Archive for the ‘ MCTS ’ Category


Published: September 17, 2012
Languages: English
Audiences: IT professionals
Technology: Windows Server 2012
Credit toward certification: Microsoft Certified Technology Specialist (MCTS)

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Model data (20%)
Map entities and relationships by using the Entity Data Model
Use the Visual Designer, build an Entity Data Model from an existing database, manage complex entity mappings in EDMX, edit EDM XML, map to stored procedures, create user-defined associations between entities, generate classes with inheritance and map them to tables
This objective does not include: using MetadataWorkspace
Map entities and relationships by using LINQ to SQL
Use the Visual Designer, build a LINQ to SQL model from an existing database, map to stored procedures
Create and customize entity objects
Configure changes to an Entity Framework entity, use the ADO.NET EntityObject Generator (T4), extending, self-tracking entities, snapshot change tracking, ObjectStateManager, partial classes, partial methods in the Entity Framework
Connect a POCO model to the Entity Framework
Implement the Entity Framework with persistence ignorance, user-created POCO entities
This objective does not include: use the POCO templates
Create the database from the Entity Framework model
Customize the Data Definition Language (DDL) (templates) generation process, generate scripts for a database, Entity Data Model tools
Create model-defined functions
Edit the Conceptual Schema Definition Language (CSDL), enable model-defined functions by using the EdmFunction attribute, complex types

Manage connections and context (18%)
Configure connection strings and providers
Manage connection strings, including Entity Framework connection strings; use the Configuration Manager; correctly address the Microsoft SQL Server instance; implement connection pooling; manage User Instance and AttachDBfilename; switch providers; implement multiple active result sets (MARS)
This objective does not include: use the ConnectionStringBuilder, Oracle data provider, create and use a custom provider, use third-party providers
Create and manage a data connection
Connect to a data source, close connections, maintain the life cycle of a connection
Secure a connection
Encrypt and decrypt connection strings, use Security Support Provider Interface (SSPI) or SQL Server authentication, read-only versus read/write connections
This objective does not include: Secure Sockets Layer (SSL)
Manage the DataContext and ObjectContext
Manage the life cycle of DataContext and ObjectContext, extend the DataContext and ObjectContext, support POCO
Implement eager loading
Configure loading strategy by using LazyLoadingEnabled, support lazy loading with POCO, explicitly loading entities
Cache data
DataContext and ObjectContext cache, including identity map; local data cache
This objective does not include: Velocity, SqlCacheDependency
Configure ADO.NET Data Services
Create access rules for entities, configure authorization and authentication, configure HTTP verbs

Query data (22%)
Execute a SQL query
DBCommand, DataReader, DataAdapters, DataSets, manage data retrieval by using stored procedures, use parameters, System.Data.Common namespace classes
Create a LINQ query
Syntax-based and method-based queries, join, filter, sort, group, aggregation, lambda expressions, paging, projection
This objective does not include: compile queries
Create an Entity SQL (ESQL) query
Join, filter, sort, group, aggregation, paging, use functions, query plan caching, return a reference to an entity instance, use parameters with ESQL, functionality related to EntityClient classes
Handle special data types
Query BLOBs, filestream, spatial and table-valued parameters
This objective does not include: implement data types for unstructured data, user-defined types, Common Language Runtime (CLR) types
Query XML
LINQ to XML, XmlReader, XmlDocuments, XPath
This objective does not include: XSLT, XmlWriter
Query data by using WCF.NET Data Services
Implement filtering and entitlement in WCF.NET Data Services, address resources, create a query expression, access payload formats, Data Services interceptors

Manipulate data (22%)
Create, update, or delete data by using SQL statements
Create/Update/Delete (CUD), use DataSets, call stored procedures, use parameters
Create, update, or delete data by using DataContext
CUD, call stored procedures, use parameters
This objective does not include: ObjectTrackingEnabled
Create, update, or delete data by using ObjectContext
CUD, calling stored procedures, using parameters, setting SaveOptions
Manage transactions
System.Transactions, DBTransaction, roll back a transaction, Lightweight Transaction Manager (LTM)
This objective does not include: distributed transactions, multiple updates within a transaction, multiple synchronization of data within an acidic transaction
Create disconnected objects
Create self-tracking entities in the Entity Framework, attach objects, DataSets, table adapters

Develop and deploy reliable applications (18%)
Monitor and collect performance data
Log generated SQL (ToTraceString), collect response times, implement performance counters, implement logging, implement instrumentation
Handle exceptions
Resolve data concurrency issues (handle OptimisticConcurrency exception, Refresh method), handle errors, transaction exceptions, connection exceptions, timeout exceptions, handle an exception from the Entity Framework disconnected object, security exceptions
Protect data
Encryption, digital signature, hashing, salting, least privilege
Synchronize data
Online/offline Entity Framework, synchronization services, save locally
Deploy ADO.NET components
Package and publish from Visual Studio, deploy an ADO.NET Services application, package and deploy Entity Framework metadata
This objective does not include: configure IIS, MSDeploy, MSBuild

QUESTION 1
You are developing a Microsoft .NET Framework 4 application.
You need to collect performance data to the event log after the application is deployed to the production environment.
Which two components should you include in the project? (Each correct answer presents part of the solution. Choose two.)

A. A trace listener
B. A debug listener
C. Debug.Asset() statements
D. Debug.WriteLine() statements
E. Trace.WriteLine() statements
Answer: B,C
Explanation: Tracing is a way for you to monitor the execution of your application while it is running.
Example:
For example, suppose you set up two listeners: a TextWriterTraceListener and an EventLogTraceListener. Each listener receives the same message. The TextWriterTraceListener would direct its output to a stream, and the EventLogTraceListener would direct its output to an event log.
The following example shows how to send output to the Listeners collection. C#VB
// Use this example when debugging. System.Diagnostics.Debug.WriteLine(“Error in Widget 42”);
// Use this example when tracing. System.Diagnostics.Trace.WriteLine(“Error in Widget 42”);


QUESTION 2
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an
application. The application uses the ADO.NET Entity Framework to model entities.
You need to create a database from your model.
What should you do?

A. Run the edmgen.exe tool in FullGeneration mode.
B. Run the edmgen.exe tool in FromSSDLGeneration mode.
C. Use the Update Model Wizard in Visual Studio.
D. Use the Generate Database Wizard in Visual Studio. Run the resulting script against a Microsoft SQL Server database.
Answer: D
Explanation:
To update the database, right-click the Entity Framework designer surface and choose Generate Database From Model.
The Generate Database Wizard produces a SQL script file that you can edit and execute.


QUESTION 3
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to develop an application that uses the Entity Framework. The application has an entity model that includes SalesTerritory and SalesPerson entities as shown in the following diagram.


You need to calculate the total bonus for all sales people in each sales territory.
Which code segment should you use?
A. from person in model.SalesPersons group person by person.SalesTerritory into territoriesByPerson
select new
{
SalesTerritory = territoriesByPerson.Key,
TotalBonus = territoriesByPerson.Sum(person => person.Bonus) };
B. from territory in model.SalesTerritories group territory by territory.SalesPersons into personByterritories
select new
{
SalesTerritory = personByterritories.Key,
TotalBonus = personByterritories.Key.Sum(person => person.Bonus) };
C. model.SalesPersons
.GroupBy(person => person.SalesTerritory)
.SelectMany(group => group.Key.SalesPersons)
.Sum(person => person.Bonus); D. model.SalesTerritories
.GroupBy(territory => territory.SalesPersons)
.SelectMany(group => group.Key)
.Sum(person => person.Bonus);
Answer: A


QUESTION 4
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an application. The application connects to a Microsoft SQL Server database. The application uses DataContexts to query the database.
The application meets the following requirements:
Stores customer data offline.
Allows users to update customer records while they are disconnected from the server.
Enables offline changes to be submitted back to the SQL Server by using the DataContext object.
You need to ensure that the application can detect all conflicts that occur between the offline customer information submitted to the SQL Server and the server version.
You also need to ensure that you can roll back local changes.
What should you do?

A. Add a try/catch statement around calls to the SubmitChanges method of the DataContext object and catch ChangeConflictExceptions.
B. Add a try/catch statement around calls to the SubmitChanges method of the DataContext object and catch SqlExceptions.
C. Override the Update operation of the DataContext object. Call the ExecuteDynamicUpdate method to generate the update SQL.
D. Call the SubmitChanges method of the DataContext object.
Pass System.Data.Linq.ConflictMode.ContinueOnConflict to the method.
Answer: D
Explanation:
FailOnFirstConflict Specifies that attempts to update the database should stop immediately when the first concurrency conflict error is detected.
ContinueOnConflict Specifies that all updates to the database should be tried, and that concurrency conflicts should be accumulated and returned at the end of the process. ExecuteDynamicUpdate() Method Called inside update override methods to redelegate to LINQ to SQL the task of generating and executing dynamic SQL for update operations. ConflictMode Enumeration
(http://msdn.microsoft.com/en-us/library/bb345922.aspx) DataContext.ExecuteDynamicUpdate Method (http://msdn.microsoft.com/en-us/library/system.data.linq.datacontext.executedynamicupdate.aspx)


QUESTION 5
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an
application. The application connects to a Microsoft SQL Server database. You use the ADO.NET Entity Framework to model entities.
You need to add a new type to your model that organizes scalar values within an entity.
You also need to map stored procedures for managing instances of the type.
What should you do?

A. Add the stored procedures in the SSDL file along with a Function attribute. Define a complex type in the CSDL file.
Map the stored procedure in the MSL file with a ModificationFunctionElement.
B. Add the stored procedures in the SSDL file along with a Function attribute. Define a complex type in the CSDL file.
Map the stored procedure in the MSL file with an AssociationEnd element.
C. Use the edmx designer to import the stored procedures.
Derive an entity class from the existing entity as a complex type.
Map the stored procedure in the MSL file with an AssociationEnd element. D. Add the stored procedures in the SSDL file along with a Function attribute. Derive an entity class from the existing entity as a complex type.
Map the stored procedure in the MSL file with a ModificationFunctionElement.
Answer: A
Explanation:
EndProperty Element (MSL) (http://msdn.microsoft.com/en-us/library/bb399578.aspx) AssosiationEnd Attribute (http://msdn.microsoft.com/en-us/library/cc716774.aspx)

Click here to view complete Q&A of 70-516 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-516 Training at certkingdom.com

Published: July 2, 2010
Languages: English
Audiences: Developers
Technology: Microsoft Visual Studio 2012
Credit toward certification: MCTS, MCPD

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Developing web forms pages (19%)
Configure web forms pages
Page directives such as ViewState, request validation, event validation, MasterPageFile; ClientIDMode; using web.config; setting the html doctype
This objective does not include: referencing a master page; adding a title to a web form
Implement master pages and themes
Creating and applying themes; adding multiple content placeholders; nested master pages; control skins; passing messages between master pages; switching between themes at runtime; loading themes at run time; applying a validation schema
This objective does not include: creating a master page; basic content pages
Implement globalization
Resource files, browser files, CurrentCulture, currentUICulture, ASP:Localize
Handle page life cycle events
IsPostback, IsValid, dynamically creating controls, control availability within the page life cycle, accessing control values on postback, overriding page events
Implement caching
Data caching; page output caching; control output caching; cache dependencies; setting cache lifetimes; substitution control
This objective does not include: distributed caching (Velocity)
Manage state
Server-side technologies, for example, session and application; client-side technologies, for example, cookies and ViewState; configuring session state (in proc, state server, Microsoft SQL Server; cookieless); session state compression; persisting data by using ViewState; compressing ViewState; moving ViewState

Preparation resources
ASP.NET web pages
ASP.NET page lifecycle overview
Caching in .NET Framework applications

Developing and using web forms controls (18%)

Validate user input
Client side, server side, and via AJAX; custom validation controls; regex validation; validation groups; datatype check; jQuery validation
This objective does not include: RangeValidator and RequiredValidator
Create page layout
AssociatedControlID; Web parts; navigation controls; FileUpload controls
This objective does not include: label; placeholder, panel controls; CSS, HTML, referencing CSS files, inlining
Implement user controls
a control; adding a user control; referencing a user control; dynamically loading a user control; custom event; custom properties; setting toolbox visibility
Implement server controls
Composite controls, INamingContainer, adding a server control to the toolbox, global assembly cache, creating a custom control event, globally registering from web.config; TypeConverters
This objective does not include: postback data handler, custom databound controls, templated control
Manipulate user interface controls from code-behind
HTML encoding to avoid cross-site scripting, navigating through and manipulating the control hierarchy; FindControl; controlRenderingCompatibilityVersion; URL encoding; RenderOuterTable
This objective does not include: visibility, text, enabled properties

Preparation resources
Walkthrough: Validating user input in a web forms page
ASP.NET user controls
ASP.NET web server controls overview

Implementing client-side scripting and AJAX (16%)
Add dynamic features to a page by using JavaScript
Referencing client ID; script manager; script combining; Page.clientscript.registerclientscriptblock; Page.clientscript.registerclientscriptinclude; sys.require (scriptloader)
This objective does not include: interacting with the server; referencing JavaScript files; inlining JavaScript
Alter a page dynamically by manipulating the DOM
Using jQuery, adding, modifying, or removing page elements, adding effects, jQuery selectors
This objective does not include: AJAX
Handle JavaScript events
DOM events, custom events, handling events by using jQuery
Implement ASP.NET AJAX
Client-side templating, creating a script service, extenders (ASP.NET AJAX control toolkit), interacting with the server, Microsoft AJAX client library, custom extenders; multiple update panels; triggers; UpdatePanel.UpdateMode; timer
This objective does not include: basic update panel and progress
Implement AJAX by using jQuery
$.get, $.post, $.getJSON, $.ajax, xml, html, JavaScript Object Notation (JSON), handling return types
This objective does not include: creating a service

Preparation resources
Client script in ASP.NET web pages
Walkthrough: Creating an Ajax-enabled web site
Creating custom client events

Configuring and extending a web application (15%)
Configure authentication and authorization
Using membership, using login controls, roles, location element, protecting an area of a site or a page
This objective does not include: Windows Live; Microsoft Passport; Windows and forms authentication
Configure providers
Role, membership, personalization, aspnet_regsql.exe
This objective does not include: creating custom providers
Create and configure HttpHandlers and HttpModules
Generic handlers, asynchronous handlers, setting MIME types and other content headers, wiring modules to application events
Configure initialization and error handling
Handling Application_Start, Session_Start, and Application_BeginRequest in global.asax, capturing unhandled exceptions, custom error section of web.config, redirecting to an error page; try and catch; creating custom exceptions
Reference and configure ASMX and WCF services
Adding service reference, adding web reference, changing endpoints, wsdl.exe, svcutil.exe; updating service URL; shared WCF contracts assembly
This objective does not include: creating WCF and ASMX services
Configure projects and solutions, and reference assemblies
Local assemblies, shared assemblies (global assembly cache), web application projects, solutions, settings file, configuring a web application by using web.config or multiple .config files; assemblyinfo
Debug a web application
Remote, local, JavaScript debugging, attaching to process, logging and tracing, using local IIS, aspnet_regiis.exe
Deploy a web application
Pre-compilation, publishing methods (e.g., MSDeploy, xcopy, and FTP), deploying an MVC application
This objective does not include: application pools, IIS configuration

Preparation resources
ASP.NET authentication
HTTP handlers and HTTP modules overview
ASP.NET debugging overview

Displaying and manipulating data (19%)
Implement data-bound controls
Advanced customization of DataList, Repeater, ListView, FormsView, DetailsView, TreeView, DataPager, Chart, GridView
This objective does not include: working in design mode
Implement DataSource controls
ObjectDataSource, LinqDataSource, XmlDataSource, SqlDataSource, QueryExtender, EntityDataSource
This objective does not include: AccessDataSource, SiteMapDataSource
Query and manipulate data by using LINQ
Transforming data by using LINQ to create XML or JSON, LINQ to SQL, LINQ to entities, LINQ to objects, managing DataContext lifetime
This objective does not include: basic LINQ to SQL
Create and consume a data service
WCF, web service; server to server calls; JSON serialization, XML serialization
This objective does not include: client side, ADO.NET data services
Create and configure a dynamic data project
Dynamic data controls, custom field templates; connecting to DataContext and ObjectContext

Preparation resources
ASP.NET data-bound web server controls overview
Data source controls overview
Walkthrough: Manipulating data (Visual Basic) (LINQ to SQL)

Developing a web application by using ASP.NET MVC 2 (13%)
Create custom routes
Route constraints, route defaults, ignore routes, custom route parameters
Create controllers and actions
Visual Studio support for right-click context menus; action filters (including Authorize, AcceptVerbs, and custom) and model binders; ActionResult sub-classes
Structure an ASP.NET MVC application
Single project areas (for example, route registration, Visual Studio tooling, and inter-area links); organizing controllers into areas; shared views; content files and folders
Create and customize views
Built-in and custom HTML helpers (for example, HTML.RenderAction and HTML.RenderPartial), strongly typed views, static page checking, templated input helpers, ViewMasterPage, ViewUserControl
This objective does not include: Microsoft.Web.Mvc futures assembly

Preparation resources
ASP.NET MVC 2
Controllers and action methods in ASP.NET MVC applications
Developer Review – Four ASP.NET MVC view engines

(“lblRegion”) lblRegion.Text = Me.Region

Answer: B

Explanation:
http://www.test4pass.com/70-515-exam.html
http://pdf.it-pruefungen.de/70-515.pdf
http://www.slideshare.net/bhupey/latest-70-515-exam-braindumps


QUESTION 2
You have created an ASP.NET server control named ShoppingCart for use by other developers. Some developers report that the ShoppingCart control does not function properly with ViewState disabled. You want to ensure that all instances of the ShoppingCart control work even if ViewState is disabled. What should you do?

A. Require developers to set EnableViewStateMac to true.
B. Store state in ControlState instead of ViewState.
C. Serialize the state into an Application state entry called “MyControl”.
D. Require developers to change the session state mode to SQLServer.

Answer: B


QUESTION 3
You are implementing an ASP.NET Web site that will be accessed by an international audience. The site contains global and local resources for display elements that must be translated into the language that is selected by the user. You need to ensure that the Label control named lblCompany displays text in the users selected language from the global resource file. Which control markup should you use?

A. <asp:Label ID=”lblCompany” runat=”server” meta:resourcekey=”lblCompany” />
B. <asp:Label ID=”lblCompany” runat=”server” Text=”meta:lblCompany.Text” />
C. <asp:Label ID=”lblCompany” runat=”server” Text=”<%$ Resources:lblCompanyText %>” />
D. <asp:Label ID=”lblCompany” runat=”server”
Text=”<%$ Resources:WebResources, lblCompanyText %>” />

Answer: D


QUESTION 4
You are developing an ASP.NET Web page that contains input controls, validation controls, and a button named btnSubmit.
The page has the following code-behind. (Line numbers are included for reference only.)
01 Public Class _Default
02 Inherits System.Web.UI.Page
03
04 Protected Sub SaveToDatabase()
05
06 End Sub
07
08 Protected Sub btnSubmit_Click(ByVal sender As Object,
09 ByVal e As EventArgs) Handles btnSubmit.Click
10
11 End Sub
12
13 End Class
You need to ensure that all data that is submitted passes validation before the data is saved in a database. What should you do?

A. Add the following method override.
Protected Overrides Sub OnInit(ByVal e As EventArgs)
MyBase.OnInit(e)
If (Page.IsValid) Then Me.SaveToDatabase()
End Sub
B. Add the following method override.
Protected Overrides Sub OnLoad(ByVal e As EventArgs)
MyBase.OnLoad(e)
If (Page.IsValid) Then Me.SaveToDatabase()
End Sub
C. Add the following method override.
Protected Overrides Sub OnPreRender(ByVal e As EventArgs)
MyBase.OnPreRender(e)
If (Page.IsValid) Then Me.SaveToDatabase()
End Sub
D. Add the following code segment at line 10.
If (Page.IsValid) Then Me.SaveToDatabase()

Answer: D


QUESTION 5
You are implementing an ASP.NET application that uses data-bound GridView controls in multiple pages. You add JavaScript code to periodically update specific types of data items in these GridView controls. You need to ensure that the JavaScript code can locate the HTML elements created for each row in these GridView controls, without needing to be changed if the controls are moved from one page to another. What should you do?

A. Replace the GridView control with a ListView control.
B. Set the ClientIDMode attribute to Predictable in the web.config file.
C. Set the ClientIDRowSuffix attribute of each unique GridView control to a different value.
D. Set the @ OutputCache directives VaryByControl attribute to the ID of the GridView control.

Answer: C

Click here to view complete Q&A of 70-515 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-515 Training at certkingdom.com

Published: July 2, 2010
Languages: English
Audiences: Developers
Technology: Microsoft Visual Studio 2010
Credit toward certification: Microsoft Certified Technology Specialist (MCTS), Microsoft Certified Professional Developer (MCPD)

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Create services (20%)
Create service and operation contracts
One-way, duplex, and request reply; create and specify fault contracts; configuration-based contracts; expose service metadata; select serialization (for example data contract serializer versus XML serializer)
This objective does not include: design service and operation contracts; transactions, instantiation, security-related attributes
Create data contracts
Manage Known Types, control data serialization, use required and order attributes on data members, implement versioning use IExtensibleDataObject, POCOs
This objective does not include: using custom serializer (ISerializationSurrogate)
Create message contracts
Application-level styles, overriding styles, style inheritance, Generic.xaml, theming attributes
This objective does not include: data-grid view style sharing
Implement generic message handling
Create a catch-all contract, read and write messages, work with properties, work with headers
This objective does not include: inherit from Message class, use BodyWriter, create Fault messages
Implement RESTful services
Access HTTP context; WebGet/WebInvoke, UriTemplates; JSON/POX
Create and configure a Routing service
Filters, static and dynamic, context-based routing, content-based routing; router interfaces
Create and configure a Discovery service
Configure ad hoc and managed modes, Discovery scopes, service announcements

Host and configure services (18%)
Create and configure endpoints
Default and standard bindings; custom bindings created from standard binding elements; standard endpoints; transports, including HTTP, TCP, named pipes, UDP, MSMQ code-based service configuration; message encoding
This objective does not include: create a custom binding element; create new standard endpoints, load configuration from a location other than the default application configuration file, security, transaction, reliable sessions
Configure behaviors
Apply service, endpoint, and operation behaviors in configuration and code
This objective does not include: create a custom behavior; create and use dispatch behaviors, load configuration from a location other than the default application configuration file
Implement self-hosting
Configure and instantiate a service host
This objective does not include: implement a custom service host
Implement web server hosting
Configure IIS/WAS for WCF, deploy to IIS/WAS, file-less configuration, specify a ServiceHost
This objective does not include: Windows Application Server

Consume services (18%)
Create a service proxy
Use a proxy class or channel factory to create a proxy, create a proxy for an asynchronous communication, create a proxy for a duplex communication
This objective does not include: SvcUtil command-line switches
Configure client endpoints
Standard bindings, custom bindings created from standard binding elements, configure behaviors; code-based and configuration-based bindings; configure addresses
This objective does not include: security; create custom behaviors
Invoke a service
Invoke a service operation synchronously and asynchronously, handle service faults, use the Message class, manage the life cycle of the proxy (open channels, close channels, abort channels, handle faulted channels), implement duplex communication
Consume RESTful services
Access HTTP context, JSON/POX
Implement service discovery
Configure target scope, monitor service announcements

Secure services (17%)
Configure secure bindings
Transport, message, mixed mode
Configure message security
Specify protection levels on different message parts
Implement authentication
Microsoft ASP.NET Membership Provider, Custom Provider, Windows Integrated Security, certificates (X.509), Federated Authentication endpoint identity; configuring client credentials; Custom Validator
This objective does not include: Geneva Framework
Implement authorization
Role-based, claim-based; configure role providers for endpoints; principal permission attribute
This objective does not include: rights-management authorization such as Active Directory Rights Management Services (AD RMS)
Implement impersonation
Configuration and code, configure WCF-specific Internet Information Services (IIS) impersonation properties, configure impersonation options, operation-based and service-based
Implement security auditing
Use serviceSecurityAudit behavior, service audit, audit log

Manage the service instance life cycle (13%)
Manage service instances
Per call, per session, single, code and configuration, activation and deactivation, durable services, throttling
Manage sessions
Code and configuration, session management attributes, throttling, reliable sessions, transport-level and application-level sessions, invoke a callback contract
Implement transactions
Distributed transactions, transactional queues, transaction flow; configure transaction binding attributes, WS-AtomicTransaction (WS-AT), transactional behavior attributes at the service and operation level, use transactions in code
Manage concurrency
Single, multiple, and reentrant concurrency modes; SynchronizationContext and CallbackBehavior
This objective does not include: deadlocks and other multithreading issues
Manage consistency between instances, sessions, transactions, and concurrency
Possible combinations between instances, sessions, transactions, and concurrency (for example, instance mode single with concurrency mode multiple)

Monitor and troubleshoot distributed systems (13%)
Configure message logging
Configure message listeners, logging level, message filters, configure logging known PII
This objective does not include: secure message logs
Configure diagnostics
WMI, performance counters, event logging
Debug client-service interactions
Send server exception details to client, end-to-end tracing, interpret output from the trace viewer (single message and end-to-end)
This objective does not include: trace viewer features outside of viewing traces


 

QUESTION 2
You have an existing Windows Communication Foundation (WCF) service.
You need to ensure that other services are notified when the service is started.
What should you do?

A. Add the following standard endpoint to the service. <endpoint name=”udpAnnouncementEndpoint” kind=”udpDiscoveryEndpoint” />
B. Add the following standard endpoint to the service. <endpoint name=”udpDiscoveryEndpoint” kind=”udpAnnouncementEndpoint” />
C. Add a service behavior with the following element. <serviceDiscovery>
<announcementEndpoints>
<endpoint kind=”udpDiscoveryEndpoint” /> </announcementEndpoints> </serviceDiscovery>
D. Add a service behavior with the following element. <serviceDiscovery>
<announcementEndpoints>
<endpoint kind=”udpAnnouncementEndpoint” /> </announcementEndpoints> </serviceDiscovery>

Answer: D


QUESTION 3
You develop a Windows Communication Foundation (WCF) service. You enable all performance counters and run multiple calls to the service.
The service must isolate session data for each user.
You need to monitor the instancing behavior used in the service.
Which performance counter should you monitor?

A. ServiceModelService 4.0.0.0\Calls
B. ServiceModelService 4.0.0.0\Instances
C. ASP.NET State Service\State Server Sessions Active
D. ASP.NET State Service\State Server Sessions Total

Answer: B


QUESTION 4
You develop a Windows Communication Foundation (WCF) service.
You name the service MovieService in the Movie namespace. The service is hosted in Microsoft Internet Information Services (IIS).
You copy the assembly containing the service to the bin folder in the virtual directory path.
You need to set up the URI that is mapped to the service.
What should you do?

A. Add the following code segment to the web.config file. <serviceHostingEnvironment>
<serviceActivations>
odd relativeAddress=”./Movie” service=”Movie.MovieService”/> </serviceAct ivations>
</serviceHostingEnvironment>
B. Add a Movie.svc file in the root of the virtual path with the following line. <%8ServiceHost language=”C#” Service=”MovieService”*>
C. Add the following code segment to the web.config file. <serviceHostingEnvironment>
<serviceActivations>
odd relativeAddress=” . /Movie, svc” service=”Hovie.MovieService”/> </serviceActivations>
</serviceHostingEnvirorunent>
D. Add a Movie.svc file in the root of the virtual path with the following line. <%8ServiceHost language=”C#” Service=”MovieService.svc”%>

Answer: B


QUESTION 5
A Windows Communication Foundation (WCF) service that handles corporate accounting must be changed to comply with government regulations of auditing and accountability.
You need to configure the WCF service to execute under the Windows logged-on identity of the calling application.
What should you do?

A. Within the service configuration, add a serviceAuthorization behavior to the service, and set impersonateCallerForAllOperations to true.
B. Within the service configuration, add a serviceAuthenticationManager behavior to the service, and set serviceAuthenticationManagerType to Impersonate.
C. Within the service configuration, add a serviceSecurityAudit behavior to the service, and set serviceAuthorizationAuditLevel to SuccessOrFailure.
D. Within the service configuration, add a serviceCredentials behavior to the service, and set type to Impersonate.

Answer: A


QUESTION 6
A Windows Communication Foundation (WCF) solution uses the following contract to share a message across its clients. (Line numbers are included for reference only.)
01 <ServiceContract()>
02 Public Interface ITeamMessageService
03
04 <OperationContract()>
05 Function GetMessage() As String
06
07 <OperationContract()>
08 Sub PutMessage(ByVal message As String)
09 End Interface
The code for the service class is as follows.
10 Public Class TeamMessageService
11 Implements ITeamMessageService
12
13 Dim key As Guid = Guid.NewGuid()
14 Dim message As String = “Today s Message”
15
16 Public Function GetMessage() As String _
17 Implements ITeamMessageService.GetMessage
18
19 Return String.Format(“Message:{0}. Key:{1}”, message, key)
20 End Function
21
22 Public Sub PutMessage(ByVal message As String) _
23 Implements ITeamMessageService.PutMessage
24
25 Me.message = message
26 End Sub
27
28 End Class
The service is self-hosted. The hosting code is as follows.
29 Dim host As ServiceHost =
New ServiceHost(GetType(TeamMessageService)) 30 Dim binding As BasicHttpBinding =
New BasicHttpBinding(BasicHttpSecurityMode.None)
31 host.AddServiceEndpoint( “MyApplication.ITeamMessageService”, binding, “http://localhost:12345”)
32 host.Open()
You need to ensure that all clients calling GetMessage will retrieve the updated string if the message is updated by any client calling PutMessage.
What should you do?

A. Add the following attribute to the TeamMessageService class, before line 10. <ServiceBehavior(InstanceContextMode:=InstanceContextMode.Single)>
B. Add the following attribute to the TeamMessageService class, before line 10002E <ServiceBehavior(InstanceContextMode:=
InstanceContextMode.PerSession)>
C. Pass a service instance to the instancing code in line 29, as follows.
Dim host As ServiceHost = New ServiceHost(New TeamMessageService())
D. Redefine the message string in line 14, as follows. Shared message As String = “Today s Message”
E. Then change the implementation of PutMessage in lines 22-26 to the following. Public Sub PutMessage(ByVal message As String) _
Implements ITeamMessageService.PutMessage TeamMessageService.message = message End Sub

Answer: A


QUESTION 7
You are creating a Window s Communication Foundation (WCF) service application. The application needs to service many clients and requests simultaneously.
The application also needs to ensure subsequent individual client requests provide a stateful conversation.
You need to configure the service to support these requirements.
Which attribute should you add to the class that is implementing the service?

A. [ ServiceBehavior ( InstanceContextMode = InstanceContextMode.PerSession, ConcurrencyMode = ConcurrencyMode.Single )]
B. [ ServiceBehavior ( InstanceContextMode = InstanceContextMode.PerCall,
ConcurrencyMode = ConcurrencyMode.Reentrant )]
C. [ ServiceBehavior ( InstanceContextMode = InstanceContextMode.PerSession, ConcurrencyMode = ConcurrencyMode.Multiple )]
D. [ ServiceBehavior ( InstanceContextMode = InstanceContextMode.PerCall, ConcurrencyMode = ConcurrencyMode.Multiple )]

Answer: C


QUESTION 8
You are configuring services to be discoverable. The services must be discoverable without relying on a central server. Client applications that consume the services are on a network segment that is separate from the network segment that the services are located on.
A firewall blocks all TCP ports between the two network segments, but allows other protocols to pass through.
You need to ensure that the client applications can discover the services.
What should you do?

A. Use ad-hoc discovery mode over HTTP.
B. Use ad-hoc discovery mode over UDP.
C. Use managed discovery mode over HTTP.
D. Use managed discovery mode over UDP.

Answer: B

Explanation: Explanation/Reference:
Managed discovery modes are incorrect, they require central server for discovery. By default the .NET Framework contains support for Ad-Hoc discovery over the UDP protocol

Click here to view complete Q&A of 70-513 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-513 Training at certkingdom.com

Published: July 2, 2010
Languages: English
Audiences: Developers
Technology: Microsoft Visual Studio 2010
Credit toward certification: MCTS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Building a user interface by using basic techniques (23%)
Choose the most appropriate control class
Evaluating design requirements and then selecting the most appropriate control based on those requirements; recognizing when none of the standard controls meet requirements; item controls, menu controls, content controls
This objective does not include: designing a custom control
Implement screen layout by using nested control hierarchies
Using panel-derived controls, attaching properties
This objective does not include: items controls, control customization
Create and apply styles and theming
Application-level styles, overriding styles, style inheritance, Generic.xaml, theming attributes
This objective does not include: data-grid view style sharing
Manage reusable resources
Fonts, styles, data sources, images, resource dictionaries, resource-only DLLs
Implement an animation in WPF
Creating a storyboard; controlling timelines; controlling the behavior when the animation completes; double, color, and point animations; starting an animation from code and from XAML
This objective does not include: direct rendering updates, implementing key frame animations

Preparation resources
Styling and templating
Layout system
Animation tips and tricks

Enhancing a user interface by using advanced techniques (21%)
Manage routed events in WPF
Tunneling vs. bubbling events, handling and cancelling events
This objective does not include: simple event handling; creating custom events
Configure WPF commanding
Defining WPF commands based on RoutedCommand; associating commands to controls; handling commands; command bindings; input gestures
This objective does not include: creating custom commands by implementing ICommand
Modify the visual interface at run time
Adding/removing controls at run time; manipulating the visual tree; control life cycle; generating a template dynamically
This objective does not include: instantiating forms and simple modification of control properties at runtime
Implement user-defined controls
Deciding whether to use a user/composite, extended, or custom control; creating a user/composite control; extending from an existing control
This objective does not include: creating a custom control by inheriting directly from the control class and writing code
Create and display graphics
Creating and displaying graphics by using geometric transformation; brushes; drawing shapes; clipping; double buffering; overriding render (WPF) and OnPaint (WinForms); differentiating between retained and non-retained graphics
This objective does not include: creating and displaying three-dimensional graphics; hit testing; creating images
Add multimedia content to an application in WPF
Media player vs. media element; adding a sound player; images
This objective does not include: buffering
Create and apply control templates in WPF
Template binding
This objective does not include: styling and theming; data templating
Create data, event, and property triggers in WPF

Preparation resources
Input and commands how-to topics
Control styles and templates

Managing data at the user interface layer (23%)
Implement data binding
Binding options, static and dynamic resources, element bindings, setting the correct binding mode and update mode; binding to nullable values
This objective does not include: binding to a specific data source
Implement value converters in WPF
Implementing custom value converters, implementing multivalue converters
Implement data validation
Handling validation and providing user feedback via the error provider (WinForms) or data templates (WPF), IDataErrorInfo, validation control, form validation and control validation
Implement and consume change notification interfaces
Implementing INotifyPropertyChanged; using INotifyCollectionChanged (ObservableCollection)
Prepare collections of data for display
Filtering, sorting, and grouping data; LINQ; CollectionView (WPF), BindingSource object (WinForms)
Bind to hierarchical data
TreeView; MenuControl
Implement data-bound controls
Using the DataGridView (WinForms) or DataGrid (WPF) control to display and update the data contained in a data source, implementing complex data binding to integrate data from multiple sources; ItemsControl-derived controls (WPF)
Create a data template in WPF
Implementing a data template selector; using templates with ItemsControl

Preparation resources
Data binding (WPF)
DataGrid

Enhancing the functionality and usability of a solution (17%)
Integrate WinForms and WPF within an application
Using ElementHosts within WinForms and ControlHosts within WPF; using the PropertyMap property
Implement asynchronous processes and threading
Implementing asynchronous programming patterns; marshalling between threads; freezing UI elements; using timers; task parallel library; parallel LINQ; using the dispatcher; BackgroundWorker component
Incorporate globalization and localization features
Loading resources by locale; marking localizable elements; using culture settings in validators and converters; using language properties and rendering direction properties; working with resource files for localization; determining installed locales; regional settings
Implement drag and drop operations within and across applications
This objective does not include: Dynamic Data Exchange (DDE)
Implement security features of an application
Configuring Software Restriction Policy (SRP); full trust and partially trusted security; interoperability with legacy CAS policy; User Account Control (UAC)
Manage user and application settings
Creating application settings; creating user settings; loading and saving settings
This objective does not include: persisting to database
Implement dependency properties
Enabling data binding and animation, property metadata, property change callbacks

Preparation resources
WPF and Windows Forms interoperation
How to: Perform drag-and-drop operations between applications
Dependency properties overview

Stabilizing and releasing a solution (16%)
Implement a WPF test strategy
Automation peer, UI automation, IntelliTrace
Debug XAML by using the WPF visualizer
Accessing the visualizer, drilling down into the visual tree, viewing and changing properties
This objective does not include: setting a breakpoint and stepping through code
Debug WPF issues by using PresentationTraceSources
Animation, data binding, dependency properties
Configure a ClickOnce deployment
Configuring the installation of a WinForms, WPF, or XBAP application by using ClickOnce technology; choosing appropriate settings to manage upgrades
Create and configure a Windows installer project
Configuring a setup project to add icons during setup, setting deployment project properties, configuring conditional installation based on operating system versions, setting appropriate launch conditions based on the .NET framework version, adding custom actions to a setup project, adding error-handling code to a setup project
Configure deployment security settings
Configuring and integrating UAC by using ClickOnce deployments; setting appropriate security permissions to deploy the application

Preparation resources
Debugging WPF – WPF Tree Visualizer and helper class
PresentationTraceSources class
How to: Use ClickOnce to deploy applications that can run on multiple versions of the .NET Framework


QUESTION 1
You use Microsoft .NET Framework 4 to create a Windows Forms application.
You add a new class named Customer to the application. You select the Customer class to create a new object data source.
You add the following components to a Windows Form:
? A BindingSource component named customerBindingSource that is data-bound to the Customer object data source.
? A set of TextBox controls to display and edit the Customer object properties. Each TextBox control is data-bound to a property of the customerBindingSource component.
? An ErrorProvider component named errorProvider that validates the input values for each TextBox control.
You need to ensure that the input data for each TextBox control is automatically validated by using the ErrorProvider component.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Implement the validation rules inside the Validating event handler of each TextBox control by throwing an exception when the value is invalid.
B. Implement the validation rules inside the TextChanged event handler of each TextBox control by throwing an exception when the value is invalid.
C. Implement the validation rules inside the setter of each property of the Customer class by throwing an exception when the value is invalid.
D. Add the following code segment to the InitializeComponent method of the Windows Form.
this.errorProvider.DataSource = this.customerBindingSource;
E. Add the following code segment to the InitializeComponent method of the Windows Form.
this.errorProvider.DataSource = this.customerBindingSource.DataSource; this. errorProvider. DataMember = this. customerBindingSource. DataMember;

Answer: C,D


QUESTION 2
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application.
The application contains a ListBox control named IbxItems that is data-bound to a collection of objects. Each object has a DisplayValue property.
You add a Button control to the application.
You need to ensure that the Content property of the Button control is data-bound to the DisplayValue property of the selected item of IbxItems.
Which binding expression should you use?

A. {Binding ElementName= IbxItems, Source=SelectedItem, Path=DisplayValue}
B. {Binding Source=lbxItems, ElementName=SelectedItem, Path=DisplayValue}
C. {Binding ElementName=lbxItems, Path=SelectedItem.DisplayValue}
D. {Binding Source=lbxItems, Path=SelectedItem.DisplayValue}

Answer: C


QUESTION 3
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application.
You write the following code fragment.
< TextBox Text=”{Binding Path=StringMember} ” / >
You need to ensure that the StringMember property of the data-bound object is updated immediately when the user types in the TextBox control.
Which binding expression should you use?

A. { Binding Path=StringMember, Mode=TwoWay }
B. { Binding Path=StringMember, NotifyOnSourceUpdated=True }
C. { Binding Path-StringMember, NotifyOnTargetUpdated=True }
D. { Binding Path=StringMember, UpdateSourceTrigger=PropertyChanged }

Answer: D


QUESTION 4
You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application.
You add a ListBox control to the application. The ListBox control is data-bound to an instance of a custom collection class of the Product objects named ProductList.
The number of items of the data-bound collection is fixed. However, users can modify the properties of each of the Product objects in the collection.
You need to ensure that changes made on the Product objects are automatically reflected in the ListBox control.
What should you do?

A. Implement the INotifyPropertyChanged interface in the Product class.
B. Implement the INotifyCollectionChanged interface in the ProductList class.
C. Set the Mode property of the Binding object of the ListBox control to TwoWay.
D. Set the UpdateSourceTrigger property of the Binding object of the ListBox control to PropertyChanged.

Answer: A

Click here to view complete Q&A of 70-511 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-511 Training at certkingdom.com

Published: June 11, 2012
Languages: English, Japanese
Audiences: IT professionals
Technology: Microsoft SQL Server 2012
Credit toward certification: MCP, MCSA, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Manage data
Configure and maintain a backup strategy
Manage different backup models, including point in time recovery; protect customer data even if backup media is lost; perform backup/restore based on proper strategies including backup redundancy; recover from a corrupted drive; manage a multi-terabyte database; implement and test a database implementation and a backup strategy (multiple files for user database and tempdb, spreading database files, backup/restore); back up a SQL Server environment; back up system databases
Restore databases
Restore a database secured with TDE; recover data from a damaged DB; restore to a point in time; file group restore; page level restore
Implement and maintain indexes
Inspect physical characteristics of indexes and perform index maintenance; identify fragmented indexes; identify unused indexes; implement indexes; defrag/rebuild indexes; set up a maintenance strategy for indexes and statistics; optimize indexes (full, filter); statistics (full, filter) force or fix queue; when to rebuild vs. reorg and index; full text indexes; column store indexes
Import and export data
Transfer data; bulk copy; bulk insert

Preparation resources
Back up and restore of SQL Server databases
File restores (full recovery model)
DBCC INDEXDEFRAG (Transact-SQL)

Implement security
Manage logins and server roles
Configure server security; secure the SQL Server using Windows Account/SQL Server accounts, server roles; create log in accounts; manage access to the server, SQL Server instance, and databases; create and maintain user-defined server roles; manage certificate logins
Manage database permissions
Configure database security; database level permissions; protect objects from being modified
Manage users and database roles
Create access to server/database with least privilege; manage security roles for users and administrators; create database user accounts; contained logins
Troubleshoot security
Manage certificates and keys; endpoints

Preparation resources
Server-level roles
Permissions (database engine)
Database-level roles

Implement high availability
Implement AlwaysOn
Implement a mirroring solution using AlwaysOn; failover
Implement database mirroring
Set up mirroring; monitor the performance of database mirroring
Implement replication
Troubleshoot replication problems; identify appropriate replication strategy

Preparation resources
AlwaysOn Availability Groups (SQL Server)
Microsoft SQL Server AlwaysOn solutions guide for high availability and disaster recovery
AlwaysOn architecture guide: Building a high availability and disaster recovery solution by using AlwaysOn Availability Groups

Design and implement a data warehouse
Design and implement dimensions
Design shared/conformed dimensions; determine whether you need support for slowly changing dimensions; determine attributes; design hierarchies; determine whether you need star or snowflake schema; determine the granularity of relationship with fact tables; determine the need for auditing or lineage; determine keys (business transactional or your own data warehouse/surrogate keys); implement dimensions; implement data lineage of a dimension table
Design and implement fact tables
Design a data warehouse that supports many to many relationships; appropriately index a fact table using columnstore indexes; partitioning; additive measures; semi-additive measures; non-additive measures; implement fact tables; determine the loading method for the fact tables; implement data lineage of a fact table; design summary aggregation tables

Preparation resources
Introduction to dimensions (Analysis Services – multidimensional data)
Dimension relationships
Columnstore indexes

Extract and transform data
Design data flow
Define data sources and destinations; distinguish blocking and non-blocking transformations; use different methods to pull out changed data from data sources; determine appropriate data flow components; determine the need for supporting Slowly Changing Dimensions (SCD); determine whether to use SQL Joins or SSIS lookup or merge join transformations; batch processing vs. row by row processing; determine the appropriate transform to use for a specific task; determine the need and method for identity mapping and deduplicating; fuzzy lookup, fuzzy grouping, and Data Quality Services (DQS) transformation; determine the need for text mining; determine the need for custom data sources, destinations, and transforms; determine what to do with erroneous rows; determine auditing needs; determine sampling needs for data mining; trusted/authoritative data sources, including warehouse metadata
Implement data flow
Debug data flow; use the appropriate data flow components; SQL/SSIS data transformation; create SSIS packages that support slowly changing dimensions; use the Lookup task in SSIS; map identities using SSIS Fuzzy Lookup; specify a data source and destination; use data flows; different categories of transformations; read, transform, and load data; understand which transforms to use to accomplish a specific business task; data correction transformation; performance tune an SSIS dataflow; optimize Integration Services packages for speed of execution; maintain data integrity, including good data flow
Implement script tasks in SSIS
Determine whether it is appropriate to use a script task; extend the capability of a control flow; perform a custom action as needed (not on every row) during a control flow

Preparation resources
Data flow
Slowly changing dimension transformation
Script task

Load data
Design control flow
Determine control flow; determine containers and tasks that are needed; determine precedence constraints; design an SSIS package strategy with rollback, staging, and transaction control; decide between one package or multiple packages; determine event handlers; determine variables; determine parameters on package and project level; determine connection managers and whether they are package or project level; determine the need for custom tasks; determine how much information you need to log from a package; determine the need for checkpoints; determine security needs
Implement package logic by using SSIS variables and parameters
User variables; variable scope, data type; implement parameterization of properties using variables; use variables in precedence constraints; refer to SSIS system variables; design dynamic SSIS packages; package configurations (file or SQL tables); expressions; package and project parameters; project level connection managers; implement dynamic package behavior; configure packages in SSIS for different environments, package configurations (xmlconfiguration file, SQLServer table, registry entry; parent package variables, environment variable); parameters (package and project level); project connection managers; property expressions (use expressions for connection managers)
Implement control flow
Checkpoints; debug control flow; implement the appropriate control flow task to solve a problem; data profiling; use sequence containers and loop containers; manage transactions in SSIS packages; manage parallelism; use precedence constraint to control task execution sequence; create package templates; use the execute package task
Implement data load options
Implement a full and incremental data load strategy; plan for an incremental update of the relational Data Mart

Preparation resources
Integration Services transactions
Developing a custom task
Integration Services (SSIS) parameters

Configure and deploy SSIS solutions
Troubleshoot data integration issues
Performance issues; connectivity issues; execution of a task or transformation failed; logic issues; demonstrate awareness of the new SSIS logging infrastructure; troubleshoot a failed package execution to determine the root cause of failure; troubleshoot SSIS package failure from an invalid datatype; implement break points; data viewers; profile data with different tools; batch cleanup
Implement auditing, logging, and event handling
Audit package execution by using system variables; propagate events; use log providers; log an SSIS execution; create alerting and notification mechanisms; use Event Handlers in SSIS to track ETL events and errors; implement custom logging
Deploy SSIS solutions
Create and configure an SSIS catalog; deploy SSIS packages by using the deployment utility; deploy SSIS packages to SQL or file system locations; validate deployed packages; deploy packages on multiple servers; install custom components and tasks; deploy SSIS packages by using DTUTIL

Preparation resources
Troubleshooting tools for package development
Enable package logging in SQL Server data tools
Integration Services (SSIS) logging

Build Data Quality solutions
Install and maintain Data Quality Services
Installation prerequisites; use Data Quality Server Installer; add users to the DQ roles; identity analysis, including data governance
Implement master data management solutions
Install Master Data Services (MDS); implement MDS; create models, entities, hierarchies, collections, and attributes; define security roles; import/export; subscriptions
Create a data quality project to clean data
Profile Online Transaction Processing (OLTP) and other source systems; data quality knowledge base management; create a data quality project; use Data Quality Client; improve data quality; identity mapping and deduplicating; handle history and data quality; manage data quality/cleansing

Preparation resources
Install Data Quality Services
Install Master Data Services
Master Data Services features and tasks


QUESTION 1
You administer a Microsoft SQL Server 2012 database that has Trustworthy set to on.
You create a stored procedure that returns database-level information from Dynamic Management Views.
You grant User1 access to execute the stored procedure.
You need to ensure that the stored procedure returns the required information when User1 executes the stored procedure.
You need to achieve this goal by granting the minimum permissions required.
What should you do? Choose all that apply.

A. Grant the db_datareader role on the database to User1.
B. Modify the stored procedure to include the EXECUTE AS OWNER statement. Grant VIEW SERVER STATE permissions to the owner of the stored procedure.
C. Create a SQL Server login that has VIEW SERVER STATE permissions. Modify the stored procedure to include the EXECUTE AS {newlogin} statement.
D. Move the stored procedure to the User1 schema.
E. Grant the VIEW SERVER STATE permission to User1.

Answer: B,C


QUESTION 2
You administer a SQL Server 2012 database instance.
You need to configure the SQL Server Database Engine service on a failover cluster.
Which user account should you use?

A. a domain user
B. the SQLBrowser account
C. the BUILTIN\SYSTEM account
D. a local user with Run as Service permissions

Answer: A


QUESTION 3
You administer a Microsoft SQL Server 2012 database instance.
You plan to migrate the database to Windows Azure SQL Database. You verify that all objects contained in the database are compatible with Windows Azure SQL Database.
You need to ensure that database users and required server logins are migrated to Windows Azure SQL Database.
What should you do?

A. Back up the database from the local server and restore it to Windows Azure SQL Database.
B. Use the Copy Database wizard.
C. Use the Database Transfer wizard.
D. Use SQL Server Management Studio to deploy the database to Windows Azure SQL Database.

Answer: D


QUESTION 4
You are a database administrator for a Microsoft SQL Server 2012 environment.
You want to deploy a new application that will scale out the workload to at least five different SQL Server instances.
You need to ensure that for each copy of the database, users are able to read and write data that will then be synchronized between all of the database instances.
Which feature should you use?

A. peer-to-peer replication
B. snapshot replication
C. failover clustering
D. database audits

Answer: A


QUESTION 5
Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.
You administer a SQL 2012 server that contains a database named SalesDb. SalesDb contains a schema named Customers that has a table named Regions. A user named userA is a member of a role named Sales.
UserA is granted the Select permission on the Regions table. The Sales role is granted the Select permission on the Customers schema.
You need to remove the Select permission for userA on the Regions table. You also need to ensure that UserA can still access all the tables in the Customers schema, including the
Regions table, through the Sales role permissions.
Which Transact-SQL statement should you use?

A. DENY SELECT ON Object::Regions FROM Sales
B. DENY SELECT ON Schema:: Customers FROM Soles
C. REVOKE SELECT ON Object::Regions FROM Soles
D. REVOKE SELECT ON Schema: Customers FROM Soles
E. DENY SELECT ON Object::Regions FROM UserA
F. DENY SELECT ON Schema: Customers FROM UserA
G. REVOKE SELECT ON Object::Regions FROM UserA
H. REVOKE SELECT ON Schema::Customers FROM UserA
I. EXEC sp_oddrolemember ‘Sales’, ‘UserA’
J. EXEC 3p_droprolemember ‘Sales’, ‘UserA’

Answer: G


QUESTION 6
Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series.
You administer a SQL Server 2012 server that contains a database named SalesDb. SalesDb contains a schema named Customers that has a table named Regions. A user named userA is a member of a role named Sales.
UserA is granted the Select permission on the Regions table. The Sales role is granted the Select permission on the Customers schema.
You need to ensure that the following requirements are met:
The Sales role does not have the Select permission on the Customers schema.UserA has the Select permission on the Regions table.
Which Transact-SQL statement should you use?

A. DENY SELECT ON Object::Regions FROM Sales
B. DENY SELECT OH Schema:: Customers FROM Soles
C. REVOKE SELECT ON Object::Regions FROM Soles
D. REVOKE SELECT ON Schema:Customers FROM Soles
E. DENY SELECT ON Object::Regions FROM UserA
F. DENY SELECT ON Schema:Customers FROM UserA
G. REVOKE SELECT ON Object::Regions FROM UserA
H. REVOKE SELECT ON Schema::Customers FROM UserA
I. EXEC sp_oddrolemember ‘Sales’, ‘UserA’
J. EXEC sp_droprolemember ‘Sales’, ‘UserA’

Answer: D

Click here to view complete Q&A of 70-458 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-458 Training at certkingdom.com


QUESTION 1
You recently migrated from System Center Configuration Manager 2007 to System Center 2012
Configuration Manager. Your network contains a client computer that runs the 64-bit version of
Windows 7 and the 32-brt version of Widows 7. Some client computers have the Microsoft Application
Virtualization (App-V) client installed. You have an Application named App1. You have a 64-bit version
of App1, a 32-bit version of App1, and a virtual version of App1. You need to deploy the Application to
all of the client computers. The solution must minimize the amount of administrative effort. What should
you do?

A. Create a new Application that has three different deployment types and create a target collection
for each of the deployment types.
B. Create a new Application that has three different deployment types and configure global
conditions for each of the deployment types.
C. Create a new package for each version of App1.
D. Create a new Application for each version of App1.

Answer: B

Explanation:
Applications contain multiple deployment types that contain the files and commands necessary to
install the software. For example, deployment types for a local installation , a virtual application
package or a version of the application for mobile devices. MSI 64, 32 deployment types
Deploy multiple type to multiple collection ( x64, x32, VirtualUserCollection) You don’t choose to deploy
a specific deployment type. Instead, you deploy the application itself. It’s pretty simple in this case, with
only one deployment type, as it’s fairly obvious which one will be installed. But if you had multiple
deployment types, you would need to specify rules to determine which one is used.


QUESTION 2
You have an Application named App1. You need to ensure that users in the finance department can
install App1 by using the Application Catalog. What should you do?

A. Create a required user deployment and target the deployment to all of the finance department users.
B. Create a required user deployment and target the deployment to all of the client computers in the finance department.
C. Create an available user deployment and target the deployment to all of the finance department users.
D. Create an available user deployment and target the deployment to all of the client computers in the finance department.

Answer: C

Explanation:
By selecting “Available” it will be selectable for the users in the Application Catalog. The “Required”
option would force the installation to all users in the finance department.


QUESTION 3
Your company uses System Center 2012 Configuration Manager with Microsoft Forefront Endpoint
Protection integration. You deploy Forefront Endpoint Protection to all client computers. The company
uses a management Application named App1. You discover that Forefront Endpoint Protection blocks
App1. You need to ensure that App1 can run. How should you configure the Default Client Malware
Policy? (Each correct answer presents a complete solution. Choose two.)

A. Create a software restriction policy.
B. Add a process exclusion.
C. Add a file location exclusion.
D. Modify the schedule scan settings.
E. Click the Use behavior monitoring check box.

Answer: BC

Explanation:


QUESTION 4
Your network contains a System Center 2012 Configuration Manager environment. You deploy a
Microsoft Office 2007 package to all client computers by using Configuration Manager. Your company
purchases Office 2010. You need to ensure that all users can install Office 2010 from the Application
Catalog. What should you do?

A. Deploy a new package for Office 2010.
B. Deploy Office 2010 by using a Group Policy Object (GPO).
C. Update the Office 2007 source file and redeploy the package.
D. Deploy a new Application for Office 2010.

Answer: D


QUESTION 5
You deploy Windows 7 by using Operating System Deployment (OSD). The development task
sequence contains steps to install software updates and Applications. The amount of time required to
deploy the Windows 7 image has increased significantly during the last six months. You need to
recommend a solution to reduce the amount of time it takes to deploy the image. What should you
recommend?

A. Synchronize software updates before deploying the image.
B. Use offline servicing for the image.
C. Create a new automatic deployment rule.
D. Add an additional Install Software Updates step to the deployment task sequence.

Answer: B

Explanation:
By updating an image in the Software Library instead of performing a new build and capture of the
operating system image you will gain a few distinct advantages. You will be able to reduce the risk of
vulnerabilities during operating system deployments and reduce the overall operating system
deployment to the end user. You will also reduce the administrative effort to maintain your operating
system images. The feature is applicable for Component Based Servicing (CBS) updates and for the
following operating systems:
Microsoft Windows Vista SP2 and later
Microsoft Windows Server 2008 SP2 and later
Microsoft Windows 7 RTM
Microsoft Windows 2008 R2
* At the launch of ConfigMgr 2012 Beta 2 Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1
are not supported. They will be supported with Configuration Manager 2012 RTM.

 

Click here to view complete Q&A of 70-243 exam

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-243 Training at certkingdom.com

Now a day’s Microsoft certifications play an important role in carrier making. This certification program allows professionals to enhanced and show up their area of professional and technical proficiency.

Why Microsoft Certification?

The Microsoft Certified Technology Specialist certification is an addition to Microsoft certification programs, its recognition and projected value is no doubt an assurance of Microsoft Certified Technology Specialist’s certification necessity in current and upcoming generation. The Microsoft Certified Technology Specialist certification helps the individual to meet the requirements of jobs in the fields of the database administrator and developer, network administrator, server system administrator, windows server administrator and monitoring operator.

How to Become a MCTS Certified?
The base line of Microsoft Certified Technology Specialist certification is actually an amalgamation of Microsoft Certified Technology Specialist which will give a golden opportunity to expand technical skills and knowledge. This is quite difficult to start with as there are numerous Microsoft Certified Technology Specialist’s categories. Now you have to decide that what to do rather you would like to go to system administrators, enterprise messaging administrator, database developer etc and most importantly you must aware of the reasons behind your selection are. The selection depends on professionals and students’ current status of MCSE. If one has an older MCSE certification that is pre 2003.In that case one will have to start from the initial stage. One should be very clear about these things.

How to study?
To achieve the Microsoft Certified Technology Specialist certification few simple steps should be kept in mind. Look for Microsoft Certified Technology Specialist training courses at several training programs are accessible for the certification, but it’s extremely suggested to choose one that is referred by a certified instructor. To save your money and precious time thinks about to select online training courses offered by a boot camp or university. The boot camp will facilitate you with a sound, smooth, glowing understanding and practice in the groundwork and training for the exams. Don’t become a victim of examination fever. Stays relax and calm. Time management for study is a key factor. It’s up to you to study consistently for hours or study in intervals by taking mental and physical rest. Always try to take proper advantage of Microsoft‘s promotions. Like once Microsoft launched a promotion known as “Second Shot”. 2nd Shot provides a blissful chance to take Microsoft Certified Technology Specialist examination free of cost if you are not successful in your first attempt of Microsoft Certified Technology Specialist exam.

Certification Policy
To identify the value of Microsoft’s fresh generation certifications, it is highly advised that continuous Microsoft Certified Technology Specialist training should be in practice, even after your carrier targets achieved. According to Microsoft’s certification policy the Microsoft Certified Technology Specialist certification requires a refurbishment of credential after every three years.


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Exam 70-158

Written by admin
May 7th, 2015

Exam 70-158
Microsoft Forefront Identity & Access Management, Configuring

Published: 20 November 2011
Languages: English
Audiences: IT professionals
Technology: Microsoft Forefront Identity Manager
Credit towards certification: MCTS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Plan and design FIM topology

Plan and design FIM topology

Identify single point of failure, match topology to performance requirements, capacity planning, design highly available implementations for FIM Service and Portal

Install the FIM Service and the FIM Portal

Microsoft SharePoint web configuration, service account permissions, prerequisites, certificates, groups

Upgrade Microsoft Identity Integration Server (MIIS)/Microsoft Identity Lifecycle Manager (ILM) to FIM 2010

Plan for upgrade, recompile extensions, upgrade SQL databases, upgrade third-party clients

Upgrade Microsoft Identity Integration Server (MIIS)/Microsoft Identity Lifecycle Manager (ILM) to FIM 2010

Plan for upgrade, recompile extensions, upgrade SQL databases, upgrade third-party clients

Deploy and manage client components

Automated installs, client images, multi-language support installation, plan for configuration of Microsoft Outlook for group management (Outlook plug-in for approvals and group management), use Group Policy objects (GPOs) to manage FIM client components, registry settings on client machines

Implement disaster recovery for FIM 2010

Back up and restore, FIM Service, FIM Portal, Sync Service, initial load scenarios; key backup and recovery

Preparation resources

Planning for Forefront Identity Manager 2010 R2
Installation guide
Forefront Identity Manager 2010 R2 deployment guide

Plan and configure core portal functionality (19%)

Plan and configure user and group provisioning

Provision to Active Directory, deprovision, data-driven provisioning and deprovisioning, configure Management Policy Rules (MPR)/workflow/sync rule triples required for provisioning in the portal, expected rule entries, detected rule entries, workflow parameters

Plan and configure group management

Configure dynamic groups (query-based) in the portal, owner-based groups and approvals, distribution groups, security groups

Plan and configure synchronisation rules

Inbound and outbound sync rules, create objects in metaverse using declarative rules, advanced attribute flows, relationships

Plan and configure authorisation and action workflows

Configure approvals, including multiple approvals and escalations; notifications; deploying and configuring custom workflow activities

Plan and configure security permissions and Management Policy Rules (MPRs)

Delegated administration, plan and implement user profile self-service, plan and implement group self-service, temporal objects, sets and set membership

Preparation resources

Provisioning rules
Synchronisation in Forefront Identity Manager 2010
Managing user identities with Forefront Identity Manager 2010 test lab guide

Configure advanced portal-based scenarios (17%)

Configure the Resource Control Display Configuration (RCDC) for object and attribute display

RCDC capabilities, validations, attribute permissions, data sources and data binding, form controls

Customise the user experience

Search scopes, menu navigation items, organisational branding, home page configuration, create and configure email templates, usage keywords

Extend the portal schema

Resource types, attributes, bindings, schema validation, synchronisation filters

Plan and configure self-service password reset and registration

Authentication workflow for password reset and registration, QA gates, case sensitivity, lockout gates, password reset action workflow

Write and interpret XPath queries

Create valid FIM XPath filters, reference objects and attributes, filters, conditions

Preparation resources

Understanding configuring and customising the FIM Portal
Creating a custom RCDC in Forefront Identity Manager 2010
Test lab guide: Demonstrating the FIM 2010 R2 self-service password reset with the QA gate

Configure FIM synchronisation (22%)

Create and configure standard management agents (MAs)

SQL Server MA, Certificate Management MA, Active Directory MA, file-based MAs, difference between call-based and file-based MAs, attribute flows, filters, projection rules, join rules, deprovisioning rules

Create and configure the FIM Service MA

Resource type mapping, Synchronisation Rule filter, understand the constraints of the FIM MA, attribute flow

Configure the metaverse

Plan precedence, extend the schema, object deletion rules

Create and automate run profiles

Clear run history, multi-step run profiles, run sequencing

Implement rules extensions

Install and configure password synchronisation and Password Change Notification Service (PCNS)

Configure Active Directory MA, install services on domain controllers, schema changes related to PCNS, service principal names

Preparation resources

Management agents in FIM 2010
Object deletion rules
Run profiles in FIM 2010 R2

Monitor and maintain FIM (21%)

Migrate the FIM configuration between environments

FIM Portal configuration, DLLs and code, synchronisation service server configuration, run scripts and automation tools, Windows PowerShell scripts, how-to-move configurations from development to test to production

Perform root cause analysis of provisioning issues

Issues with management policy rules, set definitions, workflows, and expected rule entries; misconfiguration of synchronisation service server; coexistence of classic provisioning and declarative provisioning; result sequence

Perform root cause analysis of issues related to password management

Issues with password synchronisation, self-service password reset, requirements for registration, end-to-end process

Perform root cause analysis of issues related to data flow and unexpected data

Data discovery issues, join issues, filter issues, run profile issues, threshold issues, Stack trace, precedence issues, object deletion rules

Perform root cause analysis of permissions issues

MPR definitions, set definitions, portal permission errors, service account permissions, provisioning issues, synchronisation service server roles

Preparation resources

Monitoring and diagnostics
Operations


 

MCTS Training, MCITP Trainnig

Best MCTS CertificationMicrosoft 70-158 Training at certkingdom.com

 

Microsoft MCTS 70-667
TS: Microsoft SharePoint 2010, Configuring

Examination Specifics:
This certificate exam works around Microsoft SharePoint configuring and was built in July 12, 2010 in various languages like English, German, French and Portuguese. It’s targeted towards IT professionals and built around the technology of Microsoft SharePoint Server 2010.

Audience Profile
Candidates having a proficiency in the following skills are ideal for this program. Experience of configuring SharePoint related technologies like Windows Server 2008, Internet Information Services (IIS) and Active directory is required.

The minimum qualification requirement is:
IT administrator proficient in executing and maintaining SharePoint Online and deploying SharePoint 2010 Service Pact I
Effective at DNS, IIS 7.0, Active Directory Domain Services and SQL Server
Aware of ant proficient at maintain infrastructure and security of Windows Server 2008 or later
Has experience of business operation mainly for IT which includes Restoration, data back-up and high availability.
Has basic knowledge and understanding of single sign-on and Active Directory Federation Services

Measurement of Skills
The candidate will be taught the following key areas and will be made proficient at it. The percentage of each topic depicts it weight in the exam. However, all of these topics can change and the list does not mean the only question from these areas will be asked.

Installing and Configuring a SharePoint Environment (25 percent)
Deploying new installations and upgrades.
Configuring SharePoint farms.
Configuration of service applications.
Configuring indexing and search.

Managing a SharePoint Environment (26 percent)
Managing operational settings.
Managing user roles and accounts.
Management of authentication providers.

Deploying and Managing Applications (24 percent)
Managing Web Applications.
Managing site collections.
Deploying and managing SharePoint solutions.

Maintaining a SharePoint Environment (25 percent)
Back-up and restoration of a SharePoint environment.
Monitoring and analyzing a SharePoint environment.
Optimization of the performance of a SharePoint environment.

For Best Results:
For best results, Microsoft recommends that you have a practical experience with the product and it is important that you utilize the training resources like:

Learning Plans provided by Microsoft

Classroom Training

Online training

Practice Exams

Microsoft offers Online Teaching Services which include:

Learning Plan:

A step by step study guide entirely based upon recommended resources for this exam.

TechNet:

This is specially designed for IT people. It includes instructions about various procedures, downloads, best practices, technical resources, chats and newsgroups.

MSDN:

Helps developers and provides code sample, downloads, technical articles and chats.

Microsoft Learning Community:

A community where you can connect to chat rooms, forums and ask your peers for guidelines

Microsoft recommends that you purchase the learning material for achieving significant results.

 


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

The big question rises how to become the Microsoft certified , All Microsoft certifications are acquired by simply taking a series of exams. If you can self-study for said exams, and then pass them, then you can acquire the certification for the mere cost of the exam (and maybe whatever self-study materials you purchase).

You’ll also need, at minimum (in addition to the MCTS), the CompTIA A+, Network+ and Security+ certs; as well as the Cisco CCNA cert.

Microsoft Certified Technology Specialist (MCTS) – This is the basic entry point of Microsoft Certifications. You only need to pass a single certification test to be considered an MCTS and there are numerous different courses and certifications that would grant you this after passing one. If you are shooting for some of the higher certifications that will be discussed below, then you’ll get this on your way there.

Microsoft Certified Professional Developer (MCPD) – This certification was Microsoft’s previous “Developer Certification” meaning that this was the highest certification that was offered that consisted strictly of development-related material. Receiving it involved passing four exams within specific areas (based on the focus of your certification). You can find the complete list of courses and paths required for the MCPD here.

Microsoft Certified Solutions Developer (MCSD) – This is Microsoft’s most recent “Developer Certification” which will replace the MCPD Certification (which is being deprecated / retired in July of 2013). The MCSD focuses within three major areas of very recent Microsoft development technologies and would likely be the best to persue if you wanted to focus on current and emerging skills that will be relevant in the coming years. You can find the complete list of courses and paths required for the MCSD here.

The Microsoft Certifications that you listed are basically all of the major ones within the realm of development. I’ll cover each of the major ones and what they are :

Most people, however, take some kind of course. Some colleges — especially career and some community colleges — offer such courses (though usually they’re non-credit). Other providers of such courses are private… some of them Microsoft Certified vendors of one type or another, who offer the courses in such settings as sitting around a conference table in their offices. Still others specialize in Microsoft certification training, and so have nice classrooms set up in their offices.

There are also some online (and other forms of distance learning) courses to help prepare for the exams.

The cost of taking classes to prepare can vary wildly. Some are actually free (or very nearly so), while others can cost hundreds of dollars. It all just depends on the provider.

And here’s a Google search of MCTS training resources (which can be mind-numbing in their sheer numbers and types, so be careful what you choose):

There are some pretty good, yet relatively inexpensive, ways to get vendor certificate training. Be careful not to sign-up for something expensive and involved when something cheaper — like subscribing to an “all the certificates you care to study for one flat rate” web site — would, in addition to purchasing a study guide or two at a bookstore, likely be better.

If you want a career in IT, then you need to have both an accredited degree in same (preferably a bachelors over an associates), and also a variety of IT certifications. The MCTS is but one that you will need.

You should probably also get the Microsoft MCSE and/or MCSA. The ICS CISSP. And the ITIL.

There are others, but if you have those, you’ll be evidencing a broad range of IT expertise that will be useful, generally. Then, in addition, if the particular IT job in which you end-up requires additional specialist certification, then you can get that, too (hopefully at the expense of your employer who requires it of you).

Then, whenever (if ever) you’re interested in a masters in IT, here’s something really cool of which you should be aware…

There’s a big (and fully-accredited, fully-legitimate) university in Australia which has partnered with Microsoft and several other vendors to structure distance learning degrees which include various certifications; and in which degrees, considerable amounts of credit may be earned simply by acquiring said certifications. It’s WAY cool.

One can, for example, get up to half of the credit toward a Masters degree in information technology by simply getting an MCSE (though the exams which make it up must be certain ones which correspond with the university’s courses). I’ve always said that if one were going to get an MCSE, first consult the web site of this university and make sure that one takes the specific MCSE exams that this school requires so that if ever one later decided to enter said school’s masters program, one will have already earned up to half its degree’s credits by simply having the MCSE under his/her belt. Is that cool, or what?

I wouldn’t rely on them over experience (which is far and away the most valuable asset out there) but they are worth pursuing especially if you don’t feel like you have enough experience and need to demonstrate that you have the necessary skills to land a position as a developer.

If you are going to pursue a certification, I would recommend going after the MCSD (Web Applications Track) as it is a very recent certification that focuses on several emerging technologies that will still be very relevant (if not more-so) in the coming years. You’ll pick up the MCTS along the way and then you’ll have both of those under your belt. MCPD would be very difficult to achieve based on the short time constraints (passing four quite difficult tests within just a few months is feasible, but I don’t believe that it is worth it since it will be “retired” soon after).

No job experience at all is necessary for any of the Microsoft Certifications, you can take them at any time as long as you feel confident enough with the materials of the specific exam you should be fine. The tests are quite difficult by most standards and typically cover large amounts of material, but with what it sounds like a good bit of time to study and prepare you should be fine.

Certifications, in addition to degrees, are so important in the IT field, now, that one may almost no longer get a job in that field without both. The certifications, though, are so important that one who has a little IT experience can get a pretty good job even without a degree as long as he has all the right certs. But don’t do that. Definitely get the degree… and not merely an associates. Get the bachelors in IT; and make sure it’s from a “regionally” accredited school.

Then get the certs I mentioned (being mindful, if you think you’ll ever get an IT masters, to take the specific exams that that Strut masters program requires so that you’ll have already earned up to half the credit just from the certs).

If you already have two years of experience in working in the .NET environment, a certification isn’t going to guarantee that you will get employed, a salary increase or any other bonuses for achieving the honor. However, it can help supplement your resume by indicating that you are familiar with specific technologies enough to apply them in real-world applications to solve problems.

If your ready for career change and looking for Microsoft MCTS Training, Microsoft MCITP Training or any other Microsoft Certification preparation get the best online training from Certkingdom.com they offer all Microsoft, Cisco, Comptia certification exams training in just one Unlimited Life Time Access Pack, included self study training kits including, Q&A, Study Guides, Testing Engines, Videos, Audio, Preparation Labs for over 2000+ exams, save your money on boot camps, training institutes, It’s also save your traveling and time. All training materials are “Guaranteed” to pass your exams and get you certified on the fist attempt, due to best training they become no1 site 2012.

MCTS Training, MCITP Trainnig

Best Microsoft MTA Certification, Microsoft MCTS Training at certkingdom.com

Microsoft Certifications 2014 can you a JOB

Written by admin
July 3rd, 2014

With the new technologies coming in the market every other day, life has become advanced these days. In this modern era, you have to be on your toes all the time especially if your career in related to the field of IT: one has to stay updated with all the latest programs and their features in order to stay ahead of his peers. For instance, there was a time when Gramophone was the invention of the century but then it was replaced with mobile phones. Similarly, the invention of television and radio created quite a heap in the early 20th century but later on, the thunder was stolen by computers in the late 20th century.

In this day and age, computers and internet have become the center of attention. Consequently, IT has become the most popular field. IT experts are quite in demand these days; but with the emergence of new programs every other day, they have to keep up with the latest technology in order to stay ahead in the race. One way of staying ahead is the certification courses. These courses ensure that the candidate has attained all the latest knowledge and is ready to roll in the world of technology.

This article will discuss some of the most popular certification courses offered by Microsoft.

Microsoft Technology Associate

This is a certification course designed for the starters: people who want to start their line of business in the field of technology. Accordingly, it tests the fundamentals of IT and validates that the candidates have a basic understanding of the essentials. This course has been divided into three tracks and the candidates can choose any one of the tracks, depending on their preference. The tracks are: IT infrastructure, Database Design and Developer.

Microsoft MCSA- Windows Server 2008
This exam is designed for the IT personnel and it validates their skills in Server Networking management. IT professionals and System Administrators are suggested to take MCSA- Windows Server 2008 exam especially if they are looking forward to earning their MCSE certification.

Microsoft MCSA- Windows Server 2012
This certification exam is an advanced level exam which validates that the candidates have sufficient knowledge of Windows Server 2012 for its proper installation, configuration and working. MCSA- Windows Server 2012 certified can easily get the position of Network Administrator, Computer Systems Administrator or Computer Network Analyst.

Microsoft MCSE- Server Infrastructure
This certification course is designed for IT experts and it will get you the title of ‘Solutions Expert’. It tests individual’s skills in effectively and efficiently running a modern data center with some experience in virtualization storage and networking, identity management and systems management.

Microsoft MCSE- Desktop Infrastructure
This course validates that the individuals can manage desktops and devices, while maintaining their security and integrity, from anywhere around the globe. It also tests individuals’ expertise in application and desktop virtualization together with remote desktop services. With this certification in hand, you can easily qualify for a job of Data and Application Manager or Desktop and Device Support Manager.

Microsoft MCSE- Messaging
This certification is an expert level certification and it validates that the applicant has relevant skills in order to increase user productivity and flexibility. It also validates that the person has sufficient knowledge as to how to improve data security and reduce data loss. After passing this certification exam, candidates can easily qualify for the position of Network and Computer System Administrator.

Microsoft  MCSE- Communication
This certification validates candidates’ expertise in using Lync Server to create an effective communication path that can be accessed from all around the globe. This certification is also an expert level certification and you can easily qualify for the position of Network and Computer System Administrator with it.

Microsoft  MCSE- SharePoint

This Microsoft Certified Solutions Expert certification course verifies that the candidates have the necessary expertise to share, synchronize and organize the data across the organization. SharePoint 2013 is the updated version of Microsoft Office, and passing this certification can get you a job of Systems or Network Analyst.

Microsoft MCSD- SharePoint Application

This Microsoft Certified Solutions Developer certification course is another of expert level certification courses which validates individuals’ expertise in web programming. It also requires the individuals to design and develop applications with Microsoft SharePoint. With this certification, you can easily secure the position of Software Developer or Web Developer.

Microsoft Private Cloud

MCSE- Private Cloud certification course tests candidates’ expertise to manage Private Cloud computer technologies. It also verifies that the candidate can implement these technologies in a way to optimize service delivery. You can easily get the position of Server Administrator and Network Manager with this certification on your resume.

Microsoft System Center Configuration Manager
Microsoft System Center Certification focuses on the skills to manage computer and clients. The candidates should be able to configure, administer and deploy System Center 2012 in order to pass this exam. You can earn the title of Microsoft Certified Technology Specialist through this certification.

Microsoft Server Virtualization
This certification verifies that the candidate is familiar with Server Virtualization, both on Windows Server and System Center. This course expands individual’s expertise and skills in order for him to meet the rapidly modernizing technological business needs, and it can get him the title of Microsoft Specialist in no time.

Microsoft Office Certifications
Microsoft offers many certifications that verify candidates’ skills in handling and using Microsoft Office Applications. These certifications start from beginners level and go up to the master level. Microsoft Office Specialist is a beginner level certification whereas Microsoft Office Specialist Expert is an advanced level certification. Last but not the least; Microsoft Office Specialist Master is a master level certification.

Microsoft MCSA- Office 365
This course focuses on individual’s skills in handling Office 365 together with productivity tools and cloud-based collaboration. This certification can easily get you the position of Cloud Application Administrator or SaaS Administrator.

Microsoft Dynamics

This Microsoft Certified Technology Specialist certification confirms an individual’s expertise in Microsoft dynamics: a specific module can be chosen for this certification. However, this certification will be withdrawn from the market, at the end of this year, and replaced with the new ones.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 


QUESTION 1
ABC.com has hired you as their Database administrator. You create a database on named
Development on ABC-DB01 that hosts an instance of SQL Server 2005 Enterprise Edition.
You perform weekly maintenance and conclude that the Development database growing at about
100 MB on a monthly basis. The network users started complaining about poor performance of
queries run against the database.
There is 2GB RAM installed on DB01 and the database consumes 1.6 GB of RAM.
How would you determine whether additional RAM should be acquired for ABC-DB01?

A. You should consider monitoring the SQL Server: Memory Manager – Target Server Memory (KB) Page Splits/sec counter in System Monitor.
B. You should consider monitoring the SQL Server: Buffer Manager counter in System Monitor.
C. You should consider monitoring the System – Processor Queue counter in System Monitor.
D. You should consider monitoring the SQL Server: Access Methods – Page Splits/sec counter in System Monitor.

Answer: B

Explanation: The SQL Server: Buffer Manager object is utilized to view the information related to bottlenecks.


QUESTION 2
You create a database on ABC-DB01 that is running an instance of SQL Server 2005 Enterprise Edition.
ABC.com recently suffered a power outage to the building which forces you to restart ABC-DB01
which now fails to start the SQL Server (MSSQLSERVER). ABC.com wants you to troubleshoot the service failure.
What must be done to determine the cause of the service start failure?

A. You should consider reviewing the Event Viewer logs listed below:
The Event Viewer Applications log.
The Event Viewer System logs.
Microsoft Notepad should be utilized to manually view the Microsoft SQL
Server\MSSQL.1\MSSQL\LOG\ErrorLog file.

B. You should consider reviewing the Event Viewer logs listed below :
The Event Viewer Windows logs.
The Event Viewer Setup logs.
The Event Viewer Application log.

C. You should consider reviewing the Event Viewer logs listed below :
The Event Viewer Forwarded Event logs.
The Event Viewer Hardware events.
The Event Viewer Security log.

D. You should consider reviewing the Event Viewer logs listed below :
The Event Viewer Setup Events logs.
The Event Viewer Windows logs.
The Event Viewer Applications and Services logs.

Answer: A


QUESTION 3
ABC.com has recently opened an office in Perth where you work as the database administrator.
The ABC.com database infrastructure runs on computers utilizing SQL Server 2005 Enterprise
Edition. You create a Import database with a backup schedule configured in the table below:

The Imports database contains a table named incoming which was updated a week ago. During
the course of the day A network user informs you that a table has been dropped from the Imports
table at 16:10. ABC.com wants the incoming table restored to the Imports database.
What must be done to restore the table using minimal effort and ensuring data loss is kept to a minimum?

A. You should consider restoring the database from the recent deferential backup.
B. You should consider having the differential of Monday and snapshot backup from Tuesday restored.
C. You should consider deletion of all differential and database snapshots except the recent backup.
D. You should consider having the database table recovered from the recent database snapshot.

Answer: A


QUESTION 4
ABC.com hired you as the network database administrators. You create a database named
Customers on ABC-DB01 running an instance of SQL Server 2005 Enterprise Edition.
A custom application is used to access and query the database. The users recently reported that
the custom application experiences deadlock conditions constantly.
How would you determine which Server session ID is related to the deadlocks?
What must be done to observer the SQL Server session ID involved with the deadlock scenario?

A. You should consider monitoring the SQL Server Profiler to monitor Error and Warning events.
B. You should consider monitoring the SQL Server Profiler to monitor Lock Deadlock Chain events.
C. You should consider monitoring the SQL Server Profiler to monitor Objects.
D. You should consider monitoring the SQL Server Profiler to monitor performance.

Answer: B


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a technician at ABC.com. The ABC.com network only has workgroups. All client
computers are configured to run Windows XP Professional. All ABC.com employees have
administrative privileges on their own computer. ABC.com does not want file encryption to be used.
You use a computer named ABC-WS25. You are promoted to a new position and have been
replaced by a new employee named Mia Hamm. You are worried that Mia Hamm will be able to open your files.
How can you prevent Mia Hamm from opening your files and folders on ABC-WS25?

A. The data should be compressed in a folder.
B. The user should be removed from the ACL of the folder.
C. The operating system should be reinstalled with Windows XP Professional.
D. Your user account should be deleted from ABC-WS25.

Answer: D

Explanation: Your best option in this scenario would be to delete your user account from ABCWS25.


QUESTION 2
You are the newly appointed technician at ABC.com. The ABC.com network has a domain named
ABC.com. The client computers are configured to run Windows XP Professional.
Employees search the Web using Internet Explorer. To accomplish their tasks employees log onto
the ABC.com Web site. You implement a digital certificate to enhance the security of the ABC.com
Web site. The next day an employee of ABC.com, Ally Wagner, informs you that she is having
problems connecting to the Web site when she enters the URL for ABC.com in her browser.
Which action should you execute to resolve this problem?

A. Ally Wagner should add the www.ABC.com Web site to the approved Web sites in Content Advisor.
B. Ally Wagner should access the Web site using the HTTPS for opening the URL..
C. Ally Wagner should set the Privacy setting to Medium in the Internet Option in the Control Panel.
D. Ally Wagner should add the Web site URL to the trusted sites in the security zone.

Answer: B

Explanation: Your best option would be to select Option B. The scenario states that digital
certificates are used by ABC.com to secure the information on the website and in order to
establish a secure communication channel you have to use https instead of http. Https is http over SSL.


QUESTION 3
You work as a graphics designer at ABC.com. The ABC.com network has a domain named
ABC.com. The client computers on the corporate network are configured to run Windows XP
Professional. You use a computer named ABC-WS271.
You want to increase the display size of your screen. However, you get an error message stating
that the Display menu on the control panel has been disabled.
How can you have the resolution of your screen increased?

A. You should set the hardware acceleration to full.
B. You should enable Advanced Configuration and Power Interface (ACPI) support in the system
BIOS on the computer.
C. You should configure the display settings to work in dual-monitor mode.
D. You should request that the Remove Display option in Control Panel be disabled.

Answer: D

Explanation: Your best option in this scenario would be to select Option D. The Deny Access to
the Display Settings option will disable the display settings control panel icon as well as stopping
users from accessing any display settings. This setting can be applied either by a GPO or by
modifying the registry.


QUESTION 4
You work as a technician at ABC.com. The ABC.com network has a domain named ABC.com. All
client computers on the network are configured to run Windows XP Professional.
You bring your personal laptop computer to work and attempts to logon to the domain from your
laptop. However, you are not able to log on. Your laptop computer is configured to run Windows
XP Home Edition.
How do you ensure access to the domain using your laptop? (Choose TWO. Each answer forms
part of the solution.)

A. By joining your laptop to the domain.
B. By installing Service Pack 3 on your laptop.
C. By logging on as a member of the Power Users group.
D. by changing the Custom settings in the Setup Wizard.
E. By uABCrading to Windows XP Professional.

Answer: A,E

Explanation: Your best option in this scenario would be to have ABC-WS25 uABCraded to
Windows XP Professional and join it to the domain. Microsoft has crippled the Home version of
Windows XP and made it impossible to join it to domains. It thus forced the majority of companies
to invest in the slightly more expensive Windows XP Pro.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a senior administrator at ABC.com. The ABC.com network consists of a single
domain named ABC.com. ABC.com has upgraded to System Center 2012 Configuration Manager.
You are running a training exercise for ABC.com’s administrators. You are currently discussing the
creation of global conditions in Configuration Manager.
Which of the following suitably describes global conditions in Configuration Manager?

A. Global conditions allow you to upgrade or replace existing applications using a supersedence relationship.
B. Global conditions are rules that represent business or technical conditions that can be used to
specify how an application is provided and deployed to client devices.
C. Global conditions are a method of associating a user with one or more specified devices.
D. Global conditions allow virtual applications that you have deployed to share the same file
system and registry on client computers.

Answer: B

Explanation:


QUESTION 2
You work as a senior administrator at ABC.com. The ABC.com network consists of a single
domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in
their environment.
ABC.com’s developers have recently created a new application. You then deployed the application
using the Available option from the Purpose drop-down list.
Which of the following is TRUE with regards to using this option? (Choose all that apply.)

A. If the application is deployed to a user, the user sees the published application in the
Application Catalog and can request it on demand.
B. The application is deployed automatically, in relation to the configured schedule.
C. If the application is deployed to a device, the user will see it in the Software Center and can install it on demand.
D. The administrator must approve any user requests for the application before it can be installed.

Answer: A,C

Explanation:


QUESTION 3
You work as a senior administrator at ABC.com. The ABC.com network consists of a single
domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in
their environment.
You are running a training exercise for ABC.com’s administrators. You are currently discussing the
use of Endpoint Protection in Configuration Manager.
Which of the following are TURE with regards to making use of Endpoint Protection in
Configuration Manager? (Choose all that apply.)

A. You are allowed to configure antimalware policies and Windows Firewall settings for selected
groups of computers via custom antimalware policies and client settings.
B. You are only allowed to use Windows Update to download the latest antimalware definition files
to keep client workstations up-to-date.
C. You are allowed to make use of Configuration Manager software updates to download the most
recent antimalware definition files to keep client workstations up-to-date.
D. You are not allowed to send email notifications to administrative users to inform them when
malware is detected on client workstations.

Answer: A,C

Explanation:


QUESTION 4
You work as a senior administrator at ABC.com. The ABC.com network consists of a single
domain named ABC.com. ABC.com makes use of System Center 2012 Configuration Manager in their environment.
You are applying updates to operating system images while they are in the Configuration Manager library.
Which of the following is TRUE with regards to making use of this update solution? (Choose all that apply.)

A. The risk of vulnerabilities during operating system deployments is diminished.
B. The risk of vulnerabilities during operating system deployments is reduced.
C. The overall operating system deployment to the end user is diminished.
D. The overall operating system deployment to the end user is reduced.
E. The administrative effort for maintaining your operating system images is diminished.
F. The administrative effort for maintaining your operating system images is reduced.

Answer: B,D,F

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

QUESTION 1
You work as the network administrator at ABC.com. You are in the process of configuring a
Project Server 2010 environment.
You have configured two servers. A Windows Server 2008 R2 server named ABC-SQL1 runs SQL
Server 2008 R2. A Windows Server 2008 R2 server named ABC-SPS1 runs SharePoint Server
2010 and Project Server 2010.
How can you configure the Project Server 2010 environment to allow Project Web App (PWA) to
build OLAP cubes?

A. You need to install the SQL Server 2008 Native Client and Analysis Management Objects on ABC- SPS1.
B. You need to install the SQL Server 2008 Native Client and Analysis Management Objects on ABC-SQL1.
C. You need to install SQL Server Analysis Services on ABC- SPS1.
D. You need to configure a trusted data connection library in the Excel Services settings on ABCSPS1.

Answer: A

Explanation:


QUESTION 2
You work as the network administrator at ABC.com. Your responsibilities include maintaining the
Project Server 2010 environment.
The SQL Server 2008 R2 installation on a server named ABC-SQL1 includes the Analysis and
Reporting Services. SharePoint Server 2010 and Project Server 2010 are installed on a server
named ABC-SPS1.
You have been asked by the project manager to enable Project Server reporting.
Which services should you initialize to enable Project Server reporting?

A. You should start the Excel Services Web Service then the Security Token Service.
B. You should start the SQL Server Browser Service the Security Token Service.
C. You should start the Excel Services Web Service then the Secure Store Service.
D. You should start the Security Token Service then the Secure Store Service.

Answer: C

Explanation:


QUESTION 3
You work as the network administrator at ABC.com. You are in the process of configuring a
Project Server 2010 environment.
A Windows Server 2008 R2 server named ABC-SQL1 runs SQL Server 2008 R2.
You have installed a Windows Server 2008 R2 server named ABC-SPS1. The next step is to
install Project Server 2010 on ABC-SPS1. You run the Project Server 2010 installer on ABC-SPS1
but the installation does not complete. You receive an error message on ABC-SPS1 informing you
that the server does not meet the minimum software prerequisites.
What is the easiest way to ensure that all the missing software prerequisites are installed?

A. You should install the latest Windows service pack on ABC-SPS1.
B. You should run Windows Update on ABC-SPS1.
C. You should run the SharePoint 2010 Products Preparation Tool on ABC-SPS1.
D. You should select the Complete Installation option in the Project Server 2010 setup.

Answer: C

Explanation:


QUESTION 4
You work as the network administrator at ABC.com. You are in the process of configuring a
Project Server 2010 environment.
You have configured two servers. A Windows Server 2008 R2 server named ABC-SQL1 runs SQL
Server 2008 and a Windows Server 2008 R2 server named ABC-SPS1 runs SharePoint Server
2010 and Project Server 2010.
You need to configure Microsoft SQL Server 2008 Analysis Services to build Project Server 2010
cubes. You log in using the Farm Administrator account and verify that the account has
administrative permissions for the Analysis Services on ABC-SQL1.
What should you do next?

A. You should uABCrade Microsoft SQL Server 2008 on ABC-SQL1 to Microsoft SQL Server 2008 R2.
B. You should assign the Farm Administrator account the Sysadmin role on ABC-SQL1.
C. You should add the Farm Administrator account to the local Administrators group on ABCSPS1.
D. You should delete the Farm Administrator account from OLAP group on ABC-SQL1.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

QUESTION 1
You need to configure the ProcessUpdateProc stored procedure to stop running in the event of a
failure of one of the UPDATE statements.
How should you modify the ProcessUpdateProc stored procedure?

A. By configuring the SET NOCOUNT to on.
B. By configuring the SET NOEXEC option to on.
C. By configuring the XACT_ABORT option to on.
D. By configuring the XACT_ABORT option to off.

Answer: C

Explanation:


QUESTION 2
You need to design a solution to that enables the recovery of the DailyReportsTemp database in
less than one hour in the event of a storage hardware failure. Your solution must minimize costs.
What should you recommend?

A. SQL Server Failover Clustering
B. Peer-to-peer replication
C. Differential backups
D. Log shipping
E. Database snapshots

Answer: D

Explanation:


QUESTION 3
You need to recommend a solution to meet the recovery requirements for the Manufacturing
database. Your solution must minimize costs.
What should you recommend?

A. Database snapshots
B. Transaction log backups.
C. Differential backups
D. SQL Server Failover Clustering
E. Peer-to-peer replication

Answer: A

Explanation:


QUESTION 4
You need to address the backup issues of the Sales database.
How can you reduce the time it takes to back up the Sales database?

A. By configuring table partitioning.
B. By configuring filegroups.
C. By configure the Resource Governer
D. By configuring Copy-Only backups.

Answer: B

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

70-236 Microsoft Exchange Server 2012

Written by admin
April 18th, 2013

Contents
Preface xvii
Foreword xxi
1 Introduction 1
1.1 A decade and counting of Exchange deployments 1
1.1.1 The way we were 2
1.1.2 The protocol wars 2
1.1.3 Ever increasing mobility 4
1.1.4 Third-party products and management 6
1.1.5 Some interesting projects 6
1.1.6 The not so good points 7
1.1.7 Exchange’s connection with the Active Directory 10
1.1.8 Reviewing predictions made in 1996 11
1.2 Microsoft’s themes for Exchange 2007 12
1.2.1 The happy prospect of a migration 18
1.3 Preparing for Exchange 2007 20
1.4 Installing Exchange 2007 22
1.4.1 Modifying and removing servers 27
1.4.2 Validating the installation 27
1.4.3 Third-party software 28
1.5 Server roles 28
1.5.1 Services 32
1.6 Licensing 36
1.6.1 Version numbers 40
1.6.2 32-bit Exchange 2007? 41
1.7 Support 42
1.8 Challenges for Exchange 2007 42
1.9 Into the future 45
vi Contents
2 Exchange, Windows, and the Active Directory 47
2.1 Active Directory and Exchange 47
2.1.1 Domain Designs 48
2.2 Active Directory replication 50
2.2.1 Replication basics 51
2.2.2 When Active Directory replication happens 53
2.2.3 Active Directory naming contexts 55
2.2.4 Transforming Domain controllers into
Global Catalogs 58
2.2.5 USNs and replication 60
2.2.6 Urgent replication 64
2.2.7 Intrasite and Intersite replication 65
2.2.8 High-watermark vector and up-to-date vector tables 68
2.2.9 Changes in Active Directory replication in Windows 2003 70
2.3 Exchange’s Active Directory Topology service 71
2.3.1 DSAccess (or ADAccess) 72
2.3.2 How many Global Catalog servers do I need? 75
2.3.3 Where are my Global Catalogs? 76
2.4 Recovering deleted Active Directory accounts 78
2.5 Exchange and the Active Directory schema 80
2.5.1 Updating the schema with an installation 80
2.5.2 Changing the schema 82
2.5.3 Active Directory custom attributes for Exchange 85
2.5.4 Updating the schema to allow Ambiguous
Name Resolution 86
2.5.5 Exchange-specific permissions 87
2.5.6 Exchange property sets 88
2.6 Longhorn and Exchange 2007 90
2.7 The very important LegacyExchangeDN attribute 91
2.8 Brain surgery for the Active Directory: ADSIEDIT 93
2.8.1 LDP and LDIFDE 96
2.8.2 Active Directory for Exchange 98
3 The Basics of Managing Exchange 2007 99
3.1 Exchange Management Console 100
3.1.1 The importance of filters 104
3.1.2 Managing mixed organizations 109
3.1.3 Running EMC remotely or on a workstation 112
3.1.4 No more AD Users and Computers 113
3.1.5 Changing columns 115
Contents vii
Contents
3.1.6 Visual effects 116
3.2 Why some options have disappeared from EMC 118
3.2.1 Coping with change 122
3.3 Changes in the Exchange delegation model 124
3.4 Customized Recipient Management 128
3.4.1 Adieu RUS 130
3.4.2 Recipient types 132
3.5 Moving users 133
3.5.1 Moving mailboxes 134
3.5.2 Logging mailbox moves 138
3.6 Using distribution groups 140
3.6.1 Forming groups 142
3.6.2 Group changes in Exchange 2007 145
3.6.3 Expanding distribution lists 147
3.6.4 How many objects can I have in a group? 148
3.6.5 Managing group membership 149
3.6.6 Protected groups (and users) 152
3.7 Using groups for permissions 154
3.7.1 Managing distribution groups from Outlook 154
3.8 Dynamic distribution groups 156
3.8.1 Changing filters and conditions for dynamic
distribution groups 157
3.8.2 A note on OPATH 159
3.8.3 A new UI for dynamic groups 160
3.8.4 Creating New dynamic groups 162
3.8.5 Using dynamic Distribution groups 167
3.9 Mailbox quotas 168
3.9.1 Setting mailbox quotas 170
3.10 Email address policies 173
3.10.1 Mailbox moves and email address policies 178
3.10.2 Queries that drive email address policies 178
3.11 Address lists 183
3.11.1 Upgrading Address Lists to Exchange 2007 format 187
3.12 User naming conventions 188
3.13 Server naming conventions 192
3.14 Moving from the basics 194
4 The Exchange Management Shell 195
4.1 EMS: Exchange’s management shell 197
4.1.1 Working with PowerShell commands 199
4.1.2 Exchange shell commands 204
viii Contents
4.1.3 Command editing 208
4.1.4 Getting at more information about something 210
4.1.5 Using common and user-defined variables 214
4.1.6 Identities 217
4.1.7 Working in a multi-domain forest 219
4.1.8 Profiles 221
4.1.9 PowerShell in batch 223
4.1.10 Execution policies 224
4.1.11 Sending email from the shell 226
4.2 Learning from EMC 229
4.3 Using EMS to work with mailboxes 232
4.3.1 Creating a new mailbox with a template 232
4.3.2 Setting and retrieving mailbox properties 234
4.3.3 Other ways of interacting with mailboxes 244
4.3.4 Get-Recipient 245
4.3.5 Moving mailboxes 245
4.3.6 Accessing another user’s mailbox 249
4.3.7 Different commands and different properties 251
4.3.8 Contacts 252
4.4 Working with distribution groups 253
4.4.1 Working with dynamic distribution groups 257
4.4.2 Advanced group properties 262
4.5 Delegation through the shell 265
4.6 Creating efficient filters 267
4.7 Bulk updates 270
4.7.1 Creating sets of mailboxes 273
4.8 Reporting mailbox data 275
4.8.1 Special properties 282
4.9 Using the shell for other management tasks 284
4.10 Command validation 287
4.11 Working with remote servers 290
4.12 Working with non-Exchange 2007 servers 291
4.13 Testing Exchange 2007 292
4.13.1 Client connections 294
4.13.2 Mail Flow 295
4.13.3 Miscellaneous test commands 297
4.14 PowerShell for Exchange administrators 297
5 The Store 301
5.1 Introducing the Store 301
5.2 Differences in the Exchange 2007 Store 306
Contents ix
Contents
5.2.1 Are 64 bits that important? 307
5.2.2 Trading memory for I/O 312
5.2.3 The decrease in storage costs 317
5.3 No more streaming database 318
5.4 Tables and items 320
5.5 Storage groups 323
5.5.1 Creating a new storage group and database 327
5.5.2 Working with storage groups and databases 329
5.6 Transaction logs 331
5.6.1 Circular logging 335
5.6.2 Creating new transaction logs 337
5.6.3 Reserved logs 338
5.6.4 Transactions, buffers, and commitment 339
5.6.5 Transaction log I/O 341
5.6.6 Protecting transaction logs 341
5.6.7 Transaction log checksum 342
5.6.8 Maximum database size 343
5.7 Database portability 345
5.7.1 Zero database pages 349
5.8 MAPI connections and logons 349
5.9 The Deleted Items cache 350
5.9.1 Cleaning the Deleted Items cache 356
5.9.2 Recovering items and mailboxes 357
5.10 Background maintenance 360
5.10.1 Background tasks 364
5.10.2 Tracking background maintenance 367
5.11 Fixing failed databases 368
5.12 Exchange 2007 content indexing 375
5.12.1 Using content indexing 380
5.13 Public folders 383
5.13.1 Public folders and Exchange 2007 384
5.13.2 Changes in public folders administration since
Exchange 2003 386
5.13.3 Calming replication storms 388
5.13.4 Managing public folders with Exchange 2007 392
5.13.5 Permissions on top-level folders 405
5.13.6 Referrals 405
5.13.7 Migrating public folder content 406
5.14 Removing database size limits 408
5.15 Backups 408
5.15.1 NTBackup 410
x Contents
5.15.2 Other commercial backup products 410
5.15.3 Creating a backup strategy 413
5.15.4 Backups and storage groups 415
5.15.5 Checkpoint file 421
5.15.6 The future of streaming backups 426
5.16 Moving from the Store 427
6 Exchange Transport and Routing 429
6.1 The evolution of routing 429
6.2 Change through experience 430
6.2.1 Hidden administrative and routing groups 433
6.3 Exchange 2007 transport architecture 435
6.3.1 The critical role of hub transport servers 438
6.3.2 Receive connectors 440
6.3.3 Send connectors 447
6.3.4 Linking Exchange 2003 and Exchange 2007 453
6.3.5 Multiple routes into Exchange 2003 458
6.3.6 Decommissioning Exchange 2003 routing groups 458
6.3.7 Handling Exchange 2003 link state updates
during migration 458
6.3.8 Foreign connectors 459
6.3.9 Authorization 460
6.3.10 Accepted domains 460
6.3.11 Transport storage 461
6.4 Routing ABC 464
6.4.1 Resolving multiple paths 467
6.4.2 Most specific connector 467
6.4.3 Connector cost 469
6.4.4 Closest proximity 469
6.4.5 The role of hub routing sites 470
6.4.6 Site link costs versus routing costs 471
6.4.7 Instructing mailbox servers 472
6.4.8 Bypassing some connections 472
6.4.9 Protocol logging 473
6.4.10 X.400 support 474
6.4.11 Bifurcation 475
6.4.12 Header firewalls 476
6.5 Transport configuration 476
6.5.1 Transport configuration file 481
6.5.2 Routing logs 483
6.6 Queues 485
Contents xi
Contents
6.6.1 The Queue Viewer 488
6.6.2 The Unreachable queue 491
6.6.3 Poison messages 493
6.7 Back Pressure 494
6.8 Delivery Status Notifications 496
6.8.1 Customizing DSNs 501
6.8.2 Postmaster addresses 504
6.9 Transport agents 505
6.10 Transport summary 506
6.11 Edge servers 506
6.11.1 Edge or hub? 508
6.11.2 Basic Edge 510
6.11.3 Edge Synchronization 511
6.11.4 Basic Edge security 518
6.11.5 Fighting spam and email viruses 518
6.11.6 Defense in depth 522
6.11.7 Microsoft’s approach to mail hygiene 523
6.11.8 Forefront for Exchange 528
6.11.9 Mail Hygiene Agents 533
6.11.10 Agent logs 535
6.11.11 Connection filtering 536
6.11.12 Sender filtering 538
6.11.13 Address Rewrite agent 539
6.11.14 Sender ID agent 541
6.11.15 Content filtering 547
6.11.16 Content Filter updates 550
6.11.17 Per-user SCL processing 553
6.11.18 Safelist Aggregation 554
6.11.19 Sender reputation 557
6.11.20 Recipient filtering 559
6.11.21 Blocking file attachments 560
6.11.22 Attachment filtering 562
6.11.23 Edge transport rules 563
6.11.24 Available Edge 565
6.12 Client-side spam suppression 567
6.12.1 Outlook’s Junk Mail Filter 568
6.12.2 Postmarks 573
6.12.3 Restricting OOF and other notifications 574
6.13 Routing onwards 580
xii Contents
7 Clients 581
7.1 Outlook 583
7.1.1 Outlook web services 585
7.1.2 Understanding Outlook’s relationship with Exchange 591
7.1.3 Deploying cached Exchange mode 596
7.1.4 Address caching 599
7.1.5 MAPI compression and buffers 600
7.1.6 Conflict resolution 602
7.1.7 Preventing MAPI clients from connecting 603
7.1.8 Outlook 2007 and Exchange 5.5 607
7.2 Offline and personal Stores 608
7.2.1 Personal folders 609
7.2.2 Mail delivery to personal folders 611
7.2.3 Configuring PSTs 615
7.2.4 PST archiving 617
7.3 Offline folder files 619
7.3.1 OST synchronization 621
7.3.2 When things go wrong with your OST 623
7.4 Out of Office changes 624
7.4.1 The big question: Is Outlook 2007 worth the upgrade? 625
7.5 The Offline Address Book (OAB) 626
7.5.1 Downloading the OAB 627
7.5.2 OAB files on the PC 628
7.5.3 The evolving OAB format 630
7.5.4 OAB and cached Exchange mode 632
7.5.5 OAB generation and distribution 634
7.5.6 Creating a customized OAB 640
7.5.7 Allocating OABs to users 642
7.6 Outlook Anywhere 645
7.7 Outlook Web Access 650
7.7.1 New features in Outlook Web Access 2007 652
7.7.2 Outlook Web Access Light 658
7.7.3 International versions 662
7.7.4 Accessing legacy data 664
7.7.5 Managing Outlook Web Access 666
7.7.6 Authentication 667
7.7.7 Segmentation 671
7.7.8 Notifications 675
7.7.9 Controlling attachments 677
7.7.10 Themes 680
7.7.11 Client settings 684
Contents xiii
Contents
7.8 Internet client access protocols 684
7.8.1 IMAP4 685
7.8.2 The Exchange 2007 IMAP server 689
7.9 Mobile clients 694
7.9.1 Selecting mobile devices 696
7.9.2 Server-based ActiveSync 698
7.10 Windows Mobile 6.0 and Exchange 2007 702
7.10.1 ActiveSync policies 706
7.10.2 Managing mobile devices through EMC 711
7.10.3 Moving mailboxes to Exchange 2007 and ActiveSync 713
7.10.4 Estimating network traffic for mobile devices 715
7.10.5 Analyzing ActiveSync logs 717
7.10.6 Wiping mobile devices 719
7.10.7 Debugging synchronization 721
7.11 Comparing Windows Mobile and BlackBerry 723
7.11.1 Processing the mail 725
7.11.2 Other messaging options for Windows Mobile 730
7.11.3 Power management 731
7.11.4 Input flexibility 732
7.12 Unified Communications 735
7.13 Unified Messaging 737
7.13.1 Client Access to voicemail 741
7.13.2 Dealing with voicemail 745
7.13.3 Voice synthesis 747
7.13.4 Pure voicemail 748
7.13.5 The magic of SIP 749
7.13.6 Speech Grammars 752
7.13.7 Phonetic names 754
7.13.8 Cross-forest UM 756
7.14 Special mailboxes 756
7.15 Clients and users 759
8 Managing Users 761
8.1 Room and equipment mailboxes 762
8.1.1 Managing properties of room and equipment mailboxes 765
8.1.2 Converting old mailboxes to rooms 770
8.2 Helping users to use email better 771
8.2.1 Eliminating bad habits 771
8.2.2 Disclaimers 779
8.2.3 Out-of-Office Notifications 781
8.2.4 The last few bad email habits 781
xiv Contents
8.3 Customizing display templates 782
8.4 Exchange 2007 and compliance 787
8.4.1 The growing need for compliance 789
8.4.2 Transport rules 792
8.4.3 Using a rule to add disclaimer text to outgoing messages 794
8.4.4 Capturing selected messages 795
8.4.5 Becoming more complicated 797
8.4.6 Creating an ethical firewall 800
8.4.7 Transport rule storage 803
8.4.8 Rules and the shell 804
8.4.9 Journal rules 808
8.5 Messaging Record Management 815
8.5.1 Managing default folders 818
8.5.2 Managing custom folders 824
8.5.3 Allocating managed folders with policies 826
8.5.4 Applying policies to users 827
8.5.5 The Managed Folder Assistant 829
8.5.6 Logging Managed Folder activity 831
8.5.7 Using Managed Folders 833
8.5.8 Harvesting information from managed folders 835
8.6 Message classifications 837
8.6.1 Adding intelligence to classification through rules 844
8.7 Copying user mailboxes 848
8.7.1 Auditing 853
8.8 Free and busy 853
8.8.1 Looking at free and busy data 855
8.8.2 Free and busy in Exchange 2007 861
8.8.3 Changes in Outlook 2007 863
8.8.4 Cross-forest free and busy 866
9 Hardware and Performance 867
9.1 Moving toward 64-bit Exchange 867
9.2 Buying servers for Exchange 2007 870
9.3 The storage question 876
9.4 RPC pop-ups 881
9.5 Clusters and Exchange 882
9.6 Continuous replication and Exchange 2007 888
9.6.1 Concepts 889
9.7 Deploying Local Continuous Replication (LCR) 892
9.7.1 How LCR works 897
9.7.2 LCR operations 900
Contents xv
Contents
9.7.3 LCR restrictions 903
9.7.4 LCR database transition 904
9.8 Deploying Cluster Continuous Replication (CCR) 906
9.8.1 Comparing CCR and traditional clusters 910
9.8.2 CCR in practice 912
9.8.3 CCR failovers 915
9.8.4 Lost Log Resilience 919
9.8.5 The transport dumpster 921
9.8.6 Standby Continuous Replication 924
9.9 Continuous Log Replication: Good or bad? 924
9.10 Virtual Exchange 925
10 More useful things to Know about Exchange 929
10.1 Automated analysis 929
10.1.1 SSCP 932
10.1.2 Microsoft’s Release to Web (RTW) strategy 933
10.2 The Exchange Toolbox 935
10.2.1 Updates 936
10.2.2 Database Recovery Management 937
10.2.3 Database Troubleshooter 942
10.2.4 Mail Flow Troubleshooter 943
10.3 Messaging tracking logs 945
10.3.1 Generating message tracking logs 947
10.3.2 Log sizes and ages 950
10.3.3 Keeping track of message subjects 951
10.3.4 Accessing message tracking logs 951
10.3.5 Using the Troubleshooting Assistant to track messages 952
10.3.6 Tracking messages with EMS 956
10.3.7 Message delivery latency 959
10.4 Management frameworks 959
10.5 Utilities 963
10.5.1 Performance testing 963
10.5.2 The MFCMAPI utility 965
10.5.3 MDBVU32 968
10.5.4 ExMon—Exchange User Monitor 968
10.5.5 PFDavAdmin 971
10.5.6 LogParser 973
10.5.7 Outlook Spy 978
10.6 Bits and pieces 978
10.6.1 Where the Exchange team hangs out 978
10.6.2 Online Forums 979
xvi Contents
10.7 Conferences 979
10.7.1 Magazines 980
10.7.2 How Exchange uses registry keys 980
10.8 Good reference books 981
A Appendix 983
A.1 Message Tracking Log Format 983
A.2 Events noted in Message Tracking Logs 985
B Important Exchange PowerShell commands 987
B.1 Recipient management commands 987
B.2 Exchange server administrative Commands 990
B.3 Databases and Storage Groups 993
B.4 Address Lists and Email Policies 995
B.5 Queues and Messages 995
B.6 Edge Synchronization 996
B.7 Routing 997
B.8 ActiveSync 998
B.9 Public folders 999
B.10 Transport and journal rules 1000
B.11 IMAP and POP 1001
B.12 Active Directory commands 1002
B.13 Testing Exchange 2007 1003
B.14 Basic PowerShell 1004
B.15 PowerShell control commands 1005

Preface

By their very nature, every book that seeks to describe how technology works face challenges during its creation. Dealing with beta software and attempting to resolve the difference between how the software works and how the developers say it will work in the final version is a problem faced by any author, which is one reason why it is often best to wait to finalize text after you have a chance to work with released software. Looking back at this project, in some ways, this has been the hardest book of the seven that I have written about Exchange. I think that there are four reasons why this might be so. First, Exchange 2007 marks the boundary for substantial architectural change within the product, so it is similar to the degree of change that we experienced when we moved from Exchange 5.5 to Exchange 2000. Second, the nature of software is that it becomes more complex over time as the developers add new features and this is certainly true of Exchange 2007. The new features have to be considered, probed, and documented, all of which takes time. Third, the Exchange development team has done an excellent job since 2004 to document all aspects of Exchange in a more comprehensive manner than ever before.

The Exchange 2007 help file, TechNet, MSDN, and the excellent Exchange team blog at http://msexchangeteam.com/ default.aspx are interesting and productive hoards of information for authors to mine. Unfortunately, there is often too much material (a good complaint to have) and the material needs to be interpreted and analyzed in the light of your own experience with Exchange. Engineers write great blogs, but the scourge of cognitive dissonance often means that they omit some detail that makes all the difference to a newcomer in understanding why a component works the way that it does. Last but not least, you should not underestimate the degree of cultural change that Microsoft has incorporated into Exchange 2007 in the transition from a predominantly GUI-centric approach to server management to the use of the PowerShell scripting language as the basis of many management operations. The need to understand and appreciate the change has to occur before you can adequately document and describe the benefits and this increases the effort required to write the book. I must admit that it took me time to realize the full benefit of interacting with Exchange through the shell, but now I am at the point where I wonder why Microsoft never provided such a powerful interface in the past! The degree of change that exists in Exchange 2007 means that it is diffi- cult to cover everything in one book. I have therefore elected to cover the parts of Exchange that I think are of most interest to the majority of administrators and have left other components for you to discover through the material that Microsoft publishes or perhaps another book, written by me or someone else. Please accept my apology if I have not covered something that you think is important and treat this as a challenge and opportunity for you to write about the topic yourself. There are many magazines, blogs, and other ways of spreading information about Exchange. From time to time, I wander back down the path to consider some aspect of Exchange 2003. While this book is firmly focused on Exchange 2007, the vast majority of companies that will deploy Exchange 2007 will do so by migrating from Exchange 2003 and will therefore run both products alongside each other for some period. For large organizations, the period might extend to a year or more as it is unlikely that few will complete their migration to a pure Exchange 2007 environment quickly. With this in mind, it is fair and reasonable to document how things work with Exchange 2003, especially when these servers operate with Exchange 2007. So what is in the book? To set the context, Chapter 1 starts with an overview of the development of Exchange from 4.0 to 2007 and then describes the themes that Microsoft employed to focus the development priorities for Exchange 2007 and some of the changes that occur in this release. All successful deployments of Exchange since Exchange 2000 operate on a solid Active Directory foundation, so Chapter 2 reviews some of the critical intersection points between Exchange and the Active Directory including replication, the schema, and Global Catalogs. Chapter 3 goes into the basics of managing Exchange 2007 through the Exchange Management Console. Chapter 4 takes the management topic further by exploring the ins and outs of the new Exchange Management Shell, perhaps the most fundamental change to the product that Microsoft has made in Exchange 2007. Chapter 5 goes to the heart of Exchange and reviews how the Store works including topics such as databases, storage groups, and transaction logs to content indexing and backups. Chapter 6 looks at how the new transport system routes messages and includes topics such as the Edge server and anti-spam protection. Chapter 7 explains how clients from Outlook to Outlook Web Access to mobile devices allow users to work with their mailboxes. Chapter 8 then moves on to consider some elements of user management, including the important topic of compliance and records management. Chapter 9 addresses one of the more


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 


QUESTION 1
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of
the Queue <T> collection type.
Which of the following is TRUE with regards to the Queue <T>collection type?

A. It represents a first in, first out (FIFO) collection of objects.
B. It represents a last in, first out (LIFO) collection of objects.
C. It represents a collection of key/value pairs that are sorted by key based on the associated
IComparer<T> implementation.
D. It represents a list of objects that can be accessed by index.

Answer: A

Explanation:


QUESTION 2
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You have written the following code segment:
int[] filteredEmployeeIds = employeeIds.Distinct().Where(value => value !=
employeeIdToRemove).OrderByDescending(x => x).ToArray();
Which of the following describes reasons for writing this code? (Choose two.)

A. To sort the array in order from the highest value to the lowest value.
B. To sort the array in order from the lowest value to the highest value.
C. To remove duplicate integers from the employeeIds array.
D. To remove all integers from the employeeIds array.

Answer: A,C

Explanation:


QUESTION 3
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of a
method that moves the SqlDataReader on to the subsequent record.
Which of the following is the SqlDataReader method that allows for this?

A. The Read method.
B. The Next method.
C. The Result method.
D. The NextResult method.

Answer: A

Explanation:


QUESTION 4
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You have received instructions to create a custom collection for Certkingdom.com. Objects in the
collection must be processed via a foreach loop.
Which of the following is TRUE with regards to the required code?

A. The code should implement the ICollection interface.
B. The code should implement the IComparer interface.
C. The code should implement the IEnumerable interface.
D. The code should implement the IEnumerator interface.

Answer: C

Explanation:


QUESTION 5
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of LINQ queries.
Which of the following is NOT considered a distinct action of a LINQ query?

A. Creating the query.
B. Obtaining the data source.
C. Creating the data source.
D. Executing the query.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of
the Queue <T> collection type.
Which of the following is TRUE with regards to the Queue <T>collection type?

A. It represents a first in, first out (FIFO) collection of objects.
B. It represents a last in, first out (LIFO) collection of objects.
C. It represents a collection of key/value pairs that are sorted by key based on the associated
IComparer<T> implementation.
D. It represents a list of objects that can be accessed by index.

Answer: A

Explanation:


QUESTION 2
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named
Certkingdom.com.
You have written the following code segment:
int[] filteredEmployeeIds = employeeIds.Distinct().Where(value => value !=
employeeIdToRemove).OrderByDescending(x => x).ToArray();
Which of the following describes reasons for writing this code? (Choose two.)

A. To sort the array in order from the highest value to the lowest value.
B. To sort the array in order from the lowest value to the highest value.
C. To remove duplicate integers from the employeeIds array.
D. To remove all integers from the employeeIds array.

Answer: A,C

Explanation:


QUESTION 3
You work as a senior developer at Certkingdom.com. The Certkingdom.com network consists of a single domain
named Certkingdom.com.
You are running a training exercise for junior developers. You are currently discussing the use of a
method that moves the SqlDataReader on to the subsequent record.
Which of the following is the SqlDataReader method that allows for this?

A. The Read method.
B. The Next method.
C. The Result method.
D. The NextResult method.

Answer: A

Explanation:


QUESTION 4
You work as a developer at Certkingdom.com. The Certkingdom.com network consists of a single domain named
Certkingdom.com.
You have received instructions to create a custom collection for Certkingdom.com. Objects in the
collection must be processed via a foreach loop.
Which of the following is TRUE with regards to the required code?

A. The code should implement the ICollection interface.
B. The code should implement the IComparer interface.
C. The code should implement the IEnumerable interface.
D. The code should implement the IEnumerator interface.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 


QUESTION 1
You work as a Network Administrator at Certkingdom.com. The network contains a single Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
All servers in the network have Windows Remote Management (WinRM) enabled.
You use a Windows 7 Enterprise client computer named Certkingdom-Admin1.
You are currently logged in to Certkingdom-Admin1. From your client computer, you want to obtain the IP
address of a Windows Server 2012 member server named Certkingdom-File1.
Which command or commands should you use?

A. Telnet Certkingdom-File1 ipconfig.
B. NSLookup > Server Certkingdom-File1 > ipconfig
C. WinRM –r:Certkingdom-File1 ipconfig
D. WinRS –r:Certkingdom-File1 ipconfig

Answer: D

Explanation:


QUESTION 2
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-Win12Admin runs Windows Server 2012. You use Certkingdom-Win12Admin to
administer the Windows Server 2012 servers in the domain.
A newly installed domain member server named Certkingdom-SRV06 runs a Server Core Installation of
Windows Server 2012.
You need to configure Certkingdom-SRV06 to enable you to use the Server Manager console on CertkingdomWin12Admin
to manage Certkingdom-Win12Admin.
How should you configure Certkingdom-SRV06?

A. You should install the Remote Server Administration Tools on Certkingdom-SRV06.
B. You should install the Server Manager console on Certkingdom-SRV06.
C. You should enable Windows Remote Management (WinRM) on Certkingdom-SRV06.
D. You should use the Enable-NetFirewallRule cmdlet to configure the firewall on Certkingdom-SRV06.

Answer: D

Explanation:


QUESTION 3
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-Win12Admin runs Windows Server 2012. You use Certkingdom-Win12Admin to
administer the Windows Server 2012 servers in the domain.
You want to use Server Manager on Certkingdom-Win12Admin to manage the Window Server 2008 R2
SP1 servers in the domain.
What should you do?

A. You should run the Configure-SMRemoting.exe –Enable cmdlet on the Windows Server 2008 R2 SP1 servers.
B. You should add the computer account for Certkingdom-Win12Admin to the RAS and IAS Servers group in Active Directory.
C. You should install the Microsoft .NET Framework 4.0 and Windows Management Framework 3.0 on the Windows Server 2008 R2 SP1 servers.
D. You should install the Remote Server Administration Tools on Certkingdom-Win12Admin.

Answer: C

Explanation:


QUESTION 4
Your role of Network Administrator at Certkingdom.com includes the management of the Active Directory
Domain Services (AD DS) domain named Certkingdom.com. The network includes servers that run
Windows Server 2008 R2 Service Pack 1 (SP1) and Windows Server 2012.
A server named Certkingdom-File1 runs the File and Storage Services server role. Certkingdom-File1 hosts
shared folders on the D: drive. Users access the shared folders from their Windows 7 client
computers.
A user attempts to recover a previous version of a file in a shared folder on Certkingdom-File1 but
discovers that there is no previous versions option.
How can you ensure that users can recover files using the Previous Versions function?

A. By modifying the Share Properties of each shared folder.
B. By enabling Shadow Copies on the D: drive of Certkingdom-File1.
C. By adding a condition to the shared folders on Certkingdom-File1.
D. By modifying the settings of the Recycle Bin on Certkingdom-File1.

Answer: B

Explanation:


QUESTION 5
You work for a company named Certkingdom.com. Your role of Network Administrator includes the
management of the company’s physical and virtual infrastructure.
The network includes servers running Windows Server 2008 R2 Service Pack 1 (SP1) and
Windows Server 2012.
Virtual machines (VMs) are hosted on Windows Server 2012 servers running the Hyper-V role.
You install a new Windows Server 2012 Hyper-V host server named Certkingdom-HVHost12. CertkingdomHVHost12
has four Fiber Channel host bus adapters (HBAs) and connects to two Fiber Channel
SANs using two HBAs per SAN.
You plan to create VMs on Certkingdom-HVHost12 that will need to access one of the SANs.
How should you configure Certkingdom-HVHost12?

A. By creating a Virtual Switch in Hyper-V.
B. By installing an additional host bus adapter (HBA).
C. By creating a virtual Fiber Channel SAN in Hyper-V.
D. By creating a virtual iSCSI SAN in Hyper-V.

Answer: C

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

<