Tuesday, March 27, 2012

70-659 Q&A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all
client computers Windows 7 Professional.
The company network consists of an internal LAN and a perimeter network. The two networks are
separated by an internal corporate firewall. An external corporate firewall connects the perimeter
network to the Internet.
The network includes virtual machines (VMs) running on host servers contained in both the
internal network and the perimeter network.
You have recently installed a server named Certkingdom-VMM1 on the internal network. Certkingdom-VMM1 runs
Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and will be used to manage
the virtual environment.
You are now in the process of deploying VMM agents on the host servers. You have configured
the port number for the VMM agents and configured the internal corporate firewall to allow
communications on the appropriate port number.
What else do you need to configure to ensure that the VMM agents can communicate with CertkingdomVMM1?

A. You need to configure the name of the VMM server (Certkingdom-VMM1).
B. You need to configure the Fully Qualified Domain Name (FQDN) of a domain controller.
C. You need to configure the name of a SQL Server.
D. You need to configure an encryption key.

Answer: D

Explanation:


QUESTION 2
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all
client computers Windows 7 Professional.
The company network consists of two subnets. The Development subnet is used by the
Development department. The Production subnet is used by all other company departments.
You install a Windows Server 2008 R2 Hyper-V server named Certkingdom-VMHost1 in the Production
subnet. Certkingdom-VMHost1 contains two network interface cards named NIC1 and NIC2. You have
configured NIC1 as a management interface.
You want to configure Certkingdom-VMHost1 to host virtual machines on both the Production subnet and
the Development subnet.
How should you configure Certkingdom-VMHost1?

A. You should use VLAN tags for the VMs and configure NIC2 to use Trunk Mode.
B. You should assign NIC2 as an additional management interface.
C. You should configure both adapters to support jumbo frames.
D. You should configure NIC1 with an IP address in the Production subnet and configure NIC2
with an IP address in the Development subnet.

Answer: A

Explanation:


QUESTION 3
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2008 R2.
A server named Certkingdom-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008
R2 and is used to manage the company’s virtual environment.
The company includes a Development department. Users in the Development department use
their computers to develop and test software applications for use by other company departments and customers.
You install a Windows Server 2008 R2 Hyper-V server named Certkingdom-VMTest1 in the Development
department. Certkingdom-VMTest1 will host virtual machines (VMs) for the Development department
users to use to test their applications.
You need to ensure that the VMs are completely isolated from production servers.
How can you ensure that the test VMs can communicate with each other while being isolated from
the host server and the rest of the network?

A. By configuring the VMs to connect to a Dedicated virtual network.
B. By configuring the VMs to connect to an Internal virtual network.
C. By configuring the VMs to connect to a Local virtual network.
D. By configuring the VMs to connect to a Private virtual network.

Answer: D

Explanation:


QUESTION 4
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain.
You are configuring a virtual environment for the company. You have an iSCSI storage disk array
that will be used to store virtual machines (VMs).
You install a server named Certkingdom-Host1 that runs a Server Core Installation of Windows Server 2008 R2.
You need to configure Certkingdom-Host1 to store to VMs on the iSCSI disk array.
Which two of the following tools could you use?

A. You could use Disk Management.
B. You could use Diskpart.exe.
C. You could use iSCSICLI.exe.
D. You could use iSCSICPL.exe.

Answer: C,D

Explanation:


QUESTION 5
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain named Certkingdom.com.
The company network consists of an internal LAN and a perimeter network. To comply with
company security policy, servers located in the perimeter network are not members of the
Certkingdom.com domain.
A Microsoft Hyper-V Server 2008 R2 server named Certkingdom-VMHost1 is located in the perimeter network.
You relocate Certkingdom-VMHost1 into the internal network. You now need to join Certkingdom-VMHost1 to the
Certkingdom.com AD DS domain.
How should you join Certkingdom-VMHost1 to the Certkingdom.com domain?

A. You should use the System Properties control panel applet.
B. You should use the Netsh command line utility.
C. You should use the Hyper-V configuration utility (hvconfig).
D. You should use the dcpromo utility.

Answer: D

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, March 26, 2012

Microsoft leads seizure of Zeus-related cybercrime servers

The company said it has shutdown several botnets that stole an estimated US$100 million over five years

IDG News Service - Microsoft said on Monday it and several partners had disrupted several cybercrime rings that used a notorious piece of malicious software called Zeus to steal US$100 million over the last five years.

The company said a consolidated legal case has been filed against those allegedly responsible that for the first time applies the Racketeer Influenced and Corrupt Organizations (RICO) Act.

Zeus has been a thorn in the side for financial institutions due to its stealthy nature and advanced spying capabilities that center around stealing online banking and e-commerce credentials for fraud.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


According to a complaint filed under seal on March 19 in the U.S. District Court for the Eastern District of New York, Microsoft accused the defendants of infecting more than 13 million computers and stealing more than US$100 million over the last five years.

The civil complaint lists 39 "John Doe" defendants, many of whom are identified only by online nicknames, such as "Gribodemon" and "Harderman."

It marks the latest action led by Microsoft against botnet operators. The company has gone to court before to gain permission to take control over domain names associated with the command-and-control infrastructure of botnets such as Kelihos, Rustock and Waledac.

The company has also initiated civil proceedings against unnamed operators but has had little success due to jurisdiction issues.

Mark Debenham, senior manager of investigations for Microsoft's Digital Crimes Unit, said the creators of Zeus -- as well as related malware such as SpyEye and Ice-IX -- sold "builder kits" to other would-be cybercriminals. Simple versions sold for as little as $700, while more advanced versions could cost $15,000 or more, according to Debenham's affidavit.

Microsoft also said this is the first time other parties have joined it as a plaintiff in a botnet case. The other plaintiffs are the Financial Services Information Sharing and Analysis Center, a nonprofit security organization, and the National Automated Clearing House Association (NACHA).

NACHA oversees the Automated Clearing House system (ACH), a widely-used but aging system used by financial institutions for exchanging details of direct deposits, checks and cash transfers made by businesses and individuals. It has been heavily targeted by Zeus.

In a single day in August 2011, 167 million phishing emails purported to be from NACHA were sent, according to a sworn affidavit included in the court documents from Pamela Moore, senior vice president of administrative services and NACHA's CFO. Those emails tried to entice victims into clicking links that led to malicious servers which would then install Zeus, she testified.

On a normal day, NACHA would only send out about 1,500 legitimate messages.

"The Zeus botnets have caused, and continue to cause, extreme damage to NACHA and its members, which, if allowed to continue, will be compounded as the case proceeds," Moore testified.

The court granted Microsoft and its partners permission to seize servers located in Scranton, Pennsylvania, and Lombard, Illinois, on Friday. Microsoft has also taken control of 800 domains that are part of Zeus' infrastructure in an attempt to completely wrest control of the networks from their operators.

Microsoft said the action resulted in the disruption of several of Zeus botnets, and it would now work to identify and notify people whose computers are infected with the malicious software. Also contributing to the action was Finnish security vendor F-Secure and Kyrus Tech, a security company.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, March 22, 2012

Yes, Microsoft wants Windows 8 to compete with iPads

Yes, Microsoft wants Windows 8 to compete with iPads
Windows development blog shows how to translate iPad apps into Metro apps

If there was any doubt that Microsoft wants to grab some of the iPad market, there's none any more: Now Microsoft has a web page that shows developers how to translate iPad apps into Windows 8 ones with a Metro style look and feel.

"In this case study we want to help designers and developers who are familiar with iOS to reimagine their apps using Metro style design principles," says the blog. "We show you how to translate common user interface and experience patterns found in iPad apps to Windows 8 Metro style apps."

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


TEST YOURSELF: Do you know the New iPad?
Why would anyone want to do that? "To learn more about the business opportunity of Windows 8, see Selling Apps," the posting says early on. Ultimately that leads to a site with this enticement: "With successful apps on Windows, you'll make more money than the industry standard, earning 80% of every customer dollar, after an app makes more than 25,000 USD in sales. For the first 25,000 USD of an app's sales, you get the industry-standard 70%."

Money aside, the case-study post shows how an iPad photo journal application was adapted to fit with Metro style. Both Windows 8 and iOS on iPads cater to touch commands and navigation, but where iPads rely on icons and toolbars, Windows 8 centers around words on tiles and hiding toolbars.

In converting to Windows 8 the first thing to go from the iPad app is the "chrome" - the navigation bar, pagination controls and the bottom control bar, resulting in a less cluttered application surface. In the Windows 8 version, they are gone but are less necessary because the navigation hierarchy is flattened.

For example, the hub screen for the iPad app shows a single photo for each of the 12 months, with a tab to switch to comments about the photos.

In the Windows 8 version the hub screen is a single month with a featured large photo for the month with other, smaller photos from that month displayed next to it. About a third of the same screen is devoted to comments. For more comments, tap (it's designed for touchscreen) the Recent Comment header. For more pictures, tap the This Month header.

A second navigation alternative involves pinch to zoom - making a pinching gesture while touching the screen to pull out hierarchically from a single photo to sets of 12 squares or tiles, each set representing a different year. Users can, for instance, go from a photo from March 2012 to a photo from July 2010 by pinching the March photo, zooming out to the sets of tiles, tapping the one for July 2010 and sorting through the photos that are brought up. There is no navigation bar.

With the iPad app, the same transition calls for tapping a Years button on the navigation bar at the top of the screen, selecting the year as it appears in a popover box and then sorting through that year.

Similarly, commands are hidden off screen and can be drawn up from the bottom or down from the top with a finger swipe. The commands shown depend on what object on the screen is designated. So if a photo is highlighted, the commands might include delete or upload.

In the iPad app, that is done via the always visible navigation bar.

On the iPad app, search is done via a search window on the app's home page. With Metro, it's always available on the charms bar - a bar of a consistent set of icons that can be swiped out from the right hand side of the screen. It searches the application that the user is inside of.

The features go on and on, including sharing content between applications and to various social networking sites.

Tuesday, March 20, 2012

Stuck in CAPTCHA Hell: When Security Disables

It was just after 5 AM on a workday. I had my coffee, and I needed to quickly check my work email for status on a problem. Glancing through the list of new items, I was intrigued by an unexpected message from a LinkedIn group member who I respect. I wanted to leave a comment, so I clicked on the link.

But as I tried to logon to my LinkedIn account, a CAPTCHA popped up questioning my credentials.

“Darn, I hate when this happens,” I thought. “No worries, I’ve been through this security checkpoint before.”

I typed in the two different words with the fuzzy characters. “Is there a space between these or not?” Nope – got it wrong.”


MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

Take 2
I got my glasses out and looked closer this time. Fortunately, you get to choose new images, if you think the one in front of you looks too weird. I hit the “refresh” button. Again, again and again. Finally, I liked about the fifth option. I typed in the two words. No dice.

I was mad at myself. “Wake up Lohrmann ….”

Take 3 & 4

I tried again. Calmly, I liked the first image this time. I carefully typed each word, slowly and deliberately. INCORRECT! …. What?

I got up walked into the kitchen and got another cup of coffee. I came back three minutes later and stared at the screen. Now I was getting a bit annoyed. I went through the “refresh” choice about six more times. OK, I can get this one right. I checked the “Caps Lock,” but it was NOT on.

I thought to myself, “I will try to type as if I’m acting in a kid’s play in slowwwww motion.” Here we go - I typed in each letter, one by one, very methodically. I went very, very, very slowly, making sure that each letter placed into the computer was exactly the way that I saw them on the screen. When I hit return, nope.

Failure Options

Now, I could hear the computer program talking to me: “Are you really Dan Lohrmann? I don’t think you are. In fact, I’m going to make the task of logging in even more difficult for you, because I don’t trust you. You’re probably a bad-guy hacker. You are an imposter!”

I tried all kinds of other options. I launched another browser session and tried logging on by just going to LinkedIn directly. I used my trusted helpful “Protection Suite” with my logon passwords kept safe by a famous vendor. I tried, you know, everything I could think of - etc, etc, etc. But I kept getting that stupid captcha bottleneck.

I started questioning what was going on: “Was this sad situation because I was logging in at an unexpected hour and they weren’t going to let me onto the website until after 6 AM? Did I surprise them and fail the profile with my too-early activity? Is this like my credit card number showing-up in China?”

This “incident” was now escalating in my mind. “Let’s activate the command center – just kidding.” But I was getting really, really annoyed. My thoughts were far from supportive of the security industry at this point.

“Who created this stupid CAPTCHA-thing anyway? I looked it up. I’ll send him a letter. Why are the images getting more and more difficult over the years? Why are there different fonts with all these crazy lines running through them that could be letters or just distractions. I think a computer program could figure this out easier than me – or maybe not.”

I closed my eyes and pondered. Maybe this was a business opportunity? I did some Google searches. My mind raced: “Are there CAPTCHA alternatives? I really like LinkedIn, but how about a frequent flyer line for “online travelers” who are trusted? Can I sign up for some different authentication scheme? What about….”

OK – back to the task at hand. This rabbit trail, is getting really bothersome, but “I WILL NOT BE DEFEATED! I WILL OVERCOME THE SECURITY OBSTACLES PLACED BEFORE ME at 5:15 AM!”

Wait It Out

You can stop the video and fast-forward at this point. The sad truth is that this process (and associated negative thoughts) went on, and on for about another 20 minutes. Yes, I was a glutton for punishment, and I don’t really know why. Still, I never successfully logged onto LinkedIn during that hour. My morning was unofficially a mess.

I turned off my computer. Read a book, worked out, took a shower and ate breakfast. After more than an hour, I calmly approached my PC, turned it on and tried LinkedIn again.

It worked! Oh yeah … No CAPTCHA, no waiting, no delay – I was in. I was set free!! Released from CAPTCHA hell! CELEBRATION! Yes, I started singing in my head: “Celebrate good times come-on…”

Analysis

That night after work, I looked back and laughed at myself. All that for trying to leave a helpful comment? I thought about the crazy sequence of events. “Could I ever have dreamed of this happening twenty years ago? I wanted justice. But this is a free service. OK, we’re in the 21st century … I’ll write a blog … I’ll rant. I’ll try to make lemonade out of this lemon. There must be others who’ve experienced the same things. Perhaps this happened for a good reason? “

Getting more personal in my organizational psychotherapy: “Do my customers see our government security services in the same way sometimes? Is this another example of security as a disabler?” This was a reminder to me (and us) to walk a mile in their shoes. Eat our own virtual dog food. Admit failures. Move or remove cyber barriers to getting things done, if possible.

I’m sure there is another side to this story. No doubt, CAPTCHA security works in most cases. If I let LinkedIn executives explain, they might tell me how I messed up. But that’s probably not worth the effort. (Unless they want to respond to this blog….) Nevertheless, I don’t think I’ll ever forget my morning in unexpected social networking logon misery.

Thoughts or stories? Ever been in CAPTCHA hell?

Monday, March 19, 2012

Stolen encryption key the source of compromised certificate problem, Symantec says

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Kaspersky Lab's discovery of Mediyes malware signed with Conpavi digital certificate sets off search

When Kaspersky Lab last week spotted code-signed Trojan malware dubbed Mediyes that had been signed with a digital certificate owned by Swiss firm Conpavi AG and issued by Symantec, it touched off a hunt to determine the source of the problem.

The answer, says Symantec's website security services (based on the VeriSign certificate and authentication services acquisition), is that somehow the private encryption key associated with Conpavi AG certificate had been stolen.

BACKGROUND: Kaspersky Lab spots malware signed with digital certificate

"The private key for Conpavi was exposed," says Quentin Liu, senior director of engineering at the Symantec division. "Someone got hold of the private key." For this type of digital certificate, the private key is held by the certificate owner, in this case, Conpavi. Whether the private encryption key was stolen by an insider at Conpavi or outside attacker isn't known. But the incident points out the risks associated with private encryption keys for this type of digital certificate and the need to safeguard them.

Symantec has revoked the Conpavi certificate that was used to digitally sign the Mediyes malware and is assisting the Swiss firm in analyzing what occurred and helping them prevent this from happening again.

The incident also highlights why malware authors want to sign the code they write, which in the case of Mediyes, is a so-called dropper file used to seed computers so they can be easily manipulated for other purposes. In the case of the Mediyes Trojan, the purpose was to intercept browser requests sent to search engines so the attackers could earn money in a fraudulent pay-per-click scheme.

Kaspersky last week estimated 5,000 users, mainly in Western Europe, including Germany, Switzerland, Sweden, France and Italy, had been exploited with the Mediyes Trojan for this purpose.

Criminals are increasingly using stolen digital certificates to sign their malicious code, Symantec acknowledges. The advantage in code-signing for them is it gives these attackers a boost up in having the malicious code evade detection by antivirus and other types of anti-malware software.

"We have seen more being signed, sometimes with stolen certificates," says Liam O Murchu, manager of Symantec security response. "It lends an air of legitimacy to the file."

Compromised digital certificates with stolen keys are available in criminal black markets online in places where you might find other stolen items, like credit card numbers and the like, he points out.

As Symantec has evolved its malware protection method, a risk-based score based on several factors will be used to quickly determine if code is benign or malevolent. Digitally signed code gets an advantage in this scoring system, says O Murchu. If attackers are effectively figuring out how to get around detection this way, this scoring system will need to be recalibrated, O Murchu acknowledges.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, March 15, 2012

Google restores interoperability with AOL AIM

A spam problem originating on AIM prompted Google to shut down the federation between the two networks about two weeks ago

IDG News Service - Google and AOL have restored the interoperability between their two instant messaging (IM) networks, a little over two weeks after it was temporarily suspended due to a spam flood originating in AOL's AIM that affected Gmail Chat and Google Talk users.

An AOL official originally forecasted that a fix to the spam problem could be rolled out on Thursday of last week, but the process took a bit longer, finally culminating on Tuesday.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


The interoperability between the two IM networks is now again active and everything is "running smoothly," an AOL spokeswoman said via e-mail.

This means that users logged into the Google network can engage in IM sessions with users who are on the AIM network. Without the interoperability, people need to have separate accounts for both services, using the Google account to communicate with users on Google's network and the AIM account for communicating with users on the AIM network.

Google didn't immediately respond to a request for comment, but when contacted last week about this issue, a Google spokeswoman deferred comment to AOL.

In the past week, there have been several published reports that AOL is planning layoffs, and that the AIM team will be particularly hard hit by the staff reduction. On Tuesday, The New York Times reported that already about 40 AOL employees have gotten pink slips, among them many AIM staffers.

AIM generates about $50 million in annual revenue, and costs about half as much to operate, so AOL wants to slash AIM costs dramatically to around $2 million to $3 million per year, the Times reported, citing information from anonymous sources.

The AOL spokeswoman declined to comment about the layoff reports.

Tuesday, March 13, 2012

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


QUESTION 1
Certkingdom.com has employed you as a Microsoft Dynamics CRM 4.0 administrator. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
The Certkingdom.com management has requested that you draw up a list of facts regarding knowledge
base articles.
Which of the following options would be part of your list?

A. Knowledge base articles can only be viewed by permitted users.
B. A knowledge base article selects the Work Offline option.
C. A knowledge base article displays the data in the Resources Earned Value view.
D. A knowledge base article edits the layout of each page.

Answer: A

Explanation: You should inform management that it can be viewed only by permitted users. If you
are permitted to use Microsoft Dynamics CRM 4.0, you can view the Knowledge Base Articles.
Reference: http://support.microsoft.com/kb/950100


QUESTION 2
Certkingdom.com has employed you as a Microsoft Dynamics CRM 4.0 administrator. Certkingdom.com consists
of a Sales division and a Marketing division. Certkingdom.com is currently promoting the third edition of a
Finance software package. When a fourth edition is released, it is regarded as a major uCertkingdomrade.
The manual for the fourth edition requires a supplementary segment.
You have received instructions from the CIO to retain Third Edition documentation for clients that
continues using that edition of the software. The CIO has also informed you that new
documentation should only be produced for the Fourth Edition of the Finance package.
Which of the following actions should you take?

A. You should bring down the article template for edition 3.0 documents and assimilate a new
article template for edition 3.8 documents.
B. You should configure the content deployment settings to 3.0 documents.
C. You should bring down the article template for edition 3.0 documents and remove the
accounted attribute for edition 3.8 documents.
D. You should delete the projected attribute for edition 3.8 documents.

Answer: A

Explanation: You need to bring down the article template for edition 3.0 documents. You can also
assimilate a new article template for edition 3.8 documents. Article Templates are used when
working with the Knowledge Base (found in the Service section of Microsoft Dynamics CRM).
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


QUESTION 3
Certkingdom.com has employed you as a Microsoft Dynamics CRM 4.0 administrator.
You receive an instruction from the CIO to inform the new interns in your division of the records
that will be linked to the sales literature.
Which two of the following options should you take?

A. You should inform the interns that the Products will be linked.
B. You should inform the interns that the Attention grabbing headlines will be linked.
C. You should inform the interns that the Strong offers will be linked.
D. You should inform the interns that the Half-truths will be linked.

Answer: A

Explanation: You need to inform the interns that the Competitors and the Products are
associated. The Sales Literature consists of documentation about your products designed to be
used by your sales persons. Furthermore, with Sales Literature you can add Products and identify
Competitors.
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


QUESTION 4
You are the Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. Certkingdom.com consists of a Sales
division and a Marketing division. For service management, Certkingdom.com makes use of contracts and
contract lines.
A new Certkingdom.com policy states that all cases must be associated with a contract line because this
information is necessary for analysis and reports. Historically, subject hierarchy was only created
for cases at Certkingdom.com. While analyzing the subject hierarchy, you notice a few previously used
ones that are not required any more.
You have been instructed to update the subject hierarchy.
Which of the following actions should you take?

A. You should navigate to the Views area of the Account Customization window and edit the
Lookup View.
B. The best option is to edit pick list options and current cases under their respective subjects.
C. The best option is to change all messages associated with the hierarchy and put the subjects
with the cases in it.
D. The best option is to reorganize the subject hierarchy.
Thereafter archive parent subject area should be created in the hierarchy and move the redundant
subjects under it.

Answer: D

Explanation: You need to reorganize the subject hierarchy and create an archive parent subject
area in the hierarchy and move the not needed subjects under it.
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


QUESTION 5
You work as a Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. The Certkingdom.com network
consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com consists of a Sales division. Certkingdom.com is using schedules for their Sales division. Some
of the users in the Sales division have permanent contracts, while others are hired on short-term
basis. The short-term users are normally employed for a minimum of two weeks at a time. You
then implement schedules for the users in the Sales division; however, the Sales staff does not
view the schedules. You need to keep the record of the short-term users.
Which of the following actions should you take?

A. You should create new format of the Contact records.
You should then have the short-term users disabled.
B. You should set up a Facility/Equipment record for every short-term user.
You should then remove the record when the short-term user’s contract expires and they depart.
C. You should create Contact entity.
You should then delegate the estimated time of job accomplishment.
D. You should delete the short-term user field from the record.

Answer: B

Explanation: You need to set up a Facility/Equipment record for each short-term user. You should
also delete the record when the short-term user’s contract expires and they depart.
Facilities/Equipment is needed when performing scheduling. It makes up the Resources
component. Delete Entity enables you to completely delete the record.
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Friday, March 9, 2012

The essential strategy guide on the consumerization of IT

Consumer tech is now part of most companies' technology portfolios. Here's InfoWorld's guide for making it all work


There may be someone in a dark corner of IT who hasn't heard about the consumerization of IT, that growing trend toward active user involvement and even control over aspects of the business's technology portfolio. By now, most of IT is aware -- sometimes painfully so. Also quite aware are business execs, who increasingly wave away IT's securty and control concerns as their users and customers swoon over iPads, social networking, cloud services, and the rest of the consumerization repertoire. They see employees who can do more in more places, and often they're discovering the joys personally.

7 truths about consumerization of IT

But once the euphoria has passed, real questions remain about the consumerization phenomenon. Even when IT gets over loss of control, legitimate and complex questions about risk must be addressed. And businesspeople soon discover that freedom of technology can descend into chaos without a framework to guide its use.

The issue is not whether to adopt consumerization -- it'll happen on its own -- but how best to do so. That's why InfoWorld has produced the "Consumerization of IT Digital Spotlight," a PDF guide on the essential business factors, adoption strategies, and technology management options that both business execs and IT managers should understand.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, March 8, 2012

7003-1 Q&A / Study Guide / Testing Engine

Cisco CCNA Training, Cisco CCNA Certification

Best Avaya Certification Training and Avaya Exams Training and more Cisco exams log in to Certkingdom.com


QUESTION 1
A technician deployed a Communication Server 1000E with dual homing feature configured. Both
the T and 2T ports are connected on the media Gateway Controller (MGC) one connection is
active to avoid network loops.
Which two statements are true, if the connection to the active port on the MGC is host?
(Choose two)

A. The MGC will issue a link down error.
B. The MGC will switch to the active pert.
C. The MGC and CPPM will have no loss of service.
D. The MGC will switch to the active port after 12 seconds.

Answer: B,C

Explanation:


QUESTION 2
A customer has deployed a Communication Server 100 Rls. 7x system at their site. The technician
has been asked to add the Call pickup feature to the 100 IP telephone in the sales department.
The customer wants to be sure active calls not lost when the changes are made.
Which Phones Configuration feature can be enabled that will ensure changes to the telephone are
not transmitted to the call server until the telephone are busy?

A. Bulk change
B. Courtesy change
C. Group change
D. Template change

Answer: B

Explanation:


QUESTION 3
A customer wants to build a new Ip node on their Communication Server (CS) 1000E system with
three Signaling Servers. This node will support virtual trunks, IP media services, TPS and
personnel directories. A technician logs into Elements manager to complete the configuration,
after creating and saving the node configuration, the transfer now option chosen, then the servers
are selected, the start sync is selected followed by restart application.
What is expected outcome from the system?

A. The node file will be transferred from Signaling Servers to the call servers, and INI files will be
transferred from the call server to the selected servers.
B. The node file will be transferred from Call Servers to the Signaling servers, and the INI files will
be transferred from the Call Servers to the selected servers.
C. The node file will be transferred from Signaling Servers to the Call Server, and the INI files will
be transferred from Call Servers to the Signaling servers.
D. The node will be transferred from Element manager to the call server, and INI files will be
transferred from Element manager to CallServer.

Answer: B

Explanation:


QUESTION 4
A customer wants to deploy an Avaya Server (CS) 1000 Rls. 7x system in Avaya Aura solution.
They plan to have the system support 50,000 users.
Which system type will meet the customer’s needs?

A. CS 1000E Co-Resident Call Server and Signaling Server
B. CS 1000E Standard Availability (SA)
C. CS 1000E High Availability (HA)
D. CS 1000E High Scalability (HS)

Answer: D

Explanation:


QUESTION 5
You are installing a new Communication Server 1000E (CS 1000E) SA release 7x system for your
customer. They have asked you to implement the corporate Directory Feature during the
installation.

A. SFTP must be disabled in LD 117.
B. Valid telephony accounts must already exist in Subscriber Manager.
C. The CS 1000E Call Server must be joined to security domain.
D. Centralized authentication must be disabled.

Answer: C

Explanation:


Cisco CCNA Training, Cisco CCNA Certification

Best Avaya Certification Training and Avaya Exams Training and more Cisco exams log in to Certkingdom.com

Wednesday, March 7, 2012

MCA - Microsoft Certified Architect Program

MCA - Microsoft Certified Architect Program
The Microsoft Certified Architect (MCA) program helps enable the highest-achieving professionals in IT architecture to distinguish their expertise. If you have proven experience as a technology architect who designs and delivers IT solutions for enterprise customers, and technical and leadership skills that surpass those of your peers, consider earning the MCA certification. By doing so, you can validate your advanced proficiency and join an exclusive, world-class community of experts.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Level: Successful candidates generally have ten or more years of IT experience, and five or more years of specific architectural experience. Microsoft Certified Master certification is a prerequisite for all MCA Technology certifications.

Audience: Practicing IT Architect, Microsoft Certified Master

Type: Microsoft Certification

Microsoft Certified Architect Program Overview

Why get certified?
Earning a Microsoft Certification validates your proven experience and knowledge using Microsoft products. Designed to be relevant in today's rapidly changing IT marketplace, Microsoft Certifications help you utilize evolving technologies, fine-tune your troubleshooting skills, and improve your job satisfaction.

Whether you are new to technology, changing jobs, or a seasoned IT professional, earning a Microsoft Certification demonstrates to customers, peers, and employers that you are committed to advancing your skills and taking on greater challenges. In addition, certification provides you with access to exclusive Microsoft Certified Professional (MCP) resources and benefits, including opportunities to connect with a vast, global network of MCPs.

Why get an MCA certification?
Individuals who earn an MCA have achieved the capstone certification from Microsoft, proving their ability to architect large-scale complex solutions with Microsoft technologies. As such, they are recognized by Microsoft and the IT industry worldwide for having achieved the highest level of professional certification on Microsoft server products. MCAs report that their certification has brought them:

More market credibility
More effective deployment services
Increased number of requests for advice or participation in projects
In addition to providing opportunities for career advancement and higher earning potential, an MCA offers these benefits:
Recognition for achieving the capstone certification from Microsoft, proving your ability to architect large-scale complex solutions with Microsoft technologies
Membership on the MCA distribution list in your specific solution area
Promotion of your name and technical services on the Microsoft website
MCA certificate and plaque
Potential to participate on future MCA Review Board panels and in beta exam development

The MCA certification is granted after the candidate successfully passes the MCA Board exam, which includes a portfolio submission, multiple presentations, and an intensive Q&A with a panel of Microsoft Certified Architects on the MCA Review Board. During the MCA Board exam, the candidate must definitively display the six competencies of business acumen and technological proficiency.

MCA certifications
Microsoft currently offers four MCA certifications:
MCA: Microsoft Exchange Server
MCA: Microsoft SharePoint Server
MCA: Microsoft SQL Server
MCA: Windows Server: Directory

These certifications are designed for architects who specialize in using Microsoft technologies to provide solutions for enterprise customers. Professionals who hold an MCA certification are generally recognized by Microsoft and the IT industry worldwide as individuals who hold the highest level of professional certification on Microsoft server products.

Steps to Becoming a Microsoft Certified Architect
Earn a current Microsoft Certified Master (MCM) certification for the technology for which you wish to pursue an MCA technology certification. MCM certification is a prerequisite for all MCA technology programs.

Register for the Microsoft Certified Architect program.
The registration team will review the application to ensure that you have met all of the application requirements.
Note The application fee for the MCA program is US$125. If you are accepted into the program, the fee to take the MCA Board Exam is US$7,500.
Review the program resources.
After you successfully register for the MCA program, you will be granted access to portfolio documentation and resources to help you prepare for your MCA Board exam.

Prepare the required program documentation.
Prepare a portfolio that includes your work history, a project case study, and a project presentation, all of which should show how your skills and work experience directly apply to each of the six MCA competencies.
Review the program competencies

Submit your documentation and schedule your Board Exam.
When your portfolio is complete, submit the documentation for review by the program manager for your technology track. If your portfolio addresses the objective content requirements for an effective Review Board review, the program manager will approve you to schedule an MCA Board Exam. Once the portfolio documentation is approved, you may pay the program fee and schedule your appearance before the Review Board.

The following MCA Review Board dates are currently scheduled for the Microsoft Certified Architect program. All MCA Board Exams will be held in Redmond unless otherwise noted.

Important: Registration deadline for an MCA Board Exam is two months prior to the indicated Review Board date.
Microsoft Certified Architect: Microsoft Exchange Server 2010
Microsoft Certified Architect: Microsoft SharePoint Server 2010
Closed Beta at SharePoint Conference
Microsoft Certified Architect: Microsoft SQL Server 2008
Microsoft Certified Architect: Windows Server 2008 R2: Directory
Note MCA Board Exam dates are subject to change at the sole discretion of Microsoft.
Learn more about the MCA Board Exam
Successfully complete your MCA Board Exam.

You will appear before an MCA Review Board of peers, which consists of Microsoft Certified Architects (MCAs). Your MCA Board Exam will last up to four hours and will include presentations you deliver based on your portfolio and a technology-specific case study, each of which will be followed by intensive Q&A sessions with Review Board members. You will receive performance results by email within two weeks.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, March 5, 2012

MB2-631 Q & A / Sutdy Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. Certkingdom.com has a user
owned custom unit called Certkingdom_Proj that needs to be accessed by employees in Certkingdom.com’s
Research department. The Research department employees want the business unit that they
make use of to host Certkingdom_Proj.
When Certkingdom.com releases A new policy that requires employees to produce their own new
Projects, you decide to have the role of the employees who owns Certkingdom_Proj copied with the
intention of assigning it to the Research department employees.
You now need to configure the security settings for Certkingdom_Proj.
Which two of the following actions should you take?

A. You should consider having the Business Unit disabled.
Thereafter a new Business level should be created with the access level set to Business Unit.
B. You should consider having the Share privilege permitted with the access level set to User.
C. You should consider having the Read privilege assigned to the Business Unit.
D. You should consider having the privilege appended with the access level set to User.
E. You should consider having a privilege created with the access level configured to the User.

Answer: C,E

Explanation:


QUESTION 2
You work as an administrator at Certkingdom.com. You have received instructions from the CIO to modify
the relationships within Certkingdom.com’s Microsoft Dynamics CRM 4.0 environment. The requirements
are listed below:
• The entities CertkingdomSupplier, CertkingdomContact and CertkingdomCustom should have a 1:N relationship.
• CertkingdomSupplier should be the principal entity.
• The entities CertkingdomSupplier, CertkingdomContact and CertkingdomCustom should have a N:N relationship
You now need to need to apply the mapping.
Which of the following actions should you take?

A. You should map a field from the CertkingdomSupplier entity to the CertkingdomContact entity.
B. You should publish the CertkingdomSupplier entity to the CertkingdomCustom entity.
C. You should edit the CertkingdomCustom entity to the CertkingdomSupplier entity.
D. You should change the status of the CertkingdomContact entity to the CertkingdomSupplier entity.

Answer: A

Explanation:


QUESTION 3
You work as a Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. You are in the process of
modifying certain relationships within Certkingdom.com’s Microsoft Dynamics CRM 4.0 environment. You
have received instruction from the CIO to set up the 1:N relationship between the CertkingdomAccount
and CertkingdomIncident entities to comply with the following set criteria:
• As soon as a different employee is assigned to the account, the active incidents must be
available that employee.
• The incidents of the previous employees should be closed.
Which of the following actions should you take?

A. The best option is to set the cascading behavior for the relationship to parental.
B. The best option is to open the form and add a section to cascade User-Owned.
C. The best option is to set an attribute of type varchar with format text to referential.
D. The best option is to set up the cascading behavior to Cascading. You should also set the
cascading rule for Assign to cascade Active.

Answer: D

Explanation:


QUESTION 4
You work as a Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. You are currently adding a
custom feature to the CertkingdomContact entity. CertkingdomContact will be used by Certkingdom.com employees to
hold client data. You have configured CertkingdomContact to hold data in the plain text format.
The CIO has informed you that multiple lines must be available for entering text since the amount
of data is so vast.
Which of the following actions should you take to make sure that the custom feature is able to
maintain a textbox with multiple lines? (Choose all that apply.)

A. You should create a workflow with Microsoft Office SharePoint Designer 2007. You should also
implement a feature of type ntext.
B. You should implement a feature of type varchar with format TextArea. You should also
implement a feature of type ntext.
C. You should implement a new content type and associate it with the relevant document. You
should also implement a feature of type ntext.
D. You should implement the State field to inherit the regional setting. You should also implement
a feature of type ntext.

Answer: B

Explanation:


QUESTION 5
You work as the Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. Certkingdom.com’s Sales
department employs a custom entity named Certkingdom_Sales, which is configured as the primary entity
in the Sales relationship.
During the course of the day you have received numerous complaints from Certkingdom.com users stating
that they are inable to relate existing Sales with Certkingdom_Sales when creating new Accounts in the
Certkingdom_Sales entity.
Which combination of the following actions should you take to address this issue?

A. The best option is to consider adding the Sales relationship attribute to the Certkingdom_Sales.
B. The best option is to consider selecting the Work Offline option adding the relationship.
C. The best option is to consider modifying the site master page to contain the relationship.
D. The best option is to consider publishing the Certkingdom_Sales after creating the relationship.
E. The best option is to consider applying a data connection file the relationship.

Answer: A,D

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Sunday, March 4, 2012

MB2-423 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1:

You work as the Sales Manager at Certkingdom .com. Microsoft CRM 3.0 is
implemented on the Certkingdom .com network.
You need to identify the types of leads that will result in the most opportunity using
Microsoft CRM. A Certkingdom .com employee named Kara Lang works in the Sales
Department. You delegate the task of identifying the types of leads that will result in the most opportunity.
You inform Kara Lang that she must use the most efficient manner?
What should Kara Lang do?

A. She should create a new marketing campaign.
B. She should run the Microsoft CRM Lead Source Effectiveness Report.
C. She should create a Microsoft CRM Advanced Find search.
D. She should create a new View for Lead Types.
E. All of the above.

Answer: B


QUESTION 2:

You work as a CRM consultant at Certkingdom .com. Microsoft CRM 3.0 is
implemented on the Certkingdom .com network. Certkingdom .com is currently running a
marketing campaign. The Manager of the Marketing department is named Clive
Wilson. Clive Wilson wants to track responses from customers.
What should Clive Wilson do?

A. He should make use of the Expected Response.
B. He should make use of the Response Code.
C. He should make use of the Promotion Code.
D. He should make use of the Lead Code.

Answer:


QUESTION 3:

You work as a CRM consultant at Certkingdom .com. Microsoft CRM 3.0 is
implemented on the Certkingdom .com network.
Certkingdom .com has recently hired a new junior sales representative named Mia
Hamm. Mia Hamm is not familiar with Microsoft CRM works in the IT department
and wants to know what the features of contacts in CRM are.
What would you reply? (Choose all that apply.)

A. A feature of the contacts in Microsoft CRM is that the account does not need a contact.
B. A feature of the contacts in Microsoft CRM is that the contact should have only one
parent account but can have more than one sub-contact.
C. Features of contacts in Microsoft CRM are that the contact must have sub-contacts
and you are able to achieve inventory management.
D. A feature of the contacts in Microsoft CRM is that you can achieve inventory
management and have a Many-to-Many supported relationship.

Answer: A, B


QUESTION 4:

Rory Allen works as a Sales consultant at Certkingdom .com. Certkingdom .com has deployed
Microsoft CRM 3.0. Rory Allen wants to know what advantages Certkingdom .com can
achieve by making use of the Microsoft CRM Sales Management module to follow a
defined sales process.
What would you reply? (Choose all that apply.)

A. You should be able to determine qualified opportunities and accomplish inventory management.
B. You should be able to obtain sales data easily for reporting.
C. You should be able to accomplish inventory management and shorter sales cycles.
D. You should be able to accomplish shorter sales cycles and determine qualified opportunities.

Answer: B, D


QUESTION 5:

You work as a Sales consultant at Certkingdom .com. Microsoft CRM 3.0 is
implemented on the Certkingdom .com network.
You need to identify the information needed to schedule a service for a customer.
What should you do?

A. Identify the location where the service will be performed.
B. Identify the time and subject for the appointment.
C. Identify the subject and place for the appointment.
D. Identify the customer as well as the time for the appointment.

Answer: B


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

MCITP Training - MCITP Certificaion - MCTS Exams Training - CCNA Exams - and more at CertKingdom.com