Apple launches the iPad into the classroom

A home is where treasures are kept. Treasures in many California homes are in the form of furniture collections with a coffee table from a favorite antique store or a wing-back chair you inherited from a grandmother , or may be your electronics collection with flat screen high-definition television and surround sound equipment. Even your garage is full of things boxes of treasures of which you may only have of vague recollection.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com

Your most important treasures are, of course, your wife and children. Naturally, you want all these to remain safe and a part of your life. Unfortunately, there are others who share your world who would like to relieve you of these treasures for their own gain. There may come a time when you feel the need to protect yourself and those you love with security. California security is available in many forms: by a guard with training in Los Angeles, by electronic alarm systems, or by camera surveillance.

Investing in an alarm system for your home can help you sleep better at night in your own bedroom, as well as help you play better when away from home on vacation or business trips. Representatives from alarm system companies may visit your home in person to help you design the perfect alarm system to protect your possessions and your family. Sophisticated electronic systems are disguised in a simple control panel that mounts on a convenient wall in your house, which can then be programmed to alert you and local law enforcement when a door or window of your home is opened, or when an intruder is seen on camera surveillance.

For example, one man was concerned about nightly robberies which were occurring in his small rural mining town. He traveled out of state often with his work. He decided to be proactive in protecting his possessions, and bought an electronic alarm system with a proven track record. One feature of this system included the capability to alert him by mobile phone text if his home alarm system were activated. One week after he bought and installed the system, he received a text that his alarm system had sounded. He immediately called the local police near his residence. Law enforcement was already en route; they caught the thief, who was still at the residence in the act of removing expensive electronic equipment.

There are ways to be sure your personal guard has training in Los Angeles and is completely trustworthy. One such service, called the Bureau of Security and Investigative Services, accepts applications from would-be guards. The Bureau, and other companies like it, then checks criminal history and posts applicants who are ready for employment as guards on their web site. It is important to note, however, that some states may allow those applicants with a past history of felony or misdemeanor offenses to qualify for employment as a registered guard after careful review of circumstances and possible rehabilitation. Some applicants with a criminal history may become guards, but may be restricted from carrying a weapon.

Not everyone needs this type of personal security. However, a widow in a large city felt particularly vulnerable after her husband’s death. She even suspected she was being followed when she left her house to go shopping or to walk her dog. Her children, who lived out of state, contacted an agency that provided personal security guard protection at specified times of the day to help her feel more confident every time she went out of her home. The widow saw no more evidences that she was being followed by strangers, and she was comforted to know someone was nearby that she could trust to help her if needed. Her children were also comforted to know the one they treasured was protected.

70-516 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 


QUESTION 1
Exhibit:
ee.SELECT EmployeeID, Name, Region, Country FROM dbo.Employees .
There is a MS Visual Studio 2010 and MS .NET Framework 4 application CertKingdomApp.
CertKingdomApp connects to a MS SQL Server 2008 database CertKingdomDB.
A SQL statement is used to retrieve dataset instance (see exhibit).
You need to use this dataset to access rows where the Name field is not null.
Which code should you use?

Answer:


QUESTION 2
There is MS Visual Studio 2010 and MS .NET Framework 4 application CertKingdomApp.
CertKingdomApp connects to a MS SQL Server 2008 database CertKingdomDB.
To access data from CertKingdomDB Entity SQL is used.
How can you check if a collection is empty or not? Select two.

A. Use entity set attribute…
B. Use entity set operator…
C. Use entity set function…
D. ISNULL
E. IN
F. EXISTS
G. ANYELEMENT
H. EXCEPT
I. EMPTYCOLLECTION

Answer: B,F

Explanation:


QUESTION 3
There is MS Visual Studio 2010 and MS .NET Framework 4 application CertKingdomApp.
CertKingdomApp uses this service to connect to a MS SQL Server 2008 database
CertKingdomDB.
To access data from CertKingdomDB Entity SQL is used.
How should you enable query plan caching? Select two.

A. Use a stored procedure…
B. Use object…
C. Use function…
D. Use operator…
E. EntityConnection
F. queryPlanCaching
G. EntityCommand
H. EntityCaching
I. EntityDataReader
J. sp_caching
K. EnableCaching
L. caching
M. EntityTransaction

Answer: B,G

Explanation:


QUESTION 4
There is MS Visual Studio 2010 and MS .NET Framework 4 application CertKingdomApp.
CertKingdomApp connects to a MS SQL Server 2008 database CertKingdomDB.
CertKingdomApp is calling a stored procedure that has a table-valued parameter.
What steps do you need to take to make this work?

Answer:


QUESTION 5
There is MS Visual Studio 2010 and MS .NET Framework 4 application CertKingdomApp.
CertKingdomApp connects to a MS SQL Server 2008 database CertKingdomDB.
CertKingdomApp is calling a stored procedure that is using a spatial value parameter.
What steps do you need to take to make this work?

Answer:

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-515 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
There is an ASP.NET application CertKingdomApp.
CertKingdomApp is deployed to a production server.
CertKingdomApp is deployed in Release configuration.
The web.config connection string value must be changed to the production server’s string
value in the deployment process.
How can this be achieved?

Answer:

Explanation:


QUESTION 2
There is a ASP.NET MVC 2 Web Application named CertKingdomApp.
There is a single project area for CertKingdomApp.
In the Areas folder there is a subfolder CertKingdom.
There are files CertKingdomC.cs and CertKingdomD.aspx in proper subfolders.
The Route of the area is registered, the route is named CertKingdomRoute, and the name of
the area is CertKingdomArea.
Outside the area there is a view CertKingdomView.aspx.
The CertKingdomView.aspx must be linked to CertKingdomD.aspx.
What to do?

Answer:

Explanation:


QUESTION 3
There is an ASP.NET Web site CertKingdomWS.
There is an ASP.NET Web application CertKingdomApp.
There is an ASP.NET AJAX page CertKingdomPage.
CertKingdomPage has two DIV elements.
Considering content refreshing, each div element must be refreshed individually (the page
should not be refreshed).
How can this be achieved?

Answer:

Explanation:


QUESTION 4
There is an ASP.NET Web site CertKingdomWS.
There is an ASP.NET Web application CertKingdomApp.
There is an ASP.NET page CertKingdomPage.
CertKingdomPage has the following div element <div id=”errorInfo”> </div>.
CertKingdomPage has a jQuery $.ajax function that calls the server.
An error handler must be implemented. The error handler should add error information
from all page $.ajax calls to the div named ErrorInfo.
How can this be achieved?

Answer:

Explanation:


QUESTION 5
There is an ASP.NET Web site CertKingdomWS.
There is an ASP.NET Web application CertKingdomApp.
There is a Web page CertKingdomPage.
CertKingdomPage has the following div element <span id=”PGspan”>Hello World
text</span>.
The contents of spam should be replaced with HTML.
The global variable PGURL specifies the URL from which the HTML is downloaded.
Which code should be used?

Answer:

Explanation:

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-513 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 


QUESTION 1
Exhibit:
<endpoint address =” https:://www.CertKingdom.com/CertKingdomService”
Binding=”netTc pBinding”
bindingConfiguraton-NetTcpBinding_CertKingdomService
contract=”ServiceReference 1. ICertKingdomService’
name=’NetTcpBinding_CertKingdomService”/>
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService use address tcp:www.CertKingdom.com/CertKingdomService to listens for
messages.
The logical address is www.CertKingdom.com/CertKingdomService
The WCF client is configured as in the exhibit.
However, the client is unable to communicate with the server.
In what way must the configuration be adjusted?

Answer:


QUESTION 2
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService has a callback contract.
There is a client application CertKingdomClient.
CertKingdomClient calls CertKingdomService.
How can you ensure that CertKingdomClient and CertKingdomService can communicate? Select two.

A. Use the OperationContractAttribute..
B. On CertKingdomService..
C. On CertKingdomClient..
D. ..set set the Async Pattern property value to false
E. ..set set the Async Pattern property value to true
F. ..use GetCallbackChannel <T>
G. ..add a proxy derived from DuplexClientBase <TChannel>

Answer: C,G

Explanation:


QUESTION 3
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService has a callback contract.
There is a client application CertKingdomClient.
CertKingdomClient calls CertKingdomService.
How can you ensure that CertKingdomClient and CertKingdomService can communicate? Select two.

A. Use the OperationContractAttribute..
B. On CertKingdomService..
C. On CertKingdomClient..
D. ..set set the Async Pattern property value to false
E. ..set set the Async Pattern property value to normal
F. ..use GetCallbackChannel (Of T)
G. ..add a proxy derived from DuplexClientBase (Of TChannel)

Answer: C,G

Explanation:


QUESTION 4
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService supports transactions. Messages handled by CertKingdomService must be
encoded using a binary encoding, must be secured using Windows stream-based security, and
must be sent over TCR.
CertKingdomService must implement a custom binding for the service.
How should the stacking order be defined?

Answer:


QUESTION 5
There is a WCF (Windows Communication Foundation) application CertKingdomApp.
CertKingdomApp exposes a service as and end point (SOAP) for consumption by cross-platforms
clients.
You want to log messages that the service receives from the client.
What action should you take?

Answer:


QUESTION 6
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService communicates with a database CertKingdomDB.
CertKingdomDB uses a workflow engine.
CertKingdomDB handles data access authorization. A security exception is raised an unauthorized
user tries to access CertKingdomDB.
This exception must be transmitted the client that is calling CertKingdomService.
How can this be achieved? Select two.

A. Use CertKingdomDB..
B. Use CertKingdomService..
C. ..and configure service Debug.
D. ..and configure router.
E. ..and configure router Security Audit.
F. ..and configure Unhandled Exception

Answer: B,C

Explanation:


QUESTION 7
There is a WCF (Windows Communication Foundation) service CertKingdomService.
There are out of-process process resources that CertKingdomService must access on behalf of an
originating caller. What should you do?

A. Use the service contract PrincipalPermissionAttribute..
B. Use ServiceSecurityContext.CurrentWindowsidentity.ImpersonationLevel..
C. ..and set the value to…
D. ..and change the value of bindingConfiguration attribute in the endpoint element of the
configuration file to..
E. .. TokenImpersonationLevelDelegation
F. .. wsHttpBinding
G. .. ssHttpBinding
H. .. Impersonation

Answer: B,C,E

Explanation:


QUESTION 8
There is WCF (Windows Communication Foundation) application CertKingdomApp.
There is a data contract CertKingdomData, with several data members, that is used by
CertKingdomApp.
Consider a serialized instance of CertKingdomData which is deserialized. If any of data members
are not available CertKingdomApp must throw a Serialization Exception.
What action should you take? Select three.

A. For each data member…
B. Use CertKingdomData and..
C. Set a default value in each of the data member declarations.
D. .. Set the IsRequired property..
E. .. Emit Default Value proper..
F. .. Order property..
G. ..add the Unknown Type attribute.
H. ..add the Known Type attribute.
I. ..to false.
J. ..to true.
K. .. to a unique integer value.
L. .. to a unique string value.

Answer: A,D,J

Explanation:


QUESTION 9
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService exposes the operations CertKingdom1 and CertKingdom2.
CertKingdom1 should run with the identity of the client.
CertKingdom2 should run with the identity of the CertKingdomService.
How can this be achieved?

Answer:


QUESTION 10
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService handles accounting related processes.
You must ensure that CertKingdomService runs with the identity of the application that is calling
CertKingdomService.
How can this be ensured?

Answer:


QUESTION 11
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService is secured.
How can you track attempts to access CertKingdomService that are unsuccessful? Select all that
apply.

A. Use the serviceAuthorization behavior..
B. Use the serviceDebugger behavior..
C. Use the serviceSecurityAudit behavior..
D. Use the security configuration element..
E. ..and use attribute..
F. ..and use method..
G. Mode
H. messageAuthenticationAuditLevel
I. includeExceptionDetailsInFaults
J. authorizationManagerType
K. ..and set it to..
L. True
M. False
N. Success
O. Failure
P. Service
Q. Message

Answer: C,E,H,K,O

Explanation:

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

All eyes on Target.com’s uptime with next designer launch Sunday

The last time Target launched a discount brand from a designer label, both the site and customer service overall crashed. Can Target endure another episode like that?

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com

Target is gearing up to launch yet another discounted line of clothing from a high-end fashion designer, but analysts, investors, and customers are all waiting to see whether or not the retail giant will be able to handle the e-commerce load better than it did in September.

To recall, there was a frenzy both in stores and online for Target when it launched a line from Missoni in September. (In case you’re interested, this Sunday’s launch is from Jason Wu, a favorite of First Lady Michelle Obama.)

I pinged Target reps this week to see if Target.com has taken any precautions to try to prevent similar site crashes this weekend, and I received the following response:

We have been working to improve Target.com and continue to make updates daily to provide a positive shopping experience for our guests. Many factors are taken into consideration when planning the inventory levels of our limited-time only collections. It is not uncommon for these collections to sell out quickly and we encourage our guests to shop the collection early.

Often times with sales such as these, inventory definitely can run out quickly. Yet Target all but imploded, especially on its website. Many consumers are fans of online shopping for the convenience of it as well as the opportunity to avoid the masses in stores.

But the masses came to Target.com too, bringing down the site several times for almost a day. To make things even worse, the site would come back at times and let customers order — even if it turned out there wasn’t any inventory left to buy.

Thus, many customers were left fuming when they received emails that orders could not be completed. The lucky ones got emails saying that their purchases would ship within a month. (Most in-stock items at Target.com are supposed to ship within one to two days.)

Personally (and fortunately), I fell into the latter category. However, my email read that the item I ordered (a Missoni bathmat) was out of stock — even though the product page clearly said it was “In Stock” when I put it in my shopping card and checked out.

Nevertheless, the bathmat showed up four weeks after I ordered it.

Jamus Driscoll, senior vice president of marketing at e-commerce solutions provider Demandware, warned that “any website downtime or slowdown can definitely frustrate consumers and leave a negative impression.”

“Today’s web-savvy consumers demand exceptional brand experiences, and those expectations include reliable and accessible access to a brand’s website at all times,” said Driscoll.

Nearly a month after this debacle, Target.com’s president, Steve Eastman, resigned suddenly. A very brief (one sentence) statement was released, opening the floodgates for rumors as to why he was leaving besides the typical “pursuing other opportunities” form letter — whether it had to do with this event or not.

In November, questions were raised as to whether or not Target would even be able to meet traffic demands on Black Friday or Cyber Monday, the two biggest online shopping days of the year.

However, it doesn’t appear that Target.com suffered from traffic slowdowns or worse more than any other giant online retailer.

Thus, perhaps either Target is now more prepared for such a downpour of online consumers — or it only buckled during a more high-profile, exclusive event. After all, people visit and shop from many different websites on Black Friday and Cyber Monday.

Target has had similar, very popular events with designers in the past, so you might be wondering why the Minneapolis-based enterprise had trouble all of a sudden and looked unprepared.

In fact, Target.com relaunched in August with a new platform after parting ways with Amazon.com to focus more on its own website sales. (Amazon.com powered Target.com, and Target products showed up in Amazon searches).

While the revamped Target.com was backed by some heavy partners (including IBM and AT&T), the Missoni launch proved to be the first major test for the new version of the online store. Although it looks like Target.com pretty much failed that test, Sunday will provide more conclusive evidence.

Target reps couldn’t provide an estimate for how many online visitors they are expecting this weekend, nor did they specify what precautions they were taking to meet new traffic surges.

Either way, there has been a significant amount of attention and buzz surrounding this launch for months now, so we can definitely expect long virtual queues on Sunday.

Driscoll advised that “brands must utilize a scalable commerce platform that enables their team to quickly prepare for and react to traffic spikes, and allocate capacity when needed.”

“This is a key benefit of a SaaS-based commerce platform,” Driscoll explained. “Retailers can respond to an uptick in traffic in a matter of minutes, whereas a retailer on a license-based platform might need weeks –- and costly hardware -– to manage this surge in traffic.”

70-291 Q & A / Study Guide / Testing Engine

Cisco CCNA Training, Cisco CCNA Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as It Admin at Certkingdom.com. The Certkingdom.com network consists of a domain named Certkingdom.com.
The servers at the Certkingdom.com network run Windows Server 2003. The Certkingdom.com network has a file
server named Certkingdom-SR18. Certkingdom-SR18 hosts shared folders.
During your routine monitoring, you notice that Certkingdom-SR18 has a connectivity issue. To investigate
further you run Network Monitor, but notices that during capturing, network packets were dropped.
What actions must you take to minimize the dropping of packets while monitoring Certkingdom-SR18?

A. You should configure a persistent demand-dial connection.
B. You should configure a two-way initiated demand-dial connection.
C. You should use dedicated capture mode when utilizing the Network Monitor.
D. You should select the Do not overwrite events option in the Event Viewer.

Answer: C

Explanation: The CPU of Certkingdom-SR18 runs on 80%, which indicates that there are not enough
resources to the network Monitor. Running Network Monitor in dedicated capture mode frees
resources on the computer for capturing dat
A. This results in fewer frames being dropped. The
capture statistics are not displayed or refreshed because the frames are copied to the capture
buffer.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, Implementing,
Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide & DVD Training
System, Syngress Publishing Inc., Rockland, 2003, p. 841


QUESTION 2
You work as the network administrator at Certkingdom.com. The Certkingdom.com network consists of a single
Active Directory domain named Certkingdom.com. The servers at the Certkingdom.com network run Windows
Server 2003 and the workstations, Windows XP Professional.
The Certkingdom.com network has a DNS server named Certkingdom-SR03 that does name resolution for host on
the Internet. Certkingdom.com users complain that they do not get the correct site when trying to access
Web site known to them.
What actions must you take to stop this from happening without disrupting production?

A. You should restart the DNS Server service.
B. You should select the Secure cache against pollution setting.
C. You should run the ipconfig/flushdns on Certkingdom-SR03.
D. You should run the ipconfig/registerdns on Certkingdom-SR03.

Answer: B

Explanation: When the Secure cache against pollution setting is disabled, all records received in
response to DNS queries are cached. This is true even when the records do not match to a
queried domain name. Enabling the Secure cache against pollution setting disables the ability to
pollute the DNS cache with incorrect information, and spoof DNS queries. With Windows Server
2003 the default setting is that caches are secured against pollution. This will then prevent users
that browse the Internet from being directed to the wrong websites.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, MCSA/MCSE:
Exam 70-291: Implementing, Managing, and Maintaining a Windows Server 2003 Network
Infrastructure Guide & DVD Training System, Syngress Publishing Inc., Rockland, 2003, pp. 496-
497
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291): Implementing,
Managing, and Maintaining a Microsoft Windows Server 2003 network Infrastructure, Microsoft
Press, Redmond, 2003, Part 1, Chapter 3, pp. 285, 291


QUESTION 3
You work as the network administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. The servers at the Certkingdom.com network run Windows Server 2003 and the workstations,
Windows XP Professional.
The Certkingdom.com network has a server named Certkingdom-SR10 that runs Windows Server Update
Services (WSUS). During synchronization you notice that you cannot connect to the Windows
Update servers, however, you can access to other Web site not residing in the intranet.
What actions must you take to connect to the Windows Update servers?

A. You must run the ipconfig/registerdns.
B. You must configure the forwarders on Certkingdom-SR10.
C. You must set the authentication to the proxy server in the WSUS settings.
D. You must run the gpupdate /force command on Certkingdom-SR10.

Answer: C

Explanation: In the Software Update Services administration console, there is an option to
configure your internet connection settings. These settings include proxy server settings. If you
have a proxy server between the SUS server and the internet, you need to configure the proxy
server settings in the SUS options.


QUESTION 4
You work as the network administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. The servers at the Certkingdom.com network run Windows Server 2003. Certkingdom.com has a
subsidiary named Test Labs, Inc. that has a domain named testlabs.com.
The Certkingdom.com network has a DNS server named Certkingdom-SR05. Certkingdom-SR05 acts as a secondary
zone for testlabs.com
What actions must you take to track when the DNS server at Test Labs, Inc. sends notifications of
modifications in the zone of testlabs.com to Certkingdom-SR05?

A. You must run the gpresult command in verbose mode.
B. You must select debug logging and set the log to store Notification events on Certkingdom- SR05.
C. You must run the secedit command in analysis mode.
D. You must configure a two-way initiated demand-dial connection.

Answer: B

Explanation: Debug logging is disabled by default and has to be enabled on Certkingdom-SR05. Select
the Log packets for debugging check box to configure Debug Logging. To receive useful debug
logging information, you should select a Packet direction, a Transport protocol, and at least one
more option. You can also specify the file path and name, and the maximum size for the log file.
Enabling Debug Logging slows DNS server performance.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, MCSA/MCSE:
Exam 70-291: Implementing, Managing, and Maintaining a Windows Server 2003 Network
Infrastructure Guide & DVD Training System, Syngress Publishing Inc., Rockland, 2003, p. 551


QUESTION 5
You work as the network administrator at Certkingdom.com. The Certkingdom.com network consists of a domain
named Certkingdom.com. The servers at the Certkingdom.com network run Windows Server 2003.
The Certkingdom.com network has a Web server named Certkingdom-SR11. During a routine monitoring you
notice an increase in network traffic. Due to this you need to find out the MAC address of the
workstation that initiated the transfers and the command that was used. However, you action must
not effect Certkingdom-SR11.
What actions must you take?

A. You must run the ipconfig/registerdns.
B. You must use the Netmon utility.
C. You must capture the IP traffic to Certkingdom-SR11.
D. You must Enable Server Message Block (SMB) signing on all the workstations.

Answer: C

Explanation: Network Monitor tool allows you to capture dat
A. The tool also allows you to identify
its source from where it came from. The Network Monitor tool also allows you to analyze the
content of the message. Use a Network Monitor capture filter to capture IP traffic from any
computer to Certkingdom-SR11, and apply the capture filter before capturing the data.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, MCSA/MCSE:
Exam 70-291: Implementing, Managing, and Maintaining a Windows Server 2003 Network
Infrastructure Guide & DVD Training System, Syngress Publishing Inc., Rockland, 2003, pp. 198,
543
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291): Implementing,
Managing, and Maintaining a Microsoft Windows Server 2003 network Infrastructure, Microsoft
Press, Redmond, 2003, Part 1, Chapter 3, pp. 140, 144, 145.


QUESTION 6
You work as the network administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. The servers at the Certkingdom.com network run Windows Server 2003.
The Certkingdom.com network has only one DNS server named Certkingdom-SR11 that only hosts the zone for
Certkingdom.com. During the course of the day you have received complaints that the response time of
the connections to other workstations is very poor.
What actions must you take to see if it is the DNS client traffic on Certkingdom-SR11?

A. You must set up a log of the Total queries/sec and the DNS counters Dynamic updates/sec.
B. You must configure a Network Monitor capture filter.
C. You must run the gpresult command.
D. You must set up the Performance Logs and Alerts to note down the Physical-Disk object.

Answer: A

Explanation: The System Monitor utility is used to collect and measure the real-time performance
data for a local or remote computer on the network. Through System Monitor, you can view
current data or data from a log file. When you view current data, you are monitoring real-time
activity. When you view data from a log file, you are importing a log file from a previous session.
Using the System Monitor, you can generate statistics on the following types of information
regarding DNS services:
AXFR requests (all-zone transfer requests), IXFR requests (incremental zone transfer requests),
DNS server memory usage, Dynamic updates, DNS Notify events, Recursive queries, TCP and
UDP statistics, WINS statistics and Zone transfer issues. Thus to find out where DNS client traffic
is responsible for the slow speed at which computers connect within the Certkingdom.com domain, then
you should create a log of the Dynamic Updated/sec and the Total queries/sec given the fact that
Certkingdom-SR05 is the only DNS server in the domain.
Reference:
James Chellis, Paul Robichaux and Matthew Sheltz, MCSA/MCSE: Windows Server 2003
Network Infrastructure Implementation, Management, and Maintenance Study Guide, Sybex Inc.
Alameda, 2003, pp. 70-73, 304


QUESTION 7
You work as the network administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. The servers at the Certkingdom.com network run Windows Server 2003 and the workstations,
Windows XP Professional.
The Certkingdom.com network has a Web server named Certkingdom-SR10 that has the Internet Information
Services (IIS) 6.0 installed. Certkingdom-SR10 hosts a Web site that can be reached from the internal
network and the Internet. The internal traffic at Certkingdom.com needs authentication without a secure
protocol to access the Web site; however Internet traffic needs to authenticate with a secure
protocol.
What actions must you take to ensure that the all accesses to Certkingdom-SR10 use a secure protocol?

A. You need to configure the log to capture Notification events.
B. You need to apply the hisecdc.inf predefined security template.
C. You need to monitor network traffic and IIS logs.
D. You need to apply a custom security template.

Answer: C

Explanation: To make sure that the users are using a secure protocol, you must use the Network
Monitor. The Network Monitor allows you to capture frames directly from the network. As soon as
the frames are captured it will display and filter captured frames. The Network Monitor also allows
you to edit captured frames and transmit them on the network.
Reference:
Diana Huggins, Windows Server 2003 Network Infrastructure Exam Cram 2 (Exam 70-291),
Chapter 4
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291): Implementing,
Managing, and Maintaining a Microsoft Windows Server 2003 network Infrastructure, Microsoft
Press, Redmond, 2003, 1: 26, 3: 3.


QUESTION 8
You work as the network administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. The servers at the Certkingdom.com network run Windows Server 2003 and the workstations,
Windows XP Professional.
The Certkingdom.com network has two servers, named Certkingdom-SR30 and Certkingdom-SR31, which contain file with
sensitive company information. You create a new OU named SenSrv and move Certkingdom-SR30 and
Certkingdom-SR31 to the new OU. You then create a new GPO that and configure it to encrypt all network
connections. You then link the GPO to the SenSrv OU.
How would you check to see if encrypted connections to Certkingdom-SR30 and Certkingdom-SR31 are taking
place?

A. By opening the Resultant Set of Policy console.
B. By running the Microsoft Baseline Security Analyzer (MBSA).
C. By applying the hisecdc.inf predefined security template.
D. By opening the IP Security Monitor console.

Answer: D

Explanation: Administrators can use the IP Security Monitor tool to confirm whether IP Security
(IPSec) communications are successfully secured. The tool can display the number of packets
that have been sent over the Authentication Header (AH) or Encapsulating Security Payload
(ESP) security protocols, and how many security associations and keys have been generated
since the computer was last started. The IP Security Monitor is implemented as a Microsoft
Management Console (MMC) snap-in on the Windows Server 2003 and Windows XP Professional
operating systems. It includes enhancements that allow you to view details about an active IPSec
policy, in addition to Quick Mode and Main Mode statistics, and active IPSec SAs. IP Security
Monitor also enables you to search for specific Main Mode or Quick Mode filters.
Reference:
Diana Huggins, Windows Server 2003 Network Infrastructure Exam Cram 2 (Exam 70-291),
Chapter 5
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291): Implementing,
Managing, and Maintaining a Microsoft Windows Server 2003 network Infrastructure, Microsoft
Press, Redmond, 2003, p. 15: 20
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter, Implementing,
Managing, and Maintaining a Windows Server 2003 Network Infrastructure Guide & DVD Training
System, Syngress Publishing Inc., Rockland, 2003, p.795


QUESTION 9
You work as the network administrator at Certkingdom.com. The Certkingdom.com network consists of a domain
named Certkingdom.com. The servers at the Certkingdom.com network run Windows Server 2003 and the
workstations, Windows XP Professional. The Certkingdom.com network has a DNS server named
Certkiller -SR03.
Certkingdom.com changes ISPs. Now you receive complaints that Certkingdom.com users cannot connect to Web
sites on the Internet by using the URL of the Web site.
You configure your workstation with the DNS server address of the new ISP. You can now
connect to Web sites by entering their URL in the browser.
How would you configure Certkingdom-SR03 to allow all users to connect to Internet Web sites without
causing connectivity problems on the internal network?

A. You need run the Oclist.exe command and the Security Configuration and Analysis console on
Certkingdom-SR03.
B. You need to utilize the default root hints of Certkingdom-SR03 and set up a forwarder to the new ISP.
C. You need run the Dcgpofix on Certkingdom-SR03 and set up forwarding to the new ISP.
D. You need to disable recursion and run the Security Configuration and Analysis console on
Certkingdom-SR03.

Answer: B

Explanation: Forwarders are used to inform DNS where to look for name resolution when not in
the local DNS database. With Windows Server 2003 conditional forwarding, recursive query
requests can be subject to different DNS forwarder servers based on the domain name queried.
The root hints file (cache hints file) contains host information needed to resolve names external of
the authoritative DNS domains. It holds names and addresses of root DNS servers which are
normally located on the Internet. In this situation where your network is connected to the Internet,
the root hints file should contain the addresses of the root DNS servers on the Internet. With the
default installation of Windows Server 2003, DNS uses the root hints file. It is not necessary to
configure forwarders to access the Internet. Even though it is recommended to configure
forwarders to point to your external domain, root hints will function quite fine.
Reference:
Diana Huggins, Windows Server 2003 Network Infrastructure Exam Cram 2 (Exam 70-291),
Chapter 3
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291): Implementing,
Managing, and Maintaining a Microsoft Windows Server 2003 network Infrastructure, Microsoft
Press, Redmond, 2003, Part 1, Chapters 4 & 5, pp. 193, pp. 194; and pp. 247.


QUESTION 10
You work as the network administrator at Certkingdom.com. The Certkingdom.com network consists of a domain
named Certkingdom.com. The servers at the Certkingdom.com network run Windows Server 2003 and the
workstations, Windows XP Professional.
Certkingdom.com has a Web server named Certkingdom-SR10 which is connected to the Internet. During the
course of the day you have received instructions from the CIO to use System Monitor to determine
how much bandwidth is used on Certkingdom-SR10’s Internet connection. You decide to use the Bytes
Total/sec counter with a sample rate of 10 seconds. You also plan to archive the logs once a day.
Due to limited hard drive space, you need to prevent the logs from getting too big.
What actions must you take to?

A. You should disable recursion.
B. You should create a one-way initiated demand-dial connection.
C. You should configure an alert trigger when the Datagrams/sec counter is high.
D. You should keep Certkingdom-SR10 on the existing counter and set the sample rate to 60 seconds.

Answer: D

Explanation: The function of the Network Interface Bytes Total/Sec counter is to measures the
total number of bytes that are sent/ received from the network interface. You use less processor
cycles when you reduce the sampling frequency.
Reference:
Dan Holme and Orin Thomas, MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing
and Maintaining a Microsoft Windows Server 2003 Environment, Microsoft Press, Redmond, 2003,
Chapter 12, p. 479


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Bluetooth in Brief

Bluetooth is a radio or wireless technology designed for short range data communications in the Industrial, Scientific and Medical (ISM) band. The frequency range is from 2.402Ghz to 2.480Ghz, with the available frequency sprectrum being broken up into 79 x 1Mhz wide bands.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Bluetooth was designed by Ericsson as a short range wireless connectivity solution and is used to build Personal Area Networks, or PANs as they are known so that devices in close proximity can pass information. Typical examples being a mobile phone downloading data to a Personal Computer or a mobile phone earpiece communicating with the phone itself.
The technology behind Bluetooth is known as FHSS (Frequency Hopped Spread Spectrum), where the datastream is broken up into small pieces, each containing several binary bits of data which are transmitted in a pseudo random sequence over a series of up to 79 frequency bands. As Bluetooth has developed and matured, a number of data modulation schemes have been used to modulate the data onto the radio carriers including GFSK (Gaussian Frequency Shift Keying), DQPSK (Differential Quadrature Phase Shift Keying) and 8DPSK (8-ary Differential Phase Shift Keying). The development and use of the different modulation schemes were an attempt to increase the data rates of the system.
So how does Bluetooth operate?
Two or more Bluetooth devices that establish a connection (and share a channel) form a small wireless network known as a Piconet, with up to eight devices, forming the piconet . One device becomes the Master station, can join a Bluetooth piconet. Normally the device which initiates the connection will be the Master and other devices joining the PAN will be slaves. The master passes a Frequency Hopping Synchronisation (FHS) packet to any slaves containing its address and clock. The address of the Master Bluetooth device is used to determine the hop sequence and all slaves use the Master Clock to determine which frequency to transmit or receive on at any given time.
A group of piconets are referred to as a Scatternet, with each individual piconet having a unique hopping sequence, determined by it’s Master’s address. If a collision occurs where two devices transmit on the same frequency, a device will just retransmit the data on the next frequency hop. Although this can ultimately affect the performance and data rate of the transmission, it is the accepted method, just like collisions are a way of life in a shared Ethernet network when a hub is in use.
Devices can be a member of multiple piconets by using each Master address to determine the hopping sequence for each network, but can only be the Master for one piconet. The access method used by Bluetooth devices is known as TDD (Time-Division Duplex) where each device (Master and Slave) share the same frequency and are allocated a timeslot during which to transmit. A master will normally use even-numbered time slots and the slave will use odd numbered timeslots.
There are two types of transmission links normally supported by Bluetooth, known as SCO (Synchronous Connection-Orientated) and ACL (Asynchronous Connectionless Link). General Bluetooth operation uses ACL, where the packet and payload length will determine how many timeslots are required. Because ACL is Connection-Orientated, packets that are not acknowledged will be automatically retransmitted, abeit on a different timeslot or timeslots. Forward error correction can be employed as an option and although the data delivery may be more reliable, the data rate will reduce accordingly depending on how error prone the environment is at the time.
Voice over Bluetooth normally used an SCO link, where the voice data is sent over a number of reserved timeslots within an already established ACL link. Retransmissions do not occur on an SCO link as this could cause a number of problems, least of all latency and jitter. However, forward error correction can be used to provide a degree of reliability. There is an Enhanced version of SCO that can employ retransmission in some circumstances.
The latest version of Bluetooth, version 4 and all previous versions of Bluetooth have been designed to be backward compatible with previous versions, so no worry about using older devices with the newer Bluetooth devices.
The Bluetooth technologies have allowed us to provide fast data communications between devices that are in close proximity (within a few metres) without the need for a cable running RS-232 protocol for example and so have provided us with mobility free from the constraints imposed with the use of copper wiring.