
Use Disk Cleanup to remove the unwanted, temporary, and system-generated junk files from your computer. This will also let you to remove the unnecessary old system log and empty the Recycle Bin. Removing these files helps your processor to work faster and focus only the work related files.


Performance Troubleshooter
Go to Start menu and click Control Panel. Type ‘troubleshooter’ in the search box, click ‘Troubleshooting’ in ‘System & Security’. Now, select ‘Check for performance issues’. This will open the Performance Troubleshooter Wizard. Follow it step by step to analyze the performance issues. If you’re not able to understand or resolve the problem then it is the time to buzz Windows 7 tech support.

Virtual Memory
As the name suggests, it is the virtual memory assigned on the primary or secondary disk drives for the system work. Windows recognizes this area as primary memory. It is recommended to assign 1.5 times of the RAM as minimum and 2 times as maximum amount of virtual memory. By default, it is selected to be assigned automatically by Windows. Set the virtual memory properly from 1.5 to 2 times of RAM and see a difference between in the computer performance after a restart.

Conclusion
You can follow above steps to optimize the performance of a Windows 7 computer. If it still runs slow with these steps then it is advised to take help of third-party Microsoft Support for resolving this performance glitch in your computer.

Tuesday, January 3, 2012

70-642 Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Table of Contents

Table of Contents................................................................................................................ 1

Course Overview ................................................................................................................ 3

Section 0.1: Introduction..................................................................................................... 5

Section 0.2: Server Management ........................................................................................ 6

Section 0.3: Remote Management ...................................................................................... 7

Section 0.4: Mathematical Foundations.............................................................................. 8

Section 1.1: IPv4 Addressing.............................................................................................. 9

Section 1.2: IPv4 Subnetting............................................................................................. 10

Section 1.3: IPv4 Host Configuration............................................................................... 11

Section 2.1: IPv6............................................................................................................... 12

Section 2.2: IPv6 Addressing............................................................................................ 13

Section 2.3: IPv6 Configuration ....................................................................................... 14

Section 2.4: IPv6 Implementation..................................................................................... 15

Section 3.1: DHCP Configuration .................................................................................... 16

Section 3.2: DHCP Options .............................................................................................. 17

Section 3.3: Advanced DHCPv4 Settings......................................................................... 18

Section 3.4: Server Placement .......................................................................................... 19

Section 3.5: Superscopes and Split Scopes....................................................................... 20

Section 3.6: DHCPv6........................................................................................................ 21

Section 4.1: DNS Concepts............................................................................................... 22

Section 4.2: Name Resolution........................................................................................... 23

Section 4.3: Zone Configuration....................................................................................... 24

Section 4.4: Active Directory-integrated Zones ............................................................... 25

Section 4.5: Resource Records ......................................................................................... 26

Section 4.6: Client Configuration ..................................................................................... 27

Section 4.7: Dynamic DNS............................................................................................... 28

Section 4.8: Stub Zones and Forwarding.......................................................................... 29

Section 4.9: Root Hints and Root Zone ............................................................................ 30

Section 4.10: Zone Delegation.......................................................................................... 31

Section 4.11: WINS and GlobalNames ............................................................................ 32

Section 4.12: DNS Features.............................................................................................. 33

Section 4.13: DNS Design ................................................................................................ 34

Section 5.1: Routing.......................................................................................................... 35

Section 5.2: RIP ................................................................................................................ 36

Section 5.3: Demand-dial Routing.................................................................................... 37

Section 5.4: ICS and NAT ................................................................................................ 38

Section 6.1: Remote Access Concepts.............................................................................. 39

Section 6.2: Dial-up and VPN .......................................................................................... 40

Section 6.3: SSTP ............................................................................................................. 41

Section 6.4: CMAK .......................................................................................................... 42

Section 7.1: Network Location Profiles............................................................................ 43

Section 7.2: Wireless ........................................................................................................ 44

Section 7.3: RADIUS........................................................................................................ 45

Section 7.4: Network Access Protection (NAP) ............................................................... 46

Section 7.5: Network Authentication................................................................................ 47

Section 7.6: Firewall ......................................................................................................... 48

Section 7.7: IPsec.............................................................................................................. 49

Section 8.1: File Services.................................................................................................. 50

Section 8.2: File Shares..................................................................................................... 51

Section 8.3: Offline Files .................................................................................................. 52

Section 8.4: NTFS Permissions ........................................................................................ 53

Section 8.5: Share and NTFS Permissions ....................................................................... 54

Section 8.6: EFS................................................................................................................ 55

Section 8.7: Distributed File System (DFS) ..................................................................... 56

Section 8.8: Shadow Copy................................................................................................ 57

Section 8.9: Backup and Restore ...................................................................................... 58

Section 8.10: Disk Quotas................................................................................................. 59

Section 8.11: FSRM Features ........................................................................................... 60

Section 8.12: Print Services .............................................................................................. 61

Section 9.1: WSUS ........................................................................................................... 62

Section 9.2: Client Configuration ..................................................................................... 63

Section 9.3: MBSA ........................................................................................................... 64

Section 10.1: Reliability and Performance Monitor ......................................................... 65

Section 10.2: Event Viewer .............................................................................................. 66

Section 10.3: Network Monitor ........................................................................................ 67

Section 10.4: SNMP.......................................................................................................... 68

Practice Exams.................................................................................................................. 69

Course Overview

This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. It focuses on the details of configuring the infrastructure of a network.

Module 0 – Introduction
This module introduces Microsoft’s recommendations of the technical experience a candidate should have before attempting the certification test. Students will become familiar with server and remote management tools. This module provides the mathematical calculations of how to convert numbers from binary to decimal and hexadecimal. This mathematical foundation is necessary for students to understand the IPv4 and IPv6 addresses they will be studying in the course.

Module 1 – IPv4
This module discusses the details of configuring IPv4 addressing and subnetting. This includes topics of converting IPv4 addresses from binary to decimal, converting subnet masks to slant notation, identifying Ipv4 classes and ranges of IP addresses, and determining local and non-local hosts. Students will learn how to customize the number of subnets and hosts allowed on each subnet.

Module 2 – IPv6
In this module students will learn why it will become necessary to migrate to IPv6. They will learn the basic format of IPv6 addresses, identifying IPv6 address types, and configuring IPv6 addresses using the GUI and command line. Interoperability strategies for implementing IPv4 and IPv6 are explored.

Module 3 – DHCP
This module covers DHCP configuration, customization options, and advanced settings. Students will learn proper server placement to assure client communication with the DHCP server, the rationale for creating superscopes and split scopes, and DHCPv6 options.

Module 4 – DNS
In Module 4 students will learn the details of how DNS translates host names to IP addresses and the process of DNS name resolution for both the client and server. Topics will also include; creating zone and zone transfers, creating or converting an Active Directory-integrated zone, creating and editing resource records, configuring client registration, automatically updating DNS using Dynamic DNS, resolving queries using stub zones and forwarding, using root hints and a root zone, managing zones through zone delegation, creating WINS-integrated zones and GlobalNames zones support, and implementing strategies and goals when designing a DNS solution.

Module 5 – Routing
Module 5 teaches the students the basics of routing and how to manage routing table entries. Students will become familiar with installing RRAS components, and configuring RIP, demand-dial routing, and NAT solutions.

Module 6 – Remote Access
Module 6 discusses the details of configuring remote access and network authentication. Topics include; configuring a Remote Access server to use Dial-up and VPN connections, configuring client connections, configuring a VPN using SSTP, and using CMAK to manage remote access.

Module 7 – Network Access and Security
In Module 7 students will learn several strategies for controlling network access and enhancing network security. These will include: controlling network location profiles, configuring wireless connection, configuring a RADIUS client, server and proxy, configuring a DHCP server as an enforcement point, enforcing network authentication using Kerberos and NTLM, configuring a firewall, and configuring IPsec to protect IP packets during transmission.

Module 8 – File and Print
This module discusses managing network files and printing. Topics include: managing network file sharing and shared folders, controlling access using NTFS and share permissions, encrypting files and folders, protecting integrity of data through shadow copy, and backup and restore, restricting disk space using disk quotas and FSRM, and managing print services.

Module 9 – WSUS
In this module students will learn how to configure a WSUS server and client to manage the updating of software. They will also learn how to use MBSA to scan for security compliance.

Module 10 – Performance and Reliability
This module covers tools that are used to collect and monitor network data for performance and reliability. The Reliability and Performance Monitor provides network performance statistics. Event Viewer is used to monitor event logs. Network Monitor is used to gather information about network traffic. SNMP is used to manage networkattached devices.

Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification test.


Section 0.1: Introduction

Preparation
This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. Microsoft recommends at least one year experience in the following underlying technologies:
IP addressing and services
Names resolution
File and print services
Network access and remote access
Monitoring network services

This section introduces the instructor and the concepts that will be covered in this course.

Time

About 2 minutes

Section 0.2: Server Management

Preparation
This section discusses a new management console, Server Manager, used to install and manage server components. Server Manager uses the following elements:
Role
Role services
Feature

Server Core, a scaled-down version of Server 2008, provides a reduced foot print, reduced maintenance, less crashes and downtimes, and uses less disk space. To provide these benefits a limited set of server roles are supported. Student will learn how to configure and manage a server using Server Manager. They will also learn how to install roles on a Server Core server.

Configuring Server 2008 Network Infrastructure Objectives
102. Configure Dynamic Host Configuration Protocol (DHCP)
201. Configure a Domain Name System (DNS) server.

Lecture Focus Questions:
What are the differences among roles, role services, and features?
How are dependencies handled during role installation?
How does the server core installation differ from a standard server installation?
What are the limitations of a server core installation? What are the advantages?

Time
About 20 minutes

Section 0.3: Remote Management

Preparation

This section examines remote management options. Students will learn how to enable Remote Desktop on a Server Core, enable remote management of the firewall, and open firewall ports to allow remote use of MMC snap-ins.

Lecture Focus Questions:

How do firewall ports affect your ability to remotely manage a server?
What firewall port must be opened for Remote Desktop connections?
What advantage does using TS Gateway have over using Remote

Desktop?
What is the effect of enabling the Remote Administration exception in the firewall?
What are the operating system requirements for RSAT?
Which remote administration tools could you use if the firewall had only ports 80 and 443 open?

Time
About 25 minutes

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, January 2, 2012

70-294 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the IT Admin at Certkingdom.com. The Certkingdom.com network has a forest that operates at the
forest functional level of Windows Server 2003. The forest has a root domain named Certkingdom.com,
and two child domains named north.Certkingdom.com and south.Certkingdom.com. Each domain has a security
group named Research which holds the user accounts for that domain.
Two domain controllers are situated in each of these domains. One domain controller in each
domain hosts a copy of the global catalog.
The global catalog server in the Certkingdom.com domain holds the domain naming and the schema
master roles. The global catalog server in north.Certkingdom.com and south.Certkingdom.com holds the relative
ID (RID), infrastructure, and PDC emulator master roles.
A Certkingdom.com user named Ally Wagner, in the south.Certkingdom.com domain, was recently married. When
Ally Wagner got back, she asked you to change her surname in her user account. After changing
Ally Wagner’s user account to Ally Hamm, you notice that her user account is still incorrectly
specified as Ally Wagner in the Research group.
Which of the following master roles should you move to the domain controller that does not have
the Global Catalog in each domain?

A. The domain naming master role.
B. The infrastructure master role.
C. The RID master role.
D. The schema master role.
E. The PDC emulator master role.

Answer: B

Explanation: Problems like this can occur when the Infrastructure master role is on the same
domain controller as the Global Catalog. The infrastructure master updates the group-to-user
reference whenever group memberships change and replicates these changes across the domain.
The infrastructure master compares its data with that of a global catalog. Global catalogs receive
regular updates for objects in all domains through replication, so the global catalog data will
always be up to date. If the infrastructure master finds that its data is out of date, it requests the
updated data from a global catalog. The infrastructure master then replicates that updated data to
the other domain controllers in the domain.
Unless there is only one domain controller in the domain, the infrastructure master role should not
be assigned to the domain controller that is hosting the global catalog. If the infrastructure master
and global catalog are on the same domain controller, the infrastructure master will not function.
The infrastructure master will never find data that is out of date, so it will never replicate any
changes to the other domain controllers in the domain. Transferring the Infrastructure master role
to a different computer would resolve this problem. There is no reason to transfer any other master
roles.
Reference:
Michael Cross, Jeffery
A. Martin, Todd
A. Walls, Martin Grasdal, Debra Littlejohn Shinder & Dr.
Thomas W. Shinder, MCSE: Exam 70-294: Planning, Implementing, and Maintaining a Windows
Server 2003 Active Directory Infrastructure Study Guide & DVD Training System, Syngress
Publishing, Rockland, MA, 2003, pp. 505-509.


QUESTION 2
You work as the IT Network Admin at Certkingdom.com. The Certkingdom.com network has a forest with two child
domains named us.Certkingdom.com and uk.Certkingdom.com. All servers and domain controllers on the
Certkingdom.com network have Windows 2000 Server installed.
You have been given the task to uABCrade the domain controllers in uk.Certkingdom.com to Windows
Server 2003. You therefore need to take the appropriate steps that are required to prepare the
forest for the impending deployment.
Which of the following actions should you take?
Answer by selecting the appropriate steps from the column on the left and place it in the correct
order in the column on the left.



Answer:




QUESTION 3
You work as the IT Admin at Certkingdom.com. The Certkingdom.com network has a domain named Certkingdom.com.
Certkingdom.com has offices in London and Berlin, which are configured as separate sites.
A Backup of Certkingdom.com’s Ntds.dit file is performed outside of business hours, seven days a week.
The domain has an OU named Research that currently holds no Active Directory objects. During
the course of the business day an administrator in Berlin removes the Research OU, while an
administrator in London simultaneously places existing Active Directory objects in it. The London
administrator is later informed of the removal, and now realizes that the objects that were placed
into the Research OU are missing.
The CIO has subsequently instructed you to make sure that a Research OU and the missing
Active Directory objects are available to the London administrator. The CIO also informs you that
your solution should have no impact on network connectivity and resources. You have already
created a new OU, and named it Research.
Which of the following actions should you take NEXT?

A. You should transfer the objects from the LostAndFound container to the new Research OU
B. You should recreate the objects and then place the replicas in a Domain Group Policy that
should be linked to all OUs.
C. You should restore the objects to the new Research OU nonauthoritatively.
D. You should restore the objects to the new Research OU authoritatively.

Answer: A

Explanation: You moved the objects to an OU that had just been deleted. When you move
objects to an object that is no longer there, the objects get moved to the LostAndFound container.
This means that we haven’t lost the objects, so we can just re-create the Research OU and move
the users from the LostAndFound container to the new OU.
Reference:
Michael Cross, Jeffery
A. Martin, Todd
A. Walls, Martin Grasdal, Debra Littlejohn Shinder & Dr.
Thomas W. Shinder, MCSE: Exam 70-294: Planning, Implementing, and Maintaining a Windows
Server 2003 Active Directory Infrastructure Study Guide & DVD Training System, Syngress
Publishing, Rockland, MA, 2003, pp. 38-39, 99-101


QUESTION 4
You work as a IT Admin at Certkingdom.com. Certkingdom.com has its headquarters located in Dallas and branch
division in Miami. The Dallas and Miami division represent separate sites. The Dallas and Miami
divisions are linked to each other via a WAN link.
You have added a domain controller named ABC-SR01 to the Miami division and configured it as
a global catalog server. You have just completed configuring the site link between the Dallas and
Miami divisions.
The CIO at Certkingdom.com has instructed you to make sure that Miami workstations authenticate to the
network via ABC-SR01. The CIO also informs you that the replication of domain changes has to
happen instantaneously.
Which of the following actions should you take?

A. You should reduce the site link interval.
B. You should reduce the site link cost.
C. You should combine the Dallas and Miami sites into a single site
D. You should increase the site link cost.

Answer: A

Explanation:


QUESTION 1
You work as the IT Admin at Certkingdom.com. The Certkingdom.com network has a forest that operates at the
forest functional level of Windows Server 2003. The forest has a root domain named Certkingdom.com,
and two child domains named north.Certkingdom.com and south.Certkingdom.com. Each domain has a security
group named Research which holds the user accounts for that domain.
Two domain controllers are situated in each of these domains. One domain controller in each
domain hosts a copy of the global catalog.
The global catalog server in the Certkingdom.com domain holds the domain naming and the schema
master roles. The global catalog server in north.Certkingdom.com and south.Certkingdom.com holds the relative
ID (RID), infrastructure, and PDC emulator master roles.
A Certkingdom.com user named Ally Wagner, in the south.Certkingdom.com domain, was recently married. When
Ally Wagner got back, she asked you to change her surname in her user account. After changing
Ally Wagner’s user account to Ally Hamm, you notice that her user account is still incorrectly
specified as Ally Wagner in the Research group.
Which of the following master roles should you move to the domain controller that does not have
the Global Catalog in each domain?

A. The domain naming master role.
B. The infrastructure master role.
C. The RID master role.
D. The schema master role.
E. The PDC emulator master role.

Answer: B

Explanation: Problems like this can occur when the Infrastructure master role is on the same
domain controller as the Global Catalog. The infrastructure master updates the group-to-user
reference whenever group memberships change and replicates these changes across the domain.
The infrastructure master compares its data with that of a global catalog. Global catalogs receive
regular updates for objects in all domains through replication, so the global catalog data will
always be up to date. If the infrastructure master finds that its data is out of date, it requests the
updated data from a global catalog. The infrastructure master then replicates that updated data to
the other domain controllers in the domain.
Unless there is only one domain controller in the domain, the infrastructure master role should not
be assigned to the domain controller that is hosting the global catalog. If the infrastructure master
and global catalog are on the same domain controller, the infrastructure master will not function.
The infrastructure master will never find data that is out of date, so it will never replicate any
changes to the other domain controllers in the domain. Transferring the Infrastructure master role
to a different computer would resolve this problem. There is no reason to transfer any other master
roles.
Reference:
Michael Cross, Jeffery
A. Martin, Todd
A. Walls, Martin Grasdal, Debra Littlejohn Shinder & Dr.
Thomas W. Shinder, MCSE: Exam 70-294: Planning, Implementing, and Maintaining a Windows
Server 2003 Active Directory Infrastructure Study Guide & DVD Training System, Syngress
Publishing, Rockland, MA, 2003, pp. 505-509.


QUESTION 2
You work as the IT Network Admin at Certkingdom.com. The Certkingdom.com network has a forest with two child
domains named us.Certkingdom.com and uk.Certkingdom.com. All servers and domain controllers on the
Certkingdom.com network have Windows 2000 Server installed.
You have been given the task to uABCrade the domain controllers in uk.Certkingdom.com to Windows
Server 2003. You therefore need to take the appropriate steps that are required to prepare the
forest for the impending deployment.
Which of the following actions should you take?
Answer by selecting the appropriate steps from the column on the left and place it in the correct
order in the column on the left.



Answer:




QUESTION 3
You work as the IT Admin at Certkingdom.com. The Certkingdom.com network has a domain named Certkingdom.com.
Certkingdom.com has offices in London and Berlin, which are configured as separate sites.
A Backup of Certkingdom.com’s Ntds.dit file is performed outside of business hours, seven days a week.
The domain has an OU named Research that currently holds no Active Directory objects. During
the course of the business day an administrator in Berlin removes the Research OU, while an
administrator in London simultaneously places existing Active Directory objects in it. The London
administrator is later informed of the removal, and now realizes that the objects that were placed
into the Research OU are missing.
The CIO has subsequently instructed you to make sure that a Research OU and the missing
Active Directory objects are available to the London administrator. The CIO also informs you that
your solution should have no impact on network connectivity and resources. You have already
created a new OU, and named it Research.
Which of the following actions should you take NEXT?

A. You should transfer the objects from the LostAndFound container to the new Research OU
B. You should recreate the objects and then place the replicas in a Domain Group Policy that
should be linked to all OUs.
C. You should restore the objects to the new Research OU nonauthoritatively.
D. You should restore the objects to the new Research OU authoritatively.

Answer: A

Explanation: You moved the objects to an OU that had just been deleted. When you move
objects to an object that is no longer there, the objects get moved to the LostAndFound container.
This means that we haven’t lost the objects, so we can just re-create the Research OU and move
the users from the LostAndFound container to the new OU.
Reference:
Michael Cross, Jeffery
A. Martin, Todd
A. Walls, Martin Grasdal, Debra Littlejohn Shinder & Dr.
Thomas W. Shinder, MCSE: Exam 70-294: Planning, Implementing, and Maintaining a Windows
Server 2003 Active Directory Infrastructure Study Guide & DVD Training System, Syngress
Publishing, Rockland, MA, 2003, pp. 38-39, 99-101


QUESTION 4
You work as a IT Admin at Certkingdom.com. Certkingdom.com has its headquarters located in Dallas and branch
division in Miami. The Dallas and Miami division represent separate sites. The Dallas and Miami
divisions are linked to each other via a WAN link.
You have added a domain controller named ABC-SR01 to the Miami division and configured it as
a global catalog server. You have just completed configuring the site link between the Dallas and
Miami divisions.
The CIO at Certkingdom.com has instructed you to make sure that Miami workstations authenticate to the
network via ABC-SR01. The CIO also informs you that the replication of domain changes has to
happen instantaneously.
Which of the following actions should you take?

A. You should reduce the site link interval.
B. You should reduce the site link cost.
C. You should combine the Dallas and Miami sites into a single site
D. You should increase the site link cost.

Answer: A

Explanation:


QUESTION 5
You work as the IT Admin at Certkingdom.com. The Certkingdom.com network has a domain named Certkingdom.com. All
servers on the Certkingdom.com network have Windows Server 2003 installed and all workstations have
Windows XP Professional installed.
Certkingdom.com is made up of four divisions named Sales, Marketing, Finance and Research. The
Certkingdom.com network has an organizational unit (OU) named after each division that holds the user
accounts of all employees working in that specific division.
You need to install a new application for all employees in the Marketing division. You start by
creating an installation package and a Group Policy object (GPO). You plan to make use of the
new GPO to deploy the package to the workstations in the Marketing division. You therefore
connect the GPO to the Marketing OU. However, the application does not install.
The CIO informs you that the application must be installed and that you should make sure that
marketing application is not installed on workstations in the other Certkingdom.com divisions.
How will you accomplish the task?

A. Advise the Marketing users to reboot their workstations.
B. Edit the GPO and assign the application to user accounts with Marketing OU membership.
C. Connect the GPO to the Certkingdom.com domain.
D. Connect the GPO to the OU that contains computer accounts and not the Marketing OU.

Answer: B

Explanation: It is likely that the application was assigned to the computer accounts, rather than
the user accounts.
Reference:
Jill Spealman, Kurt Hudson & Melissa Craft, MCSE Self-Paced Training Kit (Exam 70-294);
Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory
Infrastructure, Microsoft Press, Redmond, Washington, 2004, pp. 12-3 to 12-10, 12-13 to 12-28,
12-34 to 12-39

QUESTION 5
You work as the IT Admin at Certkingdom.com. The Certkingdom.com network has a domain named Certkingdom.com. All
servers on the Certkingdom.com network have Windows Server 2003 installed and all workstations have
Windows XP Professional installed.
Certkingdom.com is made up of four divisions named Sales, Marketing, Finance and Research. The
Certkingdom.com network has an organizational unit (OU) named after each division that holds the user
accounts of all employees working in that specific division.
You need to install a new application for all employees in the Marketing division. You start by
creating an installation package and a Group Policy object (GPO). You plan to make use of the
new GPO to deploy the package to the workstations in the Marketing division. You therefore
connect the GPO to the Marketing OU. However, the application does not install.
The CIO informs you that the application must be installed and that you should make sure that
marketing application is not installed on workstations in the other Certkingdom.com divisions.
How will you accomplish the task?

A. Advise the Marketing users to reboot their workstations.
B. Edit the GPO and assign the application to user accounts with Marketing OU membership.
C. Connect the GPO to the Certkingdom.com domain.
D. Connect the GPO to the OU that contains computer accounts and not the Marketing OU.

Answer: B

Explanation: It is likely that the application was assigned to the computer accounts, rather than
the user accounts.
Reference:
Jill Spealman, Kurt Hudson & Melissa Craft, MCSE Self-Paced Training Kit (Exam 70-294);
Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory
Infrastructure, Microsoft Press, Redmond, Washington, 2004, pp. 12-3 to 12-10, 12-13 to 12-28,
12-34 to 12-39

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

MCITP Training - MCITP Certificaion - MCTS Exams Training - CCNA Exams - and more at CertKingdom.com