Category Archives: MCTS Certification

Best Top-Paying and most in demand for Certifications 2014 – 2015

Best Top-Paying and most in demand for Certifications 2014 – 2015

Introduction
It’s always a good idea to take stock of your skills, your pay, and your certifications. To that end, following is a review of 15 of the top-paying certifications for 2014. With each certification, you’ll find the average (mean) salary and a brief description.

Based on the 2014 IT Skills and Salary Survey conducted by Global Knowledge and Penton and completed in October 2013, the rankings below are derived from certifications that received the minimum number of responses to be statistically relevant. Certain certifications pay more but are not represented due to their exclusive nature. Examples include Cisco Certified Internetworking Expert (CCIE) and VMware Certified Design Expert (VCDX). This was a nationwide survey, and variations exist based on where you work, years of experience, and company type (government, non profit, etc.).

1. Certified in Risk and Information Systems Control (CRISC) – $118,253
The non-profit group ISACA offers CRISC certification, much in the way that CompTIA manages the A+ and Network+ certifications. Formerly, “ISACA” stood for Information Systems Audit and Control Association, but now they’ve gone acronym only.

The CRISC certification is designed for IT professionals, project managers, and others whose job it is to identify and manage risks through appropriate Information Systems (IS) controls, covering the entire lifecycle, from design to implementation to ongoing maintenance. It measures two primary areas: risk and IS controls. Similar to the IS control lifecycle, the risk area spans the gamut from identification and assessment of the scope and likelihood of a particular risk to monitoring for it and responding to it if/when it occurs.

Since CRISC’s introduction in 2010, more than 17,000 people worldwide have earned this credential, The demand for people with these skills and the relatively small supply of those who have them result in this being the highest salary for any certification on our list this year.

To obtain CRISC certification, you must have at least three years of experience in at least three of the five areas that the certification covers, and you must pass the exam, which is only offered twice a year. This is not a case where you can just take a class and get certified. Achieving CRISC certification requires effort and years of planning.

2. Certified Information Security Manager (CISM) – $114,844

ISACA also created CISM certification. It’s aimed at management more than the IT professional and focuses on security strategy and assessing the systems and policies in place more than it focuses on the person who actually implements those policies using a particular vendor’s platform.

More than 23,000 people have been certified since its introduction in 2002, making it a highly sought after area with a relatively small supply of certified individuals. In addition, the exam is only offered three times a year in one of approximately 240 locations, making taking the exam more of a challenge than many other certification exams. It also requires at least five years of experience in IS, with at least three of those as a security manager. As with CRISC, requirements for CISM certification demand effort and years of planning.

3. Certified Information Systems Auditor (CISA) – $112,040
The third highest-paying certification is also from ISACA; this one is for IS auditors. CISA certification is ISACA’s oldest, dating back to 1978, with more than 106,000 people certified since its inception. CISA certification requires at least five years of experience in IS auditing, control, or security in addition to passing an exam that is only offered three times per year.

The CISA certification is usually obtained by those whose job responsibilities include auditing, monitoring, controlling, and/or assessing IT and/or business systems. It is designed to test the candidate’s ability to manage vulnerabilities, ensure compliance with standards, and propose controls, processes, and updates to a company’s policies to ensure compliance with accepted IT and business standards.

4. Six Sigma Green Belt – $109,165
Six Sigma is a process of analyzing defects (anything outside a customer’s specifications) in a production (manufacturing) process, with a goal of no more than 3.4 defects per million “opportunities” or chances for a defect to occur. The basic idea is to measure defects, analyze why they occurred, and then fix the issue and repeat. There is a process for improving existing processes and a slightly modified version for new processes or major changes. Motorola pioneered the concept in the mid-1980s, and many companies have since followed their examples to improve quality.

This certification is different from the others in this list, as it is not IT specific. Instead, it is primarily focused on manufacturing and producing better quality products.

There is no organization that owns Six Sigma certification per se, so the specific skills and number of levels of mastery vary depending on which organization or certifying company is used. Still, the entry level is typically Green Belt and the progression is to Black Belt and Master Black Belt. Champions are responsible for Six Sigma projects across the entire organization and report to senior management.

5. Project Management Professional (PMP) – $108,525
The PMP certification was created and is administered by the Project Management Institute (PMI®), and it is the most recognized project management certification available. There are more than half a million active PMPs in 193 countries worldwide.

The PMP certification exam tests five areas relating to the lifecycle of a project: initiating, planning, executing, monitoring and controlling, and closing. PMP certification is for running any kind of project, and it is not specialized into sub types, such as manufacturing, construction, or IT.

To become certified, individuals must have 35 hours of PMP-related training along with 7,500 hours of project management experience (if they have less than a bachelor’s degree) or 4,500 hours of project management experience with a bachelor’s or higher. PMP certification is another that requires years of planning and effort.

6. Certified Scrum Master – $107,396
Another project management-related certification, Certified Scrum Master is focused on software (application) development.

Scrum is a rugby term; it’s a means for restarting a game after a minor rules violation or after the ball is no longer in play (for example, when it goes out of bounds). In software development, Scrum is a project management process that is designed to act in a similar manner for software (application development) projects in which a customer often changes his or her mind during the development process.

In traditional project management, the request to change something impacts the entire project and must be renegotiated-a time-consuming and potentially expensive way to get the changes incorporated. There is also a single project manager.

In Scrum, however, there is not a single project manager. Instead, the team works together to reach the stated goal. The team should be co-located so members may interact frequently, and it should include representatives from all necessary disciplines (developers, product owners, experts in various areas required by the application, etc.).

Where PMP tries to identify everything up front and plan for a way to get the project completed, Scrum takes the approach that the requirements will change during the project lifecycle and that unexpected issues will arise. Rather than holding up the process, Scrum takes the approach that the problem the application is trying to solve will never be completely defined and understood, so team members must do the best they can with the time and budget available and by quickly adapting to change.

So where does the Scrum Master fit in? Also known as a servant-leader, the Scrum Master has two main duties: to protect the team from outside influences that would impede the project (the servant) and to chair the meetings and encourage the team to continually improve (the leader).

Certified Scrum Master certification was created and is managed by the Scrum Alliance and requires the individual to attend a class taught by a certified Scrum trainer and to pass the associated exam.

7. Citrix Certified Enterprise Engineer (CCEE) – $104,240
The CCEE certification is a legacy certification from Citrix that proves expertise in XenApp 6, XenDesktop 5, and XenServer 6 via the Citrix Certified Administrator (CCS) exams for each, the Citrix Certified Advanced Administrator (CCAA) for XenApp 6, and an engineering (advanced implementation-type) exam around implementing, securing, managing, monitoring, and troubleshooting a complete virtualization solution using Citrix products.

Those certified in this area are encouraged to upgrade their certification to the App and Desktop track instead, which focuses on just XenDesktop, taking one exam to become a Citrix Certified Professional – Apps and Desktops (CCP-AD). At this point though, the CCEE is available as long as the exams are available for the older versions of the products listed.

8. Citrix Certified Administrator (CCA) for Citrix NetScaler – $103,904
The CCA for NetScaler certification has been discontinued for NetScaler 9, and those with a current certification are encouraged to upgrade to the new Citrix Certified Professional – Networking (CCP-N). In any case, those with this certification have the ability to implement, manage, and optimize NetScaler networking performance and optimization, including the ability to support app and desktop solutions. As the Citrix certification program is being overhauled, refer to https:://training.citrix.com/cms/index.php/certification/ to view the certifications available, upgrade paths, etc.

9. Certified Ethical Hacker (CEH) – $103,822
The International Council of E-Commerce Consultants (EC-Council) created and manages CEH certification. It is designed to test the candidate’s abilities to prod for holes, weaknesses, and vulnerabilities in a company’s network defenses using techniques and methods that hackers employ. The difference between a hacker and a CEH is that a hacker wants to cause damage, steal information, etc., while the CEH wants to fix the deficiencies found. Given the many attacks, the great volume of personal data at risk, and the legal liabilities possible, the need for CEHs is quite high, hence the salaries offered.

10. ITIL v3 Foundation – $97,682
IT Infrastructure Library (ITIL®) was created by England’s government in the 1980s to standardize IT management. It is a set of best practices for aligning the services IT provides with the needs of the organization. It is broad based, covering everything from availability and capacity management to change and incident management, in addition to application and IT operations management.

It is known as a library because it is composed of a set of books. Over the last 30 years, it has become the most widely used framework for IT management in the world. ITIL standards are owned by AXELOS, a joint venture company created by the Cabinet Office on behalf of Her Majesty’s Government in the United Kingdom and Capita plc, but they have authorized partners who provide education, training, and certification. The governing body defined the certification tiers, but they leave it to the accredited partners to develop the training and certification around that framework.

The Foundation certification is the entry-level one and provides a broad-based understanding of the IT lifecycle and the concepts and terminology surrounding it. Anyone wishing for higher-level certifications must have this level first, thus people may have higher certifications and still list this certification in the survey, which may skew the salary somewhat.

For information on ITIL in general, please refer to https:://www.itil-officialsite.com/. Exams for certification are run by ITIL-certified examination institutes as previously mentioned; for a list of them, please refer to https:://www.itil-officialsite.com/ExaminationInstitutes/ExamInstitutes.aspx.

11. Citrix Certified Administrator (CCA) for Citrix XenServer – $97,578
The CCA for XenServer certification is available for version 6 and is listed as a legacy certification, but Citrix has yet to announce an upgrade path to their new certification structure. Those with a CCA for Citrix XenServer have the ability to install, configure, administer, maintain, and troubleshoot a XenServer deployment, including Provisioning Services. As the Citrix certification program is being overhauled, refer to https:://training.citrix.com/cms/index.php/certification/ to view the certifications available, upgrade paths, etc.

12. ITIL Expert Certification – $96,194
The ITIL Expert certification builds on ITIL Foundation certification (see number 10 above). It is interesting that ITIL Expert pays less on average than ITIL Foundation certification. Again, I suspect the salary results may be somewhat skewed depending on the certifications actually held and the fact that everyone who is ITIL certified must be at least ITIL Foundation certified.

To become an ITIL Expert, you must pass the ITIL Foundation exam as well as the capstone exam, Managing Across the Lifecycle. Along the way, you will earn intermediate certifications of your choosing in any combination of the Lifecycle and Capability tracks. You must earn at least 22 credits, of which Foundation accounts for two and the Managing Across the Lifecycle exam counts for five. The other exams count for three each (in the Intermediate Lifecycle track) or four each (in the Intermediate Capability track) and can be earned in any order and combination, though the official guide suggests six recommended options. The guide is available at https:://www.itil-officialsite.com/Qualifications/ITILQualificationScheme.aspx by clicking on the English – ITIL Qualification Scheme Brochure link.

13. Cisco Certified Design Associate (CCDA) – $95,602
Cisco’s certification levels are Entry, Associate, Professional, Expert, and Architect. Those who obtain this Associate-level certification are typically network design engineers, technicians, or support technicians. They are expected to design basic campus-type networks and be familiar with routing and switching, security, voice and video, wireless connectivity, and IP (both v4 and v6). They often work as part of a team with those who have higher-level Cisco certifications.

To achieve CCDA certification, you must have earned one of the following: Cisco Certified Entry Networking Technician (CCENT), the lowest-level certification and the foundation for a career in networking); Cisco Certified Network Associate Routing and Switching (CCNA R&S); or any Cisco Certified Internetwork Expert (CCIE), the highest level of certification at Cisco.
You must also pass a single exam.

14. Microsoft Certified Systems Engineer (MCSE) – $95,276
This certification ranked number 14 with an average salary of $95,505 for those who didn’t list an associated Windows version and $94,922 for those who listed MCSE on Windows 2003, for the weighted average of $95,276 listed above.

The Microsoft Certified Systems Engineer is an old certification and is no longer attainable. It has been replaced by the Microsoft Certified Solutions Expert (yes, also MCSE). The Engineer certification was valid for Windows NT 3.51 – 2003, and the new Expert certification is for Windows 2012. There is an upgrade path if you are currently an MCSA or MCITP on Windows 2008. There is no direct upgrade path from the old MCSE to the new MCSE.

15. Citrix Certified Administrator (CCA) for Citrix XenDesktop – $95,094
The CCA for XenDesktop certification is available for versions 4 (in Chinese and Japanese only) and 5 (in many languages including English). Those with a current certification are encouraged to upgrade to the new Citrix Certified Associate – Apps and Desktops (CCA-AD). In any case, those with this certification have the ability to install, administer, and troubleshoot a XenDesktop deployment, including Provisioning Services and the Desktop Delivery Controller as well as XenServer and XenApp. As the Citrix certification program is being overhauled, refer to https:://training.citrix.com/cms/index.php/certification/ to view the certifications available, upgrade paths, etc.

Rounding Out the Top 25

A few popular certifications just missed the Top 15 cut due to a low total number of responses or an average (mean) pay just outside the threshold. Due to their popularity, I have included them for informational purposes.

Certification Average Pay
CISSP: Certified Information Systems Security Professional $114,287

MCSE: Microsoft Certified Systems Engineer 2003 $94,922

RHCSA: Red Hat Certified System Administrator $94,802

VCP-DCV: VMware Certified Professional – Data Center Virtualization $94,515

JNCIA: Juniper Networks Certified Internet Associate $94,492

MCTS: Windows Server 2008 Applications Infrastructure Configuration $91,948

MCITP: Enterprise Administrator $91,280

CCNP: Cisco Certified Network Professional $90,833

WCNA: Wireshark Certified Network Analyst $88,716

CCNA R&S: Cisco Certified Network Associ te Routing and Switching $81,308


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCSE Training at certkingdom.com

Microsoft Certifications 2014 can you a JOB

With the new technologies coming in the market every other day, life has become advanced these days. In this modern era, you have to be on your toes all the time especially if your career in related to the field of IT: one has to stay updated with all the latest programs and their features in order to stay ahead of his peers. For instance, there was a time when Gramophone was the invention of the century but then it was replaced with mobile phones. Similarly, the invention of television and radio created quite a heap in the early 20th century but later on, the thunder was stolen by computers in the late 20th century.

In this day and age, computers and internet have become the center of attention. Consequently, IT has become the most popular field. IT experts are quite in demand these days; but with the emergence of new programs every other day, they have to keep up with the latest technology in order to stay ahead in the race. One way of staying ahead is the certification courses. These courses ensure that the candidate has attained all the latest knowledge and is ready to roll in the world of technology.

This article will discuss some of the most popular certification courses offered by Microsoft.

Microsoft Technology Associate

This is a certification course designed for the starters: people who want to start their line of business in the field of technology. Accordingly, it tests the fundamentals of IT and validates that the candidates have a basic understanding of the essentials. This course has been divided into three tracks and the candidates can choose any one of the tracks, depending on their preference. The tracks are: IT infrastructure, Database Design and Developer.

Microsoft MCSA- Windows Server 2008
This exam is designed for the IT personnel and it validates their skills in Server Networking management. IT professionals and System Administrators are suggested to take MCSA- Windows Server 2008 exam especially if they are looking forward to earning their MCSE certification.

Microsoft MCSA- Windows Server 2012
This certification exam is an advanced level exam which validates that the candidates have sufficient knowledge of Windows Server 2012 for its proper installation, configuration and working. MCSA- Windows Server 2012 certified can easily get the position of Network Administrator, Computer Systems Administrator or Computer Network Analyst.

Microsoft MCSE- Server Infrastructure
This certification course is designed for IT experts and it will get you the title of ‘Solutions Expert’. It tests individual’s skills in effectively and efficiently running a modern data center with some experience in virtualization storage and networking, identity management and systems management.

Microsoft MCSE- Desktop Infrastructure
This course validates that the individuals can manage desktops and devices, while maintaining their security and integrity, from anywhere around the globe. It also tests individuals’ expertise in application and desktop virtualization together with remote desktop services. With this certification in hand, you can easily qualify for a job of Data and Application Manager or Desktop and Device Support Manager.

Microsoft MCSE- Messaging
This certification is an expert level certification and it validates that the applicant has relevant skills in order to increase user productivity and flexibility. It also validates that the person has sufficient knowledge as to how to improve data security and reduce data loss. After passing this certification exam, candidates can easily qualify for the position of Network and Computer System Administrator.

Microsoft  MCSE- Communication
This certification validates candidates’ expertise in using Lync Server to create an effective communication path that can be accessed from all around the globe. This certification is also an expert level certification and you can easily qualify for the position of Network and Computer System Administrator with it.

Microsoft  MCSE- SharePoint

This Microsoft Certified Solutions Expert certification course verifies that the candidates have the necessary expertise to share, synchronize and organize the data across the organization. SharePoint 2013 is the updated version of Microsoft Office, and passing this certification can get you a job of Systems or Network Analyst.

Microsoft MCSD- SharePoint Application

This Microsoft Certified Solutions Developer certification course is another of expert level certification courses which validates individuals’ expertise in web programming. It also requires the individuals to design and develop applications with Microsoft SharePoint. With this certification, you can easily secure the position of Software Developer or Web Developer.

Microsoft Private Cloud

MCSE- Private Cloud certification course tests candidates’ expertise to manage Private Cloud computer technologies. It also verifies that the candidate can implement these technologies in a way to optimize service delivery. You can easily get the position of Server Administrator and Network Manager with this certification on your resume.

Microsoft System Center Configuration Manager
Microsoft System Center Certification focuses on the skills to manage computer and clients. The candidates should be able to configure, administer and deploy System Center 2012 in order to pass this exam. You can earn the title of Microsoft Certified Technology Specialist through this certification.

Microsoft Server Virtualization
This certification verifies that the candidate is familiar with Server Virtualization, both on Windows Server and System Center. This course expands individual’s expertise and skills in order for him to meet the rapidly modernizing technological business needs, and it can get him the title of Microsoft Specialist in no time.

Microsoft Office Certifications
Microsoft offers many certifications that verify candidates’ skills in handling and using Microsoft Office Applications. These certifications start from beginners level and go up to the master level. Microsoft Office Specialist is a beginner level certification whereas Microsoft Office Specialist Expert is an advanced level certification. Last but not the least; Microsoft Office Specialist Master is a master level certification.

Microsoft MCSA- Office 365
This course focuses on individual’s skills in handling Office 365 together with productivity tools and cloud-based collaboration. This certification can easily get you the position of Cloud Application Administrator or SaaS Administrator.

Microsoft Dynamics

This Microsoft Certified Technology Specialist certification confirms an individual’s expertise in Microsoft dynamics: a specific module can be chosen for this certification. However, this certification will be withdrawn from the market, at the end of this year, and replaced with the new ones.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

70-643: Windows Server 2008 Applications Infrastructure, Configuring


QUESTION 1
You work as the network administrator at ABC.com. The ABC.com network has a domain named
ABC.com. All servers on the ABC.com network run Windows Server 2008 and all client computers
run Windows Vista.
ABC.com recently entered into partnership with Weyland Industries.
You create user accounts in the ABC.com domain for some employees of Weyland Industries.
You place the user accounts into a global security group named WeySecure.
You want to provide members of the WeySecure group access to parts of the ABC.com network
via a Terminal Services Gateway server named ABC-TS01.
What do you need to do to ensure that the WeySecure group is able to access ABC-TS01?

A. You need to configure a Remote Access Policy.
B. You need to create and configure a Connection Authorization Policy.
C. You need to configure Device redirection.
D. You need to configure a Network Access Protection Policy.

Answer: B

Explanation: To provide a security group access to ABC-TS02, you need to create and configure
a Connection Authorization Policy.
A connection authorization policy (CAP) allows you to control who can connect to the Terminal
Server through the Terminal Services Gateway. You can configure what groups can access the
Terminal Server through the TS Gateway.
Reference: Configuring the Windows Server 2008 Terminal Services Gateway (Part 2) / Create a
Terminal Services Gateway CAP
http://www.windowsecurity.com/articles/Configuring-Windows-Server-2008-Terminal-Services-
Gateway-Part2.html


QUESTION 2
You work as a network administrator for ABC.com. The ABC.com network consists of a domain
named ABC.com. All servers on the ABC.com network either run Windows Server 2008 or
Windows Server 2003.
The ABC.com network contains a Windows Server 2003 server named ABC-SR05 and a Windows
Server 2008 server named ABC-SR06. ABC-SR05 has Microsoft SQL Server 2005 and Microsoft
Windows SharePoint Services (WSS) 2.0 installed.
You receive instruction to uABCrade Windows SharePoint Services (WSS) 2.0 to Windows
SharePoint Services (WSS) 3.0 and have it run on ABC-SR06. You need to have Windows
SharePoint Services (WSS) 3.0 retain the content and settings from Windows SharePoint Services
(WSS) 2.0.
Which of the following steps would be the best way to accomplish this task? (Choose multiple
answers).

A. You should back up the SharePoint configuration as well as the content from ABC-SR05.
B. You should back up the SQL Server 2005 configuration as well as the Microsoft Windows
SharePoint Services (WSS) databases from ABC-SR05.
C. You should uABCrade ABC-SR05 to Windows Server 2008.
D. You should install Microsoft Windows SharePoint Services (WSS) 3.0 on ABC-SR06.
E. You should install Microsoft Windows SharePoint Services (WSS) 2.0 on ABC-SR06.
F. You should restore the backup from ABC-SR05 to ABC-SR06.
G. You should uABCrade Windows SharePoint Services (WSS) 2.0 to Windows SharePoint
Services (WSS) 3.0 on ABC-SR06.

Answer: A,E,F,G

Explanation: In order to migrate to SharePoint Services (WSS) 3.0 from ABC-SR05 to ABC-SR06
with all the configuration and content, you need to install WSS 2.0 on ABC-SR06. You need to
back up the WSS 2.0 configuration and content from ABC-SR05. Then the backup can be restored
from ABC-SR05 to ABC-SR06. Lastly an in-place uABCrade of WSS 2.0 to WSS 3.0 can be
executed on ABC-SR06.
When you run an in-place uABCrade, all content and configuration data is uABCraded in-place, at
one time. When you start the in-place uABCrade process, the Web server and Web sites remain
offline until the uABCrade has been installed. In-place uABCrades are best for a stand-alone
server and small installations as in this case
Reference: Install and configure Office SharePoint Server for an in-place uABCrade
http://technet.microsoft.com/en-us/library/cc263212(TechNet.10).aspx
Determine uABCrade approach (Office SharePoint Server)
http://technet.microsoft.com/en-us/library/cc263447(TechNet.10).aspx


QUESTION 3
You work as the network administrator at ABC.com. The ABC.com network consists of a domain
named ABC.com. ABC.com has headquarters in London and branch office in Paris. All servers on
the ABC.com network run Windows Server 2008 and all client computers run Windows Vista.
The ABC.com network contains a member server named ABC-SR01. ABC-SR01 is configured as
the Key Management Service (KMS) server.
You are planning to roll out 20 new Windows Server 2008 computers on the network.
After installing Windows Server 2008 on three of the computers you discover that the servers are
unable to activate using ABC-SR01.
How can you ensure that the new computers are able to activate using ABC-SR01?

A. You should ensure that the new servers have a connection to the internet.
B. You should install the Key Management Service (KMS) on a dedicated Windows Server 2008
computer.
C. You should phone Microsoft Licensing House to Activate the servers by telephone.
D. You should install Windows Server 2008 on at least 7 of the remaining computers.

Answer: D

Explanation: To activate the new server through KMS server, you should complete the installation
of at least 10 servers. The Key Management Service is a Windows service. KMS is a trusted
mechanism that, once the KMS host is activated, allows volume client computers within the
enterprise to activate themselves without any interactions with Microsoft. KMS activation of
Windows Server 2008 follows a hierarchical structure. Each successive product group can activate
all the groups below it, and the KMS can be hosted on any edition that it can activate.


QUESTION 4
You are the network administrator at ABC.com. The ABC.com network consists of a domain
named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all client
computers run Windows XP Professional. ABC.com currently makes use of two computers named
ABC-TS01 and ABC-TS02 which runs the Terminal Server Session Broker role.
ABC.com recently entered into partnership with Weyland Industries who make use of two
computers named WEYLAND-TS01 and WEYLAND-TS02. During the course of the day you
receive instruction from ABC.com and Weyland Industries to configure their Terminal servers for
load balancing whilst ensuring ABC-TS02 is configured as the preferred server.
What program would you use to configure the load balancing?

A. You should use the Terminal Services Resource Authorization policy (RAP).
B. You should use the Terminal Services Configuration utility.
C. You should use the Terminal Services Connection Authorization policy (CAP).
D. You should use the Group Policy Manager utility.

Answer: B

Explanation: In order to configure load balancing for the four terminal servers you need to make
use of the Terminal Services Configuration utility. This will also make ABC-TS02 the preferred
server for TS sessions. Using NLB with Terminal Services provide increased availability,
scalability, and load-balancing performance, as well as the ability to distribute a large number of
Terminal Services clients over a group of terminal servers.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Server 2008 Certification, MCTS 70-643 Training at certkingdom.com

Availing the MCTS Certification

The MCTS Certification is one of the most advanced and important career oriented IT program that is currently being pursued by thousands of candidates all over the world. Since, this is a tough exam, it is necessary for the individuals to study very hard and put all efforts to qualify the exam. Hence, the preparation needs to be adequate and the skills derived from the program should be sound and appropriate, so that they can be put to good use at the time of the work.

Studying for the MCTS training program
It is necessary for the candidates to give enough time for studying and preparing for the MCTS exam. They need to undergo frequent practice tests, to ensure that they have a proper understanding of the different topics covered in the MCTS course and to ensure that they are ready to undergo the certification examination. This will not only help them to build immense confidence, but also provide them the much needed boost to their existing skills and knowledge. Therefore, preparation for the exam should be adequate and plenty of research needs to be done by the candidate, to ensure better grades. The Knowledge Academy professionals are well versed with the different types of topics that are covered in the course. This is because, they are provided with adequate training in the MCTS program and taken through various practical sessions, for giving them a better and clear understanding of the program.

MCTS course for facing challenges
It is important for the candidates to undergo the program seriously and sincerely, since, it would give them proper exposure on the MCTS Certification and help them to acquire the necessary skills that would be required for implementing in the work place. The exam presents the candidate with a chance to challenge their acquired knowledge and to understand how well they have learnt the program. Presently, the candidates are provided with three different formats, which include case study formats that would challenge their analytical skills, virtual labs and simulations for testing their knowledge and skills within the real setting.

The MCTS training program also presents the candidate with a chance to have a wonderful career change, in case they are finding their present one to be not quite rewarding. It has been noticed that candidates, who have successfully completed the program are presented with plenty of job opportunities and are provided with better positions and wonderful pay package. Moreover, the MCTS program also prepares the candidates to get a proper career change and to get a lucrative and rewarding career. A good MCTS training program is sure to include the study kits, audio and video presentations, preparation labs, mock test questions, study guides, self-study training kits and an access to a qualified and trained instructor, who would make all the difference to the entire MCTS course. This is sure to improve the knowledge of the individuals and help them to ascertain a better and rewarding career. Also, the candidates are sure to enjoy their training program and gain plenty of knowledge from it.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

70-630 – TS:Microsoft Office SharePoint Server 2007, Configuring

QUESTION 1
You work as a SharePoint Server administrator at ABC.com. You have just the completed the
insertion of new content in the root site. However, later that day the users complained that the new
content is not added in the search results when they run searches on the root site. You need to
make sure that the relevent content is included in query results.
What actions should you take to perform this task?

A. The best option is to set the Complete Through constraint.
B. The best option is to reset the crawled content and start a full crawl.
C. The best option is to set the Resource Center view.
D. The best option is to edit the CSS style sheet to include the new content.

Answer: B

Explanation:


QUESTION 2
You work as a SharePoint Server administrator at ABC.com. One of ABC.com branch offices
consists of a Windows Server 2003 Active Directory domain. You have received instructions from
the CIO to extend SharePoint user profiles to include the userID property from the users’ domain
accounts.
What actions should you take to perform this task?

A. The best option is to add a Microsoft Operations Manager (MOM) server.
B. The best option is to create a custom Microsoft Management Console that can access the
branch office.
C. The best option is to create a new user profile property that is configured with import mapping.
D. The best option is to run the SharePoint Products and Technologies Configuration.

Answer: C

Explanation:


QUESTION 3
You work as a SharePoint Server administrator at ABC.com. The ABC.com network contains a
SharePoint Portal Server 2003 server named ABC-SR44. ABC-SR44 hosts a SharePoint portal
that is accessed through a hyperlink on the users’ client computers. The hyperlink points to
http://www.ABC.com/ms/certifications.
You want to migrate ABC-SR44 to Microsoft Office SharePoint Server (MOSS) 2007. You need to
ensure that the SharePoint portal will be accessible after the migration.
What actions should you take to perform this task?

A. By running the stsadm command with the osearch operator.
B. By editing the hyperlink so it will point to the new URL of the migrated content.
C. By running the stsadm command with the enumsites operator.
D. By enabling the Shared Services Provider Synchronizing job.

Answer: B

Explanation:


QUESTION 4
You work as a SharePoint Server administrator at ABC.com. ABC.com contains a Microsoft
Content Management Server 2002 computer named ABC-SR11. You have received instructions
from the CIO to uABCrade ABC-SR11 to Microsoft Office SharePoint Server (MOSS) 2007.
What actions should you take to perform this task?

A. The best option is to run the stsadm command with the addwppack operator.
B. The best option is to run the stsadm command with the installfeature operator.
C. The best option is to run the CMS Assessment utility on ABC-SR11.
D. The best option is to run the Optimize HTML command in SharePoint Designer.

Answer: C

Explanation:


QUESTION 5
You work as a SharePoint Server administrator at ABC.com. ABC.com has a Development
department with a database server named ABC-DB02. ABC-DB02 hosts a database named
CkdProducts. ABC.com has implemented a Web application in the SharePoint site that must
access data in CkdProducts.
What actions should you take?

A. The best option is to obtain and install an application definition file from the Development
department.
B. The best option is to enable the Save for Sharing option, then save CkdProducts in the
Development department.
C. The best option is to save CkdProducts as a Microsoft Excel 2007 worksheet.
D. The best option is to create a custom group in the Site Settings page to the trusted file locations
list.

Answer: A

Explanation:


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-236 Microsoft Exchange Server 2012

Contents
Preface xvii
Foreword xxi
1 Introduction 1
1.1 A decade and counting of Exchange deployments 1
1.1.1 The way we were 2
1.1.2 The protocol wars 2
1.1.3 Ever increasing mobility 4
1.1.4 Third-party products and management 6
1.1.5 Some interesting projects 6
1.1.6 The not so good points 7
1.1.7 Exchange’s connection with the Active Directory 10
1.1.8 Reviewing predictions made in 1996 11
1.2 Microsoft’s themes for Exchange 2007 12
1.2.1 The happy prospect of a migration 18
1.3 Preparing for Exchange 2007 20
1.4 Installing Exchange 2007 22
1.4.1 Modifying and removing servers 27
1.4.2 Validating the installation 27
1.4.3 Third-party software 28
1.5 Server roles 28
1.5.1 Services 32
1.6 Licensing 36
1.6.1 Version numbers 40
1.6.2 32-bit Exchange 2007? 41
1.7 Support 42
1.8 Challenges for Exchange 2007 42
1.9 Into the future 45
vi Contents
2 Exchange, Windows, and the Active Directory 47
2.1 Active Directory and Exchange 47
2.1.1 Domain Designs 48
2.2 Active Directory replication 50
2.2.1 Replication basics 51
2.2.2 When Active Directory replication happens 53
2.2.3 Active Directory naming contexts 55
2.2.4 Transforming Domain controllers into
Global Catalogs 58
2.2.5 USNs and replication 60
2.2.6 Urgent replication 64
2.2.7 Intrasite and Intersite replication 65
2.2.8 High-watermark vector and up-to-date vector tables 68
2.2.9 Changes in Active Directory replication in Windows 2003 70
2.3 Exchange’s Active Directory Topology service 71
2.3.1 DSAccess (or ADAccess) 72
2.3.2 How many Global Catalog servers do I need? 75
2.3.3 Where are my Global Catalogs? 76
2.4 Recovering deleted Active Directory accounts 78
2.5 Exchange and the Active Directory schema 80
2.5.1 Updating the schema with an installation 80
2.5.2 Changing the schema 82
2.5.3 Active Directory custom attributes for Exchange 85
2.5.4 Updating the schema to allow Ambiguous
Name Resolution 86
2.5.5 Exchange-specific permissions 87
2.5.6 Exchange property sets 88
2.6 Longhorn and Exchange 2007 90
2.7 The very important LegacyExchangeDN attribute 91
2.8 Brain surgery for the Active Directory: ADSIEDIT 93
2.8.1 LDP and LDIFDE 96
2.8.2 Active Directory for Exchange 98
3 The Basics of Managing Exchange 2007 99
3.1 Exchange Management Console 100
3.1.1 The importance of filters 104
3.1.2 Managing mixed organizations 109
3.1.3 Running EMC remotely or on a workstation 112
3.1.4 No more AD Users and Computers 113
3.1.5 Changing columns 115
Contents vii
Contents
3.1.6 Visual effects 116
3.2 Why some options have disappeared from EMC 118
3.2.1 Coping with change 122
3.3 Changes in the Exchange delegation model 124
3.4 Customized Recipient Management 128
3.4.1 Adieu RUS 130
3.4.2 Recipient types 132
3.5 Moving users 133
3.5.1 Moving mailboxes 134
3.5.2 Logging mailbox moves 138
3.6 Using distribution groups 140
3.6.1 Forming groups 142
3.6.2 Group changes in Exchange 2007 145
3.6.3 Expanding distribution lists 147
3.6.4 How many objects can I have in a group? 148
3.6.5 Managing group membership 149
3.6.6 Protected groups (and users) 152
3.7 Using groups for permissions 154
3.7.1 Managing distribution groups from Outlook 154
3.8 Dynamic distribution groups 156
3.8.1 Changing filters and conditions for dynamic
distribution groups 157
3.8.2 A note on OPATH 159
3.8.3 A new UI for dynamic groups 160
3.8.4 Creating New dynamic groups 162
3.8.5 Using dynamic Distribution groups 167
3.9 Mailbox quotas 168
3.9.1 Setting mailbox quotas 170
3.10 Email address policies 173
3.10.1 Mailbox moves and email address policies 178
3.10.2 Queries that drive email address policies 178
3.11 Address lists 183
3.11.1 Upgrading Address Lists to Exchange 2007 format 187
3.12 User naming conventions 188
3.13 Server naming conventions 192
3.14 Moving from the basics 194
4 The Exchange Management Shell 195
4.1 EMS: Exchange’s management shell 197
4.1.1 Working with PowerShell commands 199
4.1.2 Exchange shell commands 204
viii Contents
4.1.3 Command editing 208
4.1.4 Getting at more information about something 210
4.1.5 Using common and user-defined variables 214
4.1.6 Identities 217
4.1.7 Working in a multi-domain forest 219
4.1.8 Profiles 221
4.1.9 PowerShell in batch 223
4.1.10 Execution policies 224
4.1.11 Sending email from the shell 226
4.2 Learning from EMC 229
4.3 Using EMS to work with mailboxes 232
4.3.1 Creating a new mailbox with a template 232
4.3.2 Setting and retrieving mailbox properties 234
4.3.3 Other ways of interacting with mailboxes 244
4.3.4 Get-Recipient 245
4.3.5 Moving mailboxes 245
4.3.6 Accessing another user’s mailbox 249
4.3.7 Different commands and different properties 251
4.3.8 Contacts 252
4.4 Working with distribution groups 253
4.4.1 Working with dynamic distribution groups 257
4.4.2 Advanced group properties 262
4.5 Delegation through the shell 265
4.6 Creating efficient filters 267
4.7 Bulk updates 270
4.7.1 Creating sets of mailboxes 273
4.8 Reporting mailbox data 275
4.8.1 Special properties 282
4.9 Using the shell for other management tasks 284
4.10 Command validation 287
4.11 Working with remote servers 290
4.12 Working with non-Exchange 2007 servers 291
4.13 Testing Exchange 2007 292
4.13.1 Client connections 294
4.13.2 Mail Flow 295
4.13.3 Miscellaneous test commands 297
4.14 PowerShell for Exchange administrators 297
5 The Store 301
5.1 Introducing the Store 301
5.2 Differences in the Exchange 2007 Store 306
Contents ix
Contents
5.2.1 Are 64 bits that important? 307
5.2.2 Trading memory for I/O 312
5.2.3 The decrease in storage costs 317
5.3 No more streaming database 318
5.4 Tables and items 320
5.5 Storage groups 323
5.5.1 Creating a new storage group and database 327
5.5.2 Working with storage groups and databases 329
5.6 Transaction logs 331
5.6.1 Circular logging 335
5.6.2 Creating new transaction logs 337
5.6.3 Reserved logs 338
5.6.4 Transactions, buffers, and commitment 339
5.6.5 Transaction log I/O 341
5.6.6 Protecting transaction logs 341
5.6.7 Transaction log checksum 342
5.6.8 Maximum database size 343
5.7 Database portability 345
5.7.1 Zero database pages 349
5.8 MAPI connections and logons 349
5.9 The Deleted Items cache 350
5.9.1 Cleaning the Deleted Items cache 356
5.9.2 Recovering items and mailboxes 357
5.10 Background maintenance 360
5.10.1 Background tasks 364
5.10.2 Tracking background maintenance 367
5.11 Fixing failed databases 368
5.12 Exchange 2007 content indexing 375
5.12.1 Using content indexing 380
5.13 Public folders 383
5.13.1 Public folders and Exchange 2007 384
5.13.2 Changes in public folders administration since
Exchange 2003 386
5.13.3 Calming replication storms 388
5.13.4 Managing public folders with Exchange 2007 392
5.13.5 Permissions on top-level folders 405
5.13.6 Referrals 405
5.13.7 Migrating public folder content 406
5.14 Removing database size limits 408
5.15 Backups 408
5.15.1 NTBackup 410
x Contents
5.15.2 Other commercial backup products 410
5.15.3 Creating a backup strategy 413
5.15.4 Backups and storage groups 415
5.15.5 Checkpoint file 421
5.15.6 The future of streaming backups 426
5.16 Moving from the Store 427
6 Exchange Transport and Routing 429
6.1 The evolution of routing 429
6.2 Change through experience 430
6.2.1 Hidden administrative and routing groups 433
6.3 Exchange 2007 transport architecture 435
6.3.1 The critical role of hub transport servers 438
6.3.2 Receive connectors 440
6.3.3 Send connectors 447
6.3.4 Linking Exchange 2003 and Exchange 2007 453
6.3.5 Multiple routes into Exchange 2003 458
6.3.6 Decommissioning Exchange 2003 routing groups 458
6.3.7 Handling Exchange 2003 link state updates
during migration 458
6.3.8 Foreign connectors 459
6.3.9 Authorization 460
6.3.10 Accepted domains 460
6.3.11 Transport storage 461
6.4 Routing ABC 464
6.4.1 Resolving multiple paths 467
6.4.2 Most specific connector 467
6.4.3 Connector cost 469
6.4.4 Closest proximity 469
6.4.5 The role of hub routing sites 470
6.4.6 Site link costs versus routing costs 471
6.4.7 Instructing mailbox servers 472
6.4.8 Bypassing some connections 472
6.4.9 Protocol logging 473
6.4.10 X.400 support 474
6.4.11 Bifurcation 475
6.4.12 Header firewalls 476
6.5 Transport configuration 476
6.5.1 Transport configuration file 481
6.5.2 Routing logs 483
6.6 Queues 485
Contents xi
Contents
6.6.1 The Queue Viewer 488
6.6.2 The Unreachable queue 491
6.6.3 Poison messages 493
6.7 Back Pressure 494
6.8 Delivery Status Notifications 496
6.8.1 Customizing DSNs 501
6.8.2 Postmaster addresses 504
6.9 Transport agents 505
6.10 Transport summary 506
6.11 Edge servers 506
6.11.1 Edge or hub? 508
6.11.2 Basic Edge 510
6.11.3 Edge Synchronization 511
6.11.4 Basic Edge security 518
6.11.5 Fighting spam and email viruses 518
6.11.6 Defense in depth 522
6.11.7 Microsoft’s approach to mail hygiene 523
6.11.8 Forefront for Exchange 528
6.11.9 Mail Hygiene Agents 533
6.11.10 Agent logs 535
6.11.11 Connection filtering 536
6.11.12 Sender filtering 538
6.11.13 Address Rewrite agent 539
6.11.14 Sender ID agent 541
6.11.15 Content filtering 547
6.11.16 Content Filter updates 550
6.11.17 Per-user SCL processing 553
6.11.18 Safelist Aggregation 554
6.11.19 Sender reputation 557
6.11.20 Recipient filtering 559
6.11.21 Blocking file attachments 560
6.11.22 Attachment filtering 562
6.11.23 Edge transport rules 563
6.11.24 Available Edge 565
6.12 Client-side spam suppression 567
6.12.1 Outlook’s Junk Mail Filter 568
6.12.2 Postmarks 573
6.12.3 Restricting OOF and other notifications 574
6.13 Routing onwards 580
xii Contents
7 Clients 581
7.1 Outlook 583
7.1.1 Outlook web services 585
7.1.2 Understanding Outlook’s relationship with Exchange 591
7.1.3 Deploying cached Exchange mode 596
7.1.4 Address caching 599
7.1.5 MAPI compression and buffers 600
7.1.6 Conflict resolution 602
7.1.7 Preventing MAPI clients from connecting 603
7.1.8 Outlook 2007 and Exchange 5.5 607
7.2 Offline and personal Stores 608
7.2.1 Personal folders 609
7.2.2 Mail delivery to personal folders 611
7.2.3 Configuring PSTs 615
7.2.4 PST archiving 617
7.3 Offline folder files 619
7.3.1 OST synchronization 621
7.3.2 When things go wrong with your OST 623
7.4 Out of Office changes 624
7.4.1 The big question: Is Outlook 2007 worth the upgrade? 625
7.5 The Offline Address Book (OAB) 626
7.5.1 Downloading the OAB 627
7.5.2 OAB files on the PC 628
7.5.3 The evolving OAB format 630
7.5.4 OAB and cached Exchange mode 632
7.5.5 OAB generation and distribution 634
7.5.6 Creating a customized OAB 640
7.5.7 Allocating OABs to users 642
7.6 Outlook Anywhere 645
7.7 Outlook Web Access 650
7.7.1 New features in Outlook Web Access 2007 652
7.7.2 Outlook Web Access Light 658
7.7.3 International versions 662
7.7.4 Accessing legacy data 664
7.7.5 Managing Outlook Web Access 666
7.7.6 Authentication 667
7.7.7 Segmentation 671
7.7.8 Notifications 675
7.7.9 Controlling attachments 677
7.7.10 Themes 680
7.7.11 Client settings 684
Contents xiii
Contents
7.8 Internet client access protocols 684
7.8.1 IMAP4 685
7.8.2 The Exchange 2007 IMAP server 689
7.9 Mobile clients 694
7.9.1 Selecting mobile devices 696
7.9.2 Server-based ActiveSync 698
7.10 Windows Mobile 6.0 and Exchange 2007 702
7.10.1 ActiveSync policies 706
7.10.2 Managing mobile devices through EMC 711
7.10.3 Moving mailboxes to Exchange 2007 and ActiveSync 713
7.10.4 Estimating network traffic for mobile devices 715
7.10.5 Analyzing ActiveSync logs 717
7.10.6 Wiping mobile devices 719
7.10.7 Debugging synchronization 721
7.11 Comparing Windows Mobile and BlackBerry 723
7.11.1 Processing the mail 725
7.11.2 Other messaging options for Windows Mobile 730
7.11.3 Power management 731
7.11.4 Input flexibility 732
7.12 Unified Communications 735
7.13 Unified Messaging 737
7.13.1 Client Access to voicemail 741
7.13.2 Dealing with voicemail 745
7.13.3 Voice synthesis 747
7.13.4 Pure voicemail 748
7.13.5 The magic of SIP 749
7.13.6 Speech Grammars 752
7.13.7 Phonetic names 754
7.13.8 Cross-forest UM 756
7.14 Special mailboxes 756
7.15 Clients and users 759
8 Managing Users 761
8.1 Room and equipment mailboxes 762
8.1.1 Managing properties of room and equipment mailboxes 765
8.1.2 Converting old mailboxes to rooms 770
8.2 Helping users to use email better 771
8.2.1 Eliminating bad habits 771
8.2.2 Disclaimers 779
8.2.3 Out-of-Office Notifications 781
8.2.4 The last few bad email habits 781
xiv Contents
8.3 Customizing display templates 782
8.4 Exchange 2007 and compliance 787
8.4.1 The growing need for compliance 789
8.4.2 Transport rules 792
8.4.3 Using a rule to add disclaimer text to outgoing messages 794
8.4.4 Capturing selected messages 795
8.4.5 Becoming more complicated 797
8.4.6 Creating an ethical firewall 800
8.4.7 Transport rule storage 803
8.4.8 Rules and the shell 804
8.4.9 Journal rules 808
8.5 Messaging Record Management 815
8.5.1 Managing default folders 818
8.5.2 Managing custom folders 824
8.5.3 Allocating managed folders with policies 826
8.5.4 Applying policies to users 827
8.5.5 The Managed Folder Assistant 829
8.5.6 Logging Managed Folder activity 831
8.5.7 Using Managed Folders 833
8.5.8 Harvesting information from managed folders 835
8.6 Message classifications 837
8.6.1 Adding intelligence to classification through rules 844
8.7 Copying user mailboxes 848
8.7.1 Auditing 853
8.8 Free and busy 853
8.8.1 Looking at free and busy data 855
8.8.2 Free and busy in Exchange 2007 861
8.8.3 Changes in Outlook 2007 863
8.8.4 Cross-forest free and busy 866
9 Hardware and Performance 867
9.1 Moving toward 64-bit Exchange 867
9.2 Buying servers for Exchange 2007 870
9.3 The storage question 876
9.4 RPC pop-ups 881
9.5 Clusters and Exchange 882
9.6 Continuous replication and Exchange 2007 888
9.6.1 Concepts 889
9.7 Deploying Local Continuous Replication (LCR) 892
9.7.1 How LCR works 897
9.7.2 LCR operations 900
Contents xv
Contents
9.7.3 LCR restrictions 903
9.7.4 LCR database transition 904
9.8 Deploying Cluster Continuous Replication (CCR) 906
9.8.1 Comparing CCR and traditional clusters 910
9.8.2 CCR in practice 912
9.8.3 CCR failovers 915
9.8.4 Lost Log Resilience 919
9.8.5 The transport dumpster 921
9.8.6 Standby Continuous Replication 924
9.9 Continuous Log Replication: Good or bad? 924
9.10 Virtual Exchange 925
10 More useful things to Know about Exchange 929
10.1 Automated analysis 929
10.1.1 SSCP 932
10.1.2 Microsoft’s Release to Web (RTW) strategy 933
10.2 The Exchange Toolbox 935
10.2.1 Updates 936
10.2.2 Database Recovery Management 937
10.2.3 Database Troubleshooter 942
10.2.4 Mail Flow Troubleshooter 943
10.3 Messaging tracking logs 945
10.3.1 Generating message tracking logs 947
10.3.2 Log sizes and ages 950
10.3.3 Keeping track of message subjects 951
10.3.4 Accessing message tracking logs 951
10.3.5 Using the Troubleshooting Assistant to track messages 952
10.3.6 Tracking messages with EMS 956
10.3.7 Message delivery latency 959
10.4 Management frameworks 959
10.5 Utilities 963
10.5.1 Performance testing 963
10.5.2 The MFCMAPI utility 965
10.5.3 MDBVU32 968
10.5.4 ExMon—Exchange User Monitor 968
10.5.5 PFDavAdmin 971
10.5.6 LogParser 973
10.5.7 Outlook Spy 978
10.6 Bits and pieces 978
10.6.1 Where the Exchange team hangs out 978
10.6.2 Online Forums 979
xvi Contents
10.7 Conferences 979
10.7.1 Magazines 980
10.7.2 How Exchange uses registry keys 980
10.8 Good reference books 981
A Appendix 983
A.1 Message Tracking Log Format 983
A.2 Events noted in Message Tracking Logs 985
B Important Exchange PowerShell commands 987
B.1 Recipient management commands 987
B.2 Exchange server administrative Commands 990
B.3 Databases and Storage Groups 993
B.4 Address Lists and Email Policies 995
B.5 Queues and Messages 995
B.6 Edge Synchronization 996
B.7 Routing 997
B.8 ActiveSync 998
B.9 Public folders 999
B.10 Transport and journal rules 1000
B.11 IMAP and POP 1001
B.12 Active Directory commands 1002
B.13 Testing Exchange 2007 1003
B.14 Basic PowerShell 1004
B.15 PowerShell control commands 1005

Preface

By their very nature, every book that seeks to describe how technology works face challenges during its creation. Dealing with beta software and attempting to resolve the difference between how the software works and how the developers say it will work in the final version is a problem faced by any author, which is one reason why it is often best to wait to finalize text after you have a chance to work with released software. Looking back at this project, in some ways, this has been the hardest book of the seven that I have written about Exchange. I think that there are four reasons why this might be so. First, Exchange 2007 marks the boundary for substantial architectural change within the product, so it is similar to the degree of change that we experienced when we moved from Exchange 5.5 to Exchange 2000. Second, the nature of software is that it becomes more complex over time as the developers add new features and this is certainly true of Exchange 2007. The new features have to be considered, probed, and documented, all of which takes time. Third, the Exchange development team has done an excellent job since 2004 to document all aspects of Exchange in a more comprehensive manner than ever before.

The Exchange 2007 help file, TechNet, MSDN, and the excellent Exchange team blog at https:://msexchangeteam.com/ default.aspx are interesting and productive hoards of information for authors to mine. Unfortunately, there is often too much material (a good complaint to have) and the material needs to be interpreted and analyzed in the light of your own experience with Exchange. Engineers write great blogs, but the scourge of cognitive dissonance often means that they omit some detail that makes all the difference to a newcomer in understanding why a component works the way that it does. Last but not least, you should not underestimate the degree of cultural change that Microsoft has incorporated into Exchange 2007 in the transition from a predominantly GUI-centric approach to server management to the use of the PowerShell scripting language as the basis of many management operations. The need to understand and appreciate the change has to occur before you can adequately document and describe the benefits and this increases the effort required to write the book. I must admit that it took me time to realize the full benefit of interacting with Exchange through the shell, but now I am at the point where I wonder why Microsoft never provided such a powerful interface in the past! The degree of change that exists in Exchange 2007 means that it is diffi- cult to cover everything in one book. I have therefore elected to cover the parts of Exchange that I think are of most interest to the majority of administrators and have left other components for you to discover through the material that Microsoft publishes or perhaps another book, written by me or someone else. Please accept my apology if I have not covered something that you think is important and treat this as a challenge and opportunity for you to write about the topic yourself. There are many magazines, blogs, and other ways of spreading information about Exchange. From time to time, I wander back down the path to consider some aspect of Exchange 2003. While this book is firmly focused on Exchange 2007, the vast majority of companies that will deploy Exchange 2007 will do so by migrating from Exchange 2003 and will therefore run both products alongside each other for some period. For large organizations, the period might extend to a year or more as it is unlikely that few will complete their migration to a pure Exchange 2007 environment quickly. With this in mind, it is fair and reasonable to document how things work with Exchange 2003, especially when these servers operate with Exchange 2007. So what is in the book? To set the context, Chapter 1 starts with an overview of the development of Exchange from 4.0 to 2007 and then describes the themes that Microsoft employed to focus the development priorities for Exchange 2007 and some of the changes that occur in this release. All successful deployments of Exchange since Exchange 2000 operate on a solid Active Directory foundation, so Chapter 2 reviews some of the critical intersection points between Exchange and the Active Directory including replication, the schema, and Global Catalogs. Chapter 3 goes into the basics of managing Exchange 2007 through the Exchange Management Console. Chapter 4 takes the management topic further by exploring the ins and outs of the new Exchange Management Shell, perhaps the most fundamental change to the product that Microsoft has made in Exchange 2007. Chapter 5 goes to the heart of Exchange and reviews how the Store works including topics such as databases, storage groups, and transaction logs to content indexing and backups. Chapter 6 looks at how the new transport system routes messages and includes topics such as the Edge server and anti-spam protection. Chapter 7 explains how clients from Outlook to Outlook Web Access to mobile devices allow users to work with their mailboxes. Chapter 8 then moves on to consider some elements of user management, including the important topic of compliance and records management. Chapter 9 addresses one of the more


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

70-483 Q&A / Study Guide / Videos / Testing Engine


QUESTION 1
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of
the Queue <T> collection type.
Which of the following is TRUE with regards to the Queue <T>collection type?

A. It represents a first in, first out (FIFO) collection of objects.
B. It represents a last in, first out (LIFO) collection of objects.
C. It represents a collection of key/value pairs that are sorted by key based on the associated
IComparer<T> implementation.
D. It represents a list of objects that can be accessed by index.

Answer: A

Explanation:


QUESTION 2
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You have written the following code segment:
int[] filteredEmployeeIds = employeeIds.Distinct().Where(value => value !=
employeeIdToRemove).OrderByDescending(x => x).ToArray();
Which of the following describes reasons for writing this code? (Choose two.)

A. To sort the array in order from the highest value to the lowest value.
B. To sort the array in order from the lowest value to the highest value.
C. To remove duplicate integers from the employeeIds array.
D. To remove all integers from the employeeIds array.

Answer: A,C

Explanation:


QUESTION 3
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of a
method that moves the SqlDataReader on to the subsequent record.
Which of the following is the SqlDataReader method that allows for this?

A. The Read method.
B. The Next method.
C. The Result method.
D. The NextResult method.

Answer: A

Explanation:


QUESTION 4
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You have received instructions to create a custom collection for Certkingdom.com. Objects in the
collection must be processed via a foreach loop.
Which of the following is TRUE with regards to the required code?

A. The code should implement the ICollection interface.
B. The code should implement the IComparer interface.
C. The code should implement the IEnumerable interface.
D. The code should implement the IEnumerator interface.

Answer: C

Explanation:


QUESTION 5
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of LINQ queries.
Which of the following is NOT considered a distinct action of a LINQ query?

A. Creating the query.
B. Obtaining the data source.
C. Creating the data source.
D. Executing the query.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-483 Q&A / Study Guide / Testing Engine / Videos


QUESTION 1
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of
the Queue <T> collection type.
Which of the following is TRUE with regards to the Queue <T>collection type?

A. It represents a first in, first out (FIFO) collection of objects.
B. It represents a last in, first out (LIFO) collection of objects.
C. It represents a collection of key/value pairs that are sorted by key based on the associated
IComparer<T> implementation.
D. It represents a list of objects that can be accessed by index.

Answer: A

Explanation:


QUESTION 2
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named
Certkingdom.com.
You have written the following code segment:
int[] filteredEmployeeIds = employeeIds.Distinct().Where(value => value !=
employeeIdToRemove).OrderByDescending(x => x).ToArray();
Which of the following describes reasons for writing this code? (Choose two.)

A. To sort the array in order from the highest value to the lowest value.
B. To sort the array in order from the lowest value to the highest value.
C. To remove duplicate integers from the employeeIds array.
D. To remove all integers from the employeeIds array.

Answer: A,C

Explanation:


QUESTION 3
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of a
method that moves the SqlDataReader on to the subsequent record.
Which of the following is the SqlDataReader method that allows for this?

A. The Read method.
B. The Next method.
C. The Result method.
D. The NextResult method.

Answer: A

Explanation:


QUESTION 4
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named
Certkingdom.com.
You have received instructions to create a custom collection for Certkingdom.com. Objects in the
collection must be processed via a foreach loop.
Which of the following is TRUE with regards to the required code?

A. The code should implement the ICollection interface.
B. The code should implement the IComparer interface.
C. The code should implement the IEnumerable interface.
D. The code should implement the IEnumerator interface.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

70-417 Q&A / Study Guide / Testing Engine / Videos


QUESTION 1
You work as a Network Administrator at Certkingdom.com. The network contains a single Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
All servers in the network have Windows Remote Management (WinRM) enabled.
You use a Windows 7 Enterprise client computer named Certkingdom-Admin1.
You are currently logged in to Certkingdom-Admin1. From your client computer, you want to obtain the IP
address of a Windows Server 2012 member server named Certkingdom-File1.
Which command or commands should you use?

A. Telnet Certkingdom-File1 ipconfig.
B. NSLookup > Server Certkingdom-File1 > ipconfig
C. WinRM –r:Certkingdom-File1 ipconfig
D. WinRS –r:Certkingdom-File1 ipconfig

Answer: D

Explanation:


QUESTION 2
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-Win12Admin runs Windows Server 2012. You use Certkingdom-Win12Admin to
administer the Windows Server 2012 servers in the domain.
A newly installed domain member server named Certkingdom-SRV06 runs a Server Core Installation of
Windows Server 2012.
You need to configure Certkingdom-SRV06 to enable you to use the Server Manager console on CertkingdomWin12Admin
to manage Certkingdom-Win12Admin.
How should you configure Certkingdom-SRV06?

A. You should install the Remote Server Administration Tools on Certkingdom-SRV06.
B. You should install the Server Manager console on Certkingdom-SRV06.
C. You should enable Windows Remote Management (WinRM) on Certkingdom-SRV06.
D. You should use the Enable-NetFirewallRule cmdlet to configure the firewall on Certkingdom-SRV06.

Answer: D

Explanation:


QUESTION 3
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-Win12Admin runs Windows Server 2012. You use Certkingdom-Win12Admin to
administer the Windows Server 2012 servers in the domain.
You want to use Server Manager on Certkingdom-Win12Admin to manage the Window Server 2008 R2
SP1 servers in the domain.
What should you do?

A. You should run the Configure-SMRemoting.exe –Enable cmdlet on the Windows Server 2008 R2 SP1 servers.
B. You should add the computer account for Certkingdom-Win12Admin to the RAS and IAS Servers group in Active Directory.
C. You should install the Microsoft .NET Framework 4.0 and Windows Management Framework 3.0 on the Windows Server 2008 R2 SP1 servers.
D. You should install the Remote Server Administration Tools on Certkingdom-Win12Admin.

Answer: C

Explanation:


QUESTION 4
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-File1 runs the File and Storage Services server role. Certkingdom-File1 hosts
shared folders on the D: drive. Users access the shared folders from their Windows 7 client
computers.
A user attempts to recover a previous version of a file in a shared folder on Certkingdom-File1 but
discovers that there is no previous versions option.
How can you ensure that users can recover files using the Previous Versions function?

A. By modifying the Share Properties of each shared folder.
B. By enabling Shadow Copies on the D: drive of Certkingdom-File1.
C. By adding a condition to the shared folders on Certkingdom-File1.
D. By modifying the settings of the Recycle Bin on Certkingdom-File1.

Answer: B

Explanation:


QUESTION 5
You work for a company named Certkingdom.com. Your role of Network Administrator includes the
management of the company’s physical and virtual infrastructure.
The network includes servers running Windows Server 2008 R2 Service Pack 1 (SP1) and
Windows Server 2012.
Virtual machines (VMs) are hosted on Windows Server 2012 servers running the Hyper-V role.
You install a new Windows Server 2012 Hyper-V host server named Certkingdom-HVHost12. CertkingdomHVHost12
has four Fiber Channel host bus adapters (HBAs) and connects to two Fiber Channel
SANs using two HBAs per SAN.
You plan to create VMs on Certkingdom-HVHost12 that will need to access one of the SANs.
How should you configure Certkingdom-HVHost12?

A. By creating a Virtual Switch in Hyper-V.
B. By installing an additional host bus adapter (HBA).
C. By creating a virtual Fiber Channel SAN in Hyper-V.
D. By creating a virtual iSCSI SAN in Hyper-V.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Exchange Server 2010 Portable Command Guide: MCTS 70-662 and MCITP 70-663

Exchange Server 2010 Portable Command Guide

MCTS 70-662 and MCITP 70-663

All the MCTS 70-662 and MCITP 70-663 Commands in One Compact, Portable Resource
Maximize your efficiency as an Exchange Server 2010 administrator, and master the commands, keywords, command arguments, options, and prompts covered on Microsoft’s MCTS 70-662 and MCITP 70-663 exams! This easy, handy reference brings together all the techniques, tips, tools, and examples you’ll need. It’s your perfect take-anywhere guide to running Exchange Server 2010 environments—and passing Microsoft’s two key Exchange Server 2010 administration exams.
MCTS Training, MCITP Trainnig
Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Covers all the commands you need to score higher on your MCTS 70-662 and MCITP 70-663 Exams !
Master Exchange Server 2010’s newest administration features
Plan and implement deployments and upgrades
Use bulk management tools to administer multiple recipients or mailboxes
Configure hub and edge transport, rules, and agents
Work with mailboxes, mailbox servers, databases, and public folders
Set up Client Access Server, Outlook access, and certificates
Maximize availability with Database Availability Groups (DAGs)
Recover from multiple forms of server failure
Use default message routing and Exchange hub sites
Implement and operate Unified Messaging (UM)
Integrate Exchange Server 2010 into older Exchange environments
Use scripts to automate administration
Configure Role-Based Access Control (RBAC) permissions
Leverage Exchange Management Shell’s reporting capabilities
Troubleshoot Exchange Server with Test cmdlets

Your Perfect Take-Anywhere Exchange Server 2010 Command Resource!
Covers PowerShell commands on the MCTS 70-662 and MCITP 70-663 Exams
Includes important administration commands that aren’t on the exams
Packed with realistic scenarios, high-efficiency examples, and expert tips
Includes many of the new SP1 cmdlets!

MCTS Training, MCITP Trainnig
Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com