C2150-618 IBM Security Privileged Identity Manager V2.0.2 Deployment

Test information:
Number of questions: 60
Time allowed in minutes: 90
Required passing score: 61%
Languages: English

Related certifications:
IBM Certified Deployment Professional – Security Privileged Identity Manager V2.0.2

The test consists of 5 sections containing a total of approximately 60 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 – Planning (20%)
Illustrate the key benefits of the privileged identity management.
Analyze the client and business requirements and translate into implementation goals (i.e. optional features, end resources, target system, adapters and access profile, ISPIM agent OS, ISPIM for Applications, auditing, reporting requirements, activity monitoring).
Produce an implementation plan (i.e. credential access methods, additional checkout assurance, reauthentication, etc.).
Determine goal customization (i.e. approval and lifecycle rules, identify shared access management, integration with existing processes, etc.).
Produce deployment topologies for business requirements (i.e. scale, size, availability, automation, redundancy, prerequisites, form factor, components, hardware and software, network architecture, upported platforms, etc.).

Section 2 – Installation and Configuration (18%)
Perform the database and directory installation and configuration (i.e. update fixpack, LDAP over SSL, etc.).
Complete the provisioning, installation and configuration of the ISPIM virtual appliance.
Perform guided and advanced configurations (i.e. cluster node setup, load balancer integration, configuration parameters, Application Identity management, secure communications, etc.).
Perform the installation and configuration of optional components (i.e. Cognos reporting server, external TDI servers, external AD registry, custom root certificate, SSL, etc.).
Perform the installation and configuration of AccessAgent on workstations, terminal server and Citrix server and desktops. (i.e. ISPIM Root CA certificate, Access Studio tool).

Section 3 – Administration (22%)
Describe how to create administrative domains, administrators, users, auditors, application managers.
Construct custom groups, views and processes (i.e. identity feeds, delegate administration, forms and workflow, etc.).
Demonstrate onboarding credentials (i.e. manual and bulk load, credential default settings, credential pools, applications, connected v/s unconnected credential, etc.).
Construct target systems connections and determine access (i.e. resources, roles and shared access policies, password policies, target endpoint, identity providers).
Construct an automated credential check-in/check-out, session recording, and access profiles.
Manipulate reports to deliver information based on customer requirements (i.e. Cognos reports, internal audit reports).

Section 4 – Maintenance (22%)
Construct and modify AccessProfiles with ISPIM support.
Perform registration, fingerprinting, recapturing, and administration of application instances and credentials.
Perform common maintenance tasks (i.e. appliance snapshots, data tier backup, firmware upgrade mechanisms, fixpack, archive and restore session recordings, Cipher Suites, certificate uploads , cluster synchronization etc.).
Perform auditing tasks and creating audit reports (i.e. ESSO audit logs and PIM request).
Perform monitoring using URLs, tools and logs.
Analyze and present maintenance plans to meet client needs (i.e. logs, reports, Cipher Suites, certificate uploads, cluster synchronization, data synchronization, etc.).

Section 5 – Troubleshooting and Tuning (18%)
Construct a support package (i.e. access, analyze, and configure component logs and traces, PMR process, etc.).
Solve connectivity issues (i.e. between appliance and data tier, client and appliance, cluster issues, reporting modules, cluster promotion, etc.).
Show data locations and manipulate usage of data to troubleshoot problems (i.e. configure new traces for the appliance).
Examine and solve user authentication and authorization issues.
Analyze performance and make tuning changes (i.e. LDAP, DB2 and appliance).

IBM Certified Deployment Professional – Security Privileged Identity Manager V2.0.2

Job Role Description / Target Audience
This intermediate level certification is intended for deployment professionals who work with IBM Security Privileged Identity Manager V2.0.2.

These deployment professionals have extensive product experience. They plan, install, configure, administer, maintain, tune and troubleshoot IBM Security Privileged Identity Manager V2.0.2 installations.

These deployment professionals are able to perform most of the tasks involved in the job role with limited assistance.

To attain the IBM Certified Deployment Professional – Security Privileged Identity Manager V2.0.2 certification, candidates must pass 1 test. To prepare for the test, it is recommended to refer to the job role description and recommended prerequisite skills, and click the link to the test below to refer to the test objectives and the test preparation tab.

Basic knowledge of:
operating systems and databases.
hardware or virtual machines.
networking and protocols.
auditing and compliance.
information security guidelines.

Requirements
This certification requires 1 test(s).

Click here to view complete Q&A of C2150-618 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best IBM C2150-618 Certification, IBM C2150-618 Training at certkingdom.com

C2150-616 IBM Security QRadar Risk Manager V7.2.6 Administration

Test information:
Number of questions: 60
Time allowed in minutes: 120
Required passing score: 61%
Languages: English

Related certifications:
IBM Certified Administrator – Security QRadar Risk Manager V7.2.6

The test consists of 6 sections containing a total of approximately 60 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 – Device configuration investigation (22%)
Identify assets in the network (i.e. device discovery).
Apply credential sets to the discovered devices.
Obtain device configuration.
Examine the asset information.
Examine scanning results (i.e. port, application, patch, etc.).
Apply specific searches (i.e. device rules, risk, vulnerabilities, etc.).
Examine connections (i.e. use, search/view, and export).

Section 2 – Device source management (22%)
Demonstrate the importing and management of devices (i.e. view, add, edit, delete, log sources, etc.)
Illustrate protocol configuration.
Create discovery schedules.
Demonstrate configurations of scans (i.e. port/app, configure windows, schedule scans, configure Linux.
Perform backup jobs (i.e. manage, add, edit, rename, delete, etc.).
Examine connections (i.e. use, search/view, and export).

Section 3 – Policy monitor (18%)
Use QRM questions to monitor policies (i.e. view, asset, compliance, device/rules, group, evaluation/result, export/import, auditing).
Illustrate policy management (i.e. create, manage, review, compliance, false positives).
Infer the Importance factor.
Demonstrate how to view and export connections (i.e. log sources, scanners).
Apply QRM Use Cases to a given scenarios.

Section 4 – Topology (13%)
Examine Topology layout.
Illustrate the function of groups within Topology.
Perform searches within Topology view (none, host, network, path).
Translate NAT within Topology.
Apply Topology to an investigation.
Use Topology graphs to determine traffic routes through network.

Section 5 – Vulnerability classification (15%)
Identify false positives.
Use simulations (edit, copy, assign, delete, monitor).
Modify simulations (revoke, group).
Perform Connections Investigations.
Examine vulnerability data using QRM (risk, criteria, information, types, exceptions, severity, impact, rules).

Section 6 – Reporting/scheduling (10%)
Construct various report types (vulnerability, log, asset, user, questions).
Modify report scheduling (create, edit, duplicate, share).
Construct and modify charts.

IBM Certified Administrator – Security QRadar Risk Manager V7.2.6

Job Role Description / Target Audience
This intermediate level certification is intended for administrators who works with IBM Security QRadar Risk Manager V7.2.6.

These administrators focus on managing security risks within their network and how those vulnerabilities can be exploited (or blocked) as a result of the current state of network assets using skills from the following areas:
1. Device configuration investigation
2. Device source management
3. Policy monitor
4. Topology
5. Vulnerability classification
6. Reporting/scheduling

These users are generally self-sufficient and able to perform most of the tasks involved in the job role with limited assistance.

To attain the IBM Certified Administrator – Security QRadar Risk Manager V7.2.6 certification, candidates must pass 1 test. To prepare for the test, it is recommended to refer to the job role description and recommended prerequisite skills, and click the link to the test below to refer to the test objectives and the Test preparation tab.

Recommended Prerequisite Skills

Working knowledge of:
IBM Security QRadar SIEM Administration
IBM Security QRadar Risk Manager

General knowledge of:
Networking
Risk management
System Administration
Network Topology

Requirements
This certification requires 1 test(s).

Click here to view complete Q&A of C2150-616 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best IBM C2150-616 Certification, IBM C2150-616 Training at certkingdom.com

C2150-614 IBM Security QRadar SIEM V7.2.7 Deployment

Test information:
Number of questions: 60
Time allowed in minutes: 115
Required passing score: 60%
Languages: English

Related certifications:
IBM Certified Deployment Professional – Security QRadar SIEM V7.2.7

The test consists of 6 sections containing a total of approximately 60 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 – Planning (25%)
Select the different Security QRadar SIEM components required to make up a suitable distributed deployment (e.g. Cloud, hardware or virtual machine; using QRadar Consoles, event and flow collectors, event and flow processors, and data nodes; considering logical networks, security constraints, and bandwidth; etc.).

Determine the required sizing, encompassing current usage and projected growth, of the overall installation (e.g. number of devices, handle the required how many events per second, how many flows per interval, how much storage is required for the solution, how to handle different geographical locations within the deployment, etc.).

Describe the purpose and limitations of the QRadar SIEM V7.2.7 high availability design (e.g. HA bandwidth, which hosts should be HA pairs, latency constraints, and network stability).

Determine how log source locations and information gathering mechanisms can affect QRadar component architecture (e.g. Windows Collection options).

Determine the method for receiving flows based on the architecture (e.g. regenerative taps, port mirrors/SPAN (Switched Port Analyzer) ports, NetFlow, etc.).

Outline common environmental data used and compare how they can be integrated (e.g. CMDB, User Information Sources, threat feeds, vulnerability scanners, REST-API, and ticketing systems).

Describe how the SIEM product interacts with other Security Intelligence QRADAR Modules (i.e. Risk Manager, Vulnerability Manager, and Incident Forensics).

Section 2 – Installation (13%)
Implement the appropriate software, Cloud or appliance installation and initial network configuration tasks for a given situation (e.g. ISO, DVD, USB, and recovering an appliance from a USB storage device; set up IP addresses, set up network aggregation links/NIC bonding (management interface), configuring QRadar to use external storage (SAN, iSCSI)).

Use deployment actions under system and license management to add additional managed hosts (e.g. set up encryption, configure off site source/target (non-storage), set up network aggregation links/NIC bonding (non-management interfaces), etc.).

Perform configuration of auto update (e.g. DSM, protocols; with or without internet Connection, etc.) (Level 3- Applying)Perform configuration of auto update (e.g. DSM, protocols; with or without internet Connection, etc.).

Determine which version of QRadar should be used when adding managed hosts into an environment (e.g. patch software, latest build of QRadar, original version of QRadar in place, how it affects managed host, HA, etc.).

Implement and optimize HA pairing (e.g. adding HA cluster to the host, demonstrating a high availability installation, determining which hosts to HA, order of installation, patching, etc.).

Summarize IMM configuration and firmware update mechanisms (e.g. changing passwords, obtaining SSL certificates, setting IP addresses, etc.).

Section 3 – Configuration (20%)
Differentiate which information will need to be put into a network hierarchy, how it relates to rule tests, and whether domains are required.

Determine the appropriate authentication and access control method(s) to use for a given environment (i.e. using the local repository, active directory, LDAP, radius, TACACS, domains and multi-tenancy, etc.) (Level 4- Analyzing)Determine the appropriate authentication and access control method(s) to use for a given environment (i.e. using the local repository, active directory, LDAP, radius, TACACS, domains and multi-tenancy, etc.).

Summarize common system settings which need to be set for each specific environment (e.g. initial system settings; administrative e-mail address, e-mail locale, and database settings, etc.).

Demonstrate configuring log sources (e.g. wincollect, syslog, log source extensions, custom QID entries, event mapping, log source groups, etc.).

Demonstrate configuring flow sources (e.g. different types of flow sources, Jflow, Sflow, netflow, PACKETEER, NAPATECH, etc.).

Demonstrate configuring scanners (e.g. configure different types of scanners and schedules, etc.).

Demonstrate configuring common administrative settings (e.g. configuration and data backups/restore, retention policies and buckets, routing rules, etc.).

Section 4 – General Operational Tasks (17%)
Demonstrate basic event and flow investigation to assist rule development and troubleshooting (i.e. searches, quick filters and simple AQL).

Demonstrate Rule and Building Block creation and optimization to deliver basic use case logic and rule evaluation troubleshooting (e.g. Rule Tests, Rule Actions and Responses, Building Blocks, Test ordering, the False Positive Rule, etc.).

Understand Custom Event and Flow properties, where they are used, how to create them and troubleshooting issues involving them (e.g. simple regex, ‘optimization for rules and searches’, scoping to logs sources/events to minimize evaluation frequency, etc.).

Choose between the four types of reference data and illustrate how the data within them can be manipulated (Aging out, CLI, REST-API and rule responses), what each type would be used for (e.g. transient data storage, rule tests, AQL enrichment, etc.) and how to investigate issues with them.

Understand where historical correlation can be used to review old data or data received in ‘batch mode’.

Discuss the performance, storage and network impact of Local vs Global rule evaluation in a distributed environment.

Section 5 – Performance Optimization and Tuning (15%)
Explain which configuration actions should be taken to make default rule sets useful (e.g. network hierarchy, server discovery and host definition building blocks, host identification, tuning building blocks, etc.).

Perform SIEM performance optimization (e.g. performance limitations, network bandwidth, Disk IO, number of concurrent searches, rules for optimizing EPS, event and flow custom properties, backend scripts, etc.) .

Infer when expensive rules and properties are automatically managed and investigated (i.e. automatic versus manual investigation, reference data, etc.).

Administer aggregated data management (e.g. determining issues with report data, disable any unnecessary views/reports, etc.).

Analyze index management requirements for an environment (e.g. determine which properties to index; understand when to index, etc.).

Section 6 – Administration and Troubleshooting (10%)
Demonstrate the investigation of offenses that are not standardized (e.g. navigate through offenses, related events and flows, analyze offenses, state the difference between an Offense and a Triggered Rule, etc.).

Demonstrate how to monitor and investigate network and log activity search issues (e.g. filtering, searching, grouping and sorting, saving searches and creating reports, creating dashboard widgets from searches, viewing audit logs, indexed fields and quick filter, etc.).

Diagnose asset management and server discovery problems (e.g. vulnerabilities, filtering, searching, grouping, sorting, saving searches on assets, importing, exporting, populating asset databases, etc.).

Diagnose system notifications regarding performance problems or system failures (e.g. dropping events, HA System Failed, I/O error, how to get logs for support tickets, license restrictions, etc.).

IBM Certified Deployment Professional – Security QRadar SIEM V7.2.7
Job Role Description / Target Audience

This intermediate level certification is intended for deployment professionals who are responsible for the planning, installation, configuration, performance optimization, tuning, troubleshooting, and administration of an IBM Security QRadar SIEM V7.2.7 deployment. These individuals are able to complete these tasks with little to no assistance from documentation, peers or support.

To attain the IBM Certified Deployment Professional – Security QRadar SIEM V7.2.7 certification, candidates must pass 1 test. To prepare for the test, it is recommended to refer to the job role description and recommended prerequisite skills, and click the link to the test below to refer to the test objectives and the test preparation tab.


Recommended Prerequisite Skills

Understanding of:
· basic system architecture design

· IBM Security QRadar SIEM V7.2.7 architecture and components
· vulnerability scanners

Working knowledge of:
· security technologies such as firewalls, encryption using keys, SSL, HTTPS,
· regular expressions
· building and managing IBM Security QRadar SIEM V7.2.7 rules and reports
· IBM Security QRadar SIEM V7.2.7 prerequisite software
· TCP/IP
· LINUX operating system such as vi, iptables, ssh, cat, tail, grep, etc.


QUESTION: No: 1
Which CLI command should be used to change the default password from PASSWORD to S3cure for the username USERID?

A. /opt/ibm/toolscenter/asu/asu set IMM. Password S3cure –ksu
B. /opt/ibm/toolscenter/asu/asu set IMM. Password.1 S3cure –ksu
C. /opt/ibm/toolscenter/asu/asu64 set IMM. Password S3cure — ksu
D. /opt/ibm/toolscenter/asu/asu64 set IMM.Password.1 S3cure — ksu

Answer: D

Explanation:
To reset the IMM password use the following command:
/opt/ibm/toolscenter/asu64 set |MM.Password.1 NewPassword –kcs
References: http://wvvvv-01.ibm.com/support/docview.wss?uid=swg21964070


QUESTION: No: 2
A Deployment Professional is performing a new deployment, and the customer wants to monitor network
traffic by sending raw data packets from a network device to IBM Security QRadar SEAM V7.2.7.
Which method should be used?

A. AGP card
B. Napatech card
C. SFIow protocol
D. NetFIow protocol

Answer: B

Explanation:
You can monitor network traffic by sending raw data packets to a IBM QRadar QFIow Collector 1310
appliance. The QRadar QFIow Collector uses a dedicated Napatech monitoring card to copy incoming
packets from one port on the card to a second port that connects to a IBM Security QRadar Packet
Capture appliance.
References:
http://www.ibm.com/support/knowledgecenter/SSKIVIKU/com.ibm.qradar.doc/t_qf|ow_forvvard_pcap.html


QUESTION: No: 3
A Deployment Professional was asked to investigate the following error:
Custom Rule Engine has detected a total of 20487 dropped event(s).
20487 event(s) were dropped in the last 62 seconds. Queue is at 99 percent capacity
The Deployment Professional needs to run the command “/opt/qradar/bin/findExpensiveCustomRuIes.sh”
to gather the necessary troubleshooting logs.
When should this command be run?

A. Right after a reboot
B. Run “service hostcontext restart” first
C. While the system is dropping events
D. Restart ECS, then run command

Answer: C

Explanation:
The script “findExpensiveCustomRuIes.sh” script is designed to query the QRadar data pipeline and
report on the processing statistics from the Custom Rules Engine (CRE). The script monitors metrics and
collecting statistics on how many events hit each rule, how long it takes to process a rule, total execution
time and average execution time. When the script completes it turns off these performance metrics. The
findExpensiveCustomRuIes script is a useful tool for creating on demand reports for rule performance, it
is not a tool for tracking historical rule data in QRadar. The core functionality of this script is often run
when users begin to see drops in events or events routed to storage between components in QRadar.
References:
http://www-01.ibm.com/support/docview.wss?uid=swg219852528myns=swgother&mynp=OCSSBQAC&
mync=R&cm_sp=swgother-_-OCSSBQAC-_-R


QUESTION: No: 4
A current banking customer has just expanded by purchasing a small rural bank with a low bandwidth
WAN connection.
The customer wants to expand its current QRadar SIEIVI 3105 all-in-one deployment to capture log events
from the newly acquired branch and to forward them on a schedule, after hours during the trough of
activity to the main branch. There is plenty of room for this additional EPS growth.
Which device will meet the requirements?

A. 1202 QFIow Collector
B. 1400 Data Node
C. 1501 Event Collector
D. 1605 Event Processor

Answer: D

Explanation:
The IBM Security QRadar Event Processor 1605 (MTM 4380-Q1E) appliance is a dedicated event
processor that you can scale your QRadar deployment to manage higher EPS rates. The QRadar Event
Processor 1605 appliance includes an on-board event collector, event processor, and internal storage for
events.
With the Basic License the capacity is 2500 EPS, and with an upgrade license it is 20000 EPS.

 

Click here to view complete Q&A of C2150-614 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best IBM C2150-614 Certification, IBM C2150-614 Training at certkingdom.com

C2150-611 IBM Security AppScan Source Edition V9.0.3 Deployment

Test information:
Number of questions: 57
Time allowed in minutes: 90
Required passing score: 57%
Languages: English

Related certifications:
IBM Certified Deployment Professional – Security AppScan Source Edition V9.0.3

The test consists of 6 sections containing a total of approximately 57 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 – Product Features and Capabilities (21%)
Explain what to expect to see from static analysis as opposed to dynamic analysis.
Explain the purpose and characteristics of subcomponents of IBM Security AppScan Source Edition, V9.0.3.
Show reporting features (AppScan source ASE).
Integrate with ASE.
Illustrate the features and capabilities of the IBM Security AppScan Source V9.0.3 for Analysis, Remediation, Development, and Automation.
Illustrate the benefits of integration of AppScan Source with AppScan Enterprise.
Analyze the use of filters in a given situation.
Illustrate the benefits and uses of creating custom scan configuration.

Section 2 – Planning and System Requirements (19%)
Illustrate the user authentication / ASE component.
Illustrate the deployment scenario that should be used in a given situation.
Show external programs needed for scanning (e.g. Java versions, Visual Studio, etc.).
Identify the supported IDEs for the IBM Security AppScan Source Edition, V9.0.3 for development/Remediation plugin.
Show the ports required for IBM Security AppScan Source Edition, V9.0.3 to be integrated with AppScan Enterprise and the purpose of each of the ports.
Show the framework compatibility.
Show that the required prerequisites are understood and accepted (database and OS).

Section 3 – Installation, Upgrading and Configuration (11%)
Upgrade from older versions of AppScan.
Explain the characteristics and limitations of deploying IBM Security AppScan Source Edition, V9.0.3 on OS X, Linux, or Windows.
Examine the steps for ASE server installation (presence of an ASE server, presence of a rational licensing server).
Examine the steps for AppScan Source installation (presence of an IBM Security AppScan Source Edition, V9.0.3 database, and if the system requirements are confirmed from IBM Security AppScan Source Edition, V9.0.3 components).

Section 4 – Configuring Applications for Scanning (19%)
Use options for Java, .net.
Demonstrate pattern-based rules.
Use advanced scan-based settings.
Configure AppScan for automation (scanning from the command line).
Create and prepare new applications for scanning.
Use the correct Scan Configuration.

Section 5 – Working with Scanned Results (21%)
Show how configuration results and bundles can be used for collaboration.
Solve common scan coverage issues (missing findings, lost sinks, poor coverage, missing sources, unsupported frameworks, etc.).
Solve the possible cause of no findings.
Solve the possible cause of a large number of false suspect findings.
Analyze and triage scan findings.

Section 6 – Administration and Troubleshooting (9%)
Demonstrate the user administration capabilities of IBM Security AppScan Source Edition, V9.0.3 (user permissions for different actions in the tool, auditing user activity).
Show the IBM Security AppScan Source Edition, V9.0.3 license that is required for a given scenario.
Distinguish between logging options (log level, log file locations, etc.).
Troubleshoot memory issues and scan failures.
Troubleshoot a licensing checkout issue.

IBM Certified Deployment Professional – Security AppScan Source Edition V9.0.3

Job Role Description / Target Audience
This intermediate level certification is intended for deployment professionals working with IBM Security AppScan Source Edition, V9.0.3.

These deployment professionals plan, install, configure, administer, maintain and troubleshoot.

These deployment professionals are generally self-sufficient and able to perform most of the tasks involved in the job role with limited assistance.

To attain the IBM Certified Deployment Professional – Security AppScan Source Edition V9.0.3 certification, candidates must pass 1 test. To prepare for the test, it is recommended to refer to the job role description and recommended prerequisite skills, and click the link to the test below to refer to the test objectives and the test preparation tab.

Recommended Prerequisite Skills

Basic knowledge of:
Application security
Application testing (static and dynamic testing)
Operating systems
Administering applications for servers (Windows, Linux, and OS X)
User authentication
Development
Networking

Requirements
This certification requires 1 test(s).

Click here to view complete Q&A of C2150-611 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best IBM C2150-611 Certification, IBM C2150-611 Training at certkingdom.com

Exam 98-365 Windows Server Administration Fundamentals

Published: August 2, 2010
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: Academic
Technology: Windows Server 2008
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Understanding server installation (10–15%)
Understand device drivers
Installation, removal, disabling, update/upgrade, rollback, troubleshooting, Plug & Play, IRQ, interrupts, driver signing
Understand services
Which statuses a service can be in, startup types, recovery options, delayed startup, Run As settings for a service, stopping or pausing a service, service accounts, dependencies
Understand server installation options
Choose the correct operating system version options; interactive installs; automated install using WDS; perform unattended installs; perform upgrades, clean installs, and migrations

Preparation resources
Installing devices and their drivers
Server Core installation option getting started guide
Installing Windows Server 2008 R2

Understanding server roles (25–30%)
Identify application servers
Mail servers, database servers, collaboration servers, monitoring servers, threat management
Understand Web services
IIS, WWW, and FTP, separate worker processes, adding components, sites, ports, SSL, certificates
Understand remote access
Remote assistance, remote administration tools, Remote Desktop Services, licensing, RD Gateway, VPN, application virtualization, multiple ports
Understand the file and print services
Local printers, network printers, printer pools, web printing, web management, driver deployment, file, folder, and share permissions vs. rights, auditing, print job management
Understand server virtualization
Virtual memory, virtual networks, snapshots and saved states, physical to virtual conversions, virtual to physical conversions

Preparation resources

Changes in functionality from Windows Server 2003 with SP1 to Windows Server 2008
What’s new in routing and remote access in Windows Server 2008

Understanding Active Directory (20–25%)
Understand accounts and groups
Domain accounts, local accounts, user profiles, computer accounts, group types, default groups, group scopes, group nesting, understand AGDLP and AGUDLP processes to help implement nesting
Understand organizational units and containers
Purpose of OUs, purpose of containers, delegation, default containers, uses for different container objects, default hidden and visible containers
Understand Active Directory infrastructure
Domain controllers. forests, child domains, operation master roles, domain vs. workgroup, trust relationships, functional levels, namespace, sites, replication, schema
Understand group policy
Group policy processing, Group Policy Management Console, computer policies, user policies, local policies

Preparation resources
Active Directory Services
Designing OU structures that work

Understanding storage (10–15%)
Identify storage technologies and their typical usage scenarios
Advantages and disadvantages of different storage topologies, Fibre Channel, iSCSI hardware
Understand RAID redundancy
RAID 0, RAID 1, RAID 5, RAID 10 and combinations, hardware and software RAID
Understand disk types
Solid State Drive (SSD) and Hard Disk Drive (HDD) types and comparisons, ATA basic disk, dynamic disk, mount points, file systems, mounting a virtual hard disk, distributed file systems

Preparation resources
Planning for disks and storage
Windows Server 2008—file and storage solutions
Overview of disk management

Understanding server performance management (10–15%)
Identify major server hardware components
Memory, disk, processor, network, 32-bit and 64-bit architecture, removable drives, graphic cards, cooling, power usage, ports
Understand performance monitoring
Methodology, procedures, effect of network, CPU, memory and disk, creating a baseline, Performance Monitor, Resource Monitor, Task Manager, performance counters
Understand logs and alerts, Event Viewer
Purpose of performance logs and alerts

Preparation resources
Performance monitoring getting started guide
Computer hardware and Windows Server 2008

Understanding server maintenance (15–20%)
Identify steps in the startup process
BIOS, UEFI, TPM, bootsector, bootloader, MBR, boot.ini, POST, Safe Mode
Understand business continuity
Backup and restore, disaster recovery planning, clustering, AD restore, folder redirection, data redundancy, uniterruptible power supply (UPS)
Understand updates
Software, driver, operating systems, applications, Windows Update, Windows Server Update Service (WSUS)
Understand troubleshooting methodology
Processes, procedures, best practices; systematic vs. specific approach, Performance Monitor, Event Viewer, Resource Monitor, Information Technology Infrastructure Library, central logging, event filtering, default logs

Preparation resources
Boot process and BCDEdit
Active Directory backup and restore in Windows Server 2008
Troubleshoot Windows Server 2008


QUESTION 1
You need to secure a server that you have been working on without disrupting the work of other employees in your company. What should you do?

A. Log off the server
B. Hibernate the server
C. Restart the server
D. Shut down the server

Answer: A


QUESTION 2
What is the default location for a new user account in Active Directory?

A. The Users Organizational Unit
B. The Accounts container
C. The Accounts Organizational Unit
D. The Users container

Answer: D

Explanation: In a default installation of an Active Directory domain, user accounts, computer accounts, and groups are
put in CN=objectclass containers instead of being put in a more desirable organizational unit class container. Similarly,
user accounts, computer accounts, and groups that were created by using earlier-version APIs are put in the CN=Users
and CN=computers containers.


QUESTION 3
Which technology is designed to host calendars, contacts, and e-mail on the server?

A. Microsoft Host Integration Server
B. Microsoft Expression Studio
C. Microsoft SQL Server
D. Microsoft Exchange Server

Answer: D


QUESTION 4
Which is used to verify that a secure Web site is legitimate?

A. Active Directory
B. Enterprise trust
C. Private key
D. Digital certificate

Answer: D

Click here to view complete Q&A of 98-365 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best Microsoft 98-365 Certification, Microsoft 98-365 Training at certkingdom.com

Exam 70-776 Perform Big Data Engineering on Microsoft Cloud Services (beta)

Published: July 5, 2017
Languages: English
Audiences: Data engineers
Technology: Microsoft Azure SQL Data Warehouse, Azure Data Lake Analytics, Azure Data Factory, Azure Stream Analytics
Credit toward certification: MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Design and Implement Complex Event Processing By Using Azure Stream Analytics (15-20%)
Ingest data for real-time processing
Select appropriate data ingestion technology based on specific constraints; design partitioning scheme and select mechanism for partitioning; ingest and process data from a Twitter stream; connect to stream processing entities; estimate throughput, latency needs, and job footprint; design reference data streams
Design and implement Azure Stream Analytics
Configure thresholds, use the Azure Machine Learning UDF, create alerts based on conditions, use a machine learning model for scoring, train a model for continuous learning, use common stream processing scenarios
Implement and manage the streaming pipeline
Stream data to a live dashboard, archive data as a storage artifact for batch processing, enable consistency between stream processing and batch processing logic
Query real-time data by using the Azure Stream Analytics query language
Use built-in functions, use data types, identify query language elements, control query windowing by using Time Management, guarantee event delivery

Design and Implement Analytics by Using Azure Data Lake (25-30%)
Ingest data into Azure Data Lake Store
Create an Azure Data Lake Store (ADLS) account, copy data to ADLS, secure data within ADLS by using access control, leverage end-user or service-to-service authentication appropriately, tune the performance of ADLS, access diagnostic logs
Manage Azure Data Lake Analytics
Create an Azure Data Lake Analytics (ADLA) account, manage users, manage data sources, manage, monitor, and troubleshoot jobs, access diagnostic logs, optimize jobs by using the vertex view, identify historical job information
Extract and transform data by using U-SQL
Schematize data on read at scale; generate outputter files; use the U-SQL data types, use C# and U-SQL expression language; identify major differences between T-SQL and U-SQL; perform JOINS, PIVOT, UNPIVOT, CROSS APPLY, and Windowing functions in U-SQL; share data and code through U-SQL catalog; define benefits and use of structured data in U-SQL; manage and secure the Catalog
Extend U-SQL programmability
Use user-defined functions, aggregators, and operators, scale out user-defined operators, call Python, R, and Cognitive capabilities, use U-SQL user-defined types, perform federated queries, share data and code across ADLA and ADLS
Integrate Azure Data Lake Analytics with other services
Integrate with Azure Data Factory, Azure HDInsight, Azure Data Catalog, and Azure Event Hubs, ingest data from Azure SQL Data Warehouse

Design and Implement Azure SQL Data Warehouse Solutions (15-20%)
Design tables in Azure SQL Data Warehouse
Choose the optimal type of distribution column to optimize workflows, select a table geometry, limit data skew and process skew through the appropriate selection of distributed columns, design columnstore indexes, identify when to scale compute nodes, calculate the number of distributions for a given workload
Query data in Azure SQL Data Warehouse
Implement query labels, aggregate functions, create and manage statistics in distributed tables, monitor user queries to identify performance issues, change a user resource class
Integrate Azure SQL Data Warehouse with other services
Ingest data into Azure SQL Data Warehouse by using AZCopy, Polybase, Bulk Copy Program (BCP), Azure Data Factory, SQL Server Integration Services (SSIS), Create-Table-As-Select (CTAS), and Create-External-Table-As-Select (CETAS); export data from Azure SQL Data Warehouse; provide connection information to access Azure SQL Data Warehouse from Azure Machine Learning; leverage Polybase to access a different distributed store; migrate data to Azure SQL Data Warehouse; select the appropriate ingestion method based on business needs

Design and Implement Cloud-Based Integration by using Azure Data Factory (15-20%)
Implement datasets and linked services
Implement availability for the slice, create dataset policies, configure the appropriate linked service based on the activity and the dataset
Move, transform, and analyze data by using Azure Data Factory activities
Copy data between on-premises and the cloud, create different activity types, extend the data factory by using custom processing steps, move data to and from Azure SQL Data Warehouse
Orchestrate data processing by using Azure Data Factory pipelines
Identify data dependencies and chain multiple activities, model schedules based on data dependencies, provision and run data pipelines, design a data flow
Monitor and manage Azure Data Factory
Identify failures and root causes, create alerts for specified conditions, perform a redeploy, use the Microsoft Azure Portal monitoring tool

Manage and Maintain Azure SQL Data Warehouse, Azure Data Lake, Azure Data Factory, and Azure Stream Analytics (20-25%)
Provision Azure SQL Data Warehouse, Azure Data Lake, Azure Data Factory, and Azure Stream Analytics
Provision Azure SQL Data Warehouse, Azure Data Lake, and Azure Data Factory, implement Azure Stream Analytics
Implement authentication, authorization, and auditing
Integrate services with Azure Active Directory (Azure AD), use the local security model in Azure SQL Data Warehouse, configure firewalls, implement auditing, integrate services with Azure Data Factory
Manage data recovery for Azure SQL Data Warehouse, Azure Data Lake, and Azure Data Factory, Azure Stream Analytics
Backup and recover services, plan and implement geo-redundancy for Azure Storage, migrate from an on-premises data warehouse to Azure SQL Data Warehouse
Monitor Azure SQL Data Warehouse, Azure Data Lake, and Azure Stream Analytics
Manage concurrency, manage elastic scale for Azure SQL Data Warehouse, monitor workloads by using Dynamic Management Views (DMVs) for Azure SQL Data Warehouse, troubleshoot Azure Data Lake performance by using the Vertex Execution View
Design and implement storage solutions for big data implementations
Optimize storage to meet performance needs, select appropriate storage types based on business requirements, use AZCopy, Storage Explorer and Redgate Azure Explorer to migrate data, design cloud solutions that integrate with on-premises data

Click here to view complete Q&A of 70-776 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best Microsoft 70-776 Certification, Microsoft 70-776 Training at certkingdom.com

70-357 Developing Mobile Apps

Published: July 22, 2016
Languages: English, Spanish, Chinese (Simplified), Chinese (Traditional), French, German, Japanese, Portuguese (Brazil), Russian
Audiences: Developers
Technology: Visual Studio Community
Credit toward certification: MCP, MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Develop a XAML page layout for an adaptive UI (10–15%)
Construct a page layout
Configure a RelativePanel layout; select the appropriate XAML layout panel based on the UI requirement; configure a grid with appropriate column and row properties; configure alignment, margins, and padding
Implement responsive and adaptive UI behaviors
Differentiate between responsive and adaptive UI behaviors, create responsive and adaptive UIs by using VisualStateManager and AdaptiveTriggers, implement settings syntax for element properties and attached properties
Create and use custom controls within an adaptive UI
Evaluate when to create a custom control; create a custom control; implement styles, themes, and resource dictionaries; apply styles to custom controls by using Generic.xaml
Optimize a page layout
Reduce complexity for performance gains, reduce unnecessary nesting

Implement page navigation and lifecycle events (10–15%)
Choose the appropriate navigation structure for an app
Evaluate when to implement the Hub, Master/Details, Tabs and Pivot, and Nav Pane navigation patterns; evaluate when to implement a custom navigation pattern
Implement Nav Pane navigation
Load page content by using Frame.Navigate, implement page navigation by using the Nav Pane pattern; implement a SplitView control for use as a navigation pane; support accessibility requirements within navigation by implementing key based navigation, UI automation, and narrator; handle Back button behavior for different Windows 10 device families
Manage app activation
Launch an app, activate an app on Startup, implement activation from a deep link, implement activation based on Search integration, implement activation from a secondary tile
Manage app suspension and resuming
Prepare an app for suspension, resume from suspension or termination, extend execution and monitor suspension errors

Implement data access and data binding (20–25%)
Access data by using Entity Framework (EF)
Access data by using EFCore with SQLite, implement a local SQLite database
Implement the {Binding} extension
Implement the {x:Bind} extension
Implement MVVM classes and class interactions
Implement event binding by applying command patterns, implement a Dispatcher to update the UI thread with async return data
Implement app-to-app communications
Integrate a Share contract to share content with another app, integrate drag-and-drop, launch an app for results, implement app extensions, implement App Services
Implement REST Web Services
Implement JSON and data serialization, access cloud data and Web APIs by using HttpClient
Implement file system access
Manage storage by using StorageFile, StorageFolder, and StorageItem; access a file location by using FilePickers; implement data roaming and roaming folders

Implement feature detection for adaptive coding (10–15%)
Implement API detection within adaptive code
Implement Type detection within adaptive code
Implement supported capabilities
Implement support for a microphone, implement support for a webcam, implement support for location, implement support for enterprise authentication

Manage user input and custom user interactions (10–15%)
Implement command bars, flyouts, and dialogs
Implement command bars and AppBarButton buttons, implement context menus and menu flyouts, implement content dialogs, display a tooltip by using ToolTipService, display a pop-up menu, implement control over app settings
Implement support for traditional and touch input devices
Support touch input, support mouse input, support keyboard and virtual keyboard input
Implement speech and voice commands
Support speech synthesis, support speech recognition, support Cortana integration, support Personal Assistant Launch capability, support voice commands
Implement alternative forms of input
Implement inking, implement camera input, implement location services and GPS input

Manage authentication and identity management (10–15%)
Implement authentication using Web Authentication Broker
Implement web service authentication, implement OAuth, implement Azure Active Directory authentication
Manage credentials securely with Credential Locker
Implement two-factor authentication
Implement two-factor authentication using Microsoft Passport, implement two-factor authentication using Windows Hello

Implement notifications, background tasks, and reusable components (15–20%)
Create and consume class libraries and Windows Runtime components
Develop Windows Runtime components, develop class libraries, integrate class libraries and Windows Runtime components
Implement tile and toast notifications
Implement adaptive and interactive toast notifications, implement local tile notifications
Create and register a background task
Create a background task project and reference the background task within a project, implement background task event triggers and conditions
Implement and manage a background task
Monitor background task progress and completion, manage task lifecycle, share data and events between an app and its background tasks, call a background task directly
Create and consume a Universal Windows Platform (UWP) app service
Specify the AppService extension, implement app service as a background task, deploy the app service provider, call app services


QUESTION 1 – (Topic 1)
You need to configure the app to meet the load time requirements.
What should you do?

A. Set the value of the CacheSize to 0.
B. Set the value of the CacheMode property to BitmapCache.
C. Set the value of the NavigationCacheMode property to Enabled.
D. Set the value of the NavigationCacheMode property to Disabled.

Answer: C

Explanation:
Scenario: You must optimize the app using the following guidelines:
? You must minimize the time it takes to display content when an item on the timeline is selected.
? The app must respect memory and resource constraints for all devices.
You use the NavigationCacheMode property to specify whether a new instance of the page is created for each visit to the page or if a previously constructed instance of the page that has been saved in the cache is used for each visit.
The default value for the NavigationCacheMode property is Disabled. Set the
NavigationCacheMode property to Enabled or Required when a new instance of the page is not essential for each visit. By using a cached instance of the page, you can improve the performance of your application and reduce the load on your server.


QUESTION 2 – (Topic 1)
Note: This question is part of a series of questions that present the same scenario. Each
question in the series contains n unique solution. Determine whether the solution meets the stated goals.
You need to implement the appropriate XAML layout (or the Timeline app.
Solution: You create an instance of a RelativePanel class.
Does this meet the goal?

A. Yes
B. No

Answer: A

Explanation: RelativePanel lets you layout UI elements by specifying where they go in relation to other elements and in relation to the panel. By default, an element is positioned in the upper left corner of the panel.


QUESTION 3 – (Topic 1)
You need to design the navigation tor the timeline.
What navigation should you use?

A. hierarchy
B. peer
C. hub
D. master/details

Answer: A

Explanation:
From scenario:
Here we can use a hierarchy with each parent node having only one single child node.
Hierarchical structures are good for organizing complex content that spans lots of pages or when pages should be viewed in a particular order. The downside is that hierarchical pages introduce some navigation overhead: the deeper the structure, the more clicks it takes for users to get from page to page.
We recommend a hiearchical structure when:
You expect the user to traverse the pages in a specific order. Arrange the hierarchy to
enforce that order.
There is a clear parent-child relationship between one of the pages and the other pages in the group.
There are more than 7 pages in the group.
When there are more than 7 pages in the group, it might be difficult for users to understand how the pages are unique or to understand their current location within the group. If you don’t think that’s an issue for your app, go ahead and make the pages peers

 

Click here to view complete Q&A of 70-357 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best Microsoft 70-357 Certification, Microsoft 70-357 Training at certkingdom.com

HPE0-S46 Architecting HPE Server Solutions

Exam type Proctored
Exam duration 1 hour 30 minutes
Exam length 60 questions
Passing score 70%
Delivery languages English

Related certifications
HPE ASE – Hybrid Infrastructure and Cloud Architect V1
HPE ASE – Server Solutions Architect V3
HPE ASE – Server Solutions Architect V3 – upgrade from IBM System x certifications
HPE ASE – Hybrid Infrastructure and Cloud Architect V1 – upgrade from HPE ASE – Server Solutions Architect V3 or V2
HPE ASE – Hybrid Infrastructure and Cloud Architect V1 – upgrade from MCSD – Azure Solutions Architect
HPE ASE – Hybrid Infrastructure and Cloud Architect V1 – upgrade from HPE ASE – Data Center and Cloud Architect V3 or V2

Exam description

This exam tests candidates’ knowledge and skills on architecting HPE server products and solutions. Topics covered in this exam include server architectures and associated technologies as well as their functions, features, and benefits. Additional topics include knowledge of planning, and designing HPE server solutions as well as positioning HPE server solutions to customers.
Ideal candidate for this exam

New candidates who want to acquire the HPE ASE – Server Solutions Architect certification and who have not already acquired a previous version of this certification. Although anyone may take the exam, it is recommended that candidates have a minimum of two years experience with architecting HPE server solutions. Candidates are expected to have industry-standard server technology knowledge from training or hands-on experience.

Exam contents
This exam has 60 questions. Here are types of questions to expect:
Input Text
Input Numbers
Matching
Multiple choice (multiple responses)
Multiple choice (single response)
Point and click

Advice to help you take this exam
Complete the training and review all course materials and documents before you take the exam.
Exam items are based on expected knowledge acquired from job experience, an expected level of industry standard knowledge, or other prerequisites (events, supplemental materials, etc.).
Successful completion of the course alone does not ensure you will pass the exam.
Read this HPE Exam Preparation Guide and follow its recommendations.
Visit HPE Press for additional reference material, study guides, and HPE books.

Sections/Objectives

24% Foundational server architectures and technologies

Differentiate between processor classes and types to provide design guideance based on customer needs.
Describe I/O accelerator technologies.
Describe and explain networking technologies.
Identify storage technologies.
Explain server management technology features and their functionality.Propose High Availability and Disaster Recovery solutions to meet the customer’s business requirements.
Propose High Availability and Disaster Recovery solutions to meet the customer’s business requirements.
Differentiate between scale-out and scale-up benefits and purpose.
Differentiate current server OS and virtualization solutions.
Determine an appropriate plan for data center components based on industry best practices and standards.

33% Functions, features, and benefits of HPE server products and solutions
Differentiate and explain the HPE server product offerings, architectures, and options.
Locate and describe HPE health and fault technologies.
Propose HPE datacenter rack and power infrastructure solutions based on site conditions and requirements.
Given a use case, propose appropriate HPE server I/O connectivity options.
Given a customer environment scenario, propose which HPE management tools optimize administrative operations.
Describe the HPE standard warranties for server solutions and options.

16% Analyzing the server market and positioning HPE server solutions to customers

Compare and contrast the HPE server solution marketplace.
Compare and contrast how HPE server solutions provide competitive advantage and add value.

27% Planning and designing HPE server solutions
Given customer requirements and constraints, determine information needed to understand the customer’s needs.
Explain concepts of designing, sizing, and validating the solution.
Interpret customer requirements and integrate them into an HPE solution.


QUESTION 1
A customer needs an OpenStack-based cloud datacenter with several virtual machines that will be placed in multiple
VLANs. The customer needs to use Virtual Extensible LAN (VXLAN)
Or Generic Routing Encapsulation (GRE) technology to support multi-tenant traffic. The architect recommends the
following HPE server equipment:

Which rationale supports the architect’s recommended configuration?

A. It allows RDMA over Converged Ethernet (RoCE)
B. It improves performance of OpenStack instance provisioning
C. It improves performance of overlay networks with a tunnel offload engine
D. It allows configuration of interconnect module stacking

Answer: D


QUESTION 2
A customer needs an API that meets the following requirements:
What should the customer use?

A. XML
B. SNMP
C. REST
D. JAVA

Answer: C

Explanation:

The iLO RESTful API provides a modern programmable interface and a lightweight data model specification that is
simple, remote, secure, and extensible. In the autumn of 2014, the iLO RESTful API introduced this architectural style
for HPE ProLiant Gen9 servers with HPE iLO 4 2.0.

HPE now introduces the iLO RESTful API with Redfish conformance. This industry standard Software Defined
Compute (SDC) infrastructure management API is being implemented into ProLiant Gen9 servers and will function
across heterogeneous environments.


QUESTION 3
Which technology was invented by HPE to create an automated, energy-aware network between IT systems and facilities?

A. HPE Smart Memory
B. HPE Adaptive RAID on a Chip
C. HPE Intelligent PowerDiscovery
D. HPE Smart Storage Battery

Answer: C

Click here to view complete Q&A of HPE0-S46 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best HP HPE0-S46 Certification, HP HPE0-S46 Training at certkingdom.com

JN0-680 JNCIP-DC Exam Objectives

Data Center Deployment or Management
Describe Zero Touch Provisioning concepts
DHCP
Monitoring
Analytics
Describe ISSU/NSSU concepts
Requirements
Monitoring
Order of operations

Multichassis LAG
Describe MC-LAG concepts
Positioning scenarios
ICCP
Demonstrate knowledge of configuring, monitoring, or troubleshooting MC-LAG
Troubleshooting tools

Mixed Virtual Chassis
Describe mixed Virtual Chassis concepts
Mixed VC PFE scaling
Mixed VC cabling
Provisioning a mixed VC
Mastership election
Demonstrate knowledge of configuring, monitoring, or troubleshooting mixed Virtual Chassis technologies
Troubleshooting tools
Processes or components

Virtual Chassis Fabric
Describe VCF concepts
Mastership election
Physical layout
VCF control plane
Mixed VCF
VCF forwarding plane
Demonstrate knowledge of configuring, monitoring, or troubleshooting VCFs
VCF management
VCF provisioning options
VCF management

IP Fabric
Describe IP Fabric concepts
3-stage Clos architecture
IP Fabric routing
IP Fabric scaling
IP Fabric best practices
Demonstrate knowledge of configuring, monitoring, or troubleshooting IP Fabrics

VXLAN
Describe VXLAN concepts
L2VPN control planes
Multicast control plane
Data plane
Demonstrate knowledge of configuring, monitoring, or troubleshooting VXLAN

EVPN VXLAN Signaling
Describe EVPN concepts
Route types
MP-BGP
MAC Learning
Demonstrate knowledge of configuring, monitoring, or troubleshooting EVPNs

Data Center Interconnect

Describe DCI concepts
Interconnect network types
Intraconnect networks
Stitching
EVPN-signaled VXLAN for DCI
Demonstrate knowledge of configuring, monitoring, or troubleshooting DCI
QUESTION 1
You are deploying 50 QFX5100 switches in your data center. You are asked to explain the benefits of using ZTP during
your deployment of these devices.
What is a benefit of this deployment?

A. You must use DHCP options to provide Junos installation packages to all devices.
B. You must use DHCP options to provide the transfer mode used for pulling files from a storage server.
C. You can use DHCP options to push the configuration files to all devices.
D. You can use DHCP options to indicate which Junos version the switches should be running.

Answer: B


QUESTION 2
What is the endpoint of a VXLAN tunnel?

A. DLCI
B. VTEP
C. LSR
D. VCF

Answer: B


QUESTION 3
A customer has built a VXLAN using an EVPN signaling infrastructure with remote facilities with VXLAN using EVPN
signaling connected to the Internet. The customer notices that the network is completely stable with no protocol errors in
the underlay or overlay. The customer, however, cannot pass any application data across the network.
Which statement would explain the intermittent loss?

A. There is an LACP key mismatch.
B. The MTU is exceeded.
C. The routing protocol authentication has failed.
D. The BPDU protection is invoked.

Answer: B


QUESTION 4
Which EVPN service consists of a single broadcast domain per EVPN instance?

A. a VLAN bundle service interface
B. a VLAN-based service interface
C. a port-based VLAN-aware service interface
D. a port-based service interface

Answer: A

Click here to view complete Q&A of JN0-680 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best Juniper JN0-680 Certification, Juniper JN0-680 Training at certkingdom.com

70-775 Perform Data Engineering on Microsoft Azure HDInsight

Published: February 22, 2017
Languages: English
Audiences: Data scientists
Technology: Azure HDInsight
Credit toward certification: MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Administer and Provision HDInsight Clusters
Deploy HDInsight clusters
Create a cluster in a private virtual network, create a cluster that has a custom metastore, create a domain-joined cluster, select an appropriate cluster type based on workload considerations, customize a cluster by using script actions, provision a cluster by using Portal, provision a cluster by using Azure CLI tools, provision a cluster by using Azure Resource Manager (ARM) templates and PowerShell, manage managed disks, configure vNet peering
Deploy and secure multi-user HDInsight clusters
Provision users who have different roles; manage users, groups, and permissions through Apache Ambari, PowerShell, and Apache Ranger; configure Kerberos; configure service accounts; implement SSH tunneling; restrict access to data
Ingest data for batch and interactive processing
Ingest data from cloud or on-premises data; store data in Azure Data Lake; store data in Azure Blob Storage; perform routine small writes on a continuous basis using Azure CLI tools; ingest data in Apache Hive and Apache Spark by using Apache Sqoop, Application Development Framework (ADF), AzCopy, and AdlCopy; ingest data from an on-premises Hadoop cluster
Configure HDInsight clusters
Manage metastore upgrades; view and edit Ambari configuration groups; view and change service configurations through Ambari; access logs written to Azure Table storage; enable heap dumps for Hadoop services; manage HDInsight configuration, use HDInsight .NET SDK, and PowerShell; perform cluster-level debugging; stop and start services through Ambari; manage Ambari alerts and metrics
Manage and debug HDInsight jobs
Describe YARN architecture and operation; examine YARN jobs through ResourceManager UI and review running applications; use YARN CLI to kill jobs; find logs for different types of jobs; debug Hadoop and Spark jobs; use Azure Operations Management Suite (OMS) to monitor and manage alerts, and perform predictive actions

Implement Big Data Batch Processing Solutions
Implement batch solutions with Hive and Apache Pig
Define external Hive tables; load data into a Hive table; use partitioning and bucketing to improve Hive performance; use semi-structured files such as XML and JSON with Hive; join tables with Hive using shuffle joins and broadcast joins; invoke Hive UDFs with Java and Python; design scripts with Pig; identify query bottlenecks using the Hive query graph; identify the appropriate storage format, such as Apache Parquet, ORC, Text, and JSON
Design batch ETL solutions for big data with Spark
Share resources between Spark applications using YARN queues and preemption, select Spark executor and driver settings for optimal performance, use partitioning and bucketing to improve Spark performance, connect to external Spark data sources, incorporate custom Python and Scala code in a Spark DataSets program, identify query bottlenecks using the Spark SQL query graph
Operationalize Hadoop and Spark
Create and customize a cluster by using ADF; attach storage to a cluster and run an ADF activity; choose between bring-your-own and on-demand clusters; use Apache Oozie with HDInsight; choose between Oozie and ADF; share metastore and storage accounts between a Hive cluster and a Spark cluster to enable the same table across the cluster types; select an appropriate storage type for a data pipeline, such as Blob storage, Azure Data Lake, and local Hadoop Distributed File System (HDFS)

Implement Big Data Interactive Processing Solutions
Implement interactive queries for big data with Spark SQL
Execute queries using Spark SQL, cache Spark DataFrames for iterative queries, save Spark DataFrames as Parquet files, connect BI tools to Spark clusters, optimize join types such as broadcast versus merge joins, manage Spark Thrift server and change the YARN resources allocation, identify use cases for different storage types for interactive queries
Perform exploratory data analysis by using Spark SQL
Use Jupyter and Apache Zeppelin for visualization and developing tidy Spark DataFrames for modeling, use Spark SQL’s two-table joins to merge DataFrames and cache results, save tidied Spark DataFrames to performant format for reading and analysis (Apache Parquet), manage interactive Livy sessions and their resources
Implement interactive queries for big data with Interactive Hive
Enable Hive LLAP through Hive settings, manage and configure memory allocation for Hive LLAP jobs, connect BI tools to Interactive Hive clusters
Perform exploratory data analysis by using Hive
Perform interactive querying and visualization, use Ambari Views, use HiveQL, parse CSV files with Hive, use ORC versus Text for caching, use internal and external tables in Hive, use Zeppelin to visualize data
Perform interactive processing by using Apache Phoenix on HBase
Use Phoenix in HDInsight; use Phoenix Grammar for queries; configure transactions, user-defined functions, and secondary indexes; identify and optimize Phoenix performance; select between Hive, Spark, and Phoenix on HBase for interactive processing; identify when to share metastore between a Hive cluster and a Spark cluster

Implement Big Data Real-Time Processing Solutions

Create Spark streaming applications using DStream API
Define DStreams and compare them to Resilient Distributed Dataset (RDDs), start and stop streaming applications, transform DStream (flatMap, reduceByKey, UpdateStateByKey), persist long-term data stores in HBase and SQL, persist Long Term Data Azure Data Lake and Azure Blob Storage, stream data from Apache Kafka or Event Hub, visualize streaming data in a PowerBI real-time dashboard
Create Spark structured streaming applications
Use DataFrames and DataSets APIs to create streaming DataFrames and Datasets; create Window Operations on Event Time; define Window Transformations for Stateful and Stateless Operations; stream Window Functions, Reduce by Key, and Window to Summarize Streaming Data; persist Long Term Data HBase and SQL; persist Long Term Data Azure Data Lake and Azure Blob Storage; stream data from Kafka or Event Hub; visualize streaming data in a PowerBI real-time dashboard
Develop big data real-time processing solutions with Apache Storm
Create Storm clusters for real-time jobs, persist Long Term Data HBase and SQL, persist Long Term Data Azure Data Lake and Azure Blob Storage, stream data from Kafka or Event Hub, configure event windows in Storm, visualize streaming data in a PowerBI real-time dashboard, define Storm topologies and describe Storm Computation Graph Architecture, create Storm streams and conduct streaming joins, run Storm topologies in local mode for testing, configure Storm applications (Workers, Debug mode), conduct Stream groupings to broadcast tuples across components, debug and monitor Storm jobs
Build solutions that use Kafka
Create Spark and Storm clusters in the virtual network, manage partitions, configure MirrorMaker, start and stop services through Ambari, manage topics
Build solutions that use HBase
Identify HBase use cases in HDInsight, use HBase Shell to create updates and drop HBase tables, monitor an HBase cluster, optimize the performance of an HBase cluster, identify uses cases for using Phoenix for analytics of real-time data, implement replication in HBase

QUESTION 2
Note: This question is part of a series of questions that present the same Scenario. Each question I the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution while others might not have correct solution.
You are implementing a batch processing solution by using Azure HDlnsight. You have a table that contains sales data.
You plan to implement a query that will return the number of orders by zip code.

You need to minimize the execution time of the queries and to maximize the compression level of the resulting data.
What should you do?

A. Use a shuffle join in an Apache Hive query that stores the data in a JSON format.
B. Use a broadcast join in an Apache Hive query that stores the data in an ORC format.
C. Increase the number of spark.executor.cores in an Apache Spark job that stores the data in a text format.
D. Increase the number of spark.executor.instances in an Apache Spark job that stores the data in a text format.
E. Decrease the level of parallelism in an Apache Spark job that Mores the data in a text format.
F. Use an action in an Apache Oozie workflow that stores the data in a text format.
G. Use an Azure Data Factory linked service that stores the data in Azure Data lake.
H. Use an Azure Data Factory linked service that stores the data In an Azure DocumentDB database.

Answer: B


QUESTION 3
Note: This question is part of a series of questions that present the same Scenario. Each question I the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution while others might not have correct solution.
You are building a security tracking solution in Apache Kafka to parse Security logs. The Security logs record an entry each time a user attempts to access an application. Each log entry contains the IP address used to make the attempt and the country from which the attempt originated.
You need to receive notifications when an IP address from outside of the United States is used to access the application.
Solution: Create two new consumers. Create a file import process to send messages. Start the producer.
Does this meet the goal?

A. Yes
B. No

Answer: B


QUESTION 4
You have an Azure HDInsight cluster.
You need to store data in a file format that maximizes compression and increases read performance.
Which type of file format should you use?

A. ORC
B. Apache Parquet
C. Apache Avro
D. Apache Sequence

Answer: A

Explanation: https://docs.microsoft.com/en-us/azure/data-factory/data-factory-supported-file-and-compression-formats

Click here to view complete Q&A of 70-775 exam
Certkingdom Review
, Certkingdom PDF

MCTS Training, MCITP Trainnig

Best Microsoft MCSE 70-775 Certification, Microsoft 70-775 Training at certkingdom.com