Category Archives: Microsoft MTA

98-388 Introduction to Programming Using Java

Published: October 12, 2017
Languages: English, Japanese, Chinese (Traditional), Chinese (Simplified), Spanish, Portuguese (Brazil), French, German, Korean
Audiences: IT professionals, Developers, Information workers
Technology: Java 6 SE
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Understand Java fundamentals (15-20%)
Describe the use of main in a Java application
Signature of main, why it is static; how to consume an instance of your own class; command-line arguments
Perform basic input and output using standard packages
Print statements; import and use the Scanner class
Evaluate the scope of a variable
Declare a variable within a block, class, or method

Work with data types, variables, and expressions (40-45%)
Declare and use primitive data type variables
Data types, including byte, char, int, double, short, long, float, boolean; identify when precision is lost; initialization; how primitives differ from wrapper object types such as Integer and Boolean
Construct and evaluate code that manipulates strings
String class and string literals, comparisons, concatenation, case and length; String.format methods; string operators; converting a primitive data type to a string; the immutable nature of strings; initialization; null
Construct and evaluate code that creates, iterates, and manipulates arrays and array lists
One- and two-dimensional arrays, including initialization, null, size, iterating elements, accessing elements; array lists, including adding and removing elements, traversing the list
Construct and evaluate code that performs parsing, casting and conversion
Implementing code that casts between primitive data types, converts primitive types to equivalent object types, or parses strings to numbers
Construct and evaluate arithmetic expressions
Arithmetic operators, assignment, compound assignment operators, operator precedence

Implement flow control (15-20%)
Construct and evaluate code that uses branching statements
if, else, else if, switch; single-line versus block; nesting; logical and relational operators
Construct and evaluate code that uses loops
while, for, for each, do while; break and continue; nesting; logical, relational, and unary operators

Perform object-oriented programming (10-15%)
Construct and evaluate a class definition
Constructors; constructor overloading; one class per .java file; this keyword; inheritance and overriding at a basic level
Declare, implement, and access data members in a class
private, public, protected; instance data members; static data members; using static final to create constants; describe encapsulation
Declare, implement, and access methods
private, public, protected; method parameters; return type; void; return value; instance methods; static methods; overloading
Instantiate and use a class object in a program
Instantiation; initialization; null; accessing and modifying data members; accessing methods; accessing and modifying static members; importing packages and classes

Compile and debug code (5-10%)

Troubleshoot syntax errors, logic errors, and runtime errors
print statement debugging; output from the javac command; analyzing code for logic errors; console exceptions after running the program; evaluating a stack trace
Implement exception handling
try catch finally; exception class; exception class types; display exception information

Click here to view complete Q&A of 98-388 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-388 Certification, MTA 98-388 Training at certkingdom.com

98-383 Introduction to Programming Using HTML and CSS

Published: August 31, 2017
Languages: English, Japanese, Chinese (Traditional), Chinese (Simplified), Spanish, Portuguese (Brazil), French, German, Korean
Audiences: IT professionals, Developers, Information workers
Technology HTML5 and CSS3
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Understand HTML Fundamentals (10-15%)
Construct markup that uses metadata elements
Script; noscript; style; link; meta tags, including encoding, keywords, viewport, and translate
Construct well-formed markup that conforms to industry best practices
DOCTYPE declaration; HTML; head; body; proper syntax, including closing tags and commonly used symbols; comments

Understand CSS Fundamentals (15-20%)
Analyze the impact of using inline styles, internal style sheets, and external style sheets
When to use inline styles; when to use internal style sheets; when to use external style sheets; precedence when using a combination of inline styles and style sheets
Construct and analyze rule sets
Valid syntax for the CSS rule set; selectors, including class, id, elements and pseudo-class
Construct well-formed style sheets that conform to industry best practices
Reusing rules and rule sets; commenting; testing on multiple browsers; web safe fonts

Structure Documents Using HTML (30-35%)
Construct and analyze markup to structure content and organize data
Table tags; h1-h6; p; br; hr; div; span; ul; ol; li
Construct and analyze markup that uses HTML5 semantic elements
Semantic tags; header; nav; section; article; aside; footer; details; summary; figure; caption
Construct and analyze markup that implements navigation
Image links; a; target; bookmark; relative versus absolute links; navigating simple folder hierarchies
Construct and analyze markup that uses form elements
Form attributes; action; method; submission methods; accessibility; input types and restrictions; select; textarea; button; output; option; datalist; fieldset

Present Multimedia Using HTML (10-15%)
Construct and analyze markup that displays images
img and picture elements and their attributes
Describe the appropriate use of the img, svg, and canvas elements
Construct and analyze markup that plays video and audio
Video; audio; track; source; simple iframe implementations

Style Web Pages Using CSS (20-25%)
Construct and analyze styles that position content
Positioning, including float, relative, absolute, max-width, overflow, height, width, and align; inline versus block; visibility; box model, including margins and padding
Construct and analyze styles that format text
Font-family; color; font-style; font-size; font-weight; link colors; text formatting, including text alignment, text decoration, and indentation
Construct and analyze styles that format backgrounds and borders
Border-color; border-style; border-width; backgrounds; divs; colors
Analyze styles that implement a simple responsive layout
Units of measure; responsive effects with CSS, including viewport and media query; percentages versus pixels; frameworks and templates; max width

Click here to view complete Q&A of 98-383 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-383 Certification, MTA 98-383 Training at certkingdom.com

Exam 98-349 Windows Operating System Fundamentals

Published: April 13, 2011
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: Home PC users, academic, information workers, IT professionals, developers
Technology: Windows 10
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of August 31, 2016, this exam includes updates for Windows 10, including the removal of any tools not supported on Windows 10. To learn more about these changes and how they affect the skills measured, please download and review the exam 98-349 change document.

Understanding operating system configurations (15–20%)
Configure Control Panel options
Configure administrative tools, configure accessibility options, configure power settings, configure File Explorer settings
Configure desktop settings
Configure profiles, display settings, and shortcuts; configure and customize Start Menu; configure Task Bar settings; configure toolbars; configure notifications
Configure native applications and tools
Configure Microsoft Edge, configure Cortana, configure Hyper-V, configure settings using MSCONFIG, configure processes and applications using Task Manager, configure computer management
Configure mobility settings
Configure Sync Center, Windows Mobility Center, and Remote Desktop
Configure and use management tools
Configure MMC, configure the Windows PowerShell console and Windows PowerShell ISE

Preparation resources
Administrative Tools in Windows 10
Manage Windows 10 Start and taskbar layout
Windows 10 Start Layout Custimization
Configure Windows 10 Taskbar
Cool Stuff about PowerShell 5.0 in Windows 10

Installing and upgrading client systems (15–20%)
Identify Windows operating system editions
Identify hardware and compatibility requirements, determine appropriate editions per device type
Identify upgrade paths
Identify upgrade paths from previous Windows versions, identify application compatibility
Understand installation types
Perform a clean install, upgrade via Windows Update, migrate from previous Windows versions, perform removable media installation, perform network installation
Understand operating system architecture
Understand kernel mode; understand user mode; understand memory, IRQs, drivers, CPUs, and UI; understand 32-bit versus 64-bit architecture

Preparation resources
Windows 10 Upgrade Path
Windows 10 Compatabililty
Windows 10 deployment considerations
Architecture of Windows 10

Managing applications (15–20%)
Configure applications
Understand local versus network applications, configure desktop applications, configure app startup options, configure Windows features, configure Windows SmartScreen, configure application removal, configure Windows Store apps
Configure user account control (UAC)
Understand standard user versus administrative user, understand types of UAC prompts and levels
Configure antivirus settings
Configure Windows Defender and the Malicious Software Removal tool
Understand services
Understand service start-up types, service accounts, and service dependencies

Preparation resources
User Account Control
Windows Defender Advanced Threat Protection
Windows Defender in Windows 10
Microsoft Malicious Software Removal Tool

Managing files and folders (15–20%)
Understand file systems
Understand FAT32, NTFS, and ReFS
Understand file and print sharing
Configure File System permissions, configure Share Permissions, configure HomeGroup settings, configure print drivers, configure effective permissions, create shares, create mapped drives
Understand encryption
Understand BitLocker and Encrypting File Systems (EFS)
Understand libraries
Understand offline files, configure libraries, add multiple local locations to a library, add networked locations

Preparation resources
BitLocker
HomeGroup from start to finish

Managing devices (15–20%)
Connect devices
Connect, enable, and disable plug-and-play and Bluetooth devices; connect and disconnect printers; install third-party software for devices; install device drivers
Understand storage
Understand disk types, security (encryption), storage device types (eSATA, USB, IEEE 1394, iSCSI, InfiniBand), and storage drive types (basic, primary, extended, logical, dynamic disk, VHDs); configure OneDrive use; optimize drives
Understand printing devices
Understand local printers, network printers, print queues, print-to-file, and Internet printing
Understand system devices
Understand video, audio, and infrared input devices; understand Device Manager

Preparation resources
Storage Spaces in Windows 10
Whats New in Windows 10

Understanding operating system maintenance (15–20%)
Understand backup and recovery methods
Configure System Restore; configure a recovery drive; configure recovery boot options, such as Last Known Good, and various Safe Mode options; recover files from OneDrive
Understand maintenance tools
Understand Disk Defragmenter, Disk Cleanup, Task Scheduler, and System Information
Configure updates
Configure Windows Update options; implement Insider Preview, Current Branch, and Current Branch for Business scenarios; manage update history; roll back updates

Preparation resources

Windows 10 Servicing Options
OneDrive


QUESTION 1
PowerShell is used to:

A. monitor user keystrokes
B. repair damaged hard disk drive sectors
C. automate a routine task
D. extend the life of the battery

Correct Answer: C


QUESTION 2
Windows Aero is a:

A. pointing device
B. device driver
C. desktop theme
D. Windows application

Correct Answer: C


QUESTION 3
Which describes the purpose of Power Saver mode for a portable computer?

A. To lock the computer when it is idle.
B. To prevent unauthorized programs from consuming resources.
C. To protect the display from burned-in images.
D. To shut down idle devices to conserve battery charge.

Correct Answer: D


QUESTION 4
You want to change your default home page in Internet Explorer. In which location should you
modify settings?

A. Trusted Sites
B. View
C. Internet Options
D. Favorites

Correct Answer: B


QUESTION 5
Every time you insert a music CD, you receive a dialog box that asks which action you want
Windows to perform. Which should you configure so that your personal computer automatically
identifies an audio CD and starts playing music?

A. The Autoplay settings
B. The Ease of Access settings
C. a desktop gadget
D. The Personalization settings

Correct Answer: A

Click here to view complete Q&A of 98-349 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-349 Certification, MTA 98-349 Training at certkingdom.com

98-366 Networking Fundamentals

Published: August 2, 2010
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: Academic
Technology: Windows Server 2016
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

There are exam updates effective as of January 31, 2018. To learn more about these changes and how they affect the skills measured, please download and review the Exam 98-366 change document.

Understanding network infrastructures (30–35%)
Understand the concepts of Internet, intranet, and extranet
Virtual Private Network (VPN), security zones, firewalls
Understand local area networks (LANs)
Perimeter networks; addressing; reserved address ranges for local use (including local loopback IP), VLANs; wired LAN and wireless LAN
Understand wide area networks (WANs)
Leased lines, dial-up, ISDN, VPN, T1, T3, E1, E3, DSL, cable modem, and more, and their characteristics (speed, availability)
Understand wireless networking
Types of wireless networking standards and their characteristics (802.11a,b,g,n,ac including different GHz ranges), types of network security (WPA, WEP, 802.1X, and others), point-to-point (P2P) wireless, ad hoc networks, wireless bridging
Understand network topologies and access methods
Star, mesh, ring, bus, logical and physical topologies

Preparation resources
Solution Design Considerations for Network Topologies
Wireless LAN Service Overview
Wired and Wireless Networking with 802.1X Authentication

Understanding network hardware (20–25%)
Understand switches
Transmission speed, number and type of ports, number of uplinks, speed of uplinks, managed or unmanaged switches, VLAN capabilities, Layer 2 and Layer 3 switches and security options, hardware redundancy, support, backplane speed, switching types and MAC table, understand capabilities of hubs versus switches, virtual switches
Understand routers
Transmission speed considerations, directly connected routes, static routing, dynamic routing (routing protocols), RIP vs. OSPF, default routes; routing table and how it selects best route(s); routing table memory, Network Address Translation (NAT), software routing in Windows Server, installing and configuring routing; Quality of Service (QoS)
Understand media types
Cable types and their characteristics, including media segment length and speed; fiber optic; twisted pair shielded or unshielded; catxx cabling, wireless; susceptibility to external interference (machinery and power cables); susceptibility to electricity (lightning), susceptibility to interception

Preparation resources
Computer Hardware and Windows Server
Routing

Understanding protocols and services (45-50%)
Understand the Open Systems Interconnection (OSI) model
OSI model; Transmission Control Protocol (TCP) model; examples of devices, protocols, applications, and which OSI/TCP layer they belong to; TCP and User Datagram Protocol (UDP); well-known ports for most used purposes (not necessarily Internet); packets and frames
Understand IPv4
Subnetting, IPconfig, why use Internet Protocol version 4 (IPv4), addressing, ipv4toipv6 tunneling protocols to ensure backward compatibility, dual IP stack, subnetmask, gateway, ports, packets, reserved address ranges for local use (including local loopback IP)
Understand IPv6
Subnetting, IPconfig, why use IPv6, addressing, ipv4toipv6 tunneling protocols to ensure backward compatibility, dual IP stack, subnetmask, gateway, ports, packets, reserved address ranges for local use (including local loopback IP)
Understand names resolution
DNS, resource records, Windows Internet Name Service (WINS), steps in the name resolution process, HOSTS file, LMHOSTS file
Understand networking services
Dynamic Host Configuration Protocol (DHCP), Network Address Translation (NAT), firewalls, remote access, VPN
Understand TCP/IP
Tools (such as ping), tracert, pathping, Telnet, IPconfig, netstat, reserved address ranges for local use (including local loopback IP), protocols

Preparation resources
IPv6
IPv4 Name Resolution
TCP/IP


QUESTION 1
You are employed as a network designer at ABC.com.
A ABC.com client has requested a network setup for his home office. The network has to be cost
effective, and easy to extend and implement. Furthermore, the client wants his workstations
connected by a single cable.
Which of the following network topologies should you use?

A. A star network topology.
B. A bus network topology.
C. A mesh network topology.
D. A ring network topology.

Answer: B


QUESTION 2
You are employed as a network designer at ABC.com.
You have recently designed a home office network for ABC.com that includes a switch.
Which of the following are TRUE with regards to network switches? (Choose all that apply.)

A. It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for
a particular address only to the port to which it is attached.
B. It keeps track of the IP addresses attached to each of its ports and directs traffic intended for a
particular address only to the port to which it is attached.
C. It operates at the Physical layer of the OSI model.
D. It operates at the Data-Link layer of the OSI model.

Answer: A,D


QUESTION 3
You are employed as a network administrator at ABC.com. The ABC.com network consists of a
single domain named ABC.com.
As part of a training exercise, you have been asked to identify the layer that allows applications
and a number of user functions access to the network.
Which of the following options represents your response?

A. The document layer.
B. The application layer.
C. The system layer.
D. The Data-link layer.

Answer: B

Explanation:


QUESTION 4
You are employed as a network administrator at ABC.com. The ABC.com network consists of a
single domain named ABC.com.
You have been tasked with making sure that ABC.com’s network includes a server that converts
NetBIOS names to IP addresses.
Which of the following actions should you take?

A. You should consider adding a DHCP server to the ABC.com network.
B. You should consider adding a DNS server to the ABC.com network.
C. You should consider adding a Web server to the ABC.com network.
D. You should consider adding a WINS server to the ABC.com network.

Answer: D


QUESTION 5
You are employed as a network designer at ABC.com.
ABC.com’s network is made up of two network segments, named Subnet A and Subnet B. DHCP
clients are located on Subnet
A. A DHCP server, named ABC-SR07, is located on Subnet B.
You need to make sure that DHCP clients are able to connect to ABC-SR07.
Which of the following actions should you take?

A. You should make sure that the RRAS service is configured.
B. You should make sure that the Web service is configured.
C. You should make sure that the DNS service is configured.
D. You should make sure that the DHCP relay agent service is configured.

Answer: D

Explanation:

Click here to view complete Q&A of 98-366 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-366 Certification, MTA 98-366 Training at certkingdom.com

98-367 Security Fundamentals

Published: August 2, 2010
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: Academic
Technology: Windows 10
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of June 23, 2016, this exam includes updates for Windows 10, in addition to updates to security and threat terms. To learn more about these changes and how they affect the skills measured, please

Understand security layers (25–30%)
Understand core security principles
Confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface analysis; threat modelling
Understand physical security
Site security; computer security; removable devices and drives; access control; mobile device security; keyloggers
Understand Internet security
Browser security settings; secure websites
Understand wireless security
Advantages and disadvantages of specific security types; keys; service set identifiers (SSIDs); MAC filters

Preparation resources
Windows Server 2008 in an organization’s defense in depth strategy
Secure Windows Server
Using Windows Server 2008: Controlling communication with the Internet

Understand operating system security (35-40%)
Understand user authentication
Multifactor authentication; physical and virtual smart cards; Remote Authentication Dial-In User Service (RADIUS); biometrics; use Run As to perform administrative tasks
Understand permissions
File system permissions; share permissions; registry; Active Directory; enable or disable inheritance; behavior when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation; inheritance
Understand password policies
Password complexity; account lockout; password length; password history; time between password changes; enforce by using Group Policies; common attack methods; password reset procedures; protect domain user account passwords
Understand audit policies
Types of auditing; what can be audited; enable auditing; what to audit for specific purposes; where to save audit information; how to secure audit information
Understand encryption
Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; virtual private network (VPN); public key/private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices; lock down devices to run only trusted applications
Understand malware
Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; backdoors; zero day attacks

Preparation resources
Windows authentication
Password policy
Audit policies

Understand network security (20–25%)
Understand dedicated firewalls
Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software firewall; stateful versus stateless firewall inspection; Security Compliance Manager; security baselines
Understand network isolation
Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation
Understand protocol security
Protocol spoofing; IPsec; tunneling; DNSsec; network sniffing; denial-of-service (DoS) attacks; common attack methods

Preparation resources
Windows Firewall
Network Access Protection
IPsec

Understand security software (15–20%)
Understand client protection
Antivirus; protect against unwanted software installations; User Account Control (UAC); keep client operating system and software updated; encrypt offline folders, software restriction policies; principle of least privilege
Understand email protection
Antispam, antivirus, spoofing, phishing, and pharming; client versus server protection; Sender Policy Framework (SPF) records; PTR records
Understand server protection
Separation of services; hardening; keep server updated; secure dynamic Domain Name System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain Controllers (RODC)

Preparation resources

What’s new for operating system hardening and integrity for Windows Server 2008
Software restriction policies
What’s new for server protection in Windows Server 2008


QUESTION 1
A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

A. Decrease the chances of a virus getting to a client machine
B. Verify that the senders of the messages are legitimate
C. Ensure that all links in the messages are trustworthy
D. No change is needed.

Answer: A


QUESTION 2
Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho already has servers for their business and would like to avoid purchasing a new one.
Which server is best to use as a web server, considering the security and performance concerns?

A. SQL Server
B. File Server
C. Domain Controller
D. Application Server

Answer: C


QUESTION 3
To protect systems from buffer overflow errors, you can use:

A. Antivirus software
B. Data Execution Prevention
C. A proxy server
D. An Intruder Prevention System

Answer: B


QUESTION 4
Windows Server Update Services (WSUS) is a tool that:

A. Updates data stored in Windows servers
B. Manages the services that run on a server
C. Updates licensing for Windows servers
D. Manages updates for Microsoft software

Answer: D

Explanation:
Windows Server Update Services (WSUS) enables information technology administrators to deploy the latest Microsoft product updates to computers that are running the Windows operating system. By using WSUS, administrators can fully manage the distribution of updates that are released through Microsoft Update to computers in their network. Reference: https:://technet.microsoft.com/en-us/windowsserver/bb332157.aspx

Click here to view complete Q&A of 98-367 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-367 Certification, MTA 98-367 Training at certkingdom.com

98-369 Cloud Fundamentals

Published: January 5, 2015
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: IT professionalsTechnology:
Office 365, Microsoft Intune
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Understand the cloud (20–25%)
Describe cloud principles and delivery mechanisms
Differentiate between on-premises IT service models; differentiate between subscription or pay-as-you-go versus upfront CapEx/OpEx funding model; use cloud services to expand capacity (elasticity of the cloud), scalability, redundancy, and availability; differentiate between cloud services that are configurable versus on-premises services that are customizable
Describe cloud security requirements and policies
Describe how cloud services manage privacy, how compliance goals are met, how data is secured at rest or on-the-wire, and how data and operations transparency requirements are met
Describe how a cloud service stays up to date and available
Describe the service/feature improvement process; monitor service health, service maintenance, and future roadmap publishing; identify guarantees, service level agreements (SLA), and capping of liability of the cloud service provider
Describe the different types of cloud services
Differentiate between types of cloud services and their characteristics, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS); integrate the cloud with on-premises services in hybrid scenarios

Enable Microsoft cloud services (20–25%)
Identify the requirements and dependencies for using Office 365 and Microsoft Intune
Plan networking and domains, firewall rule, client requirements, bandwidth implications, and DNS
Select a cloud service plan
Understand the different options and plans available for Office 365 and Microsoft Intune
Sign up for cloud services
Name your tenant, set up your first administrator, determine tenant location
Set up the initial configuration of cloud services
Register domains, verify domains, choose the domain purpose; identify required DNS record types

Administer Office 365 and Microsoft Intune (15–20%)
Create users and groups, and assign services and licenses
Differentiate between cloud identities (Online identity, Synchronized identities, Federated identities), create and manage users and identities, delete and restore users (soft delete), create and manage groups, assign and revoke licenses, determine user locations
Assign permissions in Office 365 and Microsoft Intune
Assign or revoke administrative roles; manage delegated admins; manage password policies, subscriptions, and licenses
Monitor service health in Office 365 and Microsoft Intune
Monitor the Service Health dashboard, subscribe to RSS feeds, monitor the maintenance schedule, monitor the message center, log service support requests, configure alerts

Use and configure Microsoft cloud services (20–25%)
Configure Exchange Online
Manage recipients (mailboxes, shared mailboxes, resources, contacts, groups), manage anti-spam and antivirus settings
Configure SharePoint Online, including OneDrive
Create SharePoint team sites, configure external sharing, set up social features using newsfeeds or Yammer, apply themes, set storage and resource limits
Configure Skype for Business Online
Manage Skype for Business user options, manage external communication settings, configure dial-in settings and meeting invitation options, configure Skype for Business Online DNS
Configure Microsoft Intune
Install Microsoft Intune client management software, create and deploy policies, automate installs, identify software requirements, set up notifications, identify mobile device management policies

Support cloud users (15–20%)
Resolve sign-in and Office application installation issues
Troubleshoot sign-in issues, forgotten passwords, connection problems, difficulty activating Office applications, and difficulty connecting mobile devices to Office 365 or Microsoft Intune; choose between 32-bit and 64-bit; identify when an Office repair is required; identify operating system requirements for Office 365 ProPlus; browser requirements and specific versions of Internet Explorer
Resolve email and calendar issues
Troubleshoot issues receiving and sending email, troubleshoot issues accessing a delegated mailbox
Resolve SharePoint and OneDrive issues
Identify storage limits, troubleshoot “Open with Explorer” not working and OneDrive not syncing, recover deleted files
Resolve Skype for Business issues
Troubleshoot Skype for Business sign-in issues, troubleshoot connection issues to Skype for Business Online, troubleshoot communicating to Skype consumer users and users in other companies using Skype for Business


QUESTION 1
This question requires that you evaluate the underlined text to determine if it is correct.
Your company is implementing Microsoft Office 365 and Exchange Online. You plan to configure the necessary public DNS settings. You need to create an SPF record to authorize the email service and present spoofing.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.

A. No change is needed
B. a PTR record
C. an MX record
D. a CNAME record

Answer: A

Explanation: The SPF (TXT) record helps to prevent other people from using your domain to send spam or other malicious email. Sender policy framework (SPF) records work by identifying the servers that are authorized to send email from your domain.
Reference: External DNS records required for Exchange Online
http://howtonetworking.com/msapps/office365-11.htm


QUESTION 2
You are an IT administrator for Contoso, Ltd. You have subscribed to Microsoft Office 365.
You are preparing to set up your domain. Your company already uses the custom domain name contoso.com for other cloud services.
You need to configure Office 365 to simplify the management of user identities.
What should you do before you create new user accounts?

A. Create a new custom domain name specifically for Office 365.
B. Configure Office 365 to use your custom domain
C. Verify that the automatic domain contoso.onmicrosoft.com is functioning
D. Add the .onmicrosoft suffix to your custom domain name.

Answer: A

Explanation: Custom domains
To use your own domain name with Office 365 instead of the domain name that you were given at signup, you add the domain to Office 365.
Reference: https://technet.microsoft.com/en-us/library/office-365-domains.aspx


QUESTION 3
You work in the IT department of a startup company.
The company predicts rapid growth over the next five years and plans of greatly increase its number of employees.
How will a cloud solution such as Microsoft Office 365 help the company prepare for rapid growth?

A. by allowing the company to rely on contract employees to compensate for busy periods
B. by ensuring the company’s IT services have 100 percent up time
C. by allowing the company to add new users more securely than when using traditional IT infrastructure
D. by allowing the company to increase its IT capacity for a lower cost than traditional IT infrastructure

Answer: D

Explanation: * Some of the benefits of moving to the Microsoft cloud include the following:
/ Having predictable and known costs associated with adoption.
/ Reducing cost in not only immediate monetary value but also in efficiency and resource reallocation benefits.
/ Outsourcing the hassle of installing, managing, patching, and upgrading extremely complex software systems.
Etc.
* For organizations experiencing rapid growth, a top-notch productivity solution can be vital to the success of the business. A cloud-based service that’s difficult to manage can divert
attention away from a company’s core mission. What organizations need is a solution that’s simple to use so they can focus on what they do best-growing the business.
Reference: Pros and Cons of the Microsoft Office 365 Cloud
http://www.dummies.com/how-to/content/pros-and-cons-of-the-microsoft-office-365-cloud.html


QUESTION 4
Which two features are available in Microsoft SharePoint to monitor services? Choose two.

A. Content organizer rules
B. Create an alert
C. Subscribe to an RSS feed
D. Sites and workspaces

Answer: B,C

Explanation: To stay updated when documents or items on your site change, set up alerts or subscribe to Really Simple Syndication (RSS) feeds.
Reference: Create an alert or subscribe to an RSS feed
https://support.office.com/en-sg/article/Create-an-alert-or-subscribe-to-an-RSS-feed-e5a79e7b-a146-46da-a9ef-d65409ba8918


QUESTION 5
This question requires that you evaluate the underlined text to determine if it is correct.
You are an intern for an IT analyst at a small company. The company plans to implement Microsoft Office 365.
You want to ensure that your environment can support Office 365.
You need to run the “Office 365 management pack” to check deployment readiness.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.

A. No change is needed
B. Setup Assistant
C. Config 365
D. Client Updater

Answer: B

Explanation: The setup assistant provides information for deployment readiness.

Click here to view complete Q&A of 98-369 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-369 Certification, MTA 98-369 Training at certkingdom.com

98-368 Cloud Fundamentals

Published: January 5, 2015
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: IT professionals
Technology: Office 365, Microsoft Intune
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Understand the cloud (20–25%)
Describe cloud principles and delivery mechanisms
Differentiate between on-premises IT service models; differentiate between subscription or pay-as-you-go versus upfront CapEx/OpEx funding model; use cloud services to expand capacity (elasticity of the cloud), scalability, redundancy, and availability; differentiate between cloud services that are configurable versus on-premises services that are customizable
Describe cloud security requirements and policies
Describe how cloud services manage privacy, how compliance goals are met, how data is secured at rest or on-the-wire, and how data and operations transparency requirements are met
Describe how a cloud service stays up to date and available
Describe the service/feature improvement process; monitor service health, service maintenance, and future roadmap publishing; identify guarantees, service level agreements (SLA), and capping of liability of the cloud service provider
Describe the different types of cloud services
Differentiate between types of cloud services and their characteristics, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS); integrate the cloud with on-premises services in hybrid scenarios

Enable Microsoft cloud services (20–25%)
Identify the requirements and dependencies for using Office 365 and Microsoft Intune
Plan networking and domains, firewall rule, client requirements, bandwidth implications, and DNS
Select a cloud service plan
Understand the different options and plans available for Office 365 and Microsoft Intune
Sign up for cloud services
Name your tenant, set up your first administrator, determine tenant location
Set up the initial configuration of cloud services
Register domains, verify domains, choose the domain purpose; identify required DNS record types

Administer Office 365 and Microsoft Intune (15–20%)
Create users and groups, and assign services and licenses
Differentiate between cloud identities (Online identity, Synchronized identities, Federated identities), create and manage users and identities, delete and restore users (soft delete), create and manage groups, assign and revoke licenses, determine user locations
Assign permissions in Office 365 and Microsoft Intune
Assign or revoke administrative roles; manage delegated admins; manage password policies, subscriptions, and licenses
Monitor service health in Office 365 and Microsoft Intune
Monitor the Service Health dashboard, subscribe to RSS feeds, monitor the maintenance schedule, monitor the message center, log service support requests, configure alerts

Use and configure Microsoft cloud services (20–25%)
Configure Exchange Online
Manage recipients (mailboxes, shared mailboxes, resources, contacts, groups), manage anti-spam and antivirus settings
Configure SharePoint Online, including OneDrive
Create SharePoint team sites, configure external sharing, set up social features using newsfeeds or Yammer, apply themes, set storage and resource limits
Configure Skype for Business Online
Manage Skype for Business user options, manage external communication settings, configure dial-in settings and meeting invitation options, configure Skype for Business Online DNS
Configure Microsoft Intune
Install Microsoft Intune client management software, create and deploy policies, automate installs, identify software requirements, set up notifications, identify mobile device management policies

Support cloud users (15–20%)
Resolve sign-in and Office application installation issues
Troubleshoot sign-in issues, forgotten passwords, connection problems, difficulty activating Office applications, and difficulty connecting mobile devices to Office 365 or Microsoft Intune; choose between 32-bit and 64-bit; identify when an Office repair is required; identify operating system requirements for Office 365 ProPlus; browser requirements and specific versions of Internet Explorer
Resolve email and calendar issues
Troubleshoot issues receiving and sending email, troubleshoot issues accessing a delegated mailbox
Resolve SharePoint and OneDrive issues
Identify storage limits, troubleshoot “Open with Explorer” not working and OneDrive not syncing, recover deleted files
Resolve Skype for Business issues
Troubleshoot Skype for Business sign-in issues, troubleshoot connection issues to Skype for Business Online, troubleshoot communicating to Skype consumer users and users in other companies using Skype for Business

QUESTION 1
What is an example of the way in which a Trojan horse commonly spreads to other computers?

A. It inserts copies of itself into other computer programs
B. It traverses a network by exploiting a vulnerability
C. It pretends to be a document from a friend
D. It downloads from an infected web page

Answer: D

Explanation: Trojan horses are commonly found on websites that offer free software, such as shareware programs. These
communal gathering spots on the Web give Trojan horse writers a degree of anonymity along with the chance of
attacking as many random victims as possible. Since website operators rarely have time to thoroughly examine every file
posted, an occasional Trojan horse can slip through the checking procedures unnoticed. –

Reference: HOW TROJAN HORSES SPREAD
http://etutorials.org/Misc/computer+book/Part+2+Dangerous+Threats+on+the+Internet/Cha pter+8+Trojan+Horses-
+Beware+of+Geeks+Bearing+Gifts/HOW+TROJAN+HORSES+SPREAD/

QUESTION 2
Your company uses Windows 8.1 work folders on personal devices. The devices are all registered in Microsoft Intune.
You need to enforce the following security requirements on the personal devices:
•Company data can be removed if an employee is terminated.
•Company data cannot be accessed if a devise is lost or stolen.
What should you do?

A. Enable selective wipe, and enforce a lock screen and password
B. Enable selective wipe, and secure files transfers with SSL
C. Enable selective wipe, and enforce encryption
D. Enforce encryption and enforce a lock screen and password

Answer: C

Explanation: * Microsoft Intune provides selective wipe, full wipe, remote lock, and passcode reset capabilities. A
selective wipe to remove only company data.
* Encryption on Mobile Devices can be managed with Configuration Manager and Intune
Reference: Help protect your data with remote wipe, remote lock, or passcode reset using
Microsoft Intune
https://technet.microsoft.com/en-us/library/jj676679.aspx
Reference: Managing Encryption on Mobile Devices with Configuration Manager and Intune
http://blogs.technet.com/b/pauljones/archive/2014/08/04/managing-encryption-on-mobile-devices-with-configurationmanager-
and-intune.aspx

QUESTION 3
This question requires that you evaluate the underlined text to determine if it is correct.
The “ExFAT” file system can automatically verify and auto correct data to avoid file system errors.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement
is incorrect, select the answer choice than makes the statement correct.

A. No change is needed
B. NTFS
C. FAT32
D. ReFS

Answer: D

Explanation: Resilient File System (ReFS) is a Microsoft proprietary file system introduced with Windows Server 2012
with the intent of becoming the “next generation” file system after NTFS. ReFS key design advantages are intended to
include automatic integrity checking and data scrubbing, removing the need for chkdsk and protecting against data degradation.

Reference: https:://en.wikipedia.org/wiki/ReFS

QUESTION 4
This question requires that you evaluate the underlined text to determine if it is correct.
The “Simple Spaces” resiliency type in Windows 8.1 Storage Spaces requires at least five drives in order to protect a
system from a single-drive failure.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement
is incorrect, select the answer choice than makes the statement correct.

A. No change is needed
B. two-way mirror
C. Parity Spaces
D. three-way mirror

Answer: D

Explanation: Two-way mirror spaces require at least two drives, and three-way mirror spaces require at least five.
Mirror spaces are designed for increased performance and protect your files from drive failure by keeping more than one
copy. Two-way mirror spaces make two copies of your files and can tolerate one drive failure, while three-way mirror
spaces can tolerate two drive failures.

Click here to view complete Q&A of 98-368 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-368 Certification, MTA 98-368 Training at certkingdom.com

 

98-381 Introduction to Programming Using Python

Published: August 23, 2017
Languages: English, Japanese, Chinese (Traditional), Chinese (Simplified), Spanish, Portuguese (Brazil), French, German, Korean
Audiences: IT professionals, Developers, Information workers
Technology: Python (version 3.6 or later)
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Perform Operations using Data Types and Operators (20-25%)
Evaluate an expression to identify the data type Python will assign to each variable
Identify str, int, float, and bool data types
Perform data and data type operations
Convert from one data type to another type; construct data structures; perform indexing and slicing operations
Determine the sequence of execution based on operator precedence
Assignment; Comparison; Logical; Arithmetic; Identity (is); Containment (in)
Select the appropriate operator to achieve the intended result
Assignment; Comparison; Logical; Arithmetic; Identity (is); Containment (in)

Control Flow with Decisions and Loops (25-30%)
Construct and analyze code segments that use branching statements
if; elif; else; nested and compound conditional expressions
Construct and analyze code segments that perform iteration
while; for; break; continue; pass; nested loops and loops that include compound conditional expressions

Perform Input and Output Operations (20-25%)
Construct and analyze code segments that perform file input and output operations
Open; close; read; write; append; check existence; delete; with statement
Construct and analyze code segments that perform console input and output operations
Read input from console; print formatted text; use of command line arguments

Document and Structure Code (15-20%)
Document code segments using comments and documentation strings
Use indentation, white space, comments, and documentation strings; generate documentation by using pydoc
Construct and analyze code segments that include function definitions
Call signatures; default values; return; def; pass

Perform Troubleshooting and Error Handling (5-10%)
Analyze, detect, and fix code segments that have errors
Syntax errors; logic errors; runtime errors
Analyze and construct code segments that handle exceptions
Try; except; else; finally; raise

Perform Operations Using Modules and Tools (1-5%)
Perform basic operations using built-in modules
Math; datetime; io; sys; os; os.path; random
Solve complex computing problems by using built-in modules
Math; datetime; random

QUESTION 1
You are writing an application that uses the sqrt function. The program must reference the function using the name squareRoot.
You need to import the function.
Which code segment should you use?

A. import math.sqrt as squareRoot
B. import sqrt from math as squareRoot
C. from math import sqrt as squareRoot
D. from math.sqrt as squareRoot

Answer: C

Explanation:
References: https://infohost.nmt.edu/tcc/help/pubs/python/web/import-statement.html

QUESTION 2
You are creating a function that manipulates a number. The function has the following requirements:

? A float is passed into the function
? The function must take the absolute value of the float
? Any decimal points after the integer must be removed

Which two math functions should you use? Each correct answer is part of the solution? (Choose two.)

A. math.fmod(x)
B. math.frexp(x)
C. math.floor(x)
D. math.ceil(x)
E. math.fabs(x)

Answer: D,E

QUESTION 3
The ABC company has hired you as an intern on the coding team that creates e-commerce applications.
You must write a script that asks the user for a value. The value must be used as a whole number in a calculation, even if
the user enters a decimal value.
You need to write the code to meet the requirements.
Which code segment should you use?

A. totalItems = input(“How many items would you like?”)
B. totalItems = float(input(“How many items would you like?”))
C. totalItems = str(input(“How many items would you like?”))
D. totalItems = int(input(“How many items would you like?”))

Answer: A

Explanation:

QUESTION 4

You develop a Python application for your school.
You need to read and write data to a text file. If the file does not exist, it must be created. If the file has content, the
content must be removed.

Which code should you use?

A. open(“local_data”, “r”)
B. open(“local_data”, “r+”)
C. open(“local_data”, “w+”)
D. open(“local_data”, “w”)

Answer: B

Explanation:

Click here to view complete Q&A of 98-381 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft MTA 98-381 Certification, MTA 98-382 Training at certkingdom.com

98-382 Introduction to Programming Using JavaScript

Published: August 31, 2017
Languages: English, Japanese, Chinese (Traditional), Chinese (Simplified), Spanish, Portuguese (Brazil), French, German, Korean
Audiences: IT professionals, Developers, Information workers
Technology: JavaScript (ECMAScript v5)
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Program with JavaScript Operators, Methods, and Keywords (20-25%)
Complete or debug code that uses assignment and arithmetic operators
Assignment; increment; decrement; addition; subtraction; division; multiplication; modulus; compound assignment operators
Apply JavaScript best practices
Comments; indentations; naming conventions; noscript; constants; reserved keywords; debugger keyword; setting breakpoints; console.log
Evaluate the use of inline and external scripts
When to use, how to use, and what happens when both are used
Implement exception handling
try; catch; finally
Complete and debug code that interacts with the Browser Object Model (BOM)
Manage state; display dialogs; determine screen size

Program with Variables, Data Types, and Functions (25-30%)
Declare and use variables of primitive data types
Number; Boolean; String; Null; Undefined; typeof operator; type checking functions; use strict; converting between data types; formatting numbers; string operations; single quote vs double quote (nesting); initialization
Declare and use arrays
Single-dimensional arrays; multi-dimensional arrays; iteration; initialization; define an array; sort and search an array; use push, pop, shift, and unshift methods; use the length property; access an array element;
Complete and debug code that uses objects
Properties; methods; instantiation; Date object; retrieve date and time parts; localize date format (MM/DD vs DD/MM); add and subtract dates
Complete and debug code that uses built-in Math functions
Random; round; abs; floor; ceiling; min; max; pow; sqrt
Complete and debug a function that accepts parameters and returns a value
Reusable code; local versus global scope, redefine variables, pass parameters, value versus reference, return values

Implement and Analyze Decisions and Loops (20-25%)
Evaluate expressions that use logical and comparison operators
==; !=; <, >; <=; >=; !; &&; ||
Complete and debug decision statements
if; else if; switch; nested if
Complete and debug loops
for; while; do; break; continue

Interact with the Document Object Model (15-20%)
Identify and construct the Document Object Model (DOM) tree
window; document; body; other HTML elements
Identify and handle HTML events
onchange; onmouseover; onload; onclick; onmouseout; onkeydown
Complete and debug code that outputs to an HTML document
innerHTML; document.write
Complete and debug code that locates, modifies, and adds HTML elements and attributes
getElementByld; getElementsByTagName; getElementsByClassName; setAttribute; createElement

Interact with HTML Forms (5-10%)
Complete and debug code that retrieves input from forms and sets form field values
Retrieve form values; identify the DOM path; get values from different types of elements; prepopulate values; mask values
Complete and debug code that performs input validation
Case; string comparisons; Not-A-Number (NaN)
Describe the form submission process
onsubmit; post versus get; potential targets for submission

You need to write a loop that will traverse the length of an array to find the value orange. If
an array element value is null, the code should immediately go to the next element. When
the value is found, the loop should exit.
How should you complete the code? To answer, drag appropriate keywords to the correct
locations. Each keyword may be used once, more than once, or not at all. You may need to
drag the split bar between panes or scroll to view content.

Question No : 1 DRAG DROP
You are creating a JavaScript function that returns a date the specified number of months
in the future of the current date.
The function must meet the following requirements:
Accept a number that represents the number of months to add or subtract from the

Question No : 2 HOTSPOT
current date.
Return the current data adjusted by the number of months passed into the
function.
How should you complete the code? To answer, select the appropriate code segments in
the answer area.
NOTE: Each correct selection is worth one point

Click here to view complete Q&A of 98-382 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft MCP, MCSE 98-382 Certification, MCP 98-382 Training at certkingdom.com

Exam 98-365 Windows Server Administration Fundamentals

Published: August 2, 2010
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: Academic
Technology: Windows Server 2008
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Understanding server installation (10–15%)
Understand device drivers
Installation, removal, disabling, update/upgrade, rollback, troubleshooting, Plug & Play, IRQ, interrupts, driver signing
Understand services
Which statuses a service can be in, startup types, recovery options, delayed startup, Run As settings for a service, stopping or pausing a service, service accounts, dependencies
Understand server installation options
Choose the correct operating system version options; interactive installs; automated install using WDS; perform unattended installs; perform upgrades, clean installs, and migrations

Preparation resources
Installing devices and their drivers
Server Core installation option getting started guide
Installing Windows Server 2008 R2

Understanding server roles (25–30%)
Identify application servers
Mail servers, database servers, collaboration servers, monitoring servers, threat management
Understand Web services
IIS, WWW, and FTP, separate worker processes, adding components, sites, ports, SSL, certificates
Understand remote access
Remote assistance, remote administration tools, Remote Desktop Services, licensing, RD Gateway, VPN, application virtualization, multiple ports
Understand the file and print services
Local printers, network printers, printer pools, web printing, web management, driver deployment, file, folder, and share permissions vs. rights, auditing, print job management
Understand server virtualization
Virtual memory, virtual networks, snapshots and saved states, physical to virtual conversions, virtual to physical conversions

Preparation resources

Changes in functionality from Windows Server 2003 with SP1 to Windows Server 2008
What’s new in routing and remote access in Windows Server 2008

Understanding Active Directory (20–25%)
Understand accounts and groups
Domain accounts, local accounts, user profiles, computer accounts, group types, default groups, group scopes, group nesting, understand AGDLP and AGUDLP processes to help implement nesting
Understand organizational units and containers
Purpose of OUs, purpose of containers, delegation, default containers, uses for different container objects, default hidden and visible containers
Understand Active Directory infrastructure
Domain controllers. forests, child domains, operation master roles, domain vs. workgroup, trust relationships, functional levels, namespace, sites, replication, schema
Understand group policy
Group policy processing, Group Policy Management Console, computer policies, user policies, local policies

Preparation resources
Active Directory Services
Designing OU structures that work

Understanding storage (10–15%)
Identify storage technologies and their typical usage scenarios
Advantages and disadvantages of different storage topologies, Fibre Channel, iSCSI hardware
Understand RAID redundancy
RAID 0, RAID 1, RAID 5, RAID 10 and combinations, hardware and software RAID
Understand disk types
Solid State Drive (SSD) and Hard Disk Drive (HDD) types and comparisons, ATA basic disk, dynamic disk, mount points, file systems, mounting a virtual hard disk, distributed file systems

Preparation resources
Planning for disks and storage
Windows Server 2008—file and storage solutions
Overview of disk management

Understanding server performance management (10–15%)
Identify major server hardware components
Memory, disk, processor, network, 32-bit and 64-bit architecture, removable drives, graphic cards, cooling, power usage, ports
Understand performance monitoring
Methodology, procedures, effect of network, CPU, memory and disk, creating a baseline, Performance Monitor, Resource Monitor, Task Manager, performance counters
Understand logs and alerts, Event Viewer
Purpose of performance logs and alerts

Preparation resources
Performance monitoring getting started guide
Computer hardware and Windows Server 2008

Understanding server maintenance (15–20%)
Identify steps in the startup process
BIOS, UEFI, TPM, bootsector, bootloader, MBR, boot.ini, POST, Safe Mode
Understand business continuity
Backup and restore, disaster recovery planning, clustering, AD restore, folder redirection, data redundancy, uniterruptible power supply (UPS)
Understand updates
Software, driver, operating systems, applications, Windows Update, Windows Server Update Service (WSUS)
Understand troubleshooting methodology
Processes, procedures, best practices; systematic vs. specific approach, Performance Monitor, Event Viewer, Resource Monitor, Information Technology Infrastructure Library, central logging, event filtering, default logs

Preparation resources
Boot process and BCDEdit
Active Directory backup and restore in Windows Server 2008
Troubleshoot Windows Server 2008


QUESTION 1
You need to secure a server that you have been working on without disrupting the work of other employees in your company. What should you do?

A. Log off the server
B. Hibernate the server
C. Restart the server
D. Shut down the server

Answer: A


QUESTION 2
What is the default location for a new user account in Active Directory?

A. The Users Organizational Unit
B. The Accounts container
C. The Accounts Organizational Unit
D. The Users container

Answer: D

Explanation: In a default installation of an Active Directory domain, user accounts, computer accounts, and groups are
put in CN=objectclass containers instead of being put in a more desirable organizational unit class container. Similarly,
user accounts, computer accounts, and groups that were created by using earlier-version APIs are put in the CN=Users
and CN=computers containers.


QUESTION 3
Which technology is designed to host calendars, contacts, and e-mail on the server?

A. Microsoft Host Integration Server
B. Microsoft Expression Studio
C. Microsoft SQL Server
D. Microsoft Exchange Server

Answer: D


QUESTION 4
Which is used to verify that a secure Web site is legitimate?

A. Active Directory
B. Enterprise trust
C. Private key
D. Digital certificate

Answer: D

Click here to view complete Q&A of 98-365 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best Microsoft 98-365 Certification, Microsoft 98-365 Training at certkingdom.com

Best Online MCITP Training and Learning blog