Category Archives: MCITP Training

Exam 70-640 Windows Server 2008 Active Directory, Configuring

Published: March 6, 2008
Languages: English, German, Japanese
Audiences: IT professionals
Technology: Windows Server 2008
Credit toward certification: MCP, MCTS, MCITP, MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Configuring Domain Name System (DNS) for Active Directory (18%)
Configure zones
Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDNS); Time to Live (TTL); GlobalNames; Primary, Secondary, Active Directory Integrated, Stub; SOA; zone scavenging; forward lookup; reverse lookup
Configure DNS server settings
Forwarding; root hints; configure zone delegation; round robin; disable recursion; debug logging; server scavenging
Configure zone transfers and replication
Configure replication scope (forestDNSzone; domainDNSzone); incremental zone transfers; DNS Notify; secure zone transfers; configure name servers; application directory partitions

Preparation resources
Configuring zone properties
Configure a DNS server for use with Active Directory Domain Services
Modify zone transfer settings

Configuring the Active Directory infrastructure (17%)
Configure a forest or a domain
Remove a domain; perform an unattended installation; Active Directory Migration Tool (ADMT); change forest and domain functional levels; interoperability with previous versions of Active Directory; multiple user principal name (UPN) suffixes; forestprep; domainprep
Configure trusts
Forest trust; selective authentication vs. forest-wide authentication; transitive trust; external trust; shortcut trust; SID filtering
Configure sites
Create Active Directory subnets; configure site links; configure site link costing; configure sites infrastructure
Configure Active Directory replication
DFSR; one-way replication; Bridgehead server; replication scheduling; configure replication protocols; force intersite replication
Configure the global catalog
Universal Group Membership Caching (UGMC); partial attribute set; promote to global catalog
Configure operations masters
Seize and transfer; backup operations master; operations master placement; Schema Master; extending the schema; time service

Preparation resources
Deploying a Windows Server 2008 forest root domain
Securing domain and forest trusts
Active Directory replication tools and settings

Configuring Active Directory roles and services (14%)
Configure Active Directory Lightweight Directory Service (AD LDS)
Migration to AD LDS; configure data within AD LDS; configure an authentication server; Server Core installation
Configure Active Directory Rights Management Service (AD RMS)
Certificate request and installation; self-enrollments; delegation; create RMS templates; RMS administrative roles; RM add-on for IE
Configure the read-only domain controller (RODC)
Replication; Administrator role separation; read-only DNS; BitLocker; credential caching; password replication; syskey; read-only SYSVOL; staged install
Configure Active Directory Federation Services (AD FSv2)
Install AD FS server role; exchange certificate with AD FS agents; configure trust policies; configure user and group claim mapping; import and export trust policies

Preparation resources
AD LDS getting started step-by-step guide
Read-only domain controllers step-by-step guide
AD FS step-by-step guide

Creating and maintaining Active Directory objects (18%)
Automate creation of Active Directory accounts
Bulk import; configure the UPN; create computer, user, and group accounts (scripts, import, migration); template accounts; contacts; distribution lists; offline domain join
Maintain Active Directory accounts
Manage computer accounts; configure group membership; account resets; delegation; AGDLP/AGGUDLP; deny domain local group; local vs. domain; Protected Admin; disabling accounts vs. deleting accounts; deprovisioning; contacts; creating organizational units (OUs); delegation of control; protecting AD objects from deletion; managed service accounts
Create and apply Group Policy objects (GPOs)
Enforce, OU hierarchy, block inheritance, and enabling user objects; group policy processing priority; WMI; group policy filtering; group policy loopback; Group Policy Preferences (GPP)
Configure GPO templates
User rights; ADMX Central Store; administrative templates; security templates; restricted groups; security options; starter GPOs; shell access policies
Deploy and manage software by using GPOs
Publishing to users; assigning software to users; assigning to computers; software removal; software restriction policies; AppLocker
Configure account policies
Domain password policy; account lockout policy; fine-grain password policies
Configure audit policy by using GPOs
Audit logon events; audit account logon events; audit policy change; audit access privilege use; audit directory service access; audit object access; advanced audit policies; global object access auditing; “Reason for Access” reporting

Preparation resources
Active Directory how to…
Group policy planning and deployment guide
Account policies

Maintaining the Active Directory environment (18%)
Configure backup and recovery
Using Windows Server Backup; back up files and system state data to media; backup and restore by using removable media; perform an authoritative or non-authoritative restores; linked value replication; Directory Services Recovery Mode (DSRM); backup and restore GPOs; configure AD recycle bin
Perform offline maintenance
Offline defragmentation and compaction; Restartable Active Directory; Active Directory database mounting tool
Monitor Active Directory
Event viewer subscriptions; data collector sets; real-time monitoring; analyzing logs; WMI queries; PowerShell

Preparation resources
Windows Server backup step-by-step guide for Windows Server 2008
Compact the directory database file (offline defragmentation)
Restartable AD DS step-by-step guide

Configuring Active Directory Certificate Services (15%)

Install Active Directory Certificate Services
Certificate authority (CA) types, including standalone, enterprise, root, and subordinate; role services; prepare for multiple-forest deployments
Configure CA server settings
Key archival; certificate database backup and restore; assigning administration roles; high-volume CAs; auditing
Manage certificate templates
Certificate template types; securing template permissions; managing different certificate template versions; key recovery agent
Manage enrollments
Network device enrollment service (NDES); auto enrollment; Web enrollment; extranet enrollment; smart card enrollment; authentication mechanism assurance; creating enrollment agents; deploying multiple-forest certificates; x.509 certificate mapping
Manage certificate revocations
Configure Online Responders; Certificate Revocation List (CRL); CRL Distribution Point (CDP); Authority Information Access (AIA)

Preparation resources
Active Directory certificate services step-by-step guide
Setting up a certification authority
Administering certificate templates


QUESTION 1
Your company has a main office and three branch offices. Each office is configured as a separate Active Directory site that has its own domain controller.
You disable an account that has administrative rights.
You need to immediately replicate the disabled account information to all sites.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A. From the Active Directory Sites and Services console, configure all domain controllers
as global catalog servers.
B. From the Active Directory Sites and Services console, select the existing connection objects and force replication.
C. Use Repadmin.exe to force replication between the site connection objects.
D. Use Dsmod.exe to configure all domain controllers as global catalog servers.

Answer: B,C

Explanation:
http://technet.microsoft.com/en-us/library/cc835086%28v=ws.10%29.aspx
Repadmin /syncall Synchronizes a specified domain controller with all of its replication partners. https:://ivan.dretvic.com/2012/01/how-to-force-replication-of-domain-controllers/
How to force replication of Domain Controllers From time to time its necessary to kick off AD replication to speed up a task you may be doing, or just a good too to check the status of replication between DC’s.
Below is a command to replicate from a specified DC to all other DC’s.
Repadmin /syncall DC_name /Aped By running a repadmin /syncall with the /A(ll partitions) P(ush) e(nterprise, cross sites) d(istinguished names) parameters, you have duplicated exactly what Replmon used to do in Windows 2003, except that you did it in one step, not many.And with the benefit of seeing immediate results on how the operations are proceeding.
If I am running it on the DC itself, I don’t even have to specify the server name. https:://technet.microsoft.com/en-us/library/cc776188%28v=ws.10%29.aspx Force replication over a connection
To force replication over a connection
1. Open Active Directory Sites and Services.
C:\Documents and Settings\usernwz1\Desktop\1.PNG


QUESTION 2
Your company has a branch office that is configured as a separate Active Directory site and has an Active Directory domain controller.
The Active Directory site requires a local Global Catalog server to support a new application.
You need to configure the domain controller as a Global Catalog server.
Which tool should you use?

A. The Server Manager console
B. The Active Directory Sites and Services console
C. The Dcpromo.exe utility
D. The Computer Management console
E. The Active Directory Domains and Trusts console

Answer: B

Explanation:

Answer: The Active Directory Sites and Services console https:://technet.microsoft.com/en-us/library/cc781329%28v=ws.10%29.aspx Configure a domain controller as a global catalog server
To configure a domain controller as a global catalog server 1. Open Active Directory Sites and Services.
Further information: https:://technet.microsoft.com/en-us/library/cc728188%28v=ws.10%29.aspx What Is the Global Catalog?
The global catalog is a distributed data repository that contains a searchable, partial representation of every object in every domain in a multidomain Active Directory Domain Services (AD DS) forest. The global catalog is stored on domain controllers that have been designated as global catalog servers and is distributed through multimaster replication. Searches that are directed to the global catalog are faster because they do not involve referrals to different domain controllers.
In addition to configuration and schema directory partition replicas, every domain controller in a forest stores a full, writable replica of a single domain directory partition. Therefore, a domain controller can locate only the objects in its domain. Locating an object in a different domain would require the user or application to provide the domain of the requested object. The global catalog provides the ability to locate objects from any domain without having to know the domain name. A global catalog server is a domain controller that, in addition to its
full, writable domain directory partition replica, also stores a partial, read-only replica of all other domain directory partitions in the forest. The additional domain directory partitions are partial because only a limited set of attributes is included for each object. By including only the attributes that are most used for searching, every object in every domain in even the largest forest can be represented in the database of a single global catalog server.
Note: A global catalog server can also store a full, writable replica of an application directory partition, but objects in application directory partitions are not replicated to the global catalog as partial, read-only directory partitions.
The global catalog is built and updated automatically by the AD DS replication system. The attributes that are replicated to the global catalog are identified in the schema as the partial attribute set (PAS) and are defined by default by Microsoft. However, to optimize searching, you can edit the schema by adding or removing attributes that are stored in the global catalog.
In Windows 2000 Server environments, any change to the PAS results in full synchronization (update of all attributes) of the global catalog. Later versions of Windows Server reduce the impact of updating the global catalog by replicating only the attributes that change.
In a single-domain forest, a global catalog server stores a full, writable replica of the domain and does not store any partial replica. A global catalog server in a single-domain forest functions in the same manner as a nonglobal-catalog server except for the processing of forest-wide searches.


QUESTION 3
Your company has an Active Directory domain. You have a two-tier PKI infrastructure that contains an offline root CA and an online issuing CA.
The Enterprise certification authority is running Windows Server 2008 R2.
You need to ensure users are able to enroll new certificates.
What should you do?

A. Renew the Certificate Revocation List (CRL) on the root CA. Copy the CRL to the CertEnroll folder on the issuing CA.
B. Renew the Certificate Revocation List (CRL) on the issuing CA, Copy the CRL to the SysternCertificates folder in the users’ profile.
C. Import the root CA certificate into the Trusted Root Certification Authorities store on all client workstations.
D. Import the issuing CA certificate into the Intermediate Certification Authorities store on all client workstations.

Answer: A

Explanation:
http://social.technet.microsoft.com/wiki/contents/articles/2900.offline-root-certification-authority-ca.aspx
Offline Root Certification Authority (CA)
A root certification authority (CA) is the top of a public key infrastructure (PKI) and generates a self-signed certificate. This means that the root CA is validating itself (self-validating). This root CA could then have subordinate CAs that effectively trust it. The subordinate CAs receive a certificate signed by the root CA, so the subordinate CAs can issue certificates that are validated by the root C
A. This establishes a CA hierarchy and trust path.
CA Compromise
If a root CA is in some way compromised (broken into, hacked, stolen, or accessed by an unauthorized or malicious person), then all of the certificates that were issued by that CA are also compromised. Since certificates are used for data protection, identification, and authorization, the compromise of a CA could compromise the security of an entire organizational network. For that reason, many organizations that run internal PKIs install their root CA offline. That is, the CA is never connected to the company network, which makes the root CA an offline root C
A. Make sure that you keep all CAs in secure areas with limited access.
To ensure the reliability of your CA infrastructure, specify that any root and non-issuing intermediate CAs must be offline. A non-issuing CA is one that is not expected to provide certificates to client computers, network devices, and so on. This minimizes the risk of the CA private keys becoming compromised, which would in turn compromise all the certificates that were issued by the CA.
How Do Offline CAs issue certificates?
Offline root CAs can issue certificates to removable media devices (e.g. floppy disk, USB drive, CD/DVD) and then physically transported to the subordinate CAs that need the certificate in order to perform their tasks. If the subordinate CA is a non-issuing intermediate that is offline, then it will also be used to generate a certificate and that certificate will be placed on removable media. Each CA receives its authorization to issue certificates from the CA directly above it in the CA hierarchy. However, you can have multiple CAs at the same level of the CA hierarchy. Issuing CAs are typically online and used to issue certificates to client computers, network
devices, mobile devices, and so on. Do not join offline CAs to an Active Directory Domain Services domain Since offline CAs should not be connected to a network, it does not make sense to join them to an Active Directory Domain Services (AD DS) domain, even with the
Offline Domain Join [This link is external to TechNet Wiki. It will open in a new window.] option introduced with Windows 7 and Windows Server 2008 R2.
Furthermore, installing an offline CA on a server that is a member of a domain can cause problems with a secure channel when you bring the CA back online after a long offline period. This is because the computer account password changes every 30 days. You can get around this by problem and better protect your CA by making it a member of a workgroup, instead of a domain. Since Enterprise CAs need to be joined to an AD DS domain, do not attempt to install an offline CA as a Windows Server Enterprise C
A. https:://technet.microsoft.com/en-us/library/cc740209%28v=ws.10%29.aspx
Renewing a certification authority
A certification authority may need to be renewed for either of the following reasons: Change in the policy of certificates issued by the CA
Expiration of the CA’s issuing certificate


QUESTION 4
You have a Windows Server 2008 R2 Enterprise Root certification authority (CA).
You need to grant members of the Account Operators group the ability to only manage Basic EFS certificates.
You grant the Account Operators group the Issue and Manage Certificates permission on the CA.
Which three tasks should you perform next? (Each correct answer presents part of the solution.
Choose three.)

A. Enable the Restrict Enrollment Agents option on the CA.
B. Enable the Restrict Certificate Managers option on the CA.
C. Add the Basic EFS certificate template for the Account Operators group.
D. Grant the Account Operators group the Manage CA permission on the CA.
E. Remove all unnecessary certificate templates that are assigned to the Account Operators group.

Answer: B,C,E


QUESTION 5
Your company has an Active Directory domain.
You log on to the domain controller. The Active Directory Schema snap-in is not available in the Microsoft Management Console (MMC).
You need to access the Active Directory Schema snap-in.
What should you do?

A. Add the Active Directory Lightweight Directory Services (AD LDS) role to the domain controller by using Server Manager.
B. Log off and log on again by using an account that is a member of the Schema Administrators group.
C. Use the Ntdsutil.exe command to connect to the Schema Master operations master and open the schema for writing.
D. Register Schmmgmt.dll.

Answer: D

Explanation:
http://technet.microsoft.com/en-us/library/cc732110.aspx Install the Active Directory Schema Snap-In
You can use this procedure to first register the dynamic-link library (DLL) that is required for the Active Directory Schema snap-in. You can then add the snap-in to Microsoft Management Console (MMC).
To install the Active Directory Schema snap-in
1. To open an elevated command prompt, click Start, type command prompt and then right-click Command
Prompt when it appears in the Start menu. Next, click Run as administrator and then click OK.
To open an elevated command prompt in Windows Server 2012, click Start, type cmd, right click cmd and then click Run as administrator.
2. Type the following command, and then press ENTER:
regsvr32 schmmgmt.dll
3. Click Start, click Run, type mmc and then click OK.
4. On the File menu, click Add/Remove Snap-in.
5. Under Available snap-ins, click Active Directory Schema, click Add and then click OK.
6. To save this console, on the File menu, click Save.
7. In the Save As dialog box, do one of the following:
* To place the snap-in in the Administrative Tools folder, in File name, type a name for the snap-in, and then click Save.
* To save the snap-in to a location other than the Administrative Tools folder, in Save in
navigate to a location for the snap-in. In File name, type a name for the snap-in, and then
click Save


QUESTION 6
You have an Active Directory domain that runs Windows Server 2008 R2.
You need to implement a certification authority (CA) server that meets the following requirements:
Allows the certification authority to automatically issue certificates
Integrates with Active Directory Domain Services
What should you do?

A. Install and configure the Active Directory Certificate Services server role as a Standalone Root CA.
B. Install and configure the Active Directory Certificate Services server role as an Enterprise Root CA.
C. Purchase a certificate from a third-party certification authority, Install and configure the Active Directory
Certificate Services server role as a Standalone Subordinate CA.
D. Purchase a certificate from a third-party certification authority, Import the certificate into the computer store of the schema master.

Answer: B

Click here to view complete Q&A of 70-640 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-640 Training at certkingdom.com

 

Grow Your Skills with Microsoft MCITP 70-462 Exams

The world is quickly moving towards the cloud. We all have our data which we need to be accessible everywhere and on every device we use and when our data is present on the cloud, everything is available to us anytime we need it. As we as individuals hold our data so important, consider how much more the companies would be in need of instant access to their data. This is why the cloud computing has become an instant hit and there is no denying to the fact that cloud computing has solved data sharing problems and it has made all the work to be shifted in the top gear.

Developers for the Cloud – Certification Impacts Selection
The number of job openings in the cloud computing industry is growing so rapidly there aren’t enough professionals to fill in thecloud computing positions. There is a huge shortage of cloud developers at the moment and it wouldn’t be news to say that the students who aspire to be a developer and be a part of the IT industry can become developers of the cloud and can make their entry easily. But it should not be perceived that since there is a shortage for the developers, anyone can be entered here. Professionals to the core are more than welcome to join and begin their career. Students and professionals holding the MCITP 70-462 certificate have the highest chances of getting a job as a developer for the cloud in the biggest organizations.

Certificates can play a great role in securing a reputable job in a company. The certificates are guarantees about a person’s in-depth knowledge of the industry and it also proves that the person holding the certificate has experience of working like a pro. The experience which it reflects is not about the experience one gains by working professionally in some company. But this experience is about the person having exposure to the tools that would be used during the working. As the person has a professional grip on the tools to be used while working in a professional environment, teaching him a few tricks by a real professional developer would be easy and the student would be a fast learner.

MCITP 70-462 for the Professionals
If you are already employed in some firm whose processes are automated or are designed on the computers, then the MCITP 70- professional 460 is the key to your path to become a manger. Managers are the people in charge to handle projects. It is their duty to oversee the project from start until completion. In many cases the mangers are a part of the planning team and a manager can only be considered a part of the planning team when he has the skills to make effective plans. When a person is not appointed as a project manager, he can be considered to be promoted when there is an open vacancy. If he deposits a copy of his certificate awarded by Microsoft, there is no way he would be declined in case of an open vacancy.

The MCITP 70-462 has already helped many young people and experienced ones too to become managers and now it is your turn. The moment you have decided that you are eligible to handle authoritative position within a company, start preparing for your project management exam with the preparation material you download from Certkingdom.com in the form of a PDF file or a software. In either case you only get the latest and authentic preparation material which would help you achieve success in the first attempt that too with the highest marks awarded by the vendor.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

The Big Question Rises How To Become Microsoft, Cisco, ComTIA Certified

The big question rises how to become the Microsoft certified , All Microsoft certifications are acquired by simply taking a series of exams. If you can self-study for said exams, and then pass them, then you can acquire the certification for the mere cost of the exam (and maybe whatever self-study materials you purchase).

You’ll also need, at minimum (in addition to the MCTS), the CompTIA A+, Network+ and Security+ certs; as well as the Cisco CCNA cert.

Microsoft Certified Technology Specialist (MCTS) – This is the basic entry point of Microsoft Certifications. You only need to pass a single certification test to be considered an MCTS and there are numerous different courses and certifications that would grant you this after passing one. If you are shooting for some of the higher certifications that will be discussed below, then you’ll get this on your way there.

Microsoft Certified Professional Developer (MCPD) – This certification was Microsoft’s previous “Developer Certification” meaning that this was the highest certification that was offered that consisted strictly of development-related material. Receiving it involved passing four exams within specific areas (based on the focus of your certification). You can find the complete list of courses and paths required for the MCPD here.

Microsoft Certified Solutions Developer (MCSD) – This is Microsoft’s most recent “Developer Certification” which will replace the MCPD Certification (which is being deprecated / retired in July of 2013). The MCSD focuses within three major areas of very recent Microsoft development technologies and would likely be the best to persue if you wanted to focus on current and emerging skills that will be relevant in the coming years. You can find the complete list of courses and paths required for the MCSD here.

The Microsoft Certifications that you listed are basically all of the major ones within the realm of development. I’ll cover each of the major ones and what they are :

Most people, however, take some kind of course. Some colleges — especially career and some community colleges — offer such courses (though usually they’re non-credit). Other providers of such courses are private… some of them Microsoft Certified vendors of one type or another, who offer the courses in such settings as sitting around a conference table in their offices. Still others specialize in Microsoft certification training, and so have nice classrooms set up in their offices.

There are also some online (and other forms of distance learning) courses to help prepare for the exams.

The cost of taking classes to prepare can vary wildly. Some are actually free (or very nearly so), while others can cost hundreds of dollars. It all just depends on the provider.

And here’s a Google search of MCTS training resources (which can be mind-numbing in their sheer numbers and types, so be careful what you choose):

There are some pretty good, yet relatively inexpensive, ways to get vendor certificate training. Be careful not to sign-up for something expensive and involved when something cheaper — like subscribing to an “all the certificates you care to study for one flat rate” web site — would, in addition to purchasing a study guide or two at a bookstore, likely be better.

If you want a career in IT, then you need to have both an accredited degree in same (preferably a bachelors over an associates), and also a variety of IT certifications. The MCTS is but one that you will need.

You should probably also get the Microsoft MCSE and/or MCSA. The ICS CISSP. And the ITIL.

There are others, but if you have those, you’ll be evidencing a broad range of IT expertise that will be useful, generally. Then, in addition, if the particular IT job in which you end-up requires additional specialist certification, then you can get that, too (hopefully at the expense of your employer who requires it of you).

Then, whenever (if ever) you’re interested in a masters in IT, here’s something really cool of which you should be aware…

There’s a big (and fully-accredited, fully-legitimate) university in Australia which has partnered with Microsoft and several other vendors to structure distance learning degrees which include various certifications; and in which degrees, considerable amounts of credit may be earned simply by acquiring said certifications. It’s WAY cool.

One can, for example, get up to half of the credit toward a Masters degree in information technology by simply getting an MCSE (though the exams which make it up must be certain ones which correspond with the university’s courses). I’ve always said that if one were going to get an MCSE, first consult the web site of this university and make sure that one takes the specific MCSE exams that this school requires so that if ever one later decided to enter said school’s masters program, one will have already earned up to half its degree’s credits by simply having the MCSE under his/her belt. Is that cool, or what?

I wouldn’t rely on them over experience (which is far and away the most valuable asset out there) but they are worth pursuing especially if you don’t feel like you have enough experience and need to demonstrate that you have the necessary skills to land a position as a developer.

If you are going to pursue a certification, I would recommend going after the MCSD (Web Applications Track) as it is a very recent certification that focuses on several emerging technologies that will still be very relevant (if not more-so) in the coming years. You’ll pick up the MCTS along the way and then you’ll have both of those under your belt. MCPD would be very difficult to achieve based on the short time constraints (passing four quite difficult tests within just a few months is feasible, but I don’t believe that it is worth it since it will be “retired” soon after).

No job experience at all is necessary for any of the Microsoft Certifications, you can take them at any time as long as you feel confident enough with the materials of the specific exam you should be fine. The tests are quite difficult by most standards and typically cover large amounts of material, but with what it sounds like a good bit of time to study and prepare you should be fine.

Certifications, in addition to degrees, are so important in the IT field, now, that one may almost no longer get a job in that field without both. The certifications, though, are so important that one who has a little IT experience can get a pretty good job even without a degree as long as he has all the right certs. But don’t do that. Definitely get the degree… and not merely an associates. Get the bachelors in IT; and make sure it’s from a “regionally” accredited school.

Then get the certs I mentioned (being mindful, if you think you’ll ever get an IT masters, to take the specific exams that that Strut masters program requires so that you’ll have already earned up to half the credit just from the certs).

If you already have two years of experience in working in the .NET environment, a certification isn’t going to guarantee that you will get employed, a salary increase or any other bonuses for achieving the honor. However, it can help supplement your resume by indicating that you are familiar with specific technologies enough to apply them in real-world applications to solve problems.

If your ready for career change and looking for Microsoft MCTS Training, Microsoft MCITP Training or any other Microsoft Certification preparation get the best online training from Certkingdom.com they offer all Microsoft, Cisco, Comptia certification exams training in just one Unlimited Life Time Access Pack, included self study training kits including, Q&A, Study Guides, Testing Engines, Videos, Audio, Preparation Labs for over 2000+ exams, save your money on boot camps, training institutes, It’s also save your traveling and time. All training materials are “Guaranteed” to pass your exams and get you certified on the fist attempt, due to best training they become no1 site 2012.

MCTS Training, MCITP Trainnig

Best Microsoft MTA Certification, Microsoft MCTS Training at certkingdom.com

Best Top-Paying and most in demand for Certifications 2014 – 2015

Best Top-Paying and most in demand for Certifications 2014 – 2015

Introduction
It’s always a good idea to take stock of your skills, your pay, and your certifications. To that end, following is a review of 15 of the top-paying certifications for 2014. With each certification, you’ll find the average (mean) salary and a brief description.

Based on the 2014 IT Skills and Salary Survey conducted by Global Knowledge and Penton and completed in October 2013, the rankings below are derived from certifications that received the minimum number of responses to be statistically relevant. Certain certifications pay more but are not represented due to their exclusive nature. Examples include Cisco Certified Internetworking Expert (CCIE) and VMware Certified Design Expert (VCDX). This was a nationwide survey, and variations exist based on where you work, years of experience, and company type (government, non profit, etc.).

1. Certified in Risk and Information Systems Control (CRISC) – $118,253
The non-profit group ISACA offers CRISC certification, much in the way that CompTIA manages the A+ and Network+ certifications. Formerly, “ISACA” stood for Information Systems Audit and Control Association, but now they’ve gone acronym only.

The CRISC certification is designed for IT professionals, project managers, and others whose job it is to identify and manage risks through appropriate Information Systems (IS) controls, covering the entire lifecycle, from design to implementation to ongoing maintenance. It measures two primary areas: risk and IS controls. Similar to the IS control lifecycle, the risk area spans the gamut from identification and assessment of the scope and likelihood of a particular risk to monitoring for it and responding to it if/when it occurs.

Since CRISC’s introduction in 2010, more than 17,000 people worldwide have earned this credential, The demand for people with these skills and the relatively small supply of those who have them result in this being the highest salary for any certification on our list this year.

To obtain CRISC certification, you must have at least three years of experience in at least three of the five areas that the certification covers, and you must pass the exam, which is only offered twice a year. This is not a case where you can just take a class and get certified. Achieving CRISC certification requires effort and years of planning.

2. Certified Information Security Manager (CISM) – $114,844

ISACA also created CISM certification. It’s aimed at management more than the IT professional and focuses on security strategy and assessing the systems and policies in place more than it focuses on the person who actually implements those policies using a particular vendor’s platform.

More than 23,000 people have been certified since its introduction in 2002, making it a highly sought after area with a relatively small supply of certified individuals. In addition, the exam is only offered three times a year in one of approximately 240 locations, making taking the exam more of a challenge than many other certification exams. It also requires at least five years of experience in IS, with at least three of those as a security manager. As with CRISC, requirements for CISM certification demand effort and years of planning.

3. Certified Information Systems Auditor (CISA) – $112,040
The third highest-paying certification is also from ISACA; this one is for IS auditors. CISA certification is ISACA’s oldest, dating back to 1978, with more than 106,000 people certified since its inception. CISA certification requires at least five years of experience in IS auditing, control, or security in addition to passing an exam that is only offered three times per year.

The CISA certification is usually obtained by those whose job responsibilities include auditing, monitoring, controlling, and/or assessing IT and/or business systems. It is designed to test the candidate’s ability to manage vulnerabilities, ensure compliance with standards, and propose controls, processes, and updates to a company’s policies to ensure compliance with accepted IT and business standards.

4. Six Sigma Green Belt – $109,165
Six Sigma is a process of analyzing defects (anything outside a customer’s specifications) in a production (manufacturing) process, with a goal of no more than 3.4 defects per million “opportunities” or chances for a defect to occur. The basic idea is to measure defects, analyze why they occurred, and then fix the issue and repeat. There is a process for improving existing processes and a slightly modified version for new processes or major changes. Motorola pioneered the concept in the mid-1980s, and many companies have since followed their examples to improve quality.

This certification is different from the others in this list, as it is not IT specific. Instead, it is primarily focused on manufacturing and producing better quality products.

There is no organization that owns Six Sigma certification per se, so the specific skills and number of levels of mastery vary depending on which organization or certifying company is used. Still, the entry level is typically Green Belt and the progression is to Black Belt and Master Black Belt. Champions are responsible for Six Sigma projects across the entire organization and report to senior management.

5. Project Management Professional (PMP) – $108,525
The PMP certification was created and is administered by the Project Management Institute (PMI®), and it is the most recognized project management certification available. There are more than half a million active PMPs in 193 countries worldwide.

The PMP certification exam tests five areas relating to the lifecycle of a project: initiating, planning, executing, monitoring and controlling, and closing. PMP certification is for running any kind of project, and it is not specialized into sub types, such as manufacturing, construction, or IT.

To become certified, individuals must have 35 hours of PMP-related training along with 7,500 hours of project management experience (if they have less than a bachelor’s degree) or 4,500 hours of project management experience with a bachelor’s or higher. PMP certification is another that requires years of planning and effort.

6. Certified Scrum Master – $107,396
Another project management-related certification, Certified Scrum Master is focused on software (application) development.

Scrum is a rugby term; it’s a means for restarting a game after a minor rules violation or after the ball is no longer in play (for example, when it goes out of bounds). In software development, Scrum is a project management process that is designed to act in a similar manner for software (application development) projects in which a customer often changes his or her mind during the development process.

In traditional project management, the request to change something impacts the entire project and must be renegotiated-a time-consuming and potentially expensive way to get the changes incorporated. There is also a single project manager.

In Scrum, however, there is not a single project manager. Instead, the team works together to reach the stated goal. The team should be co-located so members may interact frequently, and it should include representatives from all necessary disciplines (developers, product owners, experts in various areas required by the application, etc.).

Where PMP tries to identify everything up front and plan for a way to get the project completed, Scrum takes the approach that the requirements will change during the project lifecycle and that unexpected issues will arise. Rather than holding up the process, Scrum takes the approach that the problem the application is trying to solve will never be completely defined and understood, so team members must do the best they can with the time and budget available and by quickly adapting to change.

So where does the Scrum Master fit in? Also known as a servant-leader, the Scrum Master has two main duties: to protect the team from outside influences that would impede the project (the servant) and to chair the meetings and encourage the team to continually improve (the leader).

Certified Scrum Master certification was created and is managed by the Scrum Alliance and requires the individual to attend a class taught by a certified Scrum trainer and to pass the associated exam.

7. Citrix Certified Enterprise Engineer (CCEE) – $104,240
The CCEE certification is a legacy certification from Citrix that proves expertise in XenApp 6, XenDesktop 5, and XenServer 6 via the Citrix Certified Administrator (CCS) exams for each, the Citrix Certified Advanced Administrator (CCAA) for XenApp 6, and an engineering (advanced implementation-type) exam around implementing, securing, managing, monitoring, and troubleshooting a complete virtualization solution using Citrix products.

Those certified in this area are encouraged to upgrade their certification to the App and Desktop track instead, which focuses on just XenDesktop, taking one exam to become a Citrix Certified Professional – Apps and Desktops (CCP-AD). At this point though, the CCEE is available as long as the exams are available for the older versions of the products listed.

8. Citrix Certified Administrator (CCA) for Citrix NetScaler – $103,904
The CCA for NetScaler certification has been discontinued for NetScaler 9, and those with a current certification are encouraged to upgrade to the new Citrix Certified Professional – Networking (CCP-N). In any case, those with this certification have the ability to implement, manage, and optimize NetScaler networking performance and optimization, including the ability to support app and desktop solutions. As the Citrix certification program is being overhauled, refer to https:://training.citrix.com/cms/index.php/certification/ to view the certifications available, upgrade paths, etc.

9. Certified Ethical Hacker (CEH) – $103,822
The International Council of E-Commerce Consultants (EC-Council) created and manages CEH certification. It is designed to test the candidate’s abilities to prod for holes, weaknesses, and vulnerabilities in a company’s network defenses using techniques and methods that hackers employ. The difference between a hacker and a CEH is that a hacker wants to cause damage, steal information, etc., while the CEH wants to fix the deficiencies found. Given the many attacks, the great volume of personal data at risk, and the legal liabilities possible, the need for CEHs is quite high, hence the salaries offered.

10. ITIL v3 Foundation – $97,682
IT Infrastructure Library (ITIL®) was created by England’s government in the 1980s to standardize IT management. It is a set of best practices for aligning the services IT provides with the needs of the organization. It is broad based, covering everything from availability and capacity management to change and incident management, in addition to application and IT operations management.

It is known as a library because it is composed of a set of books. Over the last 30 years, it has become the most widely used framework for IT management in the world. ITIL standards are owned by AXELOS, a joint venture company created by the Cabinet Office on behalf of Her Majesty’s Government in the United Kingdom and Capita plc, but they have authorized partners who provide education, training, and certification. The governing body defined the certification tiers, but they leave it to the accredited partners to develop the training and certification around that framework.

The Foundation certification is the entry-level one and provides a broad-based understanding of the IT lifecycle and the concepts and terminology surrounding it. Anyone wishing for higher-level certifications must have this level first, thus people may have higher certifications and still list this certification in the survey, which may skew the salary somewhat.

For information on ITIL in general, please refer to https:://www.itil-officialsite.com/. Exams for certification are run by ITIL-certified examination institutes as previously mentioned; for a list of them, please refer to https:://www.itil-officialsite.com/ExaminationInstitutes/ExamInstitutes.aspx.

11. Citrix Certified Administrator (CCA) for Citrix XenServer – $97,578
The CCA for XenServer certification is available for version 6 and is listed as a legacy certification, but Citrix has yet to announce an upgrade path to their new certification structure. Those with a CCA for Citrix XenServer have the ability to install, configure, administer, maintain, and troubleshoot a XenServer deployment, including Provisioning Services. As the Citrix certification program is being overhauled, refer to https:://training.citrix.com/cms/index.php/certification/ to view the certifications available, upgrade paths, etc.

12. ITIL Expert Certification – $96,194
The ITIL Expert certification builds on ITIL Foundation certification (see number 10 above). It is interesting that ITIL Expert pays less on average than ITIL Foundation certification. Again, I suspect the salary results may be somewhat skewed depending on the certifications actually held and the fact that everyone who is ITIL certified must be at least ITIL Foundation certified.

To become an ITIL Expert, you must pass the ITIL Foundation exam as well as the capstone exam, Managing Across the Lifecycle. Along the way, you will earn intermediate certifications of your choosing in any combination of the Lifecycle and Capability tracks. You must earn at least 22 credits, of which Foundation accounts for two and the Managing Across the Lifecycle exam counts for five. The other exams count for three each (in the Intermediate Lifecycle track) or four each (in the Intermediate Capability track) and can be earned in any order and combination, though the official guide suggests six recommended options. The guide is available at https:://www.itil-officialsite.com/Qualifications/ITILQualificationScheme.aspx by clicking on the English – ITIL Qualification Scheme Brochure link.

13. Cisco Certified Design Associate (CCDA) – $95,602
Cisco’s certification levels are Entry, Associate, Professional, Expert, and Architect. Those who obtain this Associate-level certification are typically network design engineers, technicians, or support technicians. They are expected to design basic campus-type networks and be familiar with routing and switching, security, voice and video, wireless connectivity, and IP (both v4 and v6). They often work as part of a team with those who have higher-level Cisco certifications.

To achieve CCDA certification, you must have earned one of the following: Cisco Certified Entry Networking Technician (CCENT), the lowest-level certification and the foundation for a career in networking); Cisco Certified Network Associate Routing and Switching (CCNA R&S); or any Cisco Certified Internetwork Expert (CCIE), the highest level of certification at Cisco.
You must also pass a single exam.

14. Microsoft Certified Systems Engineer (MCSE) – $95,276
This certification ranked number 14 with an average salary of $95,505 for those who didn’t list an associated Windows version and $94,922 for those who listed MCSE on Windows 2003, for the weighted average of $95,276 listed above.

The Microsoft Certified Systems Engineer is an old certification and is no longer attainable. It has been replaced by the Microsoft Certified Solutions Expert (yes, also MCSE). The Engineer certification was valid for Windows NT 3.51 – 2003, and the new Expert certification is for Windows 2012. There is an upgrade path if you are currently an MCSA or MCITP on Windows 2008. There is no direct upgrade path from the old MCSE to the new MCSE.

15. Citrix Certified Administrator (CCA) for Citrix XenDesktop – $95,094
The CCA for XenDesktop certification is available for versions 4 (in Chinese and Japanese only) and 5 (in many languages including English). Those with a current certification are encouraged to upgrade to the new Citrix Certified Associate – Apps and Desktops (CCA-AD). In any case, those with this certification have the ability to install, administer, and troubleshoot a XenDesktop deployment, including Provisioning Services and the Desktop Delivery Controller as well as XenServer and XenApp. As the Citrix certification program is being overhauled, refer to https:://training.citrix.com/cms/index.php/certification/ to view the certifications available, upgrade paths, etc.

Rounding Out the Top 25

A few popular certifications just missed the Top 15 cut due to a low total number of responses or an average (mean) pay just outside the threshold. Due to their popularity, I have included them for informational purposes.

Certification Average Pay
CISSP: Certified Information Systems Security Professional $114,287

MCSE: Microsoft Certified Systems Engineer 2003 $94,922

RHCSA: Red Hat Certified System Administrator $94,802

VCP-DCV: VMware Certified Professional – Data Center Virtualization $94,515

JNCIA: Juniper Networks Certified Internet Associate $94,492

MCTS: Windows Server 2008 Applications Infrastructure Configuration $91,948

MCITP: Enterprise Administrator $91,280

CCNP: Cisco Certified Network Professional $90,833

WCNA: Wireshark Certified Network Analyst $88,716

CCNA R&S: Cisco Certified Network Associ te Routing and Switching $81,308


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCSE Training at certkingdom.com

Microsoft Certifications 2014 can you a JOB

With the new technologies coming in the market every other day, life has become advanced these days. In this modern era, you have to be on your toes all the time especially if your career in related to the field of IT: one has to stay updated with all the latest programs and their features in order to stay ahead of his peers. For instance, there was a time when Gramophone was the invention of the century but then it was replaced with mobile phones. Similarly, the invention of television and radio created quite a heap in the early 20th century but later on, the thunder was stolen by computers in the late 20th century.

In this day and age, computers and internet have become the center of attention. Consequently, IT has become the most popular field. IT experts are quite in demand these days; but with the emergence of new programs every other day, they have to keep up with the latest technology in order to stay ahead in the race. One way of staying ahead is the certification courses. These courses ensure that the candidate has attained all the latest knowledge and is ready to roll in the world of technology.

This article will discuss some of the most popular certification courses offered by Microsoft.

Microsoft Technology Associate

This is a certification course designed for the starters: people who want to start their line of business in the field of technology. Accordingly, it tests the fundamentals of IT and validates that the candidates have a basic understanding of the essentials. This course has been divided into three tracks and the candidates can choose any one of the tracks, depending on their preference. The tracks are: IT infrastructure, Database Design and Developer.

Microsoft MCSA- Windows Server 2008
This exam is designed for the IT personnel and it validates their skills in Server Networking management. IT professionals and System Administrators are suggested to take MCSA- Windows Server 2008 exam especially if they are looking forward to earning their MCSE certification.

Microsoft MCSA- Windows Server 2012
This certification exam is an advanced level exam which validates that the candidates have sufficient knowledge of Windows Server 2012 for its proper installation, configuration and working. MCSA- Windows Server 2012 certified can easily get the position of Network Administrator, Computer Systems Administrator or Computer Network Analyst.

Microsoft MCSE- Server Infrastructure
This certification course is designed for IT experts and it will get you the title of ‘Solutions Expert’. It tests individual’s skills in effectively and efficiently running a modern data center with some experience in virtualization storage and networking, identity management and systems management.

Microsoft MCSE- Desktop Infrastructure
This course validates that the individuals can manage desktops and devices, while maintaining their security and integrity, from anywhere around the globe. It also tests individuals’ expertise in application and desktop virtualization together with remote desktop services. With this certification in hand, you can easily qualify for a job of Data and Application Manager or Desktop and Device Support Manager.

Microsoft MCSE- Messaging
This certification is an expert level certification and it validates that the applicant has relevant skills in order to increase user productivity and flexibility. It also validates that the person has sufficient knowledge as to how to improve data security and reduce data loss. After passing this certification exam, candidates can easily qualify for the position of Network and Computer System Administrator.

Microsoft  MCSE- Communication
This certification validates candidates’ expertise in using Lync Server to create an effective communication path that can be accessed from all around the globe. This certification is also an expert level certification and you can easily qualify for the position of Network and Computer System Administrator with it.

Microsoft  MCSE- SharePoint

This Microsoft Certified Solutions Expert certification course verifies that the candidates have the necessary expertise to share, synchronize and organize the data across the organization. SharePoint 2013 is the updated version of Microsoft Office, and passing this certification can get you a job of Systems or Network Analyst.

Microsoft MCSD- SharePoint Application

This Microsoft Certified Solutions Developer certification course is another of expert level certification courses which validates individuals’ expertise in web programming. It also requires the individuals to design and develop applications with Microsoft SharePoint. With this certification, you can easily secure the position of Software Developer or Web Developer.

Microsoft Private Cloud

MCSE- Private Cloud certification course tests candidates’ expertise to manage Private Cloud computer technologies. It also verifies that the candidate can implement these technologies in a way to optimize service delivery. You can easily get the position of Server Administrator and Network Manager with this certification on your resume.

Microsoft System Center Configuration Manager
Microsoft System Center Certification focuses on the skills to manage computer and clients. The candidates should be able to configure, administer and deploy System Center 2012 in order to pass this exam. You can earn the title of Microsoft Certified Technology Specialist through this certification.

Microsoft Server Virtualization
This certification verifies that the candidate is familiar with Server Virtualization, both on Windows Server and System Center. This course expands individual’s expertise and skills in order for him to meet the rapidly modernizing technological business needs, and it can get him the title of Microsoft Specialist in no time.

Microsoft Office Certifications
Microsoft offers many certifications that verify candidates’ skills in handling and using Microsoft Office Applications. These certifications start from beginners level and go up to the master level. Microsoft Office Specialist is a beginner level certification whereas Microsoft Office Specialist Expert is an advanced level certification. Last but not the least; Microsoft Office Specialist Master is a master level certification.

Microsoft MCSA- Office 365
This course focuses on individual’s skills in handling Office 365 together with productivity tools and cloud-based collaboration. This certification can easily get you the position of Cloud Application Administrator or SaaS Administrator.

Microsoft Dynamics

This Microsoft Certified Technology Specialist certification confirms an individual’s expertise in Microsoft dynamics: a specific module can be chosen for this certification. However, this certification will be withdrawn from the market, at the end of this year, and replaced with the new ones.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

70-450: PRO: Designing, Optimizing and Maintaining a Database Administrative Solution Using Microsoft SQL Server 2008


QUESTION 1
You work as a database administrator at ABC.com. You are in the process of preparing the
deployment of a new database that will have 45 gigabytes storage space for the transaction log
file, and 280 gigabytes storage space for the database data file.
There are approximately six 120 GB disk drives available for the database in the storage array.
ABC.com contains a RAID controller that supports RAID levels 0, 1, 5 and 10. The disks are on
the RAID controller. You have received an instruction from the CIO to make sure that the
transaction log’s write performance runs at optimum. The CIO has also instructed you to make
sure that in the event of a drive failure, the database and transaction log files are protected.
To achieve this goal, you decide to configure a storage solution.
Which of the following actions should you take?

A. You should consider using a RAID 1 volume as well as a RAID 5 volume in your storage configuration.
B. You should consider using a RAID 1 volume as well as a RAID 10 volume in your storage configuration.
C. You should consider using a RAID 3 volume as well as a RAID 5 volume in your storage configuration.
D. You should consider using a RAID 1 volume as well as a RAID 3 volume in your storage configuration.

Answer: A

Explanation:


QUESTION 2
You work as a database administrator at ABC.com. ABC.com has a database server named ABCDB04
with a SQL Server 2008 instance that includes an extensive mission-critical database that is
constantly being used ABC-DB04 has a quad-core motherboard with four CPUs.
When it is reported that ABC-DB04 often encounters CPU pressure, you receive an instruction
from management to make sure that the accessible CPU cycles are not exhausted by online index rebuilds.
Which of the following actions should you take?

A. You should make use of the affinity I/O mask option.
B. You should make use of the optimize for ad hoc workloads option.
C. You should make use of the affinity mask option.
D. You should make use of the max degree of parallelism option.

Answer: D

Explanation:


QUESTION 3
You work as a database administrator at ABC.com. ABC.com has a database server named ABCDB01
with a SQL Server 2008 instance.
During routine monitoring on ABC-DB01, you discover that the amount of CXPACKET waits
experienced by the instance is low, while the amount of lazy writer waits is abundant.
You have been instructed to enhance the operation of the instance to ensure productivity.
Which of the following actions should you take?

A. You should consider setting up the Windows System Monitoring tool to better the performance.
B. You should consider setting up the Asynchronous database mirroring to better the performance.
C. You should consider using the SQLAGENT.OUT log to better the performance.
D. You should consider setting up the software non-uniform memory access (soft-NUMA) to better the performance.

Answer: D

Explanation:


QUESTION 4
You work as a database administrator at ABC.com. ABC.com has a database server named ABCDB01.
ABC-DB01 is configured with 4 quad-core processors, 80 gigabytes of RAM, and multiple
independent raid volumes.
You are in the process of using a transactional database on the instance. It is anticipated that the
transactional database will have a significant amount of INSERT, UPDATE, and DELETE
activities, which incorporates the creation of new tables.
You receive an instruction from management to minimize the contention in the storage allocation
structures so that database performance is optimized, and the disk bandwidth maximized.
Which of the following actions should you take?

A. You should consider enabling Server Auditing.
B. You should consider using multiple data files for the database.
C. You should consider using row-level compression.
D. You should consider using the checksum page verify option.

Answer: B

Explanation:


QUESTION 5
You work as a database administrator at ABC.com.
ABC.com has informed you that a new database, named ABCData, has to be installed on a SQL
Server 2008 instance. ABCData is made up of several schemas, of which one will host a
significant amount of read-only reference information. Information is regularly inserted and
updated on ABCData.
You have received instructions from the management to configure a physical database structure
that enhances the backup operation.
Which of the following actions should you take?

A. This can be accomplished by using multiple filegroups and a single log file to set up the database.
B. This can be accomplished by using caching on the multiple data files.
C. This can be accomplished by using multiple downstream servers to create the database.
D. This can be accomplished by using the Database Engine Tuning Advisor tool to create the database.

Answer: A

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-236 Microsoft Exchange Server 2012

Contents
Preface xvii
Foreword xxi
1 Introduction 1
1.1 A decade and counting of Exchange deployments 1
1.1.1 The way we were 2
1.1.2 The protocol wars 2
1.1.3 Ever increasing mobility 4
1.1.4 Third-party products and management 6
1.1.5 Some interesting projects 6
1.1.6 The not so good points 7
1.1.7 Exchange’s connection with the Active Directory 10
1.1.8 Reviewing predictions made in 1996 11
1.2 Microsoft’s themes for Exchange 2007 12
1.2.1 The happy prospect of a migration 18
1.3 Preparing for Exchange 2007 20
1.4 Installing Exchange 2007 22
1.4.1 Modifying and removing servers 27
1.4.2 Validating the installation 27
1.4.3 Third-party software 28
1.5 Server roles 28
1.5.1 Services 32
1.6 Licensing 36
1.6.1 Version numbers 40
1.6.2 32-bit Exchange 2007? 41
1.7 Support 42
1.8 Challenges for Exchange 2007 42
1.9 Into the future 45
vi Contents
2 Exchange, Windows, and the Active Directory 47
2.1 Active Directory and Exchange 47
2.1.1 Domain Designs 48
2.2 Active Directory replication 50
2.2.1 Replication basics 51
2.2.2 When Active Directory replication happens 53
2.2.3 Active Directory naming contexts 55
2.2.4 Transforming Domain controllers into
Global Catalogs 58
2.2.5 USNs and replication 60
2.2.6 Urgent replication 64
2.2.7 Intrasite and Intersite replication 65
2.2.8 High-watermark vector and up-to-date vector tables 68
2.2.9 Changes in Active Directory replication in Windows 2003 70
2.3 Exchange’s Active Directory Topology service 71
2.3.1 DSAccess (or ADAccess) 72
2.3.2 How many Global Catalog servers do I need? 75
2.3.3 Where are my Global Catalogs? 76
2.4 Recovering deleted Active Directory accounts 78
2.5 Exchange and the Active Directory schema 80
2.5.1 Updating the schema with an installation 80
2.5.2 Changing the schema 82
2.5.3 Active Directory custom attributes for Exchange 85
2.5.4 Updating the schema to allow Ambiguous
Name Resolution 86
2.5.5 Exchange-specific permissions 87
2.5.6 Exchange property sets 88
2.6 Longhorn and Exchange 2007 90
2.7 The very important LegacyExchangeDN attribute 91
2.8 Brain surgery for the Active Directory: ADSIEDIT 93
2.8.1 LDP and LDIFDE 96
2.8.2 Active Directory for Exchange 98
3 The Basics of Managing Exchange 2007 99
3.1 Exchange Management Console 100
3.1.1 The importance of filters 104
3.1.2 Managing mixed organizations 109
3.1.3 Running EMC remotely or on a workstation 112
3.1.4 No more AD Users and Computers 113
3.1.5 Changing columns 115
Contents vii
Contents
3.1.6 Visual effects 116
3.2 Why some options have disappeared from EMC 118
3.2.1 Coping with change 122
3.3 Changes in the Exchange delegation model 124
3.4 Customized Recipient Management 128
3.4.1 Adieu RUS 130
3.4.2 Recipient types 132
3.5 Moving users 133
3.5.1 Moving mailboxes 134
3.5.2 Logging mailbox moves 138
3.6 Using distribution groups 140
3.6.1 Forming groups 142
3.6.2 Group changes in Exchange 2007 145
3.6.3 Expanding distribution lists 147
3.6.4 How many objects can I have in a group? 148
3.6.5 Managing group membership 149
3.6.6 Protected groups (and users) 152
3.7 Using groups for permissions 154
3.7.1 Managing distribution groups from Outlook 154
3.8 Dynamic distribution groups 156
3.8.1 Changing filters and conditions for dynamic
distribution groups 157
3.8.2 A note on OPATH 159
3.8.3 A new UI for dynamic groups 160
3.8.4 Creating New dynamic groups 162
3.8.5 Using dynamic Distribution groups 167
3.9 Mailbox quotas 168
3.9.1 Setting mailbox quotas 170
3.10 Email address policies 173
3.10.1 Mailbox moves and email address policies 178
3.10.2 Queries that drive email address policies 178
3.11 Address lists 183
3.11.1 Upgrading Address Lists to Exchange 2007 format 187
3.12 User naming conventions 188
3.13 Server naming conventions 192
3.14 Moving from the basics 194
4 The Exchange Management Shell 195
4.1 EMS: Exchange’s management shell 197
4.1.1 Working with PowerShell commands 199
4.1.2 Exchange shell commands 204
viii Contents
4.1.3 Command editing 208
4.1.4 Getting at more information about something 210
4.1.5 Using common and user-defined variables 214
4.1.6 Identities 217
4.1.7 Working in a multi-domain forest 219
4.1.8 Profiles 221
4.1.9 PowerShell in batch 223
4.1.10 Execution policies 224
4.1.11 Sending email from the shell 226
4.2 Learning from EMC 229
4.3 Using EMS to work with mailboxes 232
4.3.1 Creating a new mailbox with a template 232
4.3.2 Setting and retrieving mailbox properties 234
4.3.3 Other ways of interacting with mailboxes 244
4.3.4 Get-Recipient 245
4.3.5 Moving mailboxes 245
4.3.6 Accessing another user’s mailbox 249
4.3.7 Different commands and different properties 251
4.3.8 Contacts 252
4.4 Working with distribution groups 253
4.4.1 Working with dynamic distribution groups 257
4.4.2 Advanced group properties 262
4.5 Delegation through the shell 265
4.6 Creating efficient filters 267
4.7 Bulk updates 270
4.7.1 Creating sets of mailboxes 273
4.8 Reporting mailbox data 275
4.8.1 Special properties 282
4.9 Using the shell for other management tasks 284
4.10 Command validation 287
4.11 Working with remote servers 290
4.12 Working with non-Exchange 2007 servers 291
4.13 Testing Exchange 2007 292
4.13.1 Client connections 294
4.13.2 Mail Flow 295
4.13.3 Miscellaneous test commands 297
4.14 PowerShell for Exchange administrators 297
5 The Store 301
5.1 Introducing the Store 301
5.2 Differences in the Exchange 2007 Store 306
Contents ix
Contents
5.2.1 Are 64 bits that important? 307
5.2.2 Trading memory for I/O 312
5.2.3 The decrease in storage costs 317
5.3 No more streaming database 318
5.4 Tables and items 320
5.5 Storage groups 323
5.5.1 Creating a new storage group and database 327
5.5.2 Working with storage groups and databases 329
5.6 Transaction logs 331
5.6.1 Circular logging 335
5.6.2 Creating new transaction logs 337
5.6.3 Reserved logs 338
5.6.4 Transactions, buffers, and commitment 339
5.6.5 Transaction log I/O 341
5.6.6 Protecting transaction logs 341
5.6.7 Transaction log checksum 342
5.6.8 Maximum database size 343
5.7 Database portability 345
5.7.1 Zero database pages 349
5.8 MAPI connections and logons 349
5.9 The Deleted Items cache 350
5.9.1 Cleaning the Deleted Items cache 356
5.9.2 Recovering items and mailboxes 357
5.10 Background maintenance 360
5.10.1 Background tasks 364
5.10.2 Tracking background maintenance 367
5.11 Fixing failed databases 368
5.12 Exchange 2007 content indexing 375
5.12.1 Using content indexing 380
5.13 Public folders 383
5.13.1 Public folders and Exchange 2007 384
5.13.2 Changes in public folders administration since
Exchange 2003 386
5.13.3 Calming replication storms 388
5.13.4 Managing public folders with Exchange 2007 392
5.13.5 Permissions on top-level folders 405
5.13.6 Referrals 405
5.13.7 Migrating public folder content 406
5.14 Removing database size limits 408
5.15 Backups 408
5.15.1 NTBackup 410
x Contents
5.15.2 Other commercial backup products 410
5.15.3 Creating a backup strategy 413
5.15.4 Backups and storage groups 415
5.15.5 Checkpoint file 421
5.15.6 The future of streaming backups 426
5.16 Moving from the Store 427
6 Exchange Transport and Routing 429
6.1 The evolution of routing 429
6.2 Change through experience 430
6.2.1 Hidden administrative and routing groups 433
6.3 Exchange 2007 transport architecture 435
6.3.1 The critical role of hub transport servers 438
6.3.2 Receive connectors 440
6.3.3 Send connectors 447
6.3.4 Linking Exchange 2003 and Exchange 2007 453
6.3.5 Multiple routes into Exchange 2003 458
6.3.6 Decommissioning Exchange 2003 routing groups 458
6.3.7 Handling Exchange 2003 link state updates
during migration 458
6.3.8 Foreign connectors 459
6.3.9 Authorization 460
6.3.10 Accepted domains 460
6.3.11 Transport storage 461
6.4 Routing ABC 464
6.4.1 Resolving multiple paths 467
6.4.2 Most specific connector 467
6.4.3 Connector cost 469
6.4.4 Closest proximity 469
6.4.5 The role of hub routing sites 470
6.4.6 Site link costs versus routing costs 471
6.4.7 Instructing mailbox servers 472
6.4.8 Bypassing some connections 472
6.4.9 Protocol logging 473
6.4.10 X.400 support 474
6.4.11 Bifurcation 475
6.4.12 Header firewalls 476
6.5 Transport configuration 476
6.5.1 Transport configuration file 481
6.5.2 Routing logs 483
6.6 Queues 485
Contents xi
Contents
6.6.1 The Queue Viewer 488
6.6.2 The Unreachable queue 491
6.6.3 Poison messages 493
6.7 Back Pressure 494
6.8 Delivery Status Notifications 496
6.8.1 Customizing DSNs 501
6.8.2 Postmaster addresses 504
6.9 Transport agents 505
6.10 Transport summary 506
6.11 Edge servers 506
6.11.1 Edge or hub? 508
6.11.2 Basic Edge 510
6.11.3 Edge Synchronization 511
6.11.4 Basic Edge security 518
6.11.5 Fighting spam and email viruses 518
6.11.6 Defense in depth 522
6.11.7 Microsoft’s approach to mail hygiene 523
6.11.8 Forefront for Exchange 528
6.11.9 Mail Hygiene Agents 533
6.11.10 Agent logs 535
6.11.11 Connection filtering 536
6.11.12 Sender filtering 538
6.11.13 Address Rewrite agent 539
6.11.14 Sender ID agent 541
6.11.15 Content filtering 547
6.11.16 Content Filter updates 550
6.11.17 Per-user SCL processing 553
6.11.18 Safelist Aggregation 554
6.11.19 Sender reputation 557
6.11.20 Recipient filtering 559
6.11.21 Blocking file attachments 560
6.11.22 Attachment filtering 562
6.11.23 Edge transport rules 563
6.11.24 Available Edge 565
6.12 Client-side spam suppression 567
6.12.1 Outlook’s Junk Mail Filter 568
6.12.2 Postmarks 573
6.12.3 Restricting OOF and other notifications 574
6.13 Routing onwards 580
xii Contents
7 Clients 581
7.1 Outlook 583
7.1.1 Outlook web services 585
7.1.2 Understanding Outlook’s relationship with Exchange 591
7.1.3 Deploying cached Exchange mode 596
7.1.4 Address caching 599
7.1.5 MAPI compression and buffers 600
7.1.6 Conflict resolution 602
7.1.7 Preventing MAPI clients from connecting 603
7.1.8 Outlook 2007 and Exchange 5.5 607
7.2 Offline and personal Stores 608
7.2.1 Personal folders 609
7.2.2 Mail delivery to personal folders 611
7.2.3 Configuring PSTs 615
7.2.4 PST archiving 617
7.3 Offline folder files 619
7.3.1 OST synchronization 621
7.3.2 When things go wrong with your OST 623
7.4 Out of Office changes 624
7.4.1 The big question: Is Outlook 2007 worth the upgrade? 625
7.5 The Offline Address Book (OAB) 626
7.5.1 Downloading the OAB 627
7.5.2 OAB files on the PC 628
7.5.3 The evolving OAB format 630
7.5.4 OAB and cached Exchange mode 632
7.5.5 OAB generation and distribution 634
7.5.6 Creating a customized OAB 640
7.5.7 Allocating OABs to users 642
7.6 Outlook Anywhere 645
7.7 Outlook Web Access 650
7.7.1 New features in Outlook Web Access 2007 652
7.7.2 Outlook Web Access Light 658
7.7.3 International versions 662
7.7.4 Accessing legacy data 664
7.7.5 Managing Outlook Web Access 666
7.7.6 Authentication 667
7.7.7 Segmentation 671
7.7.8 Notifications 675
7.7.9 Controlling attachments 677
7.7.10 Themes 680
7.7.11 Client settings 684
Contents xiii
Contents
7.8 Internet client access protocols 684
7.8.1 IMAP4 685
7.8.2 The Exchange 2007 IMAP server 689
7.9 Mobile clients 694
7.9.1 Selecting mobile devices 696
7.9.2 Server-based ActiveSync 698
7.10 Windows Mobile 6.0 and Exchange 2007 702
7.10.1 ActiveSync policies 706
7.10.2 Managing mobile devices through EMC 711
7.10.3 Moving mailboxes to Exchange 2007 and ActiveSync 713
7.10.4 Estimating network traffic for mobile devices 715
7.10.5 Analyzing ActiveSync logs 717
7.10.6 Wiping mobile devices 719
7.10.7 Debugging synchronization 721
7.11 Comparing Windows Mobile and BlackBerry 723
7.11.1 Processing the mail 725
7.11.2 Other messaging options for Windows Mobile 730
7.11.3 Power management 731
7.11.4 Input flexibility 732
7.12 Unified Communications 735
7.13 Unified Messaging 737
7.13.1 Client Access to voicemail 741
7.13.2 Dealing with voicemail 745
7.13.3 Voice synthesis 747
7.13.4 Pure voicemail 748
7.13.5 The magic of SIP 749
7.13.6 Speech Grammars 752
7.13.7 Phonetic names 754
7.13.8 Cross-forest UM 756
7.14 Special mailboxes 756
7.15 Clients and users 759
8 Managing Users 761
8.1 Room and equipment mailboxes 762
8.1.1 Managing properties of room and equipment mailboxes 765
8.1.2 Converting old mailboxes to rooms 770
8.2 Helping users to use email better 771
8.2.1 Eliminating bad habits 771
8.2.2 Disclaimers 779
8.2.3 Out-of-Office Notifications 781
8.2.4 The last few bad email habits 781
xiv Contents
8.3 Customizing display templates 782
8.4 Exchange 2007 and compliance 787
8.4.1 The growing need for compliance 789
8.4.2 Transport rules 792
8.4.3 Using a rule to add disclaimer text to outgoing messages 794
8.4.4 Capturing selected messages 795
8.4.5 Becoming more complicated 797
8.4.6 Creating an ethical firewall 800
8.4.7 Transport rule storage 803
8.4.8 Rules and the shell 804
8.4.9 Journal rules 808
8.5 Messaging Record Management 815
8.5.1 Managing default folders 818
8.5.2 Managing custom folders 824
8.5.3 Allocating managed folders with policies 826
8.5.4 Applying policies to users 827
8.5.5 The Managed Folder Assistant 829
8.5.6 Logging Managed Folder activity 831
8.5.7 Using Managed Folders 833
8.5.8 Harvesting information from managed folders 835
8.6 Message classifications 837
8.6.1 Adding intelligence to classification through rules 844
8.7 Copying user mailboxes 848
8.7.1 Auditing 853
8.8 Free and busy 853
8.8.1 Looking at free and busy data 855
8.8.2 Free and busy in Exchange 2007 861
8.8.3 Changes in Outlook 2007 863
8.8.4 Cross-forest free and busy 866
9 Hardware and Performance 867
9.1 Moving toward 64-bit Exchange 867
9.2 Buying servers for Exchange 2007 870
9.3 The storage question 876
9.4 RPC pop-ups 881
9.5 Clusters and Exchange 882
9.6 Continuous replication and Exchange 2007 888
9.6.1 Concepts 889
9.7 Deploying Local Continuous Replication (LCR) 892
9.7.1 How LCR works 897
9.7.2 LCR operations 900
Contents xv
Contents
9.7.3 LCR restrictions 903
9.7.4 LCR database transition 904
9.8 Deploying Cluster Continuous Replication (CCR) 906
9.8.1 Comparing CCR and traditional clusters 910
9.8.2 CCR in practice 912
9.8.3 CCR failovers 915
9.8.4 Lost Log Resilience 919
9.8.5 The transport dumpster 921
9.8.6 Standby Continuous Replication 924
9.9 Continuous Log Replication: Good or bad? 924
9.10 Virtual Exchange 925
10 More useful things to Know about Exchange 929
10.1 Automated analysis 929
10.1.1 SSCP 932
10.1.2 Microsoft’s Release to Web (RTW) strategy 933
10.2 The Exchange Toolbox 935
10.2.1 Updates 936
10.2.2 Database Recovery Management 937
10.2.3 Database Troubleshooter 942
10.2.4 Mail Flow Troubleshooter 943
10.3 Messaging tracking logs 945
10.3.1 Generating message tracking logs 947
10.3.2 Log sizes and ages 950
10.3.3 Keeping track of message subjects 951
10.3.4 Accessing message tracking logs 951
10.3.5 Using the Troubleshooting Assistant to track messages 952
10.3.6 Tracking messages with EMS 956
10.3.7 Message delivery latency 959
10.4 Management frameworks 959
10.5 Utilities 963
10.5.1 Performance testing 963
10.5.2 The MFCMAPI utility 965
10.5.3 MDBVU32 968
10.5.4 ExMon—Exchange User Monitor 968
10.5.5 PFDavAdmin 971
10.5.6 LogParser 973
10.5.7 Outlook Spy 978
10.6 Bits and pieces 978
10.6.1 Where the Exchange team hangs out 978
10.6.2 Online Forums 979
xvi Contents
10.7 Conferences 979
10.7.1 Magazines 980
10.7.2 How Exchange uses registry keys 980
10.8 Good reference books 981
A Appendix 983
A.1 Message Tracking Log Format 983
A.2 Events noted in Message Tracking Logs 985
B Important Exchange PowerShell commands 987
B.1 Recipient management commands 987
B.2 Exchange server administrative Commands 990
B.3 Databases and Storage Groups 993
B.4 Address Lists and Email Policies 995
B.5 Queues and Messages 995
B.6 Edge Synchronization 996
B.7 Routing 997
B.8 ActiveSync 998
B.9 Public folders 999
B.10 Transport and journal rules 1000
B.11 IMAP and POP 1001
B.12 Active Directory commands 1002
B.13 Testing Exchange 2007 1003
B.14 Basic PowerShell 1004
B.15 PowerShell control commands 1005

Preface

By their very nature, every book that seeks to describe how technology works face challenges during its creation. Dealing with beta software and attempting to resolve the difference between how the software works and how the developers say it will work in the final version is a problem faced by any author, which is one reason why it is often best to wait to finalize text after you have a chance to work with released software. Looking back at this project, in some ways, this has been the hardest book of the seven that I have written about Exchange. I think that there are four reasons why this might be so. First, Exchange 2007 marks the boundary for substantial architectural change within the product, so it is similar to the degree of change that we experienced when we moved from Exchange 5.5 to Exchange 2000. Second, the nature of software is that it becomes more complex over time as the developers add new features and this is certainly true of Exchange 2007. The new features have to be considered, probed, and documented, all of which takes time. Third, the Exchange development team has done an excellent job since 2004 to document all aspects of Exchange in a more comprehensive manner than ever before.

The Exchange 2007 help file, TechNet, MSDN, and the excellent Exchange team blog at https:://msexchangeteam.com/ default.aspx are interesting and productive hoards of information for authors to mine. Unfortunately, there is often too much material (a good complaint to have) and the material needs to be interpreted and analyzed in the light of your own experience with Exchange. Engineers write great blogs, but the scourge of cognitive dissonance often means that they omit some detail that makes all the difference to a newcomer in understanding why a component works the way that it does. Last but not least, you should not underestimate the degree of cultural change that Microsoft has incorporated into Exchange 2007 in the transition from a predominantly GUI-centric approach to server management to the use of the PowerShell scripting language as the basis of many management operations. The need to understand and appreciate the change has to occur before you can adequately document and describe the benefits and this increases the effort required to write the book. I must admit that it took me time to realize the full benefit of interacting with Exchange through the shell, but now I am at the point where I wonder why Microsoft never provided such a powerful interface in the past! The degree of change that exists in Exchange 2007 means that it is diffi- cult to cover everything in one book. I have therefore elected to cover the parts of Exchange that I think are of most interest to the majority of administrators and have left other components for you to discover through the material that Microsoft publishes or perhaps another book, written by me or someone else. Please accept my apology if I have not covered something that you think is important and treat this as a challenge and opportunity for you to write about the topic yourself. There are many magazines, blogs, and other ways of spreading information about Exchange. From time to time, I wander back down the path to consider some aspect of Exchange 2003. While this book is firmly focused on Exchange 2007, the vast majority of companies that will deploy Exchange 2007 will do so by migrating from Exchange 2003 and will therefore run both products alongside each other for some period. For large organizations, the period might extend to a year or more as it is unlikely that few will complete their migration to a pure Exchange 2007 environment quickly. With this in mind, it is fair and reasonable to document how things work with Exchange 2003, especially when these servers operate with Exchange 2007. So what is in the book? To set the context, Chapter 1 starts with an overview of the development of Exchange from 4.0 to 2007 and then describes the themes that Microsoft employed to focus the development priorities for Exchange 2007 and some of the changes that occur in this release. All successful deployments of Exchange since Exchange 2000 operate on a solid Active Directory foundation, so Chapter 2 reviews some of the critical intersection points between Exchange and the Active Directory including replication, the schema, and Global Catalogs. Chapter 3 goes into the basics of managing Exchange 2007 through the Exchange Management Console. Chapter 4 takes the management topic further by exploring the ins and outs of the new Exchange Management Shell, perhaps the most fundamental change to the product that Microsoft has made in Exchange 2007. Chapter 5 goes to the heart of Exchange and reviews how the Store works including topics such as databases, storage groups, and transaction logs to content indexing and backups. Chapter 6 looks at how the new transport system routes messages and includes topics such as the Edge server and anti-spam protection. Chapter 7 explains how clients from Outlook to Outlook Web Access to mobile devices allow users to work with their mailboxes. Chapter 8 then moves on to consider some elements of user management, including the important topic of compliance and records management. Chapter 9 addresses one of the more


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

70-483 Q&A / Study Guide / Videos / Testing Engine


QUESTION 1
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of
the Queue <T> collection type.
Which of the following is TRUE with regards to the Queue <T>collection type?

A. It represents a first in, first out (FIFO) collection of objects.
B. It represents a last in, first out (LIFO) collection of objects.
C. It represents a collection of key/value pairs that are sorted by key based on the associated
IComparer<T> implementation.
D. It represents a list of objects that can be accessed by index.

Answer: A

Explanation:


QUESTION 2
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You have written the following code segment:
int[] filteredEmployeeIds = employeeIds.Distinct().Where(value => value !=
employeeIdToRemove).OrderByDescending(x => x).ToArray();
Which of the following describes reasons for writing this code? (Choose two.)

A. To sort the array in order from the highest value to the lowest value.
B. To sort the array in order from the lowest value to the highest value.
C. To remove duplicate integers from the employeeIds array.
D. To remove all integers from the employeeIds array.

Answer: A,C

Explanation:


QUESTION 3
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of a
method that moves the SqlDataReader on to the subsequent record.
Which of the following is the SqlDataReader method that allows for this?

A. The Read method.
B. The Next method.
C. The Result method.
D. The NextResult method.

Answer: A

Explanation:


QUESTION 4
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You have received instructions to create a custom collection for Certkingdom.com. Objects in the
collection must be processed via a foreach loop.
Which of the following is TRUE with regards to the required code?

A. The code should implement the ICollection interface.
B. The code should implement the IComparer interface.
C. The code should implement the IEnumerable interface.
D. The code should implement the IEnumerator interface.

Answer: C

Explanation:


QUESTION 5
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of LINQ queries.
Which of the following is NOT considered a distinct action of a LINQ query?

A. Creating the query.
B. Obtaining the data source.
C. Creating the data source.
D. Executing the query.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-417 Q&A / Study Guide / Testing Engine / Videos


QUESTION 1
You work as a Network Administrator at Certkingdom.com. The network contains a single Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
All servers in the network have Windows Remote Management (WinRM) enabled.
You use a Windows 7 Enterprise client computer named Certkingdom-Admin1.
You are currently logged in to Certkingdom-Admin1. From your client computer, you want to obtain the IP
address of a Windows Server 2012 member server named Certkingdom-File1.
Which command or commands should you use?

A. Telnet Certkingdom-File1 ipconfig.
B. NSLookup > Server Certkingdom-File1 > ipconfig
C. WinRM –r:Certkingdom-File1 ipconfig
D. WinRS –r:Certkingdom-File1 ipconfig

Answer: D

Explanation:


QUESTION 2
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-Win12Admin runs Windows Server 2012. You use Certkingdom-Win12Admin to
administer the Windows Server 2012 servers in the domain.
A newly installed domain member server named Certkingdom-SRV06 runs a Server Core Installation of
Windows Server 2012.
You need to configure Certkingdom-SRV06 to enable you to use the Server Manager console on CertkingdomWin12Admin
to manage Certkingdom-Win12Admin.
How should you configure Certkingdom-SRV06?

A. You should install the Remote Server Administration Tools on Certkingdom-SRV06.
B. You should install the Server Manager console on Certkingdom-SRV06.
C. You should enable Windows Remote Management (WinRM) on Certkingdom-SRV06.
D. You should use the Enable-NetFirewallRule cmdlet to configure the firewall on Certkingdom-SRV06.

Answer: D

Explanation:


QUESTION 3
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-Win12Admin runs Windows Server 2012. You use Certkingdom-Win12Admin to
administer the Windows Server 2012 servers in the domain.
You want to use Server Manager on Certkingdom-Win12Admin to manage the Window Server 2008 R2
SP1 servers in the domain.
What should you do?

A. You should run the Configure-SMRemoting.exe –Enable cmdlet on the Windows Server 2008 R2 SP1 servers.
B. You should add the computer account for Certkingdom-Win12Admin to the RAS and IAS Servers group in Active Directory.
C. You should install the Microsoft .NET Framework 4.0 and Windows Management Framework 3.0 on the Windows Server 2008 R2 SP1 servers.
D. You should install the Remote Server Administration Tools on Certkingdom-Win12Admin.

Answer: C

Explanation:


QUESTION 4
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-File1 runs the File and Storage Services server role. Certkingdom-File1 hosts
shared folders on the D: drive. Users access the shared folders from their Windows 7 client
computers.
A user attempts to recover a previous version of a file in a shared folder on Certkingdom-File1 but
discovers that there is no previous versions option.
How can you ensure that users can recover files using the Previous Versions function?

A. By modifying the Share Properties of each shared folder.
B. By enabling Shadow Copies on the D: drive of Certkingdom-File1.
C. By adding a condition to the shared folders on Certkingdom-File1.
D. By modifying the settings of the Recycle Bin on Certkingdom-File1.

Answer: B

Explanation:


QUESTION 5
You work for a company named Certkingdom.com. Your role of Network Administrator includes the
management of the company’s physical and virtual infrastructure.
The network includes servers running Windows Server 2008 R2 Service Pack 1 (SP1) and
Windows Server 2012.
Virtual machines (VMs) are hosted on Windows Server 2012 servers running the Hyper-V role.
You install a new Windows Server 2012 Hyper-V host server named Certkingdom-HVHost12. CertkingdomHVHost12
has four Fiber Channel host bus adapters (HBAs) and connects to two Fiber Channel
SANs using two HBAs per SAN.
You plan to create VMs on Certkingdom-HVHost12 that will need to access one of the SANs.
How should you configure Certkingdom-HVHost12?

A. By creating a Virtual Switch in Hyper-V.
B. By installing an additional host bus adapter (HBA).
C. By creating a virtual Fiber Channel SAN in Hyper-V.
D. By creating a virtual iSCSI SAN in Hyper-V.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Geek of All Trades: The new certifications

There’s a whole “new” crop of reconfigured and reclassified Microsoft certification exams, but how much has the focus and the gravitas changed?
Greg Shields

The Microsoft Certified Solutions Expert (MCSE) is back, but does this mark a return to the good old days? Microsoft’s resurrection of the long-treasured MCSE could reignite certification’s glory days of long lines at testing centers and sold-out classrooms. The biggest question is: Do certifications still matter? And will today’s test objectives stand above the issues experienced by the last generation of MCSE-certified IT professionals?

Those questions will be fully answered in time. For now, though, we can peer deeply into the variety of new MCSEs with an eye toward the technologies Microsoft deems important. If you haven’t looked yet, you might be surprised at the focus of their attention.
I say “‘Cloud,’ you say ‘System Center’
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
The Microsoft certification overview Web site states the new generation of MCSEs has been reinvented “to maintain their market relevance as the industry shifts to the cloud.” The cloud is in fact a central theme in all of the current literature regarding the new certification program. The previous Microsoft IT professional certifications, the Microsoft Certified Technology Specialist (MCTS) and Microsoft Certified IT Professional (MCITP), are categorized under Microsoft Certifications. The new Microsoft Certified Solutions Associate (MCSA) and MCSE certs are referred to as Microsoft Cloud-built Certifications.

While that distinction might be important to Microsoft, I wonder how it will be percieved by the everyday IT professional. Many don’t yet see themselves as caretakers of a cloud-based datacenter, although many work within virtual environments that fit the definition—more or less.

Dig a bit deeper and you’ll find the term “cloud” has special meaning for Microsoft. Look through the objectives in any new-generation MCSE exam. You’ll likely surmise that for Microsoft, “Cloud-built” does in fact mean “System Center.”

Microsoft Exam 70-415 is an excellent example. This exam is the first of two (the other being 70-416) required to upgrade a new-generation MCSA to an MCSE: Desktop Infrastructure. While you can easily accomplish the majority of objectives atop Windows Server 2012 by itself, a remarkable few require System Center experience.

For example, the 70-415 objective, “Implement Zero Touch deployment,” is a task you can only accomplish with the help of System Center Configuration Manager. Another objective, titled “Implement an updates infrastructure,” requires actions in Configuration Manager and System Center Virtual Machine Manager (VMM). Objectives in 70-416 include references to App-V (“Manage application virtualization environments” and “Design and implement a resilient virtual application delivery infrastructure”), as well as Configuration Manager (“Deploy applications to the desktop” and “Plan and implement application updates”).

The days are gone when a prospective MCSE could learn everything he needed from Windows Server. Getting MCSE-certified these days requires myriad “other” skills that will require additional effort.
MCSA: The new MCSE

It’s worth mentioning that the MCSE prerequisite certification—the MCSA—doesn’t appear to have the same focus on System Center. While System Center experience doesn’t appear necessary for a prospective MCSA test-taker, a casual review of objectives reveals a more mature MCSA. This isn’t your father’s entry-level certification. The objective domains in this generation’s MCSA exams feel eerily similar to those in the last generation’s MCSE.

Obtaining the MCSA requires passing three exams: Installing and Configuring Windows Server 2012 (70-410), Administering Windows Server 2012 (70-411), and Configuring Advanced Windows Server 2012 Services (70-412). Passing these three now requires a broader range of topics that will greatly challenge the last generation’s “paper MCSEs.”

For example, answering the questions in the 70-411 exam (Administering Windows Server 2012) requires knowledge across a wide array of technologies with acronyms such as WDS, WSUS, DCS, DFS, FSRM, ERS, DNS, VPNs, NPS, NAP, SPNs, UGMC, RODCs, GPOs, CSEs and even a little DirectAccess to boot. As a test-taker, if these acronyms mean nothing, you’ve got a long road ahead. Obtaining today’s MCSA might indeed be just as challenging as obtaining the last generation’s MCSE.
MCSE ‘flavors’

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

The new MCSE has evolved beyond its original intent, so that realization is actually a good thing. An oft-noted problem of the last MCSE was its binary nature. You either had it, or you didn’t. As a consequence, the process of attainment became less important than the actual attaining. Jane may have taken a more challenging path to her certification, involving elective tests in obtuse and complex technologies. John chose Network Essentials and IIS. At the end of the day, though, both are MCSEs.

The new MCSE program attempts to change that perception by eliminating the previous generation’s electives. Replacing them is a variety of “flavors” of the MCSE. A candidate with server experience can obtain an MCSE: Server Infrastructure by taking one path. Another who focuses on desktops can take another path for the MCSE: Desktop Infrastructure. There are MCSE: SQL Server 2012 and MCSE: Private Cloud certifications also available.

One assumes that each of these new flavors better focuses the proven skills of the certification holder on the topics of interest to that person’s employer or potential employers.
‘A mile wide and an inch deep’

One of these flavors merits special attention due to its focus on essentially everything within the Microsoft wheelhouse—MCSE: Private Cloud. Among the range of new certifications, this one is a bit of an enigma. Its test objectives bring to mind a saying long ago associated with the objectives in the (ISC)2 CISSP exam: “They’re a mile wide and an inch deep.”

Like all flavors of the MCSE, obtaining the MCSE: Private Cloud first requires obtaining an MCSA. The difference here, however, is that that MCSA is in Windows Server 2008. The current MCSE: Private Cloud also notably tests against Windows Server 2008 R2 technologies and not Windows Server 2012. Then, you’ll need to complete two exams. One is 70-247 (Configuring and Deploying a Private Cloud with System Center 2012), and the other is 70-246 (Monitoring and Operating a Private Cloud with System Center 2012).

This MCSE is different in part because its focus is almost entirely on System Center technologies. It even tests against the core hypervisor that sits on Windows Server 2008 R2. To pass 70-247, you’ll need to know Hyper-V. You’ll also need experience in almost the entire System Center suite, including VMM, Data Protection Manager, App Controller, Service Manager, App-V and Operations Manager. Only Configuration Manager appears to be absent from the objectives.

Whereas the 70-247 exam focuses on laying down the building blocks for a private cloud, 70-246 tests on monitoring and operations. A review of its objectives reveals that it tests against the same System Center components in this exam as in the other one (with the exception of Orchestrator, which has been added to one objective domain). Only the tasks you’ll be accomplishing with those System Center components are different. As its name suggests, you won’t be building your private cloud here. You’ll be automating its operations.
Breadth of topics: a challenge for the classroom approach?

The Microsoft certification program has historically aligned its exams with Microsoft Official Academic Courses. That trend doesn’t change with this generation of MCSE. What may change, however, is the efficacy in learning the necessary content via the traditional classroom learning approach.

Bluntly put, there’s a ridiculous amount of content to cover, and the best classroom instructors tend to be those with personal experience in implementing the technologies they teach. That personal experience can be hard to find when the range of testable topics in any exam is so broad across Windows Server and the entire System Center portfolio.

That classroom learning experience might also be hindered by the sheer number of virtual machines (VMs) required to drive all these functions. That count of VMs is exacerbated by an insidious limitation of System Center. Each component must be installed to its own Windows Server instance. Powering them all might require a significant hardware investment for the learning centers that offer the courses. The System Center components are large in number and hungry in hardware requirements. You can’t help but wonder if alternative learning approaches such as prerecorded computer-based training might have an advantage here in best delivering the knowledge transfer.
Re-legitimizing the MCSE

Having said all this, this MCSE is indeed an impressive certification. The breadth of its content can be overwhelming for the typical IT professional just starting out in his career. That same breadth, however, is also this MCSE’s greatest strength. Many last-generation MCSE holders felt betrayed by the diminishing value of their certification effort as scores of minimally experienced individuals lined up with certification papers in hand.

Make no mistake, this MCSE appears to be quite a bit harder to obtain. While that difficulty might not reinvigorate a second explosion in Microsoft IT certification, it does stand to create a smaller and more reliable cadre of experienced and proven IT professionals. That’s the kind of certification legitimacy that ultimately benefits everyone.