Archive for the ‘MCSE’ Category

Exam 70-413 Designing and Implementing a Server Infrastructure

Published: April 7, 2014
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows Server 2012 and Windows Server 2012 R2
Credit toward certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of April 2014, this exam includes content covering Windows Server 2012 R2.

Plan and deploy a server infrastructure (20–25%)
Design and plan an automated server installation strategy
Design considerations including images and bare metal/virtual deployment; design a server implementation using Windows Assessment and Deployment Kit (ADK); design a virtual server deployment
Plan for deploying servers to Microsoft Azure infrastructure as a service (IaaS); plan for deploying servers to public and private cloud by using AppController and Windows PowerShell; plan for multicast deployment; plan for Windows Deployment Services (WDS)
Implement a server deployment infrastructure
Configure multi-site topology and transport servers; implement a multi-server topology, including stand-alone and Active Directory–integrated Windows Deployment Services (WDS) servers; deploy servers to Microsoft Azure IaaS; deploy servers to public and private cloud by using AppController and Windows PowerShell
Plan and implement server upgrade and migration
Plan for role migration; migrate server roles; migrate servers across domains and forests; design a server consolidation strategy; plan for capacity and resource optimization
Plan and deploy Virtual Machine Manager services
Design Virtual Machine Manager service templates; plan and deploy profiles, operating system profiles, hardware and capability profiles, application profiles, and SQL profiles; plan and manage services including scaling out, updating and servicing services; configure Virtual Machine Manager libraries; plan and deploy services to non-trusted domains and workgroups
Plan and implement file and storage services
Planning considerations include iSCSI SANs, Fibre Channel SANs, Virtual Fibre Channel, storage spaces, storage pools including tiered storage and data de-duplication; configure the Internet Storage Name server (iSNS); configure Services for Network File System (NFS); plan and implement SMB 3.0 based storage; plan for Windows Offloaded Data Transfer (ODX)

Preparation resources
Windows deployment with the Windows ADK
Windows Deployment Services overview
Install, use, and remove Windows Server migration tools

Design and implement network infrastructure services (20–25%)
Design and maintain a Dynamic Host Configuration Protocol (DHCP) solution
Design considerations including a highly available DHCP solution including split scope, DHCP failover, and DHCP failover clustering, DHCP interoperability, and DHCPv6; implement DHCP filtering; implement and configure a DHCP management pack; maintain a DHCP database
Design a name resolution solution strategy
Design considerations including Active Directory integrated zones, DNSSEC, DNS Socket Pool, cache locking, disjoint namespaces, DNS interoperability, migration to application partitions, IPv6, Single-Label DNS Name Resolution, zone hierarchy, and zone delegation
Design and manage an IP address management solution
Design considerations including IP address management technologies including IPAM, Group Policy based, manual provisioning, and distributed, centralized, hybrid placement, and database storage; configure role-based access control; configure IPAM auditing; migrate IPs; manage and monitor multiple DHCP and DNS servers; configure data collection for IPAM; integrate IPAM with Virtual Machine Manager (VMM)

Preparation resources
DHCP design guide
Reviewing DNS concepts
IP Address Management (IPAM) overview

Design and implement network access services (15–20%)
Design a VPN solution
Design considerations including certificate deployment, firewall configuration, client/site to site, bandwidth, protocol implications, connectivity to Microsoft Azure IaaS and VPN deployment configurations using Connection Manager Administration Kit (CMAK)
Design a DirectAccess solution
Design considerations including deployment topology, migration from Forefront UAG, One Time Password (OTP), and use of certificates issued by enterprise Certificate Authority (CA)
Design a Web Application Proxy solution
Design considerations including planning for applications, authentication and authorization, Workplace Join, devices, multifactor authentication, multifactor access control, single sign-on (SSO), certificates, planning access for internal and external clients
Implement a scalable remote access solution
Configure site-to-site VPN; configure packet filters; implement packet tracing; implement multi-site Remote Access; configure Remote Access clustered with Network Load Balancing (NLB); implement an advanced DirectAccess solution, configure multiple RADIUS server groups and infrastructure, configure Web Application Proxy for clustering
Design and implement network protection solution
Design considerations including Network Access Protection (NAP) enforcement methods for DHCP, IPSec, VPN, and 802.1x, capacity, placement of servers, firewall, Network Policy Server (NPS), and remediation network, configure NAP enforcement for IPsec and 802.1x, monitor for compliance

Preparation resources
Plan the Remote Access deployment
DirectAccess design, deployment, and troubleshooting guides
Microsoft Virtual Academy: Multi site and high availability DirectAccess

Design and implement an Active Directory infrastructure (logical) (20–25%)
Design a forest and domain infrastructure
Design considerations including multi-forest architecture, trusts, functional levels, domain upgrade, domain migration, forest restructure, Microsoft Azure Active Directory and DirSync
Implement a forest and domain infrastructure
Configure domain rename; configure Kerberos realm trusts; implement a domain upgrade; implement a domain migration; implement a forest restructure; deploy and manage a test forest including synchronization with production forests
Design a Group Policy strategy
Design considerations including inheritance blocking, enforced policies, loopback processing, security, and WMI filtering, site-linked Group Policy Objects (GPOs), slow-link processing, group strategies, organizational unit (OU) hierarchy, and Advanced Group Policy Management (AGPM), and Group Policy caching
Design an Active Directory permission model
Design considerations including Active Directory object security and Active Directory quotas; customize tasks to delegate in Delegate of Control Wizard; deploy administrative tools on the client devices; delegate permissions on administrative users (AdminSDHolder); plan for Kerberos delegation

Preparation resources
AD DS design guide
Domain Rename technical reference
Advanced Group Policy management

Design and implement an Active Directory infrastructure (physical) (20–25%)
Design an Active Directory sites topology
Design considerations including proximity of domain controllers, replication optimization, and site link; monitor and resolve Active Directory replication conflicts
Design a domain controller strategy
Design considerations including global catalog, operations master roles, Read-Only Domain Controllers (RODCs), partial attribute set, and domain controller cloning, and domain controller placement
Design and implement a branch office infrastructure
Design considerations including RODC, Universal Group Membership Caching (UGMC), global catalog, DNS, DHCP, and BranchCache; implement confidential attributes; delegate administration; modify filtered attributes set; configure password replication policy; configure hash publication

Preparation resources

Planning domain controller placement
RODC frequently asked questions
Branch office infrastructure solution


QUESTION 1
What method should you use to deploy servers?

A. WDS
B. AIK
C. ADK
D. EDT

Answer: A

Explanation: WDS is a server role that enables you to remotely deploy Windows operating systems. You can use it to set up new computers by using a network-based installation. This means that you do not have to install each operating system directly from a CD, USB drive, or DVD.
Reference: What’s New in Windows Deployment Services in Windows Server


QUESTION 2
You need to recommend a solution for DHCP logging. The solution must meet the technical requirement.
What should you include in the recommendation?

A. Event subscriptions
B. IP Address Management (IPAM)
C. DHCP audit logging
D. DHCP filtering

Answer: B

Explanation: * Scenario: A central log of the IP address leases and the users associated to those leases must be created.
* Feature description
IPAM in Windows Server 2012 is a new built-in framework for discovering, monitoring, auditing, and managing the IP address space used on a corporate network. IPAM provides for administration and monitoring of servers running Dynamic Host Configuration Protocol
(DHCP) and Domain Name Service (DNS). IPAM includes components for:
• Automatic IP address infrastructure discover)’: IPAM discovers domain controllers, DHCP servers, and DNS servers in the domains you choose. You can enable or disable management of these servers by IPAM.
• Custom IP address space display, reporting, and management: The display of IP addresses is highly customizable and detailed tracking and utilization data is available. IPv4 and IPv6 address space is organized into IP address blocks, IP address ranges, and individual IP addresses. IP addresses are assigned built-in or user-defined fields that can be used to further organize IP address space into hierarchical, logical groups.
• Audit of server configuration changes and tracking of IP address usage: Operational events are displayed for the IPAM server and managed DHCP servers. IPAM also enables IP address tracking using DHCP lease events and user logon events collected from Network Policy Server (NPS), domain controllers, and DHCP servers. Tracking is available by IP address, client ID, host name, or user name.
• Monitoring and management of DHCP and DNS services: IPAM enables automated service availability monitoring for Microsoft DHCP and DNS servers across the forest. DNS zone health is displayed, and detailed DHCP server and scope management is available using the IPAM console.
Reference: IP Address Management (IPAM) Overview


QUESTION 3
After the planned upgrade to Windows Server 2012, you restore a user account from the Active Directory Recycle Bin.
You need to replicate the restored user account as quickly as possible.
Which cmdlets should you run?

A. Get-ADReplicationSite and Set-ADReplicationConnection
B. Get-ADReplicationAttributeMetadata and Compare-Object
C. Get-ADReplicationUpToDatenessVectorTable and Set-ADReplicationSite
D. Get ADDomainController and Sync-ADObject

Answer: D

Explanation:
* Scenario:
All of the domain controllers are global catalog servers.
The FSMO roles were not moved since the domains were deployed.
* The Get-ADDomainController cmdlet gets the domain controllers specified by the parameters.
You can get domain controllers by setting the Identity, Filter or Discover parameters.
* The Sync-ADObject cmdlet replicates a single object between any two domain controllers that have partitions in common. The two domain controllers do not need to be direct replication partners. It can also be used to populate passwords in a read-only domain
controller (RODC) cache.
Reference: Get-ADDomainController, Sync-ADObject


QUESTION 4
You need to recommend a fault-tolerant solution for the VPN. The solution must meet the technical requirements.
What should you include in the recommendation?

A. Network adapter teaming
B. Network Load Balancing (NLB)
C. Failover Clustering
D. DirectAccess

Answer: B

Explanation:
* Scenario: Core networking services in each office must be redundant if a server fails.
* The Network Load Balancing (NLB) feature distributes traffic across several servers by using the TCP/IP networking protocol. By combining two or more computers that are running applications into a single virtual cluster, NLB provides reliability and performance for web servers and other mission-critical servers.
Reference: Network Load Balancing Overview
http://technet.microsoft.com/en-us/library/hh831698.aspx


QUESTION 5
You are planning the migration of research.contoso.com.
You need to identify which tools must be used to perform the migration.
Which tools should you identify?

A. Active Directory Migration Tool version 3.2 (ADMT v3.2) and Group Policy Management Console (GPMC)
B. Active Directory Federation Services (AD FS) and Microsoft Federation Gateway
C. Active Directory Migration Tool version 3.2 (ADMT v3.2) and Active Directory Federation Services (AD FS)
D. Active Directory Lightweight Directory Services (AD LDS) and Group Policy Management
Console (GPMC)

Answer: A

Explanation:
* Scenario:
All of the users and the Group Policy objects (GPOs) in research.contoso.com will be migrated to contoso.com.
two domain controllers for the research.contoso.com domain. The domain controllers run Windows Server 2008 R2.

 


 

 

Click here to view complete Q&A of 70-413 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-413 Training at certkingdom.com

Exam 70-412 Configuring Advanced Windows Server 2012 Services

Published: September 17, 2012
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows Server 2012 R2
Credit toward certification: MCP, MCSA, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of January 2014, this exam includes content covering Windows Server 2012 R2.

Configure and manage high availability (15–20%)
Configure Network Load Balancing (NLB)
Install NLB nodes, configure NLB prerequisites, configure affinity, configure port rules, configure cluster operation mode, upgrade an NLB cluster
Configure failover clustering
Configure quorum, configure cluster networking, restore single node or cluster configuration, configure cluster storage, implement Cluster-Aware Updating, upgrade a cluster, configure and optimize clustered shared volumes, configure clusters without network names, configure storage spaces
Manage failover clustering roles
Configure role-specific settings, including continuously available shares; configure virtual machine (VM) monitoring; configure failover and preference settings; configure guest clustering
Manage VM movement
Perform live migration; perform quick migration; perform storage migration; import, export, and copy VMs; configure VM network health protection; configure drain on shutdown

Preparation resources
Managing Network Load Balancing clusters
Setting Network Load Balancing parameters
Failover cluster deployment guide

Configure file and storage solutions (15–20%)
Configure advanced file services
Configure Network File System (NFS) data store, configure BranchCache, configure File Classification Infrastructure (FCI) using File Server Resource Manager (FSRM), configure file access auditing
Implement Dynamic Access Control (DAC)
Configure user and device claim types, implement policy changes and staging, perform access-denied remediation, configure file classification, create and configure Central Access rules and policies, create and configure resource properties and lists
Configure and optimize storage
Configure iSCSI target and initiator, configure Internet Storage Name server (iSNS), implement thin provisioning and trim, manage server free space using Features on Demand, configure tiered storage

Preparation resources
Network File System
File Server Resource Manager
Dynamic Access Control: Scenario overview

Implement business continuity and disaster recovery (15–20%)
Configure and manage backups
Configure Windows Server backups, configure Microsoft Azure backups, configure role-specific backups, manage VSS settings using VSSAdmin
Recover servers
Restore from backups, perform a Bare Metal Restore (BMR), recover servers using Windows Recovery Environment (Win RE) and safe mode, configure the Boot Configuration Data (BCD) store
Configure site-level fault tolerance
Configure Hyper-V Replica, including Hyper-V Replica Broker and VMs; configure multi-site clustering, including network settings, Quorum, and failover settings; configure Hyper-V Replica extended replication; configure Global Update Manager; recover a multi-site failover cluster

Preparation resources
Windows Server backup overview
Windows Recovery Environment (RE) explained
How to configure bare-metal restore/recovery media

Configure Network Services (15–20%)
Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution
Create and configure superscopes and multicast scopes; implement DHCPv6; configure high availability for DHCP, including DHCP failover and split scopes; configure DHCP Name Protection; configure DNS registration
Implement an advanced DNS solution
Configure security for DNS, including Domain Name System Security Extensions (DNSSEC), DNS Socket Pool, and cache locking; configure DNS logging; configure delegated administration; configure recursion; configure netmask ordering; configure a GlobalNames zone; analyze zone level statistics
Deploy and manage IP Address Management (IPAM)
Provision IPAM manually or by using Group Policy, configure server discovery, create and manage IP blocks and ranges, monitor utilization of IP address space, migrate to IPAM, delegate IPAM administration, manage IPAM collections, configure IPAM database storage

Preparation resources
Dynamic Host Configuration Protocol (DHCP) overview
Step-by-step: Demonstrate DNSSEC in a test lab
Holistic administration of IP address space using Windows Server 2012 IP Address Management

Configure the Active Directory infrastructure (15–20%)
Configure a forest or a domain
Implement multi-domain and multi-forest Active Directory environments, including interoperability with previous versions of Active Directory; upgrade existing domains and forests, including environment preparation and functional levels; configure multiple user principal name (UPN) suffixes
Configure trusts
Configure external, forest, shortcut, and realm trusts; configure trust authentication; configure SID filtering; configure name suffix routing
Configure sites
Configure sites and subnets, create and configure site links, manage site coverage, manage registration of SRV records, move domain controllers between sites
Manage Active Directory and SYSVOL replication
Configure replication to Read-Only Domain Controllers (RODCs), configure Password Replication Policy (PRP) for RODC, monitor and manage replication, upgrade SYSVOL replication to Distributed File System Replication (DFSR)

Preparation resources
Deploy Active Directory Domain Services (AD DS) in your enterprise
Active Directory domains and trusts
Introduction to Active Directory replication and topology management using Windows PowerShell (Level 100)

Configure Identity and Access Solutions (15–20%)
Implement Active Directory Federation Services (AD FS)
Install AD FS; implement claims-based authentication, including Relying Party Trusts; configure authentication policies; configure Workplace Join; configure multi-factor authentication
Install and configure Active Directory Certificate Services (AD CS)
Install an Enterprise Certificate Authority (CA), configure certificate revocation lists (CRL) distribution points, install and configure Online Responder, implement administrative role separation, configure CA backup and recovery
Manage certificates
Manage certificate templates; implement and manage certificate deployment, validation, and revocation; manage certificate renewal; manage certificate enrollment and renewal to computers and users using Group Policies; configure and manage key archival and recovery
Install and configure Active Directory Rights Management Services (AD RMS)
Install a licensing or certificate AD RMS server, manage AD RMS Service Connection Point (SCP), manage RMS templates, configure Exclusion Policies, back up and restore AD RMS

Preparation resources
AD FS deployment guide
Active Directory Certificate Services overview
Deploy a private CA with Windows Server 2012


QUESTION 1
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2.
Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. Cluster1 contains a cluster disk resource.
A developer creates an application named App1. App1 is NOT a cluster-aware application. App1 runs as a service. App1 stores date on the cluster disk resource.
You need to ensure that App1 runs in Cluster1. The solution must minimize development effort.
Which cmdlet should you run?

A. Add-ClusterGenericServiceRole
B. Add-ClusterGenericApplicationRole
C. Add-ClusterScaleOutFileServerRole
D. Add-ClusterServerRole

Answer: B
Explanation:
Add-ClusterGenericApplicationRole
Configure high availability for an application that was not originally designed to run in a failover cluster.
If you run an application as a Generic Application, the cluster software will start the application, then periodically query the operating system to see whether the application appears to be running. If so, it is presumed to be online, and will not be restarted or failed over.
EXAMPLE 1.
Command Prompt: C:\PS>
Add-ClusterGenericApplicationRole -CommandLine NewApplication.exe
Name OwnerNode State
—- ——— —–
cluster1GenApp node2 Online Description
———–
This command configures NewApplication.exe as a generic clustered application. A default name will be used for client access and this application requires no storage.
Reference: Add-ClusterGenericApplicationRole
http://technet.microsoft.com/en-us/library/ee460976.aspx


QUESTION 2
Your network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. All client computers run Windows 8.
You need to configure a custom Access Denied message that will be displayed to users when they are denied access to folders or files on Server1.
What should you configure?

A. A classification property
B. The File Server Resource Manager Options
C. A file management task
D. A file screen template

Answer: B
Explanation:
Access-denied assistance can be configured by using the File Server Resource Manager console on the file server.
Note: Access-denied assistance is a new feature in Windows Server 2012, which provides the following ways to troubleshoot issues that are related to access to files and folders:
* Self-assistance. If a user can determine the issue and remediate the problem so that they can get the requested access, the impact to the business is low, and no special exceptions are needed in the central access policy. Access-denied assistance provides an access-denied message that file server administrators can customize with information specific to their organizations. For example, an administrator could set the message so that users can request access from a data owner without involving the file server administrator.
Reference: Scenario: Access-Denied Assistance


QUESTION 2
Your network contains an Active Directory domain named contoso.com. The domain contains a member server named Server1 that has the Active Directory Federation Services server role installed. All servers run Windows Server 2012.
You complete the Active Directory Federation Services Configuration Wizard on Server1.
You need to ensure that client devices on the internal network can use Workplace Join.
Which two actions should you perform on Server1? (Each correct Answer presents part of the solution. Choose two.)

A. Run Enable-AdfsDeviceRegistration -PrepareActiveDirectory.
B. Edit the multi-factor authentication global authentication policy settings.
C. Run Enable-AdfsDeviceRegistration.
D. Run Set-AdfsProxyProperties HttpPort 80.
E. Edit the primary authentication global authentication policy settings.

Answer: C,E
Explanation:
C. To enable Device Registration Service
On your federation server, open a Windows PowerShell command window and type: Enable-AdfsDeviceRegistration
Repeat this step on each federation farm node in your AD FS farm.
E. Enable seamless second factor authentication
Seamless second factor authentication is an enhancement in AD FS that provides an added level of access protection to corporate resources and applications from external devices that are trying to access them. When a personal device is Workplace Joined, it becomes a ‘known’ device and administrators can use this information to drive conditional access and gate access to resources.
To enable seamless second factor authentication, persistent single sign-on (SSO) and conditional access for Workplace Joined devices.
In the AD FS Management console, navigate to Authentication Policies. Select Edit Global Primary Authentication. Select the check box next to Enable Device Authentication, and then click OK.
Reference: Configure a federation server with Device Registration Service.


QUESTION 3
You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard. You discover that the new virtual disk has a write-back cache of 1 GB.
You need to ensure that the virtual disk has a write-back cache of 5 GB.
What should you do?

A. Detach the virtual disk, and then run the Resize-VirtualDisk cmdlet.
B. Detach the virtual disk, and then run the Set-VirtualDisk cmdlet.
C. Delete the virtual disk, and then run the New-StorageSubSystemVirtualDisk cmdlet.
D. Delete the virtual disk, and then run the New-VirtualDisk cmdlet.

Answer: D
Explanation:
So what about changing the cache size? Well, you can’t modify the cache size, but you can specify it at the time that you create a new virtual hard disk. In order to do so, you have to use Windows PowerShell.
New-VirtualDisk –StoragePoolFriendlyName “<storage pool name>” –FriendlyName “<v
Reference: Using Windows Server 2012’s SSD Write-Back Cache


QUESTION 4
Your company has offices in Montreal, New York, and Amsterdam.
The network contains an Active Directory forest named contoso.com. An Active Directory site exists for each office. All of the sites connect to each other by using the DEFAULTIPSITELINK site link.
You need to ensure that only between 20:00 and 08:00, the domain controllers in the Montreal office replicate the Active Directory changes to the domain controllers in the Amsterdam office.
The solution must ensure that the domain controllers in the Montreal and the New York offices can replicate the Active Directory changes any time of day.
What should you do?

A. Create a new site link that contains Montreal and Amsterdam. Remove Amsterdam from DEFAULTIPSITE1INK. Modify the schedule of DEFAULTIPSITELINK.
B. Create a new site link that contains Montreal and Amsterdam. Create a new site link bridge. Modify the schedule of DEFAULTIPSITELINK.
C. Create a new site link that contains Montreal and Amsterdam. Remove Amsterdam from DEFAULTIPSITELINK. Modify the schedule of the new site link.
D. Create a new site link that contains Montreal and Amsterdam. Create a new site link bridge. Modify the schedule of the new site link.

Answer: C
Explanation:
We create a new site link between Montreal and Amsterdam and schedule it only between 20:00 and 08:00. To ensure that traffic between Montreal and Amsterdam only occurs at this time we also remove Amsterdam from the DEFAULTIPSITELINK.
Reference: How Active Directory Replication Topology Works
http://technet.microsoft.com/en-us/library/cc755994(v=ws.10).aspx


QUESTION 5
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server server role installed.
You need to create an IPv6 scope on Server1. The scope must use an address space that is reserved for private networks. The addresses must be routable.
Which IPV6 scope prefix should you use?

A. 2001:123:4567:890A::
B. FE80:123:4567::
C. FF00:123:4567:890A::
D. FD00:123:4567::

Answer: D
Explanation:
Explanation/Reference:
* A unique local address (ULA) is an IPv6 address in the block fc00::/7, defined in RFC 4193. It is the approximate IPv6 counterpart of the IPv4 private address.
The address block fc00::/7 is divided into two /8 groups: / The block fc00::/8 has not been defined yet.
/ The block fd00::/8 is defined for /48 prefixes, formed by setting the 40 least-significant bits of the prefix to a randomly generated bit string.
* Prefixes in the fd00::/8 range have similar properties as those of the IPv4 private address ranges:
/ They are not allocated by an address registry and may be used in networks by anyone without outside involvement.
/ They are not guaranteed to be globally unique.
/ Reverse Domain Name System (DNS) entries (under ip6.arpa) for fd00::/8 ULAs cannot be delegated in the global DNS.
Reference: RFC 4193


QUESTION 6
Your network contains an Active Directory forest named contoso.com.
Users frequently access the website of an external partner company. The URL of the website is http://partners.adatum.com.
The partner company informs you that it will perform maintenance on its Web server and that the IP addresses of the Web server will change.
After the change is complete, the users on your internal network report that they fail to access the website. However, some users who work from home report that they can access the website.
You need to ensure that your DNS servers can resolve partners.adatum.com to the correct IP address immediately.
What should you do?

A. Run dnscmd and specify the CacheLockingPercent parameter.
B. Run Set-DnsServerGlobalQueryBlockList.
C. Run ipconfig and specify the Renew parameter.
D. Run Set-DnsServerCache.

Answer: D
Explanation:
The Set-DnsServerCache cmdlet modifies cache settings for a Domain Name System (DNS) server.
Run Set-DnsServerCache with the -LockingPercent switch.
/ -LockingPercent<UInt32>
Specifies a percentage of the original Time to Live (TTL) value that caching can consume. Cache locking is configured as a percent value. For example, if the cache locking value is set to 50, the DNS server does not overwrite a cached entry for half of the duration of the TTL. By default, the cache locking percent value is 100. This value means that the DNS server will not overwrite cached entries for the entire duration of the TTL.
Note. A better way would be clear the DNS cache on the DNS server with either Dnscmd /ClearCache (from command prompt), or Clear-DnsServerCache (from Windows PowerShell).
Reference: Set-DnsServerCache
http://technet.microsoft.com/en-us/library/jj649852.aspx
Incorrect:
Not A. You need to use the /config parameter as well:
You can change this value if you like by using the dnscmd command:
dnscmd /Config /CacheLockingPercent<percent>

Click here to view complete Q&A of 70-412 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-412 Training at certkingdom.com

Exam 70-345 Designing and Deploying Microsoft Exchange Server 2016 (beta)

Published: January 8, 2016
Languages: English
Audiences: IT professionals
Technology: Microsoft Exchange Server 2016
Credit toward certification: MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft
Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Plan, deploy, manage, and troubleshoot mailbox databases (15–20%)
Plan, deploy, and manage mailbox databases
Plan for database size and storage performance requirements, plan mailbox database capacity and placement, plan archive mailboxes capacity and placement, plan modern public folder capacity and placement, plan for storage architecture (SAN, DAS, RAID, JBOD), plan file system requirements, plan for auto reseed, plan for virtualization requirements and scenarios, validate storage design by running JetStress, create and configure mailbox databases, manage mailbox databases, configure transaction log properties and file placement
Plan, deploy, and manage high-availability solutions for mailbox databases
Identify failure domains; plan a solution that meets SLA requirements around scheduled downtime; plan for software updates and server maintenance; plan for change management; create, configure, and manage Database Availability Groups (DAGs); create, configure, and manage DAG networks; create, configure, and manage proper placement of a file share witness (FSW); create and configure mailbox database copies; create, configure, and manage Azure file share witness (FSW); create, configure, and manage Azure DAG members
Plan, deploy, and manage a site-resilient Database Availability Group (DAG)
Recommend quorum options with given customer requirements; plan, create, and configure cross-site DAG configuration; plan, deploy, and configure Datacenter Activation Coordination (DAC); configure and manage proper placement of an alternate file share witness (FSW); test and perform site recovery
Monitor and troubleshoot mailbox databases
Monitor mailbox database replication and content indexing, troubleshoot mailbox database replication and replay, troubleshoot mailbox database copy activation, troubleshoot mailbox database performance, troubleshoot database failures (e.g., repair, defrag, recover), resolve quorum issues, troubleshoot data center activation
Plan, deploy, and manage backup and recovery solutions for mailbox databases
Plan most appropriate backup solution that meets SLA requirements of recovery point objectives and recovery time objectives; deploy, configure, and manage lagged mailbox database copies; recover an Exchange Server, mailbox database, mailbox, public folder, or mail item; recover the public folder hierarchy; perform a dial tone restore

Plan, deploy, manage, and troubleshoot client access services (15–20%)
Plan, deploy, and manage client access services
Plan namespaces for client connectivity; plan proxy and redirection requirements; plan and deploy certificates; plan and configure authentication (including FBA, Basic, NTLM, and Kerberos); plan, deploy, and configure Autodiscover, Outlook Anywhere, Outlook MAPI over HTTP, Exchange Web Services, Outlook on the Web, Exchange Admin Center, Exchange ActiveSync, POP3, and IMAP4; plan, deploy, and configure Office Online Servers (OOS); plan, create, and configure Offline Address Book (OAB); plan, create, and configure hierarchical address lists; plan, deploy, and configure address book policies
Plan, deploy, and manage mobility solutions
Plan, deploy, and configure OWA for Devices, Outlook for the Web policies, and mobile device mailbox policies; plan, deploy, and configure Allow Block Quarantine (ABQ); plan, deploy, and configure Office Apps
Plan, deploy, and manage load balancing
Configure namespace load balancing, plan for differences between layer seven and layer four load balancing methods
Monitor and troubleshoot client connectivity
Troubleshoot Outlook Anywhere connectivity, troubleshoot Outlook MAPI over HTTP connectivity, troubleshoot Exchange Web Services (EWS), troubleshoot Outlook on the Web, troubleshoot POP3 and IMAP4, troubleshoot authentication, troubleshoot Autodiscover, troubleshoot Exchange ActiveSync, troubleshoot proxy and redirection issues
Plan, deploy, and manage a site-resilient client access services solution
Plan site-resilient namespaces, configure site-resilient namespace URLs, perform and test steps for site failover and switchover, plan certificate requirements for site failovers, manage expected client behavior during a failover and switchover

Plan, deploy, manage, and troubleshoot transport services (15–20%)
Plan, deploy, and manage transport services
Plan a solution that meets SLA requirements around message delivery; plan inter-site mail flow; plan inter-org mail flow; plan, deploy, and configure redundancy for intra-site scenarios; plan and configure for SafetyNet; plan and configure for shadow redundancy; plan and configure for redundant MX records; plan, create, and configure TLS transport, Edge transport, Send/Receive connectors, transport rules, accepted domains, email address policies, and Address Rewriting
Troubleshoot and monitor transport services
Interpret message tracking logs and protocol logs; troubleshoot a shared namespace environment; troubleshoot SMTP mail flow; given a failure scenario, predict mail flow and identify how to recover; troubleshoot TLS; troubleshoot the new transport architecture
Plan, deploy, and manage message hygiene
Plan and configure malware filtering, plan and configure connection filtering, plan and configure spam filtering, plan and configure recipient filtering, plan and configure Sender Policy Framework, plan and configure Spam Confidence Level (SCL) thresholds
Plan, deploy, and manage site resilience transport services
Plan, create and configure MX records for failover scenarios; manage resubmission and reroute queues; plan, create, and configure Send/Receive connectors for site resiliency; test and perform steps for transport failover and switchover

Plan, deploy, and manage an Exchange infrastructure, recipients, and security (15–20%)
Plan and configure Active Directory (AD) Domain Services for Exchange and Organizational settings
Plan the number of domain controllers, plan placement of Global Catalog (GC), plan and configure DNS changes required for Exchange, plan for schema changes required for Exchange, prepare AD for Exchange, prepare domains for Exchange, plan and configure Active Directory site topology, plan and configure throttling policies
Create and configure mail-enabled objects
Create and configure mailboxes, create and configure resource mailboxes and scheduling, create and configure shared mailboxes, create and configure mail-enabled users and contacts, create and configure distribution lists, configure moderation, create and configure linked mailboxes, create and configure modern public folders
Manage mail-enabled object permissions
Determine when to use Send-As and Send-On-Behalf permissions, configure mailbox folder permissions, configure mailbox permissions, set up room mailbox delegates, configure auto-mapping, create and configure public folder permissions
Plan, deploy, manage, and troubleshoot Role Based Access Control (RBAC)
Determine appropriate RBAC roles and cmdlets, limit administration using existing role groups, evaluate differences between RBAC and Active Directory split permissions, plan and configure a custom-scoped role group, plan and configure delegated setup, plan and create unscoped top-level roles, troubleshoot RBAC, plan and configure user assignment policies
Plan an appropriate security strategy
Plan and configure BitLocker, plan and configure S/MIME
Plan, deploy, manage, and troubleshoot IRM with Active Directory Rights Management Services (AD RMS) or Azure RMS
Plan and configure Information Rights Management (IRM) in Exchange, create an RMS template, plan and create transport protection rules, plan and create Outlook protection rules, plan and configure journal report decryption, plan and configure IRM for eDiscovery, plan and configure pre-licensing for client access, troubleshoot failed IRM protection

Plan, deploy, and manage compliance, archiving, eDiscovery, and auditing (10–15%)
Plan and configure Data Loss Prevention (DLP) solutions
Plan a DLP solution to meet business requirements, plan and configure pre-built rules, plan and create custom rules, plan and configure custom DLP policies, plan and configure DLP fingerprinting
Plan, configure, and manage Archiving and Message Records Management (MRM)
Plan and configure retention policies; plan, create, and configure custom tags; assign policies to users; plan and configure the Managed Folder Assistant; remove and delete tags; plan and configure online archiving (Office 365); plan and create archive policies; plan and configure in-place archiving
Plan, configure, and perform eDiscovery
Plan and delegate RBAC roles for eDiscovery; enable a legal/litigation hold; perform a query-based InPlace hold; perform multi-mailbox searches in Exchange Administration Center (EAC) and Exchange Management Shell; integrate InPlace federated searches with Microsoft SharePoint Discovery center
Plan, configure, and manage a compliance solution
Plan and configure MailTips; plan, create, configure, and deploy message classifications; plan and configure transport rules to meet specified compliance requirements; plan and configure journaling
Plan, manage, and use mailbox and administrative auditing
Plan and configure mailbox audit logging, plan and configure administrative audit logging, search and interpret all audit logs

Implement and manage coexistence, hybrid scenarios, migration, and federation (10–15%)
Plan, deploy, and troubleshoot coexistence with Office 365 (Exchange Online)
Plan, deploy, and manage hybrid configuration; evaluate limitations of the Hybrid Configuration Wizard; plan and manage hybrid deployment OAuth-based authentication; plan and configure certificate and firewall requirements for Exchange Hybrid setup; troubleshoot transport with Exchange Online; troubleshoot client access with Exchange Online; troubleshoot directory synchronization
Plan, deploy, manage, and troubleshoot Exchange federation
Plan, create, and manage federation trusts with Microsoft federation gateways; manage sharing policies; manage organization relationships; plan and create certificate and firewall requirements for federation; troubleshoot Exchange federation trust and organization relationships; troubleshoot cross-forest availability
Plan, deploy, and troubleshoot on-premises coexistence with earlier supported versions of Exchange
Plan, create, and configure namespaces for coexistence; plan and configure proxy redirect; plan firewall configuration for coexistence; plan and configure for mail flow requirements; plan for mailbox migrations; troubleshoot transport in coexistence; troubleshoot client access in coexistence
Migrate from earlier supported versions of Exchange
Determine transition paths to Exchange, migrate to modern public folders, migrate mailboxes, plan for discontinued features, transition and decommission servers, troubleshoot Mailbox Replication Services

Who should take this exam?
This exam is designed for candidates who have a minimum of three years of experience designing and managing Exchange Server and who are responsible for the Exchange Server 2016 messaging environment in an enterprise environment. They are IT consultants or senior administrators who act as the technical lead over a team of administrators. Candidates should be familiar with the requirements for integrating Microsoft Exchange Server with Skype for Business and Office 365.

Click here to view complete Q&A of 70-345 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-345 Training at certkingdom.com

Exam 70-334 Core Solutions of Microsoft Skype for Business 2015 (beta)

Exam 70-334 Core Solutions of Microsoft Skype for Business 2015 (beta)

Published: July 31, 2015
Languages: English
Audiences: IT professionals
Technology: Skype for Business
Credit toward certification: MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Plan and design Skype for Business (30-35%)
Plan Skype for Business site topology
Evaluate user distribution for central and branch site design; associate workloads to business requirements; analyze business requirements and capacity requirements; plan Skype for Business architecture; analyze and design Skype for Business SIP domains including shared SIP namespaces(Split Domain); plan for Skype for Business Online dependencies
Plan Skype for Business Server support infrastructure
Define certificate requirements for internal servers; analyze and design load balancing, plan for DNS, SQL, AD DS, and file store; assess network requirements including ExpressRoute; plan for optimal conferencing traffic, capacity, and QoS support; estimate network usage and capacity including internal network and Skype for Business Online service requirements
Plan Skype for Business Servers
Define server roles; analyze hardware requirements; determine storage requirements for archiving and monitoring; determine operating system version requirements; determine operating system dependencies; define virtualization requirements
Design a Skype for Business Server high availability/disaster recovery (HA/DR) solution
Design a strategy for central and branch office scenarios, resiliency, SQL mirroring, SQL AlwaysOn Failover Clustering Instances and SQL AlwaysOn Availability Groups, Persistent Chat, load balancing, and Geo DNS; define failover scenarios
Design conferencing
Design dial-in conferencing including conference access numbers and conferencing regions, conferencing lifecycle, conferencing policies, video interoperability server (VIS), Office Online Server (OOS), and Skype Meeting Broadcast
Design Skype for Business remote and external access using Edge Services
Design federation including Skype consumer connectivity, Skype for Business Online, and XMPP; design for mobility; design for directors; design for remote user access; define certificate requirements for remote servers; analyze and design firewall requirements, load balancing, DNS, and reverse proxy, split tunneling strategies
Plan for Skype for Business clients and user experiences
Plan contact list management, client version control, privacy, Address Book web search/download, Skype for Business mobility, client authentication options, Skype for Business users for VDI, and corporate access to Skype for Business Online; design for client UI experience; plan for Skype for Business room system
Plan migration and upgrade from previous versions
Plan the migration sequence; plan for in-place upgrade; decommission old servers; monitoring and archiving server roles; plan for co-existence with previous server versions; upgrade from mirroring to AlwaysOn

Deploy and configure Skype for Business (30-35%)
Configure and publish topology
Create Skype for Business roles; create gateways and trunks; add/remove server features; deploy Edge Server; deploy SQL HA options, create Office Online Server
Configure conferencing
Create PIN policy, regions and conference dial-in access numbers, meeting configuration, conference policies, mediation server co-location, and trunks and gateways; configure Skype Meeting Broadcast
Configure Skype for Business remote and external access
Configure federation, including Skype consumer connectivity, Skype for Business Online, and XMPP; configure mobility policies and remote user access policies; configure load balancing, DNS, and reverse proxy
Deploy and configure clients
Configure Skype for Business client features, client policies, and client security options; deploy Skype for Business users for VDI; deploy Skype for Business room system
Migrate and upgrade from previous versions and/or Skype for Business Online
Consolidate servers to a supported single version; move users; migrate Response Groups or LIS; move CMS or File Share Data; transition to SQL AlwaysOn; perform in-place upgrade; configure clients for Skype for Business Online; enable or move users to Skype for Business Online; migrate user settings; migrate to Skype for Business Online
Configure HA/DR
Configure pool pairing, configure Geo DNS for site failover, configure SQL HA
Deploy and configure monitoring and archiving services
Deploy monitoring reports; configure CDR and Quality of Experience; configure archiving storage; configure archiving and eDiscovery with Exchange including Exchange Online, archiving policies, Media Quality Dashboard (MQD), and server-side conversation history
Deploy and configure Persistent Chat servers
Implement chat history, room management URLs, HA and DR, user policies, room design, and ethical boundaries

Manage and troubleshoot Skype for Business (30-35%)
Manage and troubleshoot conferencing and application sharing
Manage and troubleshoot Conferencing Auto Attendant (CAA), Conference Announcement Service (CAS), contact objects, and conference directories; troubleshoot web scheduler, multipoint control unit (MCU) health, simple URLs (join launcher), UC add-in for Microsoft Outlook; manage and troubleshoot multi-party video, server resources, media relay, and third-party interop; troubleshoot Microsoft PowerPoint presentation connections, Office Web App server configurations, and dataproxy; troubleshoot Skype Meeting Broadcast.
Manage and troubleshoot sign-in, presence, and client configuration
Manage and troubleshoot DNS, certificates, registration, network connectivity including ExpressRoute, authentication, and auto-discover; manage and troubleshoot aggregation (OOF, calendar, machine, and user), enhanced privacy, subscriptions, contact list, and privacy relationship; manage and troubleshoot file transfer, policy assignment, URL filtering, client version filtering, GPO, and Skype for Business Online
Manage and troubleshoot federation and remote access
Manage and troubleshoot federation, including Skype consumer connectivity, XMPP, and Skype for Business Online federation types (open, direct, and enhanced), federation policy, and legacy interop; troubleshoot mobile auto-discover issues, mobile device usage issues, mobile callback feature, push notification, call establishment, and mobile conference data
Manage and troubleshoot Address Book
Configure Address Book; troubleshoot normalization, local versus web lookup, internal file download, external file download, Address Book generation, and contact merge
Manage and troubleshoot high availability and resiliency
Manage and troubleshoot the backup service, server storage replication, and file share replication by using DFS; manage single server failure (Skype for Business, SQL); manage data center failure, including CMS and branch survivability; backup and restore application service data; manage filestore data and contacts; maintain and recover Skype for Business topology; recover CMS
Identify issues by using troubleshooting tools
Interpret Skype for Business monitoring reports, and identify potential issues; configure synthetic transactions; test connectivity with PowerShell Test cmdlets; configure core reliability and media quality monitoring; verify service health and CMS replication; recover from failed server build; analyze event viewer; enable Best Practice Analyzer; verify name resolution; identify issues using CLSlogging Scenarios; use Snooper for log analysis; identify issues using a network packet analyzer, CLS Logger, Event Viewer, and Performance Monitor; analyze signaling and media call flow for Skype for Business for online users; validate connectivity for online users; use Microsoft Online Services Diagnostics and Logging Support Toolkit
Manage and troubleshoot topology and dependent infrastructure
Enable or move Skype for Business users; configure role-based access control (RBAC); manage and troubleshoot DNS; manage RGS delegated administration; troubleshoot database synchronization issues, including SQL HA and LYSS replication, topology replication, IIS, user placement, and RBAC rights assignment; troubleshoot certificates
Manage and troubleshoot Persistent Chat servers
Manage categories, scope, chat rooms, room access, compliance, and add-ins

Preparation options
Instructor-led training
From the community

Who should take this exam?
Candidates for this exam are IT consultants and telecommunications consulting professionals who design, plan, deploy, and maintain solutions for unified communications (UC). Candidates should be able to translate business requirements into technical architecture and design for a UC solution. Candidates should have a minimum of two years of experience with Skype for Business technologies and should be familiar with supported migration scenarios. Candidates should be proficient in deploying Skype for Business solutions for end users, endpoint devices, telephony, audio/video and web conferences, security, and high availability. Candidates should also know how to monitor and troubleshoot Skype for Business using Microsoft tools. In addition, candidates should be proficient with Active Directory Domain Services, data networks, and telecommunications standards and components that support the configuration of Skype for Business. Candidates should be familiar with the requirements for integrating Skype for Business with Microsoft Exchange Server and Office 365.

 

Click here to view complete Q&A of 70-334 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-334 Training at certkingdom.com

 

Exam 70-333 Deploying Enterprise Voice with Skype for Business 2015 (beta)

Published: July 31, 2015
Languages: English
Audiences: IT professionals
Technology: Skype for Business
Credit toward certification: MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Plan and design Skype for Business with Enterprise Voice (30-35%)
Design Enterprise Voice topology
Design mediation server collocation or placement, gateways, trunks, voice resiliency, mediation server dependencies, voice usage and traffic, DNS, and phone configuration
Design call routing and Public Switched Telephone Network (PSTN) connectivity
Design dial plans, routes, including location-based routing, normalization, voice policies, basic emergency dialing and notification, PSTN usage, and trunk configuration; design for call via work; define SIP trunk capacity requirements; design multiple media gateway support, trunk configuration; define outbound translation rules, inbound dial plan; qualify technology options from UCOIP
Design voice applications
Design call park, Response Group, delegation model, Response Group workflows; design private line and vacant number announcements
Design unified messaging (UM)
Design UM dial plans, normalization rules, UM auto-attendant, subscriber access, UM outbound dialing, and UM placement and capacity for on-premises and online
Plan for network readiness and optimization
Assess network requirements including Multiprotocol Label Switching (MPLS), virtual private network (VPN), multiple MPLS providers including ExpressRoute providers, asymmetric links, point-to-point wireless, internal NAT, TCP vs. UDP, and signaling vs. media traffic; plan for optimal conferencing traffic, capacity, Edge placement, assess QoS readiness including traffic policing and traffic shaping impact on RTC, DSCP, port based, scavenger class, best effort traffic class, and separate/converged networks; estimate network usage; analyze media scenarios for conference, peer-to-peer, PSTN, and capture traces for max jitter, average jitter, peak consecutive packet loss, average packet loss, and one-way network delay
Design network services for Enterprise Voice
Design Location Information Services (LIS) and Call Admission Control (CAC); plan for Media Bypass; design for QoS including port requirements for internal and external services; design and forecast network needs for sizing ExpressRoute
Model and analyze Skype for Business traffic per site
Predict and calculate service needs and growth, compare how different personas impact network requirements, and calibrate usage models based on customer usage and business requirements, including web, audio and video conferencing, PSTN, and peer-to peer calls; adjust business requirements, adjust network components (topology, capacity), and limit traffic volume or modify solution design; calculate traffic volume by using the Skype for Business bandwidth calculator for branch traffic, central site traffic, and remote user traffic
Analyze policies and historical data network usage
Analyze Service Level Agreements (SLAs) on network infrastructure, analyze impact of security policies, including firewalls, VPN tunnels, remote access, Direct Access, NAT, and Private VLANs, and assess appropriateness of current QoS policies for Skype for Business, average usage, peak usage, average drop, and peak packet loss; analyze historical call quality data; analyze bandwidth requirements for Skype for Business Online
Plan and analyze simulation traffic results, and make recommendations
Design site traffic generator endpoint placement/location, design site traffic generator transaction path, and design site traffic generator transaction volume per path; interpret baseline network characteristics and any variations, analyze simulation results in the context of a network (topology, QoS); recommend network reconfigurations, recommend modifications for QoS approach, and explain impact of observed network characteristics, including latency, packet loss, jitter, and bandwidth usage

Deploy and configure Enterprise Voice (30-35%)
Configure network services for Enterprise Voice
Configure Location Information Services (LIS), Call Admission Control (CAC) for voice, Call Admission Control (CAC) for video, DHCP for phone edition, QOS, and media bypass; configure ExpressRoute for Office 365
Configure voice applications
Configure call park, Response Group workflows, Response Group queues, private line, and vacant number announcements, configure delegation; configure and enable PSTN Conferencing with ACP, Cloud PBX, PSTN Calling, Hybrid Voice infrastructure; port phone numbers to Microsoft as the carrier; configure users with cloud phone numbers
Configure call routing
Configure dial plans, routes, and trunks; apply voice policies, PSTN usages, and emergency dialing; call via work
Configure unified messaging (UM) for Skype for Business and Cloud Voicemail
Configure UM dial plans, the normalization rules, UM auto-attendant, subscriber access, and call answering rules; configure DNS records; configure Edge Server for integration with Office 365; manage and assign Hosted Voice Mail policies; enable users for Hosted Voice Mail; create Contact Objects for Hosted Voice Mail; configure Skype for Business Online Enterprise Voice users to have Cloud Voicemail
Configure Enterprise Voice client features
Configure delegation, simultaneous ring, team calling, and group call pickup, shared line appearance, call via work

Manage and troubleshoot Enterprise Voice (30-35%)
Troubleshoot call setup and teardown
Troubleshoot Skype for Business Server and Skype for Business Online internal phone calls (PC to PC), external phone calls (PC to Public Switched Telephone Network [PSTN]), inbound and outbound routing, network configuration, and internal and external clients; call via work
Troubleshoot Enterprise Voice quality issues
Analyze Call Detail Recording/ Quality of Experience (CDR/QOE) logs, analyze call flow by using Snooper, analyze call data quality using call quality methodology (CQM), troubleshoot third-party devices, QOS, and network bandwidth; analyze rate my call results; analyze and troubleshoot issues with Skype for Business Online Enterprise Voice users
Troubleshoot Enterprise Voice configuration
Analyze dial plans (normalization, translation), analyze session management (trunk routing); analyze policies, routes, and usages; troubleshoot external connectivity (gateways, SBA, PBX, SBC, PSTN) and media bypass; call admission control (CAC); call via work; troubleshoot delegation, simultaneous ring, team calling, and group call pickup; number porting
Troubleshoot and analyze Enterprise Voice applications
Troubleshoot call park, Response Groups, unassigned numbers, Exchange voicemail, and LIS and emergency calling implementation
Troubleshoot universal communications (UC) devices and peripherals
Troubleshoot device update issues, device connectivity issues (LPE + 3PIP), PIN authentication issues, peripherals, and VDI plug-in device pairing
Monitor and manage Skype for Business
Monitor call quality dashboard, monitoring server reports, QoE, synthetic transactions, and server health; monitor Rate My Call results

Who should take this exam?
Candidates for this exam are IT consultants and telecommunications consulting professionals who design, plan, deploy, and maintain solutions for unified communications (UC). Candidates should be able to translate business requirements into technical architecture and design for a UC solution. Candidates should have a minimum of two years of experience with Skype for Business technologies and be familiar with supported migration scenarios. Candidates should be proficient in deploying Skype for Business Server and Skype for Business Online solutions for end users, endpoint devices, telephony, audio/video and web conferences, security, and high availability. Candidates should also know how to monitor and troubleshoot Skype for Business using Microsoft tools. In addition, candidates should be proficient with Active Directory Domain Services, data networks, and telecommunications standards and components that support the configuration of Skype for Business. Candidates should be familiar with the requirements for integrating Skype for Business with Microsoft Exchange Server and Office 365.

Click here to view complete Q&A of 70-333 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-333 Training at certkingdom.com

70-341 Core Solutions of Microsoft Exchange Server 2013


QUESTION 1
You need to prepare the environment for the implementation of phase 1.
What changes must be made to the environment before you can install Exchange Server 2013?

A. The operating system or service pack level of TexDC1 needs to be upgraded.
B. The Windows 2008 R2 domain controllers in Washington and Boston need to be upgraded.
C. A server running Exchange Server 2007 or Exchange Server 2010 needs to be installed in Texas.
D. The PDC emulator role needs to be transferred to a domain controller in Washington or Boston.

Answer: A

Explanation:


QUESTION 2
You are evaluating whether the proposed Exchange solution will meet the current and future
capacity requirements.
You want to gather statistics about the current Exchange environment.
Which of the following tools would you use to determine the number of emails sent to and received
by the current users?

A. Remote Server Administration Tools.
B. Microsoft Exchange Server Profile Analyzer.
C. Microsoft Exchange Server Deployment Assistant.
D. ESEUtil.exe.
E. Microsoft Exchange Server Jetstress.

Answer: B

Explanation:


QUESTION 3
You need to apply the required size restriction to the mailboxes in the new environment.
Which of the following commands should you run?

A. Get-MailboxDatabase | Set-MailboxDatabase –ProhibitSendReceiveQuota
B. Get-MailboxDatabase | Set-Mailbox –ProhibitSendReceiveQuota
C. Get-Mailbox | Set-Mailbox –ProhibitSendReceiveQuota
D. Get-MailboxDatabase | Get-Mailbox | Set-Mailbox –ProhibitSendReceiveQuota

Answer: A

Explanation:


QUESTION 4
You are evaluating whether the proposed Exchange solution will meet the current and future
capacity requirements.
You want to gather statistics about the current Exchange environment.
Which of the following tools would you use to determine the number of IOPS (Input/Output
Operations Per Second) required for the mailbox database storage?

A. ESEUtil.exe.
B. Microsoft Exchange Server Jetstress.
C. Microsoft Exchange Server Deployment Assistant.
D. Exchange Mailbox Server Role Requirements Calculator.
E. SQL Server Analysis Services.

Answer: D

Explanation:


QUESTION 5
You need to install and configure anti-spam and antimalware filtering.
Which servers should you install the anti-spam agents and enable the anti-spam and antimalware
filtering? (Choose two).

A. You should install the anti-spam agents on the Client Access Servers only.
B. You should install the anti-spam agents on the Mailbox serversonly.
C. You should install the anti-spam agents on the Client Access Servers and the Mailbox Servers.
D. You should enable antimalware filtering on the Client Access Serversonly.
E. You should enable antimalware filtering on the Mailbox serversonly.
F. You enable antimalware filtering on the Client Access Servers and the Mailbox Servers.

Answer: B,E

Explanation:

 

 

Click here to view complete Q&A of 70-341 exam

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-341 Training at certkingdom.com

The Big Question Rises How To Become Microsoft, Cisco, ComTIA Certified

The big question rises how to become the Microsoft certified , All Microsoft certifications are acquired by simply taking a series of exams. If you can self-study for said exams, and then pass them, then you can acquire the certification for the mere cost of the exam (and maybe whatever self-study materials you purchase).

You’ll also need, at minimum (in addition to the MCTS), the CompTIA A+, Network+ and Security+ certs; as well as the Cisco CCNA cert.

Microsoft Certified Technology Specialist (MCTS) – This is the basic entry point of Microsoft Certifications. You only need to pass a single certification test to be considered an MCTS and there are numerous different courses and certifications that would grant you this after passing one. If you are shooting for some of the higher certifications that will be discussed below, then you’ll get this on your way there.

Microsoft Certified Professional Developer (MCPD) – This certification was Microsoft’s previous “Developer Certification” meaning that this was the highest certification that was offered that consisted strictly of development-related material. Receiving it involved passing four exams within specific areas (based on the focus of your certification). You can find the complete list of courses and paths required for the MCPD here.

Microsoft Certified Solutions Developer (MCSD) – This is Microsoft’s most recent “Developer Certification” which will replace the MCPD Certification (which is being deprecated / retired in July of 2013). The MCSD focuses within three major areas of very recent Microsoft development technologies and would likely be the best to persue if you wanted to focus on current and emerging skills that will be relevant in the coming years. You can find the complete list of courses and paths required for the MCSD here.

The Microsoft Certifications that you listed are basically all of the major ones within the realm of development. I’ll cover each of the major ones and what they are :

Most people, however, take some kind of course. Some colleges — especially career and some community colleges — offer such courses (though usually they’re non-credit). Other providers of such courses are private… some of them Microsoft Certified vendors of one type or another, who offer the courses in such settings as sitting around a conference table in their offices. Still others specialize in Microsoft certification training, and so have nice classrooms set up in their offices.

There are also some online (and other forms of distance learning) courses to help prepare for the exams.

The cost of taking classes to prepare can vary wildly. Some are actually free (or very nearly so), while others can cost hundreds of dollars. It all just depends on the provider.

And here’s a Google search of MCTS training resources (which can be mind-numbing in their sheer numbers and types, so be careful what you choose):

There are some pretty good, yet relatively inexpensive, ways to get vendor certificate training. Be careful not to sign-up for something expensive and involved when something cheaper — like subscribing to an “all the certificates you care to study for one flat rate” web site — would, in addition to purchasing a study guide or two at a bookstore, likely be better.

If you want a career in IT, then you need to have both an accredited degree in same (preferably a bachelors over an associates), and also a variety of IT certifications. The MCTS is but one that you will need.

You should probably also get the Microsoft MCSE and/or MCSA. The ICS CISSP. And the ITIL.

There are others, but if you have those, you’ll be evidencing a broad range of IT expertise that will be useful, generally. Then, in addition, if the particular IT job in which you end-up requires additional specialist certification, then you can get that, too (hopefully at the expense of your employer who requires it of you).

Then, whenever (if ever) you’re interested in a masters in IT, here’s something really cool of which you should be aware…

There’s a big (and fully-accredited, fully-legitimate) university in Australia which has partnered with Microsoft and several other vendors to structure distance learning degrees which include various certifications; and in which degrees, considerable amounts of credit may be earned simply by acquiring said certifications. It’s WAY cool.

One can, for example, get up to half of the credit toward a Masters degree in information technology by simply getting an MCSE (though the exams which make it up must be certain ones which correspond with the university’s courses). I’ve always said that if one were going to get an MCSE, first consult the web site of this university and make sure that one takes the specific MCSE exams that this school requires so that if ever one later decided to enter said school’s masters program, one will have already earned up to half its degree’s credits by simply having the MCSE under his/her belt. Is that cool, or what?

I wouldn’t rely on them over experience (which is far and away the most valuable asset out there) but they are worth pursuing especially if you don’t feel like you have enough experience and need to demonstrate that you have the necessary skills to land a position as a developer.

If you are going to pursue a certification, I would recommend going after the MCSD (Web Applications Track) as it is a very recent certification that focuses on several emerging technologies that will still be very relevant (if not more-so) in the coming years. You’ll pick up the MCTS along the way and then you’ll have both of those under your belt. MCPD would be very difficult to achieve based on the short time constraints (passing four quite difficult tests within just a few months is feasible, but I don’t believe that it is worth it since it will be “retired” soon after).

No job experience at all is necessary for any of the Microsoft Certifications, you can take them at any time as long as you feel confident enough with the materials of the specific exam you should be fine. The tests are quite difficult by most standards and typically cover large amounts of material, but with what it sounds like a good bit of time to study and prepare you should be fine.

Certifications, in addition to degrees, are so important in the IT field, now, that one may almost no longer get a job in that field without both. The certifications, though, are so important that one who has a little IT experience can get a pretty good job even without a degree as long as he has all the right certs. But don’t do that. Definitely get the degree… and not merely an associates. Get the bachelors in IT; and make sure it’s from a “regionally” accredited school.

Then get the certs I mentioned (being mindful, if you think you’ll ever get an IT masters, to take the specific exams that that Strut masters program requires so that you’ll have already earned up to half the credit just from the certs).

If you already have two years of experience in working in the .NET environment, a certification isn’t going to guarantee that you will get employed, a salary increase or any other bonuses for achieving the honor. However, it can help supplement your resume by indicating that you are familiar with specific technologies enough to apply them in real-world applications to solve problems.

If your ready for career change and looking for Microsoft MCTS Training, Microsoft MCITP Training or any other Microsoft Certification preparation get the best online training from Certkingdom.com they offer all Microsoft, Cisco, Comptia certification exams training in just one Unlimited Life Time Access Pack, included self study training kits including, Q&A, Study Guides, Testing Engines, Videos, Audio, Preparation Labs for over 2000+ exams, save your money on boot camps, training institutes, It’s also save your traveling and time. All training materials are “Guaranteed” to pass your exams and get you certified on the fist attempt, due to best training they become no1 site 2012.

MCTS Training, MCITP Trainnig

Best Microsoft MTA Certification, Microsoft MCTS Training at certkingdom.com

Microsoft Certifications 2014 can you a JOB

With the new technologies coming in the market every other day, life has become advanced these days. In this modern era, you have to be on your toes all the time especially if your career in related to the field of IT: one has to stay updated with all the latest programs and their features in order to stay ahead of his peers. For instance, there was a time when Gramophone was the invention of the century but then it was replaced with mobile phones. Similarly, the invention of television and radio created quite a heap in the early 20th century but later on, the thunder was stolen by computers in the late 20th century.

In this day and age, computers and internet have become the center of attention. Consequently, IT has become the most popular field. IT experts are quite in demand these days; but with the emergence of new programs every other day, they have to keep up with the latest technology in order to stay ahead in the race. One way of staying ahead is the certification courses. These courses ensure that the candidate has attained all the latest knowledge and is ready to roll in the world of technology.

This article will discuss some of the most popular certification courses offered by Microsoft.

Microsoft Technology Associate

This is a certification course designed for the starters: people who want to start their line of business in the field of technology. Accordingly, it tests the fundamentals of IT and validates that the candidates have a basic understanding of the essentials. This course has been divided into three tracks and the candidates can choose any one of the tracks, depending on their preference. The tracks are: IT infrastructure, Database Design and Developer.

Microsoft MCSA- Windows Server 2008
This exam is designed for the IT personnel and it validates their skills in Server Networking management. IT professionals and System Administrators are suggested to take MCSA- Windows Server 2008 exam especially if they are looking forward to earning their MCSE certification.

Microsoft MCSA- Windows Server 2012
This certification exam is an advanced level exam which validates that the candidates have sufficient knowledge of Windows Server 2012 for its proper installation, configuration and working. MCSA- Windows Server 2012 certified can easily get the position of Network Administrator, Computer Systems Administrator or Computer Network Analyst.

Microsoft MCSE- Server Infrastructure
This certification course is designed for IT experts and it will get you the title of ‘Solutions Expert’. It tests individual’s skills in effectively and efficiently running a modern data center with some experience in virtualization storage and networking, identity management and systems management.

Microsoft MCSE- Desktop Infrastructure
This course validates that the individuals can manage desktops and devices, while maintaining their security and integrity, from anywhere around the globe. It also tests individuals’ expertise in application and desktop virtualization together with remote desktop services. With this certification in hand, you can easily qualify for a job of Data and Application Manager or Desktop and Device Support Manager.

Microsoft MCSE- Messaging
This certification is an expert level certification and it validates that the applicant has relevant skills in order to increase user productivity and flexibility. It also validates that the person has sufficient knowledge as to how to improve data security and reduce data loss. After passing this certification exam, candidates can easily qualify for the position of Network and Computer System Administrator.

Microsoft  MCSE- Communication
This certification validates candidates’ expertise in using Lync Server to create an effective communication path that can be accessed from all around the globe. This certification is also an expert level certification and you can easily qualify for the position of Network and Computer System Administrator with it.

Microsoft  MCSE- SharePoint

This Microsoft Certified Solutions Expert certification course verifies that the candidates have the necessary expertise to share, synchronize and organize the data across the organization. SharePoint 2013 is the updated version of Microsoft Office, and passing this certification can get you a job of Systems or Network Analyst.

Microsoft MCSD- SharePoint Application

This Microsoft Certified Solutions Developer certification course is another of expert level certification courses which validates individuals’ expertise in web programming. It also requires the individuals to design and develop applications with Microsoft SharePoint. With this certification, you can easily secure the position of Software Developer or Web Developer.

Microsoft Private Cloud

MCSE- Private Cloud certification course tests candidates’ expertise to manage Private Cloud computer technologies. It also verifies that the candidate can implement these technologies in a way to optimize service delivery. You can easily get the position of Server Administrator and Network Manager with this certification on your resume.

Microsoft System Center Configuration Manager
Microsoft System Center Certification focuses on the skills to manage computer and clients. The candidates should be able to configure, administer and deploy System Center 2012 in order to pass this exam. You can earn the title of Microsoft Certified Technology Specialist through this certification.

Microsoft Server Virtualization
This certification verifies that the candidate is familiar with Server Virtualization, both on Windows Server and System Center. This course expands individual’s expertise and skills in order for him to meet the rapidly modernizing technological business needs, and it can get him the title of Microsoft Specialist in no time.

Microsoft Office Certifications
Microsoft offers many certifications that verify candidates’ skills in handling and using Microsoft Office Applications. These certifications start from beginners level and go up to the master level. Microsoft Office Specialist is a beginner level certification whereas Microsoft Office Specialist Expert is an advanced level certification. Last but not the least; Microsoft Office Specialist Master is a master level certification.

Microsoft MCSA- Office 365
This course focuses on individual’s skills in handling Office 365 together with productivity tools and cloud-based collaboration. This certification can easily get you the position of Cloud Application Administrator or SaaS Administrator.

Microsoft Dynamics

This Microsoft Certified Technology Specialist certification confirms an individual’s expertise in Microsoft dynamics: a specific module can be chosen for this certification. However, this certification will be withdrawn from the market, at the end of this year, and replaced with the new ones.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

70-412 Configuring Advanced Windows Server 2012 Services


QUESTION 1
You are employed as a network administrator at ABC.com. ABC.com has an Active Directory
domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
ABC.com has a server, named ABC-SR07, which is configured as a DHCP server. You have
created a superscope on ABC-SR07.
Which of the following describes a reason for creating a superscope? (Choose all that apply.)

A. To support DHCP clients on a single physical network segment where multiple logical IP
networks are used.
B. To allow for the sending of network traffic to a group of endpointsdestination hosts.
C. To support remote DHCP clients located on the far side of DHCP and BOOTP relay agents.
D. To provide fault tolerance.

Answer: A,C

Explanation:


QUESTION 2
You are employed as a network administrator at ABC.com. ABC.com has an Active Directory
domain named ABC.com. All servers, including domain controllers, on the ABC.com network have
Windows Server 2012 installed.
ABC.com has a domain controller, named ABC-DC01, which is configured as a DNS server. You
are planning to unsign the ABC.com zone.
Why should you unsign the zone?

A. To remove the zone.
B. To change the current zone type.
C. To add a new primary zone.
D. To create an Active Directory-integrated zone.

Answer: B

Explanation:


QUESTION 3
You are employed as a network administrator at ABC.com. ABC.com has an Active Directory
domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
ABC.com has a server named ABC-SR01, which hosts the IP Address Management (IPAM)
Server feature. ABC.com also has a server, named ABC-SR02, which is configured as a DHCP server.
You have been instructed to make sure that a user, named Mia Hamm, who belongs to the IPAM
Users group on ABC-SR01, has the ability to modify the DHCP scopes on ABC-SR02 by making
use of use IPAM. You want to achieve this without assigning Mia Hamm any unnecessary permissions.
Which of the following actions should you take?

A. You should consider making Mia Hamm a member of the DHCP Administrators group on ABCSR02.
B. You should consider making Mia Hamm a member of the IPAM Administrators group on ABCSR02.
C. You should consider making Mia Hamm a member of the Local Administrators group on ABCSR02.
D. You should consider making Mia Hamm a member of the Domain Administrators group.

Answer: A

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCSE Certification, Microsoft 70-412 Training at certkingdom.com

 

Examkingdom Releases Training Courseware and Test Prep for the MCSE 2012 Private Cloud Certification

Prove your expertise in managing and implementing Microsoft private cloud computing technologies with Examkingdom.

Examkingdom is pleased to announce the addition of its Training Courseware and Certkingdom Test Prep for the 70-246 and 70-247 MCSE 2012 Private Cloud Certification exams.

For professionals seeking to expand their career path, cloud computing has become the dominant IT protocol in corporate culture. Cloud computing and cloud-related skills represent virtually all IT growth opportunities through 2015. Businesses worldwide are in need of IT professionals with verifiable experience in private cloud implementation. The MCSE 2012 Private Cloud certification equips IT professionals to build private cloud solutions which can elevate IT service delivery within companies.

Required prerequisite for the MCSE 2012 Private Cloud is the MCSA: Windows Server 2012 certification. Earning an MCSE 2012: Private Cloud certification will qualify candidates for such jobs as server administrator, systems programmer, and network manager.

Examkingdom Training Courseware will help develop a thorough understanding and real world knowledge of Microsoft’s approach to cloud computing. Combined with Certkingdom Test Prep, Examkingdom ensures you maximize the learning experience for success on exam day. Let Examkingdom assist in expanding your career to a Microsoft Certified Solutions Expert today.

About Examkingdom
Examkingdom was founded in 2010 to assist individuals and organizations with preparing for and passing IT certification exams. Since our inception, our industry recognized materials have assisted countless people in growing their knowledge and advancing their careers. Examkingdom develops and sells labs, training videos, practice test software, audio preparation programs, study guides and flash cards for the Information Technology, Financial and Trade marketplaces.


 

 

MCTS Certification, MCITP Certification

Best Microsoft MCSE Certification, Microsoft MCSE Training at examkingdom.com