Microsoft to ship last service pack for Office 2007 this month

Microsoft yesterday announced it will ship a third and final service pack update for Office 2007 before year’s end.

MCTS Certification, MCITP Certification
Cisco CCNA Training, Cisco CCNA Certification 2000+ Exams at Examkingdom.com

It appears that Microsoft will deliver Office 2007 Service Pack 3 (SP3) this month.

“The October 2011 release provides a six-month window to test and deploy the release prior to exiting mainstream support,” Microsoft said in a blog post Thursday.

Office 2007, which went on general sale in January 2007 alongside Windows Vista, exits what Microsoft calls “mainstream support” in April 2012.

The suite will continue to be updated with security fixes for another five years after that, through April 11, 2017, during the “extended support” phase.

The biggest difference between the two support phases is that extended, non-security fixes are provided only to companies that have paid for special support contracts.

Microsoft, however, never issues service packs — which are mostly composed of past security and other patches — once a product is retired from mainstream support.

Office 2007 SP3 will be offered using Microsoft’s now-standard procedure. Initially, the service pack will be available as a manual download and through Windows Update as an optional install. Three months later, the company will kick SP3 into Windows Update for automatic distribution and deployment.

Microsoft also usually gives corporate customers another heads-up about 30 days before it starts serving Office service packs through its update services.

Service Pack 3 is Office’s 2007’s first SP since 2009’s SP2.

Not surprisingly, Microsoft touted the newer Office 2010 as an option for customers who want to retire Office 2007 or the even-older Office 2003.

Office 2003 has more than two years of life left in it: The suite won’t be retired from security support until April 2014.

Microsoft says no more Zunes, it’s all about the phone now

Microsoft will make no more Zune music players, building its future music strategy on applications incorporated in its Windows Phone and Xbox platforms, the company has confirmed.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Rumors circulated in March that Microsoft planned to stop making dedicated music players, but the company ducked the issue then, saying this year’s new Zune devices would be mobile phones running Zune software. It went on to release a trickle of applications for the Zune platform later in the year.

The company has now updated a help page at Zune.net to announce: “We will no longer be producing Zune players.” Instead, the page said: “Going forward, Windows Phone will be the focus of our mobile music and video strategy.”

However, this will make no difference to current Zune users, the company said on the support page: “Your device will continue to work with Zune services just as it does today. And we will continue to honor the warranties of all devices for both current owners and those who buy our very last devices.”

Microsoft launched the first Zune players and Zune Marketplace music store on Nov. 14, 2006, as a challenge to Apple’s iPod player and iTunes music store.

However, Apple moved the goalposts a couple of months later with its Jan. 9, 2007, announcement of the iPhone, a widescreen iPod that could also make phone calls and surf the Web.

It took Microsoft three years to follow suit. When it announced Windows Phone in February 2010, one of the features of the new mobile OS was a Zune music player app. It’s also possible to access Zune music and video via Xbox Live, Microsoft’s online service for its Xbox 360 game console.

Sales of the Zune have consistently trailed far behind those of the iPod. While not a definitive ranking, the list of best-selling MP3 players at Amazon.com is telling: Nine of the 10 best sellers are iPods (Sandisk has a $40 Sansa model in eighth place) and the first Zune device now appears at number 24, preceded by 16 iPod variants.

70-652 Exam


 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 



QUESTION 1
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network, including virtual computers, have Windows
Server 2008 installed and all workstations have Windows 7 installed.
You have installed the Hyper-V server role on a server named ABC-SR34, and the Windows
Deployment Services role on a server named ABC-SR35. Certkingdom.com’s virtual computer, named
ABC-VM01, only has a solitary Virtual Hard Disk (VHD) configured.
You have been instructed to make sure that an image of ABC-VM01’s Virtual Hard Disk (VHD) is
deployed to physical and virtual hosts via Windows Deployment Services.
To achieve this, you first need to have an image of ABC-VM01’s Virtual Hard Disk (VHD)
positioned on ABC-SR35.
Which combination of the following actions should you take?

A. You should consider exporting ABC-VM01, and then configuring the use of a legacy network
adapter.
B. You should consider configure ABC-VM01 to make use of a legacy adapter prior to restarting it
with a Windows Deployment Services discover image.
C. You should configure ABC-VM01 to make use of a legacy adapter prior to restarting it with a
Windows Deployment Services discover image.
D. You should configure ABC-VM01 to make use of a legacy adapter prior to restarting it with a
Windows Deployment Services capture image.

Answer: D

Explanation:


QUESTION 2
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
Certkingdom.com has a server, named ABC-SR14, which has a Windows Server 2008 Server Core
installation and is also configured as a Hyper-V server.
You have been informed that a Windows Vista SP1 64-bit workstation must be able to open
Hyper-V Manager, and also establish a link to ABC-SR14.
Which of the following actions should you take?

A. You should consider making use of the winrm command-line tool.
B. You should consider making use of the cscript command-line tool.
C. You should consider making use of the oclist command-line tool.
D. You should consider making use of the ocsetup command-line tool.
E. You should consider making use of the Netsh advfirewall command-line tool.

Answer: E

Explanation:


QUESTION 3
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
Certkingdom.com has a server named ABC-SR14 that is configured as a Hyper-V server, and hosts four
virtual computers. These servers are named ABC-VM01, ABC-VM02, ABC-VM03 and ABC-VM04.
Certkingdom.com also has a server named ABC-SR15 that is configured as a Hyper-V server, but hosts
no virtual computers. Certkingdom.com has another server named ABC-SR16 that has Microsoft System
Center Virtual Manager (SCVMM) 2008 installed.
You have been instructed to relocate ABC-VM04 from ABC-SR14 to ABC-SR15 without altering
the virtual computer configurations.
You have to make sure that ABC-VM04 is offline for as little time as possible. You have also been
informed that user interaction must be kept to a minimum.
Which of the following actions should you take?

A. You should consider relocating ABC-VM04 to a host group via the Hyper-V Manager.
B. You should consider importing ABC-VM04 via the Virtual Machine Manager on ABC-SR15.
C. You should consider dragging ABC-VM04 from ABC-SR14 and dropping it on ABC-SR15 via
the Virtual Machine Manager.
D. You should consider exporting ABC-VM04 from ABC-SR14 via the Virtual Machine Manager.

Answer: C

Explanation:


QUESTION 4
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
When Certkingdom.com acquires a new server, you are instructed to install the Hyper-V server role on it.
The server has a 32-bit Dual-core CPU, 4GB RAM, a single port network card, and two SATA hard
drives.
You need to make sure that you are able to install the Hyper-V server role on the new server.
Which of the following actions should you take?

A. You should install an additional network adaptor to system.
B. You should install an additional 8 GB RAM.
C. You should substitute the 32-bit CPU with a 64-bit CPU.
D. You should install an additional 500 GB hard drive.

Answer: C

Explanation:


QUESTION 5
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
A network administrator, named Andy Reid, has requested that you compile a report for server
consolidation suggestions. This report should list servers on which virtualization can be
configured, as well as performance monitoring information.
Which of the following actions should you take?

A. You should consider having the Virtual Machine Manager 2008 update first.
B. You should consider having the Virtual Machine Manager (VMM) Self-Service Portal installed first.
C. You should consider executing the ocsetup Microsoft-Hyper-V command first.
D. You should consider having Microsoft Assessment and Planning Solution Accelerator installed
first.

Answer: D

Explanation:


QUESTION 6
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
Certkingdom.com has a server named ABC-SR35, which is configured as a Hyper-V server. ABC-SR35
has two disks, of which one is configured as the C: drive and the other has not been allocated as
yet. Both of these drives are online.
You are tasked with creating a pass-through disk. After accessing Hyper-V Manager, you find that
you are unable to create a pass-through disk because the hard disk option is not displayed.
You are required to rectify this as soon as possible.
Which of the following actions should you take?

A. You should consider completely removing the C: drive.
B. You should consider completely removing the unallocated disk.
C. You should consider marking the unallocated disk as offline.
D. You should consider marking the C: drive as offline.

Answer: C

Explanation:


QUESTION 7
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
You have been tasked with creating a virtual computer named ABC-VM05. ABC-VM05 has six
virtual drives configured. There is a 100 GB drive, a DVD drive, as well as four 300 GB drives.
You would like to configure as little disk controllers as possible for ABC-VM05’s virtual disks.
Which of the following actions should you take?

A. You should consider configuring an SCSI controller for the DVD drive, and a single IDE
controller for the five hard drives.
B. You should consider configuring an SCSI controller and five IDE controllers for each of the hard
drives.
C. You should consider configuring six SCSI controllers.
D. You should consider configuring six IDE controllers.

Answer: A

Explanation:


QUESTION 8
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
Certkingdom.com has a server named ABC-SR35, which is configured as a Hyper-V server. ABC-SR35
has two virtual computers installed, named ABC-VM01 and ABC-VM02. Each virtual computer has
one Virtual Hard Disk (VHD) configured as a differencing disk. The Virtual Hard Disks (VHDs) are
named ABC-vm01.vhd and ABC-vm02.vhd respectively.
A fellow administrator, named Kara Lang, has removed lots of information from ABC-VM01, and
would like to know how to decrease ABC-vm01.vhd’s size. Kara Lang would like to complete this
task without affecting the current information on ABC-vm01.vhd. Kara Lang also informs you that
the solution should not have an effect on ABC-vm02.vhd.
Which of the following actions should you take?

A. You should consider deleting ABC-vm01.vhd.
B. You should consider compacting ABC-vm01.vhd.
C. You should consider expanding ABC-vm02.vhd.
D. You should consider editing ABC-vm02.vhd.

Answer: B

Explanation:


QUESTION 9
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
You have been tasked with running tests on a new application, named TestApp1. The tests will be
performed on a Windows Vista SP1 virtual computer named Test-VM01, which is installed on a
workstation in Certkingdom.com’s test lab named Test-WS01. Every test you are about to perform will alter
TestApp1’s configuration.
You must make sure that every test is performed with TestApp1’s default configuration.
You have already deployed the application with the default configuration, and also taken a
snapshot image of the virtual computer.
Which of the following actions should you take?

A. You should consider choosing the option to revert Test-VM01 subsequent to every test.
B. You should consider choosing the option to restart Test-WS01 subsequent to every test.
C. You should consider choosing the option to restore Test-WS01 subsequent to every test.
D. You should consider choosing the option to reset Test-VM01 subsequent to every test.

Answer: A

Explanation:


QUESTION 10
You work as an administrator at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com. All servers on the Certkingdom.com network have Windows Server 2008 installed.
You have been tasked with running tests on a new application, named TestApp1. The tests will be
performed on a Windows Vista SP1 virtual computer named Test-VM01, which is installed on a
server in Certkingdom.com’s test lab named TestLab-SR35. Every test requires TestLab-SR35 to restart.
You have to make sure that the tests continue to run at startup.
Which of the following actions should you take?

A. You should consider choosing the option to restore Test-SR01.
B. You should consider choosing the option to revert Test-VM01
C. You should consider choosing the option to restart Test-SR01.
D. You should consider choosing the option to reset Test-VM01.

Answer: C

Explanation:

 

 


 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

Silver Surfers are past it? Never!

Well, much to my amusement I recently discovered that there’s a new name for Internet users in my age group: We are now called “Silver Surfers” (with apparently no nod to Marvel and its superhero of the same name).

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Yep, we of the SS … wait, that doesn’t sound good … er, we SSers (nope, that’s not much better) … um, we Online Baby Boomers (OBBs … yeccch), that is to say, those of us born between 1946 and 1964 who use the ‘Net, are a huge cohort.

And those of us Silver Surfers who have, in particular, been in the Information Technology world, have also been through the mill: We were around to grapple with mainframes and we were there to wrestle with minicomputers.

We know punched paper tape from punch cards. We know what green bar paper is. We’ve mounted mag tape and manhandled diskpacks the size of hat boxes (if any of that makes no sense to you, dear reader, you aren’t a Silver Surfer).

We Silver Surfers then tamed PCs when they put in an appearance and we built local area networks out of them with what today looks like baling wire, chewing gum and hope.

Even better, we made the Internet explosion happen and then we enjoyed the Internet Bubble and were dismayed when it burst. We have been around the block and we’ve been back again.

Solid Gold technology of the 1980s

And from all that experience we have wound up with complex, rich skill sets derived from decades of hacking (the good kind) every piece of gear put in front of us, as well as from building every kind of systems and subsystems you can think of, along with coding, debugging, tracing, analyzing, documenting and wrangling the barely wrangleable.

In short, we are IT heroes. Hell, we’re Business Heroes … or rather we should be.

But the reality is that despite our unarguable chops and our glorious histories, the Silver Surfers are often looked at as “past it” (or maybe that should be “past IT”).

The truth is that we are anything but.

Sure, you can bring in Young Turks with all sorts of qualifications; They can have an MCTS, MCITP, Oracle OCA/OCP, CCNA, RHCE, CISSP, CET, CWNA, LPI, SCJP, CIW, MOS, PM, or an ABCDEFGHIJK but, seriously, what do they know?

On the other hand, what many Sliver Surfers have that the Young Turks don’t have is “insight”; that almost magical ability to see the architecture of systems and processes and how they relate to business along with their opportunities and flaws.

Most of the young ‘uns take one look at an existing infrastructure and the first thing that occurs to them is to tear it all down and start again. The Sliver Surfers are different; they “grok” that there’s a working machine to be dealt with and that when you interfere with something in the enterprise world that is functional, no matter what problems it may have, you risk business “meltdown.”

Nope, the Young Turks most often want to rebuild from the ground up rather than face the realities of business which are, essentially, that money has been invested and instituting wholesale change is equivalent to tearing the business apart. If they were dealing with a car this would be like replacing the engine when what you’re trying to do is fill the tank.

One of the things I know from some of my Silver Surfer IT friends is that this economy hasn’t been kind to them. These are guys who have incredible technical abilities and if they haven’t architected it, they coded it, and if they didn’t do that, they most likely project managed it.

But over the years they have become almost too knowledgeable. They can’t work for some guy half or even two-thirds their age who doesn’t have a clue. They really do know the answers or, if they don’t, they know how to do the analysis to find out.

And when the Young Turks pick the latest and, in the opinion of the salesman they dealt with, greatest solution and ignore that the Silver Surfers who actually know BS when they see it and smell it, it’s a standoff: Age against energy, knowledge versus belief, warranted cynicism over reckless enthusiasm, and, ultimately, pearls before swine.

So, if you are a CxO who gets to deal with IT in any way, keep in mind that the Silver Surfers may be old and wrinkled, they may be unwilling to work 16 hours a day, they may (occasionally well, maybe often) be cranky and even rude when they think you’re talking crap but, you know what? If they think you are talking crap when it comes to IT then you probably are and they are probably right.

The Silver Surfers have been there and back, around the block and up at the pointy end. And if you listen to them they’ll save you money, waste far less time and make your life easier.

Comptia N10-004 Exam

 

Best comptia Network+ Training, Comptia Network+ Certification at Certkingdom.com

 


 

 

 

QUESTION 1
Which of the following ports is default for DNS?

A. 53
B. 69
C. 80
D. 143

Answer: A

Explanation:


QUESTION 2
Which of the following components would be used to terminate all distribution and trunk cables in
a central office or PBX?

A. 66 block
B. MDF
C. Demarc
D. IDF

Answer: B

Explanation:


QUESTION 3
A technician has received a call from a customer stating that the customer has logged in, but
cannot access the Internet. The technician asks the customer if the gateway and the firewall can
be pinged. This is an example of which of the following troubleshooting skills?

A. Information gathering
B. Implementing and testing
C. Escalation
D. Documenting the solution

Answer: A

Explanation:


QUESTION 4
Which of the following connectors uses 9-pins?

A. LC
B. RJ-45
C. RS-232
D. BNC

Answer: C

Explanation:


QUESTION 5
Which of the following ports does IPSec use, by default?

A. 53
B. 500
C. 3389
D. 8080

Answer: B

Explanation:


QUESTION 6
Which of the following components is used to terminate a T1 connection?

A. 66 block
B. Patch panel
C. Smart jack
D. 110 block

Answer: C

Explanation:


QUESTION 7
During a new employee briefing, employees are given copies of the network user agreement, the
company network policy, and other administrative forms. Which of the following is BEST practice
when granting users access to the companys network?

A. Access is granted once each user has signed the network user agreement.
B. Access is granted once the employee briefing is concluded.
C. Access is granted once the Chief Executive Officer (CEO) signs each network agreement.
D. Access is granted at the beginning of the employee briefing meeting.

Answer: A

Explanation:


QUESTION 8
Which of the following protocols can be found at the transport layer?

A. FTP
B. SMTP
C. TCP
D. DNS

Answer: C

Explanation:


QUESTION 9
Which of the following is the maximum sustainable distance for 100Base-FX?

A. 600 feet (183 meters)
B. 1.2 miles (1.93 kilometers)
C. 2.8 miles (4.5 kilometers)
D. 2,500 feet (762 meters)

Answer: B

Explanation:


QUESTION 10
Which of the following is used to relay queries from a private network to the Internet?

A. Content filter
B. Load balancer
C. Proxy server
D. Stateful firewall

Answer: C

Explanation:


QUESTION 11
Which of the following OSI layers is included in the TCP/IP models Application layer?

A. Data Link
B. Session
C. Transport
D. Network

Answer: B

Explanation:


QUESTION 12
A technician has been tasked to reduce the administrative time spent on the network. The network
uses several VLANs. Which of the following is a protocol that can be added to the switches to help
reduce administrative time?

A. MTU
B. WLAN
C. SIP
D. VTP

Answer: D

Explanation:


QUESTION 13
Which of the following tools could an administrator use to determine a workstations default
gateway?

A. route
B. nslookup
C. dig
D. ping

Answer: A

Explanation:


QUESTION 14
Which of the following routing protocols is based on being open and takes the shortest path
FIRST?

A. RIP
B. OSPF
C. EIGRP
D. IS-IS

Answer: B

Explanation:


QUESTION 15
An administrator needs to obtain the MAC address of all systems on a small SOHO network.
Which of the following is the BEST way to accomplish this?

A. Run nslookup for each IP address.
B. ARP each IP, then look in the ping table.
C. ARP poison the router, then run a network sniffer.
D. Ping each IP then look in the ARP table.

Answer: D

Explanation:


QUESTION 16
Which of the following is an example of CIDR notation?

A. ::1
B. 10.10.10.0/30
C. 10.192.30.5:22
D. 255.255.255.0

Answer: B

Explanation:


QUESTION 17
Which of the following should be used to extend the range of a network between two points where
physical media cannot be installed?

A. WAP
B. Bridge
C. Hub
D. Router

Answer: A

Explanation:


QUESTION 18
Installing specialized devices in between network resources and the Internet to distribute network
requests and ensure availability of resources is an example of which of the following network
management techniques?

A. Port mirroring
B. Load balancing
C. Port address translation
D. QoS

Answer: B

Explanation:


QUESTION 19
An administrator needs to cut a 100 pair wire in half. Which of the following tools should the
administrator use?

A. Cable stripper
B. Snips
C. Punch down tool
D. Crimper

Answer: B

Explanation:


QUESTION 20
Which of the following wireless technologies uses point-to-multipoint for data transmission?

A. 802.11g
B. 802.11n
C. 802.11b
D. 802.11a

Answer: B

Explanation:


QUESTION 21
Which of the following naming conventions takes place in the data link layer of the OSI model and
is often used in conjunction with IPv6?

A. MAC-48
B. EUI-48
C. EUI-64
D. IP address

Answer: C

Explanation:


QUESTION 22
An administrator needs to determine if the local workstation is using DHCP. Which of the following
tools would verify this?

A. hostname
B. netstat
C. ipconfig
D. nbtstat

Answer: C

Explanation:


QUESTION 23
A technician is setting up a network for 25 users at a remote location. All of the users share a
single Internet connection. The ISP provides a single IP address for the location. Which of the
following addressing mechanisms should the technician use to provide access and IP addresses
for all 25 users?

A. NAT
B. Proxy
C. Gateway
D. DNS

Answer: A

Explanation:


QUESTION 24
Which of the following is MOST likely to be used for telephone wires connected to the plain old
telephone service (POTS)?

A. 66 block
B. 110 block
C. CAT6 patch panels
D. Smart jacks

Answer: A

Explanation:


QUESTION 25
Which of the following would an administrator do NEXT once an action plan has been created?

A. Find new symptoms and issues.
B. Identify more areas that may be affected.
C. Determine if escalation is necessary.
D. Implement the plan and test it.

Answer: D

Explanation:


QUESTION 26
An office is using 802.11a to network the entire office. When a visitor brings a personal laptop to
the office, the visitor is not able to connect to the network. Which of the following is the reason why
visitors are unable to connect?

A. Weak signal
B. Standard mismatch
C. Incorrect channel
D. Wrong DNS

Answer: B

Explanation:


QUESTION 27
172.20.0.112 represents an address at which of the following layers of the OSI model?

A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4

Answer: C

Explanation:


QUESTION 28
An administrator needs to create a subnet that will accommodate up to 4000 hosts on the same
subnet but not more than 6000. Which of the following network addresses would the administrator
use to accommodate this request?

A. 10.4.4.0/22
B. 10.10.1.0/19
C. 172.31.146.0/20
D. 192.168.100.0/23

Answer: C

Explanation:


QUESTION 29
Which of the following logical topologies uses distributed authentication?

A. Client/server
B. VLAN
C. VPN
D. P2P

Answer: D

Explanation:


QUESTION 30
A helpdesk team is unable to agree on a solution to an issue. Each technician presents their own
solution to the problem. When a solution is agreed upon, which of the following documentation
MOST likely needs to be reviewed and possibly updated?

A. Baseline
B. Wiring Schematics
C. Procedures
D. Regulations

Answer: C

Explanation:

 

 

 

Best comptia Network+ Training, Comptia Network+ Certification at Certkingdom.com

70-236 Exam

70-236 Exam

 

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 


QUESTION 1
You work as the Exchange Administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 infrastructure.
The network contains a mailbox named TestResources. At present all users are able to diarize
appointments for TestResources. A new company policy states that only Kara Lang and Mia
Hamm are permitted to diarize appointments for TestResources.
What actions must you take to comply with the Certkingdom.com policy?

A. You should run the following cmdlet:
Set- MailboxCalendarSettings – Identity”TestResources” – MonthCalendar calendar = new
MonthCalendar(); KaraLang , MiaHamm.
B. You should run the following cmdlet:
Set-MailboxCalendarSettings – Identity ” TestResources” – BookInPolicy KaraLang , MiaHamm –
AllBookInPolicy $false cmdlet.
C. You should run the following cmdlet:
Set – MonthCalendar calendar = new MonthCalendar(); “host.KaraLang , MiaHamm = calendar ”
this.Content = host;.
D. You should run the following cmdlet:
Set – MonthCalendar calendar = new MonthCalendar();
HwndSource source = HwndSource.FromHwnd(calendar.Handle);
this.Content = calendar;Delegates KaraLang , MiaHamm.

Answer: B

Explanation:


QUESTION 2
You work as the Exchange Administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment. Certkingdom.com has headquarters in London and branch offices in Paris and
Berlin. The marketing department is located at the Paris office. The personnel in Paris connect to
the network through the Internet and use Outlook Anywhere on their laptops. To ensure
productivity management wants you to make sure that the marketing personnel have access to the
companies’ mailboxes.
What actions must you take?

A. You should utilize the Test- MAPIConnectivity and the Test- WebServicesConnectivity cmdlet.
B. You should utilize Get- Recipient – Filter cmdlet.
C. You should utilize Show-MailboxStatistics cmdlet.
D. You should utilize List-Mailbox cmdlet.

Answer: A

Explanation:


QUESTION 3
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment. The Certkingdom.com network has an Exchange Server 2007 environment.
The Edge Transport Server role is installed on a server named ABC-EX01. Due to this server
failure, you have decided to install a new Microsoft Windows Server 2003 server named ABCEX03
on the network with the reinstallation of the Edge Transport Server role. However, the
address rewrites that was functional on ABC-EX01 did not in operation on ABC-EX03. This
functionality is needed.
What actions must you take?

A. You should use the ImportEdgeConfig.ps1 on ABC-EX03.
B. You should use the iiscnfg/enable: application name check version.
C. You should use the Transaction Logs for sp_configure configuration.
D. You should use create a new Send connector on ABC-EX03.

Answer: A

Explanation:


QUESTION 4
You work as the Exchange administrator at Certkingdom.com. Certkingdom.com has headquarters in London and
a branch office in Paris. The Exchange Server 2007 server in the London office is named ABCEX07
and the Exchange Server 2003 server in the London office is named ABC-EX08. You need
to transfer the mailbox from ABC-EX07 to ABC-EX08.
What actions must you take?

A. You should include the IgnoreRuleLimitErrors parameter when using the Move-Mailbox cmdlet.
B. You should use the System configuration data collector.
C. You should create a mapping schema definition.
D. You should enable the Windows Remote Management (WinRM).

Answer: A

Explanation:


QUESTION 5
You work as the Exchange administrator at Certkingdom.com. Certkingdom.com has its headquarters in Chicago
and a branch office in Dallas. You are implementing a new Exchange Server 2007 Organization.
The Exchange Server 2007 environment of Certkingdom.com has the following server installed:
• An Edge Transport server named ABC-EX01
• A Hub Transport server named ABC-EX02.
During the course of the day you have received instruction from the CIO to have e-mail routing
configured on ABC-EX01 and ABC-EX02. In your solution you need to ensure that ABC-EX01 is
able to transmit e-mail messages to and from the Internet. You should also ensure that Internet email
is sent to ABC-EX01 via ABC-EX02.
What actions must you take?

A. You should use the Microsoft System Center Configuration Manager (SCCM).
B. You should export a new Edge Subscription file to ABC-EX01 and Import the Edge Subscription
file to ABC-EX02.
C. You should use the Microsoft System Center Operations Manager (SCOM).
D. You should use the Microsoft Exchange Internet Message Access Protocol, Version 4 (IMAP4).

Answer: B

Explanation:


QUESTION 6
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
You were compelled to restore the directory objects and settings from a backup. However, after
the restoration a number of employees reported that they are unable to access their mailboxes
that were assigned to them before the backup was made. The employees need to access their
mailboxes.
What actions must you take?

A. You should use the Get-Mailbox cmdlet.
B. You should use the Get-MailboxInformation cmdlet.
C. You should use the Connect-Mailbox cmdlet.
D. You should use the Show-Information cmdlet.

Answer: C

Explanation:


QUESTION 7
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
During routine maintenance of the Exchange server you discover that the storage limits are all
different in the mailboxes.
What actions must you take to ensure that the storage limits to be the same?

A. You should use the Get-MailboxStatistics cmdlet and forward it to the Get-Mailbox cmdlet.
B. You should use the Show-MailboxStatistics cmdlet and forward it to the Select-Object cmdlet.
C. You should use the Get-MailboxInformation cmdlet and forward it to the Select-Object cmdlet.
D. You should create an Exchange Management Shell script and forward the Get-Mailbox
Database cmdlet output to the Set-Mailbox Database cmdlet.

Answer: D

Explanation:


QUESTION 8
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment. The Certkingdom.com network contains a stand-alone server named ABCSR09.
Your boss, CertKingdom, wants to know which Exchange Server 2007 server role can ABC-SR09
support.
What would you reply?

A. It can support the Terminal Service Session Broker (TS Session Broker) role.
B. It can support the Edge Transport server role.
C. It can support the PDC emulator role.
D. It can support the Exchange Recipient Administrators role.

Answer: B

Explanation:


QUESTION 9
You work as the Exchange Administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 infrastructure that has two Client Access Servers with load balancing.
The employees on the intranet has 24/7 access to data when utilizing Outlook Anywhere. During
the course of the day you have received instruction from the CIO to ensure that the employees
who connect to the Exchange infrastructure via the IUnernet also have access to data 24/7.
What actions must you take?

A. You should enable the Microsoft Exchange Information Store.
B. You should enable the Microsoft Exchange Search Service.
C. You should set the external URL on every Client Access Server.
D. You should enable the Microsoft Exchange File Distribution service.

Answer: C

Explanation:


QUESTION 10
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
You have received several complaints from employees in various departments stating that e-mail
messages are ending up in their Junk E-mail folder even though the sender’s e-mail address is on
their Safe Senders List. You need to ensure that the employees’ Safe Senders Lists are used.
What actions must you take?

A. You should modify the SMTP Send connectors.
B. You should utilize the Get-Mailbox cmdlet.
C. You should utilize the Show-Information cmdlet.
D. You should utilize the Update-SafeList cmdlet on each mailbox.

Answer: D

Explanation:


QUESTION 11
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
Certkingdom.com recently acquired a new company named TestLabs, Inc. The Certkingdom.com management
wants all mail to TestLabs, Inc. to be accepted by the Certkingdom.com Exchange servers as the e
Exchange servers of TestLabs, Inc. will be decommissioned.
What actions must you take to receives TestLabs, Inc’s mail?

A. You should set up TestLabs Inc as an authoritative domain.
B. You should create a Send connector for TestLabs Inc.
C. You should configure the RejectMessagesFrom setting in TestLabs Inc.
D. You should run the Set-CASMailbox cmdlet.

Answer: A

Explanation:


QUESTION 12
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment. Certkingdom.com makes use of Microsoft ActiveSync policy.
As a security measure the Microsoft ActiveSync policy is configured to ensure that idle clients
provide their password every 20 minutes. You therefore decide to set up an inactivity timer on the
network computers.
During the course of the day you have receive a request from the Marketing manager named Amy
Wilson, to ensure that her laptop, ABC-WS236 is not affected by this Microsoft ActiveSync policy.
What actions must you take to ensure that ABC-WS236 is not affected by the Microsoft
ActiveSync policy but all other computers are?

A. You should disable Microsoft ActiveSync on ABC-WS236.
B. You should use the Set- ReceiveConnector – ProtocolLoggingLevel None cmdlet.
C. You should set up a new ActiveSync policy to accommodate ABC-WS236.
D. You should run the Set-CASMailbox cmdlet on ABC-WS236.

Answer: C

Explanation:


QUESTION 13
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
2007 environment.
Microsoft ActiveSync is on the Exchange servers but is disabled. You are in the process of
assigning a new notebook computer named ABC-WS123 to Rory Allen that should be
synchronized with the Exchange servers.
What actions must you take?

A. You should run the Set- ContentFilterConfig – RecipientEnabled $false cmdlet.
B. You should run the Set-CASMailbox cmdlet and enable the feature.
C. You should run the Set- ContentFilterConfig – BypassedRecipients anti-spam@Certkingdom.com
cmdlet.
D. You should create a new ActiveSync policy that contains all the necessary settings.

Answer: B

Explanation:


QUESTION 14
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
Certkingdom.com has two servers named ABC-EX01 and ABC-EX02. ABC-EX01 is hosting the Client
Access server role and ABC-EX02 is hosting the Hub Transport server role. During the week ABCEX01
has a failure. To ensure productivity you need to transfer the Client Access Server role to
ABC-EX02.
What actions must you take?

A. You should run the Disable-StorageGroupCopy cmdlet and enable the DatabaseCopy cmdlet.
B. You should utilize the Setup/mode:RecoverServer command.
C. You should utilize the Add or Remove Programs applet.
D. You should open the Exchange Management Console and imported the Client Access server
role.

Answer: C

Explanation:


QUESTION 15
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
2007 environment. Certkingdom.com wants to know how much space the mailboxes take up at present.
How would you find this information?

A. By running the AutomateProcessing Auto Update cmdlet.
B. By running the Show-MailboxStatistics cmdlet.
C. By running the Get-MailboxStatistics cmdlet.
D. By running the Get-MailboxInformation cmdlet.

Answer: C

Explanation:


QUESTION 16
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment with a server named ABC-EX10. ABC-EX10 had several physical hard
disk drives. You have received instruction from the CIO to ensure that ABC-EX10 has the best
possible I/O performance while also being fault tolerant.
What actions must you take?

A. You should make use of a dedicated RAID 3 array.
B. You should make use of a dedicated RAID 10 array.
C. You should make use of a dedicated RAID 5 array.
D. You should make use of a dedicated RAID 0 array.

Answer: B

Explanation:


QUESTION 17
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment. The Certkingdom.com network has a server named ABC-EX12 that functions as
a mailbox. You need to determine whether the employees in the Finance department can use
Microsoft Office Outlook to access their mailboxes on ABC-EX12.
What actions must you take?

A. You should make use the Microsoft Baseline Security Analyzer.
B. You should make use the Event trace data collector.
C. You should make use the Test- ServiceHealth cmdlet.
D. You should make use the Test-ExchangeSearch cmdlet.

Answer: C

Explanation:


QUESTION 18
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
Certkingdom.com contains quite a few distribution groups. A new Certkingdom.com policy only allows the owner to
add or remove members from their distribution group.
What actions must you take to adhere to the Certkingdom.com policy?

A. You should create a universal distribution group without any permission.
B. You should create a universal security group but disable its mailbox.
C. You should attach the owner to the Managed By tab of their distribution group and click the
Manager can update membership list check box.
D. You should create a mail-enabled universal security group.

Answer: C

Explanation:


QUESTION 19
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
A Certkingdom.com user named Mia Hamm complains that she cannot access her mailbox. You
investigate and discover that Mia Hamm’s mailbox was removed from a Mailbox server named
ABC-EX07; however there is an exciting back of the mailbox that resides in the recovery storage
group.
What actions must you do to get the mailbox to the working database?

A. You should make use the Restore-DatabaseCopy cmdlet.
B. You should make use the Copy-StorageGroupCopy cmdlet.
C. You should make use the Set-Mailbox cmdlet.
D. You should make use the Restore-Mailbox cmdlet.

Answer: D

Explanation:


QUESTION 20
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
The Certkingdom.com network has a server named ABC-EX11 that is configured as a mailbox server. A
Certkingdom.com user named Andy Reid complains one morning that he is unable to access his mailbox.
You then discover that there mailbox store has become corrupt. You thus recover mailbox store
from a recent backup to a recovery storage group. However, Andy Reid reports that he still is
unable to access his mailbox.
What actions must you take to ensure that Andy Reid can access his mailbox?

A. You should add Andy Reid as a mailbox before reconnecting.
B. You should shift the mailbox to a standard storage group before reconnecting.
C. You should add Andy Reid as a mailbox-enabled user before reconnecting.
D. You should use the Get-MailboxStatistics cmdlet.

Answer: B

Explanation:


QUESTION 21
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
The Certkingdom.com network contains a mail server named ABC-EX04 that has the complete Client
Access server role installed. Due to a failure on ABC-EX04, you have implemented a server
named ABC-EX05 on the Certkingdom.com network that is running Exchange Server 2007 and restore the
System State data. However, the Certkingdom.com CIO wants the Client Access server role to have same
settings as the previous one.
What actions must you take?

A. You should copy the log files from ABC-EX04 on ABC-EX05.
B. You should run the ISInteg utility on ABC-EX04 and copy the log files on ABC-EX05.
C. You should make use of the Setup/mode:RecoverServer command and execute a System State.
D. You should restore the \ClientAccess\ directory and run the Setup /mode:RecoverServer
command for the implementation of the Client Access server role.

Answer: D

Explanation:


QUESTION 22
You work as the Exchange administrator at Certkingdom.com. The Certkingdom.com network has an Exchange
Server 2007 environment.
Certkingdom.com contains two servers named ABC-EX08 and ABC-EX09. ABC-EX08 hosts the Edge
Transport server role and ABC-EX09 hosts the Hub Transport role. The Edge Subscription of
ABC-EX08 resides on ABC-EX09.
The internet connection to ABC-EX08 goes down for a considerable period and when the
connection is re-established you notice that no delivery of e-mails is taking place.
What actions must you take to restore e-mail delivery?

A. You should utilize the Get-Queue – Filter {status – eq “retry” cmdlet on ABC-EX08.
B. You should utilize the Get-Message –Filter {Subject – eq “Latest Production Line”} cmdlet on ABC-EX08.
C. You should utilize the Resume-queue –filter {status – eq “retry”} cmdlet on ABC-EX08.
D. You should utilize the Retry-Queue cmdlet on ABC-EX08.

Answer: D

Explanation:

 

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

Is an IT boot camp the way to shape up for Windows Vista?

The attractions of an accelerated tech training course are obvious. Why spend weeks or months reading boring computer books or lurching through online courseware when you can have high-energy instructors helping you to cram all that information in over a single long weekend?

MCTS Certification, MCITP Certification
Cisco CCNA Training, Cisco CCNA Certification 2000+ Exams at Examkingdom.com

Nicknamed boot camps for their abbreviated length and grueling methods — 12 hours in class per day, along with assigned homework at night, is not unusual — some even have students taking certification exams by weekend’s end — and still boast a respectable pass rate.

Unsurprisingly, a number of boot camps aimed at training both system administrators and end users in Vista and Office 2007 are starting to spring up.

The courses aren’t cheap. Prices typically start at more than $1,000 for a long weekend’s course, and the costs go up rapidly from. But some experts see value in these crash courses. IT boot camps “are very helpful to get a team up to speed prior to a software deployment,” said Cushing Anderson, an analyst at Framingham, Mass.-based IDC.

A constellation of camps

Training Camp, the boot camp division of TechTrain, will begin offering Vista boot camps in June with a three-day course aimed at helping Microsoft Certified Technology Specialists (MCTS) pass the certification exam for configuring Vista.

Jeff Porch, director of educational services at Philadelphia-based Training Camp, says the $2,195 course is aimed at people who provide IT support, both in person and via call centers.

All of the instructors employed by Training Camp are Microsoft Certified Trainers (MCT).  Classes are limited to 10 students, allowing them to get a lot of one-on-one attention, Porch said. They are also worked hard. “The camp will run from 9:00 a.m. to 9:00 p.m., with an hour for lunch and an hour for dinner,” Porch said.

Training Camp is also developing courses for Office 2007 and Exchange that should be available by the end of the summer, Porch said.

Other providers include Vigilar Inc.’s Intense School, which is holding a series of five-day Vista-Office 2007 boot camps starting in August. The $2,495 course will prepare students for the Vista configuration exam. Intense School Chief Technology Officer Barry Kaufman said 97% of students in Intense’s MCSE classes pass their exams.

Atlanta-based CED Solutions’ six-day, $2,995 course claims to go one better by preparing students for two MCTS exams on configuring and deploying Vista and Office 2007.

Meanwhile, Houston-based ETEC is, until the end of this month, letting students who register for a 14-day, $5,990 course for Microsoft Certified System Engineering (MCSE) certification also attend  a three-day Vista boot camp for free.

Learn IT is offering three-day Vista deployment courses for $1,400 in San Francisco and Santa Clara, Calif.  Compared to Training Camp’s courses, Learn IT’s weekday classes run at a relatively light pace — 8:30 a.m. to 4:30 p.m. — and the company makes no mention of preparing students for passing certification tests.

Certifications less valuable today

One reason why not all training companies offer certification exam preparation may be because of the recent decrease in the prestige of technical certifications. The dot-com crash left many IT workers, even those with certifications and years of experience, unemployed for many years.

Some scrambled to buttress their resumes by hastily taking courses to add certifications. That led to a situation in which many workers held paper certifications but lacked much or any work experience with a given technology.

Add to that recent reports about the prevalence of cheating and pirating of certification test answers,  and it’s no wonder that many employers are less impressed with certifications than they once were. “Certifications used to be the be-all, end-all for getting you a job. Now they’re a way to get you an interview,” Porch said.

Still, certifications are important enough for most students that Training Camp has them taking the exam at the end of its three-day course. Porch said 80% of students pass at the time of the boot camp, and 90% pass after six months.

Moreover, Training Camp takes an approach similar to the one the Princeton Review takes in preparing high school students for the SAT. In addition to teaching the content, Training Camp instructors also teach strategies for taking the mostly multiple-choice test — such as eliminating two answers if they are too similar, or reading the answers first on a long question, Porch said.

Porch says the company has to balance opposing needs. “We don’t want anyone to walk away feeling like they were given the answers to the test,” he said. At the same time, “we try to focus on the exams because it’s 90% of what students are looking for.”

Teaching to the test

While IDC’s Anderson remains a fan of IT boot camps, he takes a hard line against providers focusing purely on getting certified.

“Teaching to the test is, in my view, unethical and bogus,” said Anderson, emphasizing that he was speaking generally and not singling out Training Camp. “What a manager wants is someone who knows the material. They care if you have the skill.”

Anderson doesn’t buy the argument that emphasizing test-taking tactics helps those students who otherwise know the material but tend to choke or underperform during exams.

“We’re talking only about a very small minority of people there,” he said. “It’s not helping the profession of IT to have certificates granted to people who three weeks later may not be able to pass the same test.”

Anderson also warns that some boot camps don’t license official content from Microsoft, leaving them vulnerable to teaching out-of-date information. Potential students need to ask and make sure the courseware didn’t come from “some manual bought at Borders,” he said.

How about an online course instead?

Anderson said students — especially those who are motivated and lack a pressing deadline — should certainly consider other options, such as self-study with books or self-paced online courses. The downside, he pointed out, is that it’s easy to procrastinate with self-guided study programs, since “life tends to get in the way.”

Rubbish, said Tim Hildreth, manager of content solutions at SkillSoft PLC, a Nashua, N.H.-based provider of online IT courses. “If students aren’t motivated to begin with, they won’t be motivated sitting in a classroom, either,” he said.

SkillSoft, which claims 3,000 corporate customers and more than 6 million current end users, offers four Office 2007 courses today. It is also developing an additional eight Vista courses and 50 Office 2007 courses that will start to become available in July.

Hildreth claimed that online courses are more convenient to those who can’t take whole days or weeks off to attend a boot camp. SkillSoft also sells subscriptions to its e-library of more than 12,000 technical books. Those are popular with IT administrators, who can cut-and-paste scripts and programs straight from the books, Hildreth said.

While some SkillSoft courses “are very closely aligned to a certification exam,” Hildreth said, “in general, our courseware tries to be broader than that.”

Another provider, Anaheim, Calif.-based New Horizons, is offering 14 Vista-related courses at the moment.

70-649 Exam

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com


QUESTION 1
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a Routing and Remote Access computer named ABCSR01
running Network Access Protection.
How should you configure ABC-SR01 to ensure Point-to-Point (PP) authentication is used?

A. By using the Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) protocol.
B. By using the Secure Shell (SSH) protocol.
C. By using the Extensible Authentication Protocol (EAP) protocol.
D. By using the Kerberos v5 protocol.

Answer: C

Explanation:
To configure the Point-to-Point Protocol (PPP) authentication method on ABC-SR01, you need to
configure Extensible Authentication Protocol (EAP) authentication method.
Microsoft Windows uses EAP to authenticate network access for Point-to-Point Protocol (PPP)
connections. EAP was designed as an extension to PPP to be able to use newer authentication
methods such as one-time passwords, smart cards, or biometric techniques.
Reference: Making sense of remote access protocols in Windows / DIAL-UP AUTHENTICATION
http://articles.techrepublic.com.com/5100-10878_11-1058239.html


QUESTION 2
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a computer named ABC-SR01 using the default security
settings to run Remote Desktop.
How would you configure the Remote Desktop connection to ensure secure connections between
ABC-SR01 and accessing clients?

A. By configuring Windows Firewall to block communications via port 110 on the firewall.
B. By obtaining user certificates from the internal certificate authority.
By allowing connections to Remote Desktop client computers that use Network Level
Authentication only.
C. By configuring Windows Firewall to block communications via port 443 on the firewall.
D. By obtaining user certificates from the external certificate authority.
By allowing connections to Remote Desktop client computers that use Network Level
Authentication only.
E. By configuring Windows Firewall to block communications via port 1423 on the firewall.

Answer: B

Explanation:
To ensure the RDP connections are as secure as possible, you need to first acquire user
certificates from the internal certificate authority and then configure each server to allow
connections only to Remote Desktop client computers that use Network Level Authentication.
In the pre-W2008 Terminal Server, you used to enter the name of the server and a connection is
initiated to its logon screen. Then, at that logon screen you attempt to authenticate. From a
security perspective, this isn’t a good idea. Because by doing it in this manner, you’re actually
getting access to a server prior to authentication – the access you’re getting is right to a session
on that server – and that is not considered a good security practice.
NLA, or Network Level Authentication, reverses the order in which a client attempts to connect.
The new RDC 6.0 client asks you for your username and password before it takes you to the
logon screen. If you’re attempting to connect to a pre-W2008 server, a failure in that initial logon
will fail back to the old way of logging in. It shines when connecting to Windows Vista computers
and W2008 servers with NLA configured it prevents the failback authentication from ever
occurring, which prevents the bad guys from gaining accessing your server without a successful
authentication.
Reference: Server 2008 Terminal Services Part 2: NLA – Network Level Authentication
http://www.realtime-windowsserver.com/tips_tricks/2007/06/server_2008_terminal_services_2.htm


QUESTION 3
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a computer named ABC-SR18 configured to host the
Internet Information Services (IIS) Web server role and SMTP gateway role.
ABC.com has a Marketing division using ABC-SR18 to send and receive e-mail from the Internet.
The ABC.com Marketing division accesses the Internet using the SMTP gateway on port 25.
How would you configure ABC-SR18 to send e-mail to Internet recipients after configuring the
SMTP gateway to relay messages?

A. By creating an SRV record for the SMTP gateway on an internal DNS server.
B. By creating a host (A) record for the SMTP gateway on an internal DNS server.
C. By configuring the SMTP email feature for the website on ABC-SR18.
D. By creating a CNAME record for the SMTP gateway on an internal DNS server.

Answer: C

Explanation: You need to configure the SMTP email feature for the website on ABC-SR18. The
Simple Message Transfer Protocol allows the emails to be sent to a specific address.
Reference: https:://technet2.microsoft.com/windowsserver2008/en/library/4ade618d-ff7a-4359-
b6ba-4982f0bdf4a51033.mspx?mfr=true


QUESTION 4
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a computer named ABC-SR15 configured to host the
Active Directory Lightweight Directory Services (AD LDS) service.
How would you replicate Active Directory Lightweight Directory Services (AD LDS) to a newly
deployed server?

A. By using the ADSI Edit Snap-in to replicate the AD LDS instance.
B. By creating and installing a replica of AD LDS running the AD LDS Setup wizard on ABC-SR15
C. By using the xcopy command to copy the entire AD LDS instance.
D. By using Active Directory Sites and Services to replicate the AD LDS instance.

Answer: B

Explanation: You need to run the AD LDS setup wizard on the computer in the lab to create and
install a replica of AD LDS. In the AD LDS setup wizard there will be an option to replicate the AD
LDS instance on another computer.


QUESTION 5
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a computer named ABC-SR01 configured to host
virtualization role service and virtual machines installed with the KingSales application.
How would you configure the virtual machines to be recovered to the original state if installation of
KingSales fails?

A. By using an Automated System Recovery (ASR) disk on the virtual machine when the
application fails.
B. By installing and configuring third party backup software on Virtual machine.
C. By creating a snapshot of the virtual machine through the Virtualization Management Console.
D. By using the Windows Backup utility to backup the Virtual machines.

Answer: C

Explanation: To ensure that you can restore the Virtual machine to its original state if an
application installation fails, you should create a snapshot of the virtual machine using the
Virtualization Management Console. You can always restore the virtual machines in its original
state by using the snapshot you created.


QUESTION 6
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has two computers configured as follows:
• ABC-DC01 – configured as a domain controller.
• ABC-DC02 – configured as a Read-Only Domain Controller (RODC).
ABC.com Marketing division members makes use of ABC-DC01 to log onto the domain.
How would you ensure that ABC-DC02 can be used by the Marketing division to log onto the
domain?

A. By deploying a computer running Active Directory Certificate Services (AD CS).
B. By using a Password Replication Policy on the RODC.
C. By installing and configuring an Active Directory Federation Services (AD FS) front-end server.
D. By deploying a computer running Active Directory Lightweight Directory Services (AD LDS) and
Active Directory Domain Services (AD DS).

Answer: B

Explanation: You should use the Password Replication Policy on the RODC. This will allow the
users at the Dallas office to log on to the domain with RODC. RODCs don’t cache any user or
machine passwords.


QUESTION 7
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a computer named ABC-SR21 in the default Web site
running WSUS for updates.
How would you configure a group policy with the port and intranet update location to ensure the
Secure Sockets Layer (SSL) is used on ABC-SR21?

A. By using https://ABC-sr21: 80 to indicate the default port and intranet update location.
B. By using https://ABC-sr21 to indicate the default port and intranet update location.
C. By using https:://ABC-sr21: 1073 to indicate the default port and intranet update location.
D. By using https:://ABC-sr21: 110 to indicate the default port and intranet update location.

Answer: B

Explanation: You need to use https://ABC-sr21 to configure a group policy object (GPO) that
specifies the intranet update locations on a default port. You also need a URL for a secure port
that the WSUS server is listening on. You should make use of a URL that specifies HTTPS. This
will secure the client computer channel. However, if you are using any port other than 443 for SSL,
you need to include that port in the URL, too.
Reference: WSUS SSL Client Configuration
http://www.techsupportforum.com/microsoft-support/windows-nt-2000-2003-server/115983-wsusssl-
client-configuration.html


QUESTION 8
You are employed as an enterprise administrator at ABC.com. The ABC.com has a domain
named ABC.com. All servers on the domain run Microsoft Windows Server 2008 and all client
computers run Microsoft Windows Vista. ABC.com has a computer named ABC-SR20 that hosts
the Internet Information Services (IIS) Web Server role though being configured not to utilize the
Windows Performance and Reliability Monitor. During the course of the day ABC.com instructs
you to install and configure Reliability Monitor.
How can you ensure ABC-SR20 collects reliability information keeping the system stability share
current?

A. By configuring the Remote Access Auto Connection Manager service to start automatically on
the ABC-SR20.
B. By configuring the Net Logon service to start automatically on the ABC-SR20.
C. By configuring the Task scheduler service to start automatically on the ABC-SR20.
D. By configuring the Error Reporting Services service to start automatically on the ABC-SR20.

Answer: C

Explanation: To configure the ABC-SR20 to collect the reliability monitor data, you need to
configure the Task scheduler service to start automatically.
Reliability Monitor uses data provided by the RACAgent scheduled task, a pre-defined task that
runs by default on a new installation of Windows Vista. The seamless integration between the
Task Scheduler user interface and the Event Viewer allows an event-triggered task to be created
with just five clicks.
In addition to events, the Task Scheduler in Windows Vista / Server 2008 supports a number of
other new types of triggers, including triggers that launch tasks at machine idle, startup, or logon.
Because you need Task Scheduler to collect reliability monitor data, you need to you need to
configure the Task scheduler service to start automatically.
Reference: Network Monitor 3.1 OneClick … now what? / Task Scheduler Changes in Windows
Vista and Windows Server 2008 – Part One
http://blogs.technet.com/askperf/
Reference: What allows the Reliability Monitor to display data?
http://www.petri.co.il/reliability_monitor_windows_vista.htm


QUESTION 9
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has three computers configured as follows:
• ABC-SR11 – configured with Event Log subscription monitoring
• ABC-SR12 – configured as a domain controller.
• ABC-SR13 – configured as a domain controller.
During the course of the day ABC.com instructs you to create the subscription using ABC-SR12 or
ABC-SR13 which fails as the operation does not complete.
How would you ensure that the subscription can be created using either ABC-SR12 or ABCMicrosoft
70-649: Practice Exam
SR13? (Choose two)

A. By running the command wecutil cs subscription.xml on ABC-SR11.
B. By creating subscription.xml custom view on ABC-SR11.
C. By running the wecutil qc command on ABC-SR12.
D. By running the winrm connect command on ABC-SR13.
E. By running the winrm allow command on ABC-SR13

Answer: A,B

Explanation: To configure a subscription on ABC-SR11, you need to first create an event
collector subscription configuration file and Name the file subscription.xml. You need to then run
the wecutil cs subscription.xml command on ABC-SR11.
This command enables you to create and manage subscriptions to events that are forwarded from
remote computers, which support WS-Management protocol. wecutil cs subscription.xml
command will create a subscription to forward events from a Windows Vista Application event log
of a remote computer at ABC.com to the ForwardedEvents log.
Reference: Wecutil
http://technet2.microsoft.com/windowsserver2008/en/library/0c82a6cb-d652-429c-9c3d-
0f568c78d54b1033.mspx?mfr=true


QUESTION 10
You work as the enterprise administrator at ABC.com. ABC.com has a domain named ABC.com.
The ABC.com network servers run Microsoft Windows Server 2008 and the client computers run
Microsoft Windows Vista. ABC.com has a computer named ABC-SR11 configured to run Internet
Information Services (IIS) Web server role hosting confidential company information.
ABC.com has a Marketing division accessing the confidential information which loads excessively
slow. During the course of the maintenance you discovered ABC-SR11 uses a high percentage of
processor time.
How would you gather information regarding the processor utilizing high percentages of processor
time?

A. By using Windows Reliability and Performance Monitor to check percentage of processor
capacity.
B. By using a counter log to track the processor usage.
C. By using the Performance Logs and Alerts.
D. By checking the security log for Performance events.
E. By checking the error log for performance events.

Answer: A

Explanation: Explanation
To gather additional data to diagnose the cause of the problem, you need to use the Resource
View in Windows Reliability and Performance Monitor to see the percentage of processor capacity
used by each application.
The Resource View window of Windows Reliability and Performance Monitor provides a real-time
graphical overview of CPU, disk, network, and memory usage. By expanding each of these
monitored elements, system administrators can identify which processes are using which
resources. In previous versions of Windows, this real-time process-specific data was only
available in limited form in Task Manager
Reference: Windows Reliability and Performance Monitor
http://technet.microsoft.com/en-us/library/cc755081.aspx

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Certs: Added value or minimum requirement?

I’ve got a Bachelors Degree in Information Systems Management, my Certified Information Security Systems Professional (CISSP) certification, the SANS GIAC Systems and Network Auditor (GSNA) certificate and I used to be a CCNA.   I spent two years getting my B.S. by attending night courses, the CISSP took me 6 months of constant study, the GSNA required a week’s worth of intense instructor lead study, and I spent the better part of a school year taking the official Cisco course work at the local junior college before taking the test.  And with the exception of the CCNA, the time I spent earning my degree and getting my certifications was aimed strictly at filling in a check box on an HR person’s list rather than learning something.  Not to say I didn’t learn something in studying for each, but my goal was fulfilling a job requirement instead of education.

I have mixed feelings about certifications in the IT and security professions; certifications show that someone has the minimum knowledge required to pass a particular test.  It shows they understand their profession well enough to know what certificates are going to be required to get a job in their field.  It shows that the person is dedicated enough to their profession to take and pass these tests.  But what it doesn’t show is real-world knowledge of security.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Obviously I’m not opposed to certifications, since I hold several myself.  But I’ve never liked the fact that many people think certification and skills are the same thing.  The fact that having the right certification can mean a significantly higher level of pay for professionals who otherwise are of the same skill level only further complicates the situation.   It encourages people to accumulate as many different certifications as possible to help bolster their income, something I’m as guilty of as anyone else.

I remember the early days of the Microsoft Certified Systems Engineer and “paper MCSE’s” who had passed all the tests, but could barely remember how to change a password when they got their first job in the real world.  I often hear accusations that the CISSP is heading in the same direction, despite increased efforts by the ISC2 to validate candidates and  verify levels of experience.  But I think both of these miss the real point of certification; they show that someone has spent the time and effort to pass a test, not that they have the skills required to work in the real world.   After all, no one expects a kid fresh out of college to know everything about their chosen career, so why should a certificate be any different?