Tuesday, January 31, 2012

Intel's new Core i5 chip qualifies for protection plan

Intel has rolled out a handful of new Core i5 desktop processors, including one that raises the clock speed and qualifies for a new protection plan under which CPUs can be replaced.

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com



The quad-core Core i5-2550K runs at a clock speed of 3.4GHz and is based on the Sandy Bridge microarchitecture. The fastest clock speed in the Core i5 desktop processor line was previously provided by the Core i5-2500K chip, which ran at 3.3GHz.

The chip qualifies for replacement under Intel's Performance Tuning Protection Plan, which is a pilot program the company started last month. The plan provides certain out-of-warranty service offerings and replacements in case of damage caused by overclocking or overvoltage of a chip. The plan is separate from a three-year standard warranty that comes with Intel chips.

Chips with the K moniker are targeted at enthusiasts and are unlocked so that those who want to overclock can change settings like turbo, memory, core voltage and other features. The other chips qualifying for the protection plan include the X and LGA2011-socketed boxed processors.

The plan is available directly from Intel, but the Core i5-2550K chip is not yet listed on the Web page that has information about the program. Protection plans for K-chips and X-chips are priced at $20 to $35.

This protection plan includes CyberPower, Canada Computers and Electronics, Scan Computers, and Altech Computers in its first phase. More resellers will be added on Feb. 13, and Intel will decide in six months whether to continue offering the protection plan.

The Core i5-2550K has 6MB of cache and is priced at $225 in units of 1,000.

The other new Core i5 desktop processors include the quad-core i5-2450P, which runs at a clock speed of 3.2GHz and is priced at $195, and i5-2380P, which runs at a clock speed of 3.1GHz and is priced at $177. The chips have 6MB of cache.

The new Core i5 chips with the P moniker do not have integrated graphics capabilities, an Intel spokesman said.

Friday, January 27, 2012

Genius wireless mouse does away with batteries

The Genius BlueEy DX-ECO mouse uses a rechargeable gold capacitor to keep charged up.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



I am so enamored of my solar-powered, wireless keyboard from Logitech that I had to mention a new product that I just heard about from Taiwanese technology company Genius: a battery-free mouse called the DX-ECO BlueEye Mouse.


According to the product specification sheet, the mouse uses a rechargeable gold capacitor instead of a battery. The capacitor charges fully via a microUSB cord in about three minutes. The Genius BlueEye DX-ECO product literature doesn’t say how long the capacitor will hold a charge, but it can be recharged up to 100,000 times.

The device uses 2.4 Ghz wireless communications technology (which means you have to use a Pico receiver, which will require a USB slot). It can communicate up almost 50 feet away. There is not shortage of buttons and features, including a scroll button, a button for adjusting DPI settings, and even a button for clicking back and forth between pages (previous and next). The products supports Windows 7, Vista and XP and works with Macintosh OSX 10.4 or later, according to the specs.

The suggested retail price on the DX-ECO is $39.99. I haven’t managed to find the mouse for sale at any of the usual retail suspects, although the company appears to have a relationship with many of them.

Wednesday, January 25, 2012

E-learning Managment System

In the world of learning, where education plays a critical role from centuries to centuries and passed of many generations and trends its still been improving day by day. The source of education has been to many forms and styles where each country follows they own education system. But the most common and latest one is E-learning.
The main idea of this system is “You can learn where ever your”.
Its been the latest trend followed by many educational institution and universities in the world. The motto behind this system is a person can learn anything with its own individual knowledge and the information he/she gets from the system without depending on any one to teach. In these way of learning a person does not under go any stress or pain, its a way of individuality to learn from the information and data’s given. And can read anytime/anywhere from the place where they are with fresh minds and ideas which can excel them in betterment of they learning.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



What is E-Learning?

A learning process through electronic means is called e-learning. This involves online learning and training through internet or intranet or any other technology means. E-learning mainly includes the use of electronic device such as computers, laptops, tablets, mobile phones etc.

Some of the approaches used in e-learning services are:

• Computer Based Learning.
• Computer Based Training (CBT).
• Web Based Learning.
• Web Based Training (WBT) or Internet Based Training (IBT).
• Computer-supported collaborative learning (CSCL).
• Technology-enhanced learning (TEL).
• Virtual Classrooms.
• Digital Collaboration.

History of E-learning:

In the mid of 20th century, for the first time a new word e-learning was introduced by CBT systems in a seminar in Los Angeles. It was associated with the expression online learning or virtual learning. It had a great start up in beginning of 1990’s and under gone a great hype in mid of 1990’s to 2000. Where many students and institution started to use these system by the end of 21st century it has become a standard and realistic one to be used in educational system and technologically too. Many companies these days are offering E-learning development and sources as per the needs of people. And it as been one of leading and matured market in the tech world.


Uses of E-learning:

E-learning as been used tremendously in educational area especially in colleges and schools where students can learn on their own and get many ideas, and much more information on same topic. It can also effectively improve the efficiency of students and bring they own pace among others.
It helps disability people who have they own liberty to learn and work. Its one of the beneficial method to be thought practically and excel on it.
It’s also used in medical education where students have to carry very large books and these books are blended into e-books and used well, where the data are stored permanently and carried with them.

Advantages of E-Learning:

• Reduces travel cost and time.
• Learners may have the option to select learning materials.
• Learners can study wherever they have access to a computer and Internet.
• Self-paced learning modules allow learners to work on their own pace.
• Different learning styles are addressed.
• Development of computer and Internet skills.

Tuesday, January 24, 2012

Gen Y fuels trend in online tuition

Parents are moving towards online tutorship for the younger generation’s educational requirements.

Best CCNA Training and CCNA Certification and more Cisco exams log in to examkingdom.com



Following a trend in home tutors to provide additional learning support, it seems e-learning is also on the rise.

Thousands of British students are taking advantage of the services, in order to try and improve their grades before exam times loom too close. With many parents across the UK having hired a traditional home tutor at some point, it is likely that the potential in this market will expand as more pressure is placed on students to do well and secure limited university places.

For a generation that spends more time using technology than their predecessors, it is not uncommon that many students may prefer this method of learning. Technology is gaining more popularity in classrooms, and some school syllabuses are changing to accommodate the demand for students to use more technology within school.

Teaching methods for online students vary, but often they work by building upon existing knowledge and improving confidence before the pupil has to sit their exams. It does take additional training, as well as good computational knowledge to teach across an online network — when you train as a teacher you learn how to cope in a classroom setting, not how to use Skype or keep the attention of a student potentially hundreds of miles away.

An example service is Make the Grade, who offer tuition in Maths, Science, and English at various levels. They cater for students with special needs, offer extra help in exam techniques and indicate they tutor to remedy any knowledge gaps:

Just teaching the subject alone is not sufficient in today’s competitive environment, but by showing them the correct technique they can maximise their grades.

For the first time, e-learning services will be reviewed in The Good Schools Guide, which will hopefully indicate to parents which services they can trust, and afford. Sue Fieldman, senior adviser at The Good Schools Guide, said:

“While parents often prefer the personal touch of a tutor coming to the house, youngsters are so wrapped up with technology that the only way a parent can persuade them to do any extra academic work is if it is done online. A teenager would rather work on a computer than be confronted face to face with a tutor in the living room.”

However, choosing the right service provider can prove full of risk. E-learning platforms are currently unregulated, although there have been recent attempts to change this. An example is epprobate, who have begun devising a standardised rating system that can be extended across all online course materials and learning support structures.

If the trend of e-learning is to continue to expand, then it is recommended that more traditional guides such as The Good Schools Guide take note of this avenue — and help make sure that parents are paying for good quality learning support.

Monday, January 16, 2012

Executive Certificates

Gain the advanced business skills you need, without having to enrol on a full postgraduate programme.

MCTS Certification, MCITP Certification

Best CCIE Training and CCIE Exams and more Cisco exams log in to examkingdom.com



Our online Executive Certificates allow you to focus on precise business disciplines, and all in a way that fits around your life. Each can be completed in up to 3 months, with the award-winning InterActive platform putting HD video lectures, lecture notes, case studies and practice tutor assessments at your disposal.

We offer 29 certificates covering key areas of business, including Advanced Financial Management, Global Marketing and International Human Resource Management.

Full Executive Certificates List

Advanced Financial Management
Business Continuity & Crisis Management
Buy Out Strategies: LBOs and MBOs
Coaching and Mentoring for Leadership & Management
Consumer Behaviour
Corporate Finance Strategy
Equity and Fixed Income Investments
Financial Reporting and Analysis
Fundamentals of Islamic Finance
Global Marketing
Integrated Marketing Communications
International Financial Management
International Financial Markets and Institutions
International Human Resource Management
Internet and Digital Marketing Communications
Islamic Portfolio Management
Managing Information
Marketing Management
Marketing: Metrics, Analysis and Evaluation
Operations Management
Options, Futures and Derivatives
Organisational Behaviour
Performance Measurement & Control
Project Management
Quantitative Methods in Investment Management
Risk Management
Strategic Planning
Strategic Sales Management
Valuation of Mergers and Acquisitions

An Executive Certificate is the ideal way to prepare yourself for top managerial positions that require advanced, specialist knowledge. You will be able to:

Focus on the specific business disciplines that will benefit your career most.
Harness the most relevant, up-to-date industry insights, skills and knowledge.
Gain accredited certification that is recognised and respected around the world.
Study anywhere, anytime at a pace that suits your current commitments.

Gain the advanced skills your career needs. Apply now for your Executive Certificate by filling the form on the right.

Friday, January 13, 2012

It’s time for Apple to bring back the Newton

It’s time for Apple to bring back the Newton
Apple pushes the envelope when it comes to breakthrough devices that become iconic symbols in the marketplace. Even before the iPod, iPhone, and iPad, there was the ill-fated Newton. The Newton’s short life had as much to do with being too far ahead of the capable technology of the time as it did internal fighting at Apple. It was doomed when Sculley was forced out at Apple and Steve Jobs came back, as the latter was not a fan of the stylus.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



It didn’t last long but the Newton became a cult device that is still around today. While the interest is due to being a groundbreaking device with a place in consumer electronics history, the concept is still intriguing. I’ve been giving this a lot of thought, and I think that it’s time for Apple to bring back the Newton. I think it could become the next iconic product line from the company famous for iconic products.

Imagine a 6-inch slate, a mini-iPad if you will, that is thin, light and ties into the Apple iTunes/iCloud ecosystem. Basically a larger iPod Touch, with fast processor and tons of internal storage. The Wi-Fi connected Newton would fit right into the existing Apple customer base.

This Newton would allow Apple to introduce what is essentially a smaller iPad without losing face. There is definitely a market for a smaller iPad, but under Steve Jobs Apple has said no. Introducing the Newton as a “new” product line gets around past statements, and lets Apple test the waters for a small iPad. Tim Cook could make this his inaugural vision post-Jobs.

The new Newton would be a full iPad, but with special apps to make it more personal and tie into the Newton history. I envision a super calendar, contacts, and email experience that make this little guy instantly appealing. Tight integration with social networks and iTunes content would make this a very personal device for the owner. Apple’s penchant for making the device owner feel like the gadget was made just for him/her would permeate the Newton experience.

What about Apple’s disdain for the stylus? The new Newton doesn’t need one. Think Siri voice control integrated into every aspect of Newton operation. The Siri technology is already good enough to pull this off, with dictation, and Apple could expand it to make the Newton the new definition of “personal” assistant.

I believe a Newton could be the Next Big Thing for Apple, one that competitors can’t touch given the Siri technology. Apple would once again have a totally new product line that is built on existing products, but developed in ways the competition can’t touch. This is the very model Apple is famous for following, and I believe it would work wonderfully for a new Newton.

Saturday, January 7, 2012

70-432 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

QUESTION 4
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance. The SQL Server 2008 instance hosts quite a few applications. ABC also has a server
named ABC-SR43 that is used to store log files.
You have to set up a new job that stores log files on ABC-SR43. You create a new account
ABC\Log_Account. You set it up to be run by the SQL Server Agent Services.
However, your job fails to store any log files on ABC-SR43. After some investigation you notice
that the job does not have permissions to store files on ABC-SR43.
How should you remedy the situation? Select the best option.

A. You should set up ABC\Log_Accoun as a Remote Service account.
B. You should set up ABC\Log_Accoun as a Domain service account.
C. You should set up ABC\Log_Accoun as a Local Service account.
D. You should set up ABC\Log_Accoun as a Local System account.
E. You should set up ABC\Log_Accoun as a Network Service account.
F. You should set up ABC\Log_Account as a Domain account.

Answer: F

Explanation:
The service startup account defines the Microsoft Windows account in which SQL Server Agent
runs and its network permissions. SQL Server Agent runs as a specified user account. For
compatibility with earlier versions of SQL Server, SQL Server Agent can also run as the Local
System account.
In this scenario you should select a Domain account, which allows sufficient permissions and
improved security.


QUESTION 5
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance that has a table named ABC_Training. ABC_ Training contains a column named
ABC_Distance. A new Certkingdom.com training policy states that the training (ie. The ABC_Distance
column in the ABC_Training table) cannot be increased or decreased by more than 3%.
How should you implement the ABC Training Policy?

A. You should consider developing a view which rolls back non-compliant Certkingdom.com policy
changes to ABC_Distance.
B. You should consider developing a stored procedure which rolls back non-compliant Certkingdom.com
policy compliant changes to the ABC_Distance column.
C. You should consider developing a primary key constraint to the ABC_training table which only
contains valid values on ABC_Distance.
D. You should consider developing a create trigger which rolls back non-compliant Certkingdom.com
policy changes to the ABC_Distance column.
E. You should consider developing an update trigger which rolls back non-compliant Certkingdom.com
policy changes to the ABC_Distance column.
F. You should consider developing a delete trigger which rolls back non-compliant Certkingdom.com policy
changes to the ABC_Distance column.

Answer: E

Explanation:


QUESTION 6
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance that contains a database named ABC_DB. Certkingdom.com contains a lot of customer data
which is processed by the Web application. You need to keep the customer information safe since
it is confidential. This information includes files of data, backups, and log files.
How can this be achieved and still keep the performance and functionality of the web application?
Select one or two.

A. You should consider adding a transaction Log on ABC_DB, and set the information to be
encrypted for a fixed time.
B. Use BitLocker Drive Encryption on the hard drives on the SQL Server.
C. Use EFS (Encrypting File System) on the hard drives on the SQL Server.
D. You should consider enabling the Transparent Database Encryption on ABC_DB and back up
the transaction log.
E. You should consider enabling the Transparent Database Encryption on ABC_DB and enabling
the Transparent Database Encryption on master database.
F. Use cell-level encryption for the specific data that needs to be kept safe.

Answer: D

Explanation:
With the introduction of transparent data encryption (TDE) in SQL Server 2008, users now have
the choice between cell-level encryption as in SQL Server 2005, full database-level encryption by
using TDE, or the file-level encryption options provided by Windows. TDE is the optimal choice for
bulk encryption to meet regulatory compliance or corporate data security standards. TDE works at
the file level, which is similar to two Windows® features: the Encrypting File System (EFS) and
BitLocker™ Drive Encryption, the new volume-level encryption introduced in Windows Vista®,
both of which also encrypt data on the hard drive. TDE does not replace cell-level encryption,
EFS, or BitLocker.


QUESTION 7
You work as a database administrator at Certkingdom.com. Certkingdom.com is using two SQL Server 2008
sample named ABCSmp1 and ABCSmp2. Furthermore, ABCSmp1 contains a database named
ABC_DB. A Certkingdom.com user named Mia Hamm uses her logon MiaHamm to log on to the database
on ABCSmp1. During the week you have transferred ABC_DB to ABCSmp2. You manually
recreate the Mia Hamm login on ABCSmp2. However, when she tries to login on ABC_DB at
ABCSmp2, she received an error message stating that she is not allowed access. Mia Hamm
needs to access ABC_DB and you need to make it happen.
What T-SQL code should you use? (Each correct option is part of the answer. Choose TWO)

A. Use Certkingdom.com;
B. Use ABC_DB; *
C. Use ABCSmp1;
D. Use ABCSmp2;
E. ALTER LOGIN MiaHamm WITH DEFAULT_DATABASE = ABC_DB;
F. CHANGE LOGIN MiaHamm WITH DEFAULT_DATABASE = ABC_DB;
G. ALTER LOGIN MiaHamm WITH PASSWORD = 'pwd1234' UNLOCK;
H. CHANGE LOGIN MiaHamm WITH PASSWORD = 'pwd1234' UNLOCK;
I. CHANGE USER MiaHamm WITH LOGIN = MiaHamm;
J. ALTER USER MiaHamm WITH LOGIN = MiaHamm; *
K. ALTER LOGIN MiaHamm ENABLE;
L. CHANGE LOGIN MiaHamm ENABLE;

Answer: B,J

Explanation:


QUESTION 8
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008 instance.
Your junior assistant is curious about on how to move a table, such as ABC_table, from its current
scheme (scheme1) to another scheme (scheme2)
How can you accomplish this in T-SQL?

A. You should consider using the following:
ALTER TABLE Schema1.ABC_Table SWITCH TO Schema2.ABC_table;

B. You should consider using the following:
ALTER AUTHORIZATION ON Schema1.ABC_Table TO Schema2;

C. You should consider using the following:
ALTER SCHEMA schema2 TRANSFER schema1.ABC_table;

D. You should consider using the following:
ALTER SCHEMA schema1 TRANSFER schema2.ABC_table;

E. You should consider using the following:
ALTER USER Schema1 WITH DEFAULT_SCHEMA = Schema2;

F. You should consider using the following:
MOVE ABC_Table FROM SCHEMA schema1 TO schema2

G. You should consider using the following:
MOVE ABC_Table FROM schema1 TO schema2

Answer: C

Explanation:
ALTER SCHEMA can only be used to move securables between schemas in the same database.
To change or drop a securable within a schema, use the ALTER or DROP statement specific to
that securable.


QUESTION 9
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance. You have received instructions from management to allow the users at Certkingdom.com on the
SQL Server sample to use the OPENROWSET() function to search remote information sources.
You study incomplete code in the exhibit carefully. (Line numbers are used for reference purposes only)
Exhibit:
01. sp_configure 'show advanced options', 1
02. RECONFIGURE
03.
04. RECONFIGURE
05. GO
06.
07. SELECT a.*
08. FROM OPENROWSET('SQLNCLI', 'Server=Madrid;Trusted_Connection=yes;',
09. 'SELECT GroupName, Name, DepartmentID
10. FROM AdventureWorks.HumanResources.Department
11. ORDER BY GroupName, Name') AS a;
12. GO
Which T-SQL statement should you insert at line 03 to make the batch meet the requirement in
this scenario?

A. sp_configure 'Router control', 1
B. sp_configure 'Router control', 0
C. sp_configure 'Transaction Logs', 1
D. sp_configure 'Transaction Logs', 0
E. sp_configure 'Ad Lib Distributed Queries ', 1
F. sp_configure 'Ad Lib Distributed Queries ', 0
G. sp_configure 'Ad Hoc Distributed Queries', 1
H. sp_configure 'Ad Hoc Distributed Queries', 0

Answer: G

Explanation:
By default, SQL Server does not allow ad hoc distributed queries using OPENROWSET and
OPENDATASOURCE. When this option is set to 1, SQL Server allows ad hoc access. When this
option is not set or is set to 0, SQL Server does not allow ad hoc access.
Ad hoc distributed queries use the OPENROWSET and OPENDATASOURCE functions to
connect to remote data sources that use OLE DB. OPENROWSET and OPENDATASOURCE
should be used only to reference OLE DB data sources that are accessed infrequently. For any
data sources that will be accessed more than several times, define a linked server.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Friday, January 6, 2012

DSLR Video Production Gear

The majority of dSLR shooters require a light gear load as we usually do not have the luxury of a full crew to help carry our stuff. We also might move to several locations in a single day, and more equipment means slower set ups and breakdowns which can make a tight video production schedule even tighter. There are, however, a few things that I recommend even one-man-band shooters to carry around due to their light weight, small size and tremendous utility.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



Zoom H4N or TASCAM DR-100
These little devices are indispensable as
video production field recorders, thanks to their low $300 price tags and stunning stereo sound quality. You can use the onboard mics, which do a great job on their own, or attach external microphones, each of which can be recorded onto its own separate track in 4-Channel recording mode on the H4N. The sound quality of these affordable devices adds a tremendous amount of production value to a low-budget dSLR shoot, as dSLR onboard mics sound pretty terrible. Even if you have a higher-end field recorder and mics for your main capture, the H4N can be used to capture ambient sounds to layer in during post or do quick ADR sessions while your actors are on set. Have an assistant take your actors to a quiet area and re-record all their lines while you continue shooting. These takes can then be used to replace any garbled lines recorded by your main unit. One note: the units lack Time Code generators, meaning all syncing has to be done visually using waveforms.


Monopod
Having a lightweight, collapsible monopod tucked into my gear bag has come in extremely handy when I least expected it on dSLR video productions. A decent monopod costs around 20 bucks and is way lighter than any tripod. In addition to allowing me to shoot smooth pans with my dSLR with a much smaller footprint than a tripod, I have also used my monopod as a boom pole which I attach my H4N to directly. For shoots in nature, I have used my monopod as a walking stick. A bonus is the security felt by having a six-foot pole with which to potentially beat off wild animals! In a festive mood? Instant limbo-stick! Seriously though, it’s a very versatile tool which can even be used as a stabilization device as I explain in this other ShutterDown article on Cheap or Free Stabilization/Steadicam Tricks.

18% Grey Card
Setting proper exposure is best done with a professional light meter. If you find yourself without one (they can be a bit pricey), then another solution for setting exposure quickly in the field is an 18% gray card. This is a card with a neutral color cast that contains 18% black (on a scale where 0% is pure white and 100% is pure black). You can use the card to set the exposure on your dSLR and avoid blowing out your whites. A secondary use of the card is to set your white balance. For most dSLRs it works just as well as a white card without having to carry something else in your gear kit. For even more accurate color correction in post, invest in a three-card set containing pure white, 18% gray and pure black. After you frame your shot and set exposure, shoot a few seconds of the cards and use this footage in post to adjust your white, grey and black levels in your color corrector using the eye-dropper tool. Need a free card? Wilsonart will send you FREE samples of their laminate which will come in handy in a pinch. I ordered a black, white and grey card from them in 3 x 5 sizes (choose “matte” finish for low reflectivity), and used a brass binder to hold them all together. The gray is quite close to a pro gray card, close enough to neutral to do the trick for most shooters on a budget.


Collapsible Reflector
When on a dSLR shoot, I like to travel as lightly as possible. For this reason, I prefer collapsible reflectors as opposed to carrying Styrofoam boards around. In addition to being inconvenient, large boards have a tendency to act like sails when not in use and fly around, potentially whacking your actors or your gear. The collapsible reflector I use shrinks to 12” when folded and put in its case, making it much less of a hazard and easy to carry around. It’s great to bounce a little fill on an actor’s face or to reduce harsh light by acting as a shade.

Extra Media Cards
Media cards, such as SD or P2 cards, can die at the worst possible moment. This unfortunate event happened to me once while setting up to shoot a live theater performance. I had tested the camera earlier and all was well. For some inexplicable reason, however, when I turned the camera on to start recording, my camera reported an SD card error. Thankfully, I had a spare, which I quickly formatted and used to record the show without further problems. What would I have done without this extra card? I shudder to think of the disappointing conversation with my clients that would have occurred had I not had that spare little card in my gear bag. p.s. While buying an extra media card, pick up at least one spare battery for your camera as well.

Thursday, January 5, 2012

70-431 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server. CERTKINGDOM-DB01
contains a database named CKD_Sales.
CertKingdom.com intends migrating CERTKINGDOM-DB01 to SQL Server 2005 in the near future. To
prepare for the migration, you decide to install SQL Server 2005 Express on a server named
CERTKINGDOM-SR31. You verify that CERTKINGDOM-SR31 exceeds the minimum recommended
hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-SR31 to Windows Sever 2003 and install Service Pack 1.
B. Install and run the SQL Server Upgrade Advisor on CERTKINGDOM-SR31.
C. Install SQL Server 2000 on CERTKINGDOM-SR31.
D. Download and install the .NET Framework 2.0.

Answer: D

Explanation:
SQL Server 2005 requires the.NET Framework 2.0. This is automatically installed when SQL
Server 2005 is installed but is not automatically installed when SQL Server 2005 Express is installed.

Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-SR31 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 Express can be installed on Windows 2000 Server. You will need to install
Service Pack 4 for Windows 2000 Server though.
B: You should run the SQL Server Upgrade Advisor when you want to upgrade an instance of a
SQL Server 2000 database to SQL Server 2005.
C: You do not need to install SQL Server 2000 before installing SQL Server 2005 Express.

Reference: Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server
Express, before installing


QUESTION 2
You work as a database administrator at CertKingdom.com. The CertKingdom.com network consists of a
single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003 with the latest Service Packs and Hotfixes, while the client computers
run Windows XP Professional, Windows 98 Second Edition, and Novell NetWare 6.5.
You install SQL Server 2005 on a member server named CERTKINGDOM-SR21. CERTKINGDOMSR21
will host a database named CKD_Sales. All CertKingdom.com users must be able to connect to
CERTKINGDOM-SR21 by computer name. A CertKingdom.com network administrator named Rory Allen
must ensure that the client computers will be able to connect to CERTKINGDOM-SR21.
Which protocols can CertKingdom.com users use to CERTKINGDOM-SR21?

A. TCP/IP and Named Pipes
B. TCP/IP and IPX/SPX
C. Virtual Interface Adapter (VIA)
D. Shared Memory

Answer: A

Explanation:
By default, clients have TCP and Named Pipes as available protocols. You can manipulate the
protocol ordering by using the SQL Server Client utility. The client application uses the protocols
in the order specified on the client computer. If you are using SQL Server 2005, the protocol order
is stored in the ProtocolOrder registry entry under the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0
Incorrect Answers:
B: SQL Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as
NetWare 6.5, support TCP/IP which makes it the common protocol for all clients.
C: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.
D: Shared Memory can only be used on the local computer and cannot be used as a network protocol.

Reference:Microsoft SQL Server 2005 Books Online (2006), Index: client connections
[SQL Server], about client network connections, choosing a network protocol


QUESTION 3
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server. CERTKINGDOM-DB01
contains a database named CKD_Sales.
CertKingdom.com intends migrating CERTKINGDOM-DB01 to SQL Server 2005 in the near future. To
prepare for the migration, you decide to install SQL Server 2005 Express on a server named
CERTKINGDOM-SR23. CERTKINGDOM-SR31 was used for previously used by application developer
and contains Microsoft Visual Studio 2003, .NET Framework 1.2 and Internet Explorer 5.5. You
verify that CERTKINGDOM-SR23 exceeds the minimum recommended hardware requirements for
SQL Server 2005.
What should you do next? (Each correct answer provides part of the solution. Choose THREE.)

A. Upgrade CERTKINGDOM-SR23 to Windows Sever 2003 and install Service Pack 1 for Windows Sever 2003.
B. Install Service Pack 4 for Windows 2000 Sever on CERTKINGDOM-SR23.
C. Upgrade the .NET Framework 1.2 to .NET Framework 2.0 on CERTKINGDOM-SR23.
D. Uninstall the .NET Framework 1.2 and install the .NET Framework 2.0 on CERTKINGDOM-SR23.
E. Upgrade Internet Explorer 5.5 to Internet Explorer 6.0 and install Service Pack 1 for Internet
Explorer 6.0 on CERTKINGDOM-SR23.
F. Upgrade Microsoft Visual Studio 2003 to Microsoft Visual Studio 2005 and install Service Pack
1 for Microsoft Visual Studio 2005 on CERTKINGDOM-SR23.

Answer: B,D,E

Explanation:
SQL Server 2005 requires Service Pack 4 for Windows 2000 Sever, Internet Explorer 6.0 with
Service Pack 1 and the .NET Framework 2.0. The .NET Framework 2.0 is automatically installed
with other versions of SQL Server 2005 but is not automatically installed with SQL Server 2005
Express. You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET
Framework 2.0 but .NET Framework 1.2 must be uninstalled first.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-SR31 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 Express can be installed on a Windows 2000 Server once you install Service
Pack 4 for Windows 2000 Server.
C: You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET Framework
2.0 but .NET Framework 1.2 must be uninstalled first.
F: SQL Server 2005 Express does not require any version of Microsoft Visual Studio.
Reference:Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server
Express, before installing


QUESTION 4
You work as a database administrator at CertKingdom.com. The CertKingdom.com network consists of a
single Active Directory domain named CertKingdom.com.
You have received instruction from the CIO to prepare a new installation of SQL Server 2005. The
new SQL Server 2005 database server is named CERTKINGDOM-DB01. A CertKingdom.com user
named Mia Hamm is a member of the Marketing department. You instruct her to identify the
protocols that the client computers might use to connect to the server. Mia Hamm needs to identify
the protocols that are needed to accomplish this goal.
What should she identify? (Choose all that apply)

A. She should use the Multiprotocol.
B. Mia Hamm should use the Named Pipes.
C. She should use the Shared Memory.
D. She should use the TCP/IP
E. Mia Hamm should use the Virtual Interface Adapter (VIA).

Answer: B,D

Explanation:
The clients have by default TCP and Named Pipes as available protocols. You can make use of
the SQL Server Client utility to manipulate the protocol ordering. The client application uses the
protocols in the order specified on the client computer. When you make use of the SQL Server
2005, the protocol order is stored in the ProtocolOrder registry entry under the following registry
subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0
Incorrect Answers:
C: Shared Memory can only be used on the local computer and cannot be used as a network
protocol.
E: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.Reference:Microsoft SQL
Server 2005 Books Online (2006), Index: client connections [SQL Server], about client network
connections, choosing a network protocol


QUESTION 5
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server Service Pack 4.
CERTKINGDOM-DB01 contains a database named CKD_Trading.
CertKingdom.com wants to migrate CERTKINGDOM-DB01 to SQL Server 2005 but wants to retain the
CKD_Trading database with the same instance name. You decide to perform an in-place upgrade to
SQL Server 2005. You verify that CERTKINGDOM-DB01 exceeds the minimum recommended
hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-DB01 to Windows Sever 2003 Service Pack 1.
B. Run the SQL Server Upgrade Advisor on CERTKINGDOM-DB01.
C. Detach the CKD_Trading database on CERTKINGDOM-DB01.
D. Run the SQL Server 2005 Setup utility.

Answer: B

Explanation:
Before you perform an in-place upgrade of an existing database, you should run the SQL Server
Upgrade Advisor. The SQL Server Upgrade Advisor produces a list of items that must be
addressed before and after performing the upgrade. This list of items is specific to the existing
installation.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-DB01 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 can be installed on Windows 2000 Server with Service Pack 4.
C: You need to detach a database when you need to move the database to another database
instance or another database server. You do not need to detach the database before performing
an in-place upgrade.
D: You should run the SQL Server Upgrade Advisor before you run the SQL Server 2005 Setup
utility. The SQL Server Upgrade Advisor produces a list of items that must be addressed before
and after performing the upgrade. This list of items is specific to the existing
installation.Reference:Microsoft SQL Server 2005 Books Online (2006), Index: updating
databases, detaching and attaching databases


QUESTION 6
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 7.0 database server
named CERTKINGDOM-DB01 that runs on Windows 2000 Server. Service Pack 4 for Windows 2000
Server id installed on CERTKINGDOM-DB01.
CertKingdom.com wants to migrate CERTKINGDOM-DB01 to SQL Server 2005. You decide to perform
an in-place upgrade to SQL Server 2005. You verify that CERTKINGDOM-DB01 exceeds the
recommended hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-DB01 to Windows Sever 2003.
B. Install Service Pack 4 for SQL Server 7.0 on CERTKINGDOM-DB01.
C. Upgrade SQL Server 7.0 on CERTKINGDOM-DB01 to SQL Server 2000.
D. Run the SQL Server 2005 Setup utility on CERTKINGDOM-DB01 and upgrade directly to SQL
Server 2005.

Answer: B

Explanation:
You can upgrade from SQL Server 7.0 with Service Pack 4 directly to SQL Server 2005. Thus you
need only install Service Pack 4 for SQL Server 7.0.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-DB01 to Windows Sever 2003 as SQL Server 2005
can be installed on Windows 2000 Server with Service Pack 4.
C: You do not need to upgrade CERTKINGDOM-DB01 to SQL Server 200 as SQL Server 7.0 with
Service Pack 4 can be upgraded directly to SQL Server 2005. Besides, you will need to install
Service Pack 3 for SQL Server 2000 before you can upgrade it to SQL Server 2005.
D: You need to install Service Pack 4 for SQL Server 7.0 before you can upgrade it directly to SQL
Server 2005.Reference:Microsoft SQL Server 2005 Books Online (2006), Index: upgrading SQL
Server, upgrading to SQL Server 2005


QUESTION 7
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003 and all client computers run Windows XP Professional. The
CertKingdom.com network contains two SQL Server 2000 database servers named CERTKINGDOMDB01
and CERTKINGDOM-DB02 that are configured for log shipping. CERTKINGDOM-DB01 is the
primary server and hosts a database named CKD_Trading. Both CERTKINGDOM-DB01 and
CERTKINGDOM-DB02 have Service Pack 3 for SQL Server 2000 installed.
CertKingdom.com wants to upgrade CERTKINGDOM-DB01 and CERTKINGDOM-DB02 to SQL Server
2005 Enterprise Edition but the CKD_Trading database must remain available during the upgrade
process. You verify that both CERTKINGDOM-DB01 and CERTKINGDOM-DB02 exceed the
recommended hardware requirements for SQL Server 2005 Enterprise Edition. You then install
Service Pack 1 for Windows Server 2003 on CERTKINGDOM-DB01 and CERTKINGDOM-DB02.
What should you do next?

A. Install Service Pack 4 for SQL Server 2000 on both database servers.
B. Enable failover in the SQL Server 2000 log shipping configuration and upgrade CERTKINGDOMDB02
to SQL Server 2005.
C. Run the Database Maintenance Plan Wizard on CERTKINGDOM-DB01 to upgrade it to SQL
Server 2005.
D. Upgrade CERTKINGDOM-DB02 to SQL Server 2005 and then upgrade CERTKINGDOM-DB01 to
SQL Server 2005.

Answer: B

Explanation:
SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral to
log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL
Server 2000 log shipping configuration directly to SQL Server 2005. To upgrade log shipping to
SQL Server 2005, you must migrate the database servers to SQL Server 2005. If you want the
database to remain available during the migration process, you must migrate with failover. To
migrate with failover you must enable failover and upgrade CERTKINGDOM-DB02. Then you need
to failover to CERTKINGDOM-DB02 and upgrade CERTKINGDOM-DB01. Then configure log shipping
with the CERTKINGDOM-DB02 becoming the primary server and CERTKINGDOM-DB01 becoming the
secondary server.
Incorrect Answers:
A: You do not need to install Service Pack 4 for SQL Server 2000 on the database servers as SQL
Server 2000 with Service Pack 3 can be upgraded to SQL Server 2005. However, SQL Server
2005 does not support the Database Maintenance Plan Wizard which was integral to log shipping
in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL Server 2000
log shipping configuration directly to SQL Server 2005.
C: SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral
to log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a
SQL Server 2000 log shipping configuration directly to SQL Server 2005.
D: Removing log shipping from CERTKINGDOM-DB02 and upgrading CERTKINGDOM-DB01 to SQL
Server 2005 will not ensure that the CKD_Trading database remains available. Reference:Microsoft
SQL Server 2005 Books Online (2006), Index: log shipping [SQL Server], upgrading


QUESTION 8
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003. The CertKingdom.com network contains a Domain Controller named
CERTKINGDOM-DC01 and a member server named CERTKINGDOM-SR21.
CertKingdom.com wants to implement a SQL Server 2005 database that will store sales data. All
CertKingdom.com users will require access to the Sales_DB database. You have been instructed to
install SQL Server 2005 on CERTKINGDOM-SR21 and to create a database named Sales_DB. You
need to ensure that CertKingdom.com users and applications can connect to the database instance by
using only the computer name.
What should you do during the installation of SQL Server 2005 on CERTKINGDOM-SR21?

A. Select the Named Instance and use MSSQLSERVER as the instance name.
B. Select the Named Instance and use CERTKINGDOM-DC01 as the instance name.
C. Select the Default Instance and accept the default instance name.
D. Select the Named Instance and use CERTKINGDOM-SR21 as the instance name.

Answer: C

Explanation:
To ensure that users and applications can connect to the instance using the computer name, you
should select the Default Instance and accept the default instance name, MSSQLSERVER.
Incorrect Answers:
A: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.
B: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.
D: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.


QUESTION 9
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run on Windows Server2003 while the client computers run Windows XP Professional, Windows
98 Second Edition, and Novell NetWare 6.5. All computers are members of the CertKingdom.com
Active Directory domain. The CertKingdom.com network contains a SQL Server 2005 database server
named CERTKINGDOM-DB01 that hosts a database instance named MSSQLSERVR.
CertKingdom.com wants to implement another SQL Server 2005 instance for a database named
Sales_DB. Sales_DB will store sales data for the company. All CertKingdom.com users will require
access to the Sales_DB database. You have been instructed to create the SQL Server 2005
instance for the Sales_DB database. You need to ensure that all users will be able to connect to
the Sales_DB database. You cannot make configuration changes to the client computers. Your
solution must optimize network traffic.
What should you do?

A. Install the instance as a Named Instance and configure it to support Mixed Mode
Authentication. The enable TCP/IP for the instance.
B. Install the instance as a Default Instance and configure it to support Windows Authentication.
The enable TCP/IP for the instance.
C. Install the instance as a Named Instance and configure it to support SQL Authentication. The
enable IPX/SPX for the instance.
D. Install the instance as a Default Instance and configure it to support Windows Authentication.
The enable IPX/SPX for the instance.

Answer: A

Explanation:
The default instance is named MSSQLSERVER. This instance name is already in use; therefore
you should use a Named Instance. You should use Mixed Mode Authentication to support
NetWare users.
Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use. Furthermore, you need to use Mixed Mode Authentication as Windows
Authentication does not support NetWare users.
C: You can use SQL Authentication, but this will require that you create SQL Logins for all users
and groups. It would be easier to use Windows Authentication for clients that user Windows XP
Professional and Windows 98 SE, and create SQL Logins for the NetWare 6.5 users. Also, SQL
Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as NetWare 6.5,
support TCP/IP which makes it the common protocol for all clients.
D: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use. Furthermore, you need to use Mixed Mode Authentication as Windows
Authentication does not support NetWare users. Also, SQL Server 2005 does not support
IPX/SPX. The newer versions of NetWare, such as NetWare 6.5, support TCP/IP which makes it
the common protocol for all clients.


QUESTION 10
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run on Windows Server2003 and all client computers run Windows XP Professional. The
CertKingdom.com network contains two SQL Server 2005 database servers that are configured in a
cluster with two nodes named NodeA and NodeB. NodeA hosts a default database instance
named MSSQLSERVR.
CertKingdom.com wants to implement another SQL Server 2005 instance for a database named
Sales_DB. Sales_DB will store sales data for the company. All CertKingdom.com users will require
access to the Sales_DB database. You have been instructed to create the SQL Server 2005
instance for the Sales_DB database on Node
A. You need to ensure that all users will be able to
connect to the Sales_DB database.
What should you do?

A. Run the SQL Server 2005 Setup utility on NodeA and select a Named Instance for the
Sales_DB database.
B. Run the SQL Server 2005 Setup utility on NodeA and select the Default Instance for the
Sales_DB database.
C. Move the existing instance from NodeA to NodeB. Run the SQL Server 2005 Setup utility on
Node
A. Select the Default Instance and accept the default instance name
D. Run the SQL Server 2005 Setup utility on NodeB and select a Named Instance for the
Sales_DB database.

Answer: A

Explanation:
The default instance is named MSSQLSERVER. This instance name is already in use on NodeA;
therefore you should use a Named Instance.
Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use.
C: You do not need to move the existing instance as you can install up to 50 instances on a SQL
Server 2005 database server.
D: You need to install the instance on NodeA not NodeB. You can install a new instance on
NodeA if you use a Named Instance.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, January 3, 2012

70-642 Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Table of Contents

Table of Contents................................................................................................................ 1

Course Overview ................................................................................................................ 3

Section 0.1: Introduction..................................................................................................... 5

Section 0.2: Server Management ........................................................................................ 6

Section 0.3: Remote Management ...................................................................................... 7

Section 0.4: Mathematical Foundations.............................................................................. 8

Section 1.1: IPv4 Addressing.............................................................................................. 9

Section 1.2: IPv4 Subnetting............................................................................................. 10

Section 1.3: IPv4 Host Configuration............................................................................... 11

Section 2.1: IPv6............................................................................................................... 12

Section 2.2: IPv6 Addressing............................................................................................ 13

Section 2.3: IPv6 Configuration ....................................................................................... 14

Section 2.4: IPv6 Implementation..................................................................................... 15

Section 3.1: DHCP Configuration .................................................................................... 16

Section 3.2: DHCP Options .............................................................................................. 17

Section 3.3: Advanced DHCPv4 Settings......................................................................... 18

Section 3.4: Server Placement .......................................................................................... 19

Section 3.5: Superscopes and Split Scopes....................................................................... 20

Section 3.6: DHCPv6........................................................................................................ 21

Section 4.1: DNS Concepts............................................................................................... 22

Section 4.2: Name Resolution........................................................................................... 23

Section 4.3: Zone Configuration....................................................................................... 24

Section 4.4: Active Directory-integrated Zones ............................................................... 25

Section 4.5: Resource Records ......................................................................................... 26

Section 4.6: Client Configuration ..................................................................................... 27

Section 4.7: Dynamic DNS............................................................................................... 28

Section 4.8: Stub Zones and Forwarding.......................................................................... 29

Section 4.9: Root Hints and Root Zone ............................................................................ 30

Section 4.10: Zone Delegation.......................................................................................... 31

Section 4.11: WINS and GlobalNames ............................................................................ 32

Section 4.12: DNS Features.............................................................................................. 33

Section 4.13: DNS Design ................................................................................................ 34

Section 5.1: Routing.......................................................................................................... 35

Section 5.2: RIP ................................................................................................................ 36

Section 5.3: Demand-dial Routing.................................................................................... 37

Section 5.4: ICS and NAT ................................................................................................ 38

Section 6.1: Remote Access Concepts.............................................................................. 39

Section 6.2: Dial-up and VPN .......................................................................................... 40

Section 6.3: SSTP ............................................................................................................. 41

Section 6.4: CMAK .......................................................................................................... 42

Section 7.1: Network Location Profiles............................................................................ 43

Section 7.2: Wireless ........................................................................................................ 44

Section 7.3: RADIUS........................................................................................................ 45

Section 7.4: Network Access Protection (NAP) ............................................................... 46

Section 7.5: Network Authentication................................................................................ 47

Section 7.6: Firewall ......................................................................................................... 48

Section 7.7: IPsec.............................................................................................................. 49

Section 8.1: File Services.................................................................................................. 50

Section 8.2: File Shares..................................................................................................... 51

Section 8.3: Offline Files .................................................................................................. 52

Section 8.4: NTFS Permissions ........................................................................................ 53

Section 8.5: Share and NTFS Permissions ....................................................................... 54

Section 8.6: EFS................................................................................................................ 55

Section 8.7: Distributed File System (DFS) ..................................................................... 56

Section 8.8: Shadow Copy................................................................................................ 57

Section 8.9: Backup and Restore ...................................................................................... 58

Section 8.10: Disk Quotas................................................................................................. 59

Section 8.11: FSRM Features ........................................................................................... 60

Section 8.12: Print Services .............................................................................................. 61

Section 9.1: WSUS ........................................................................................................... 62

Section 9.2: Client Configuration ..................................................................................... 63

Section 9.3: MBSA ........................................................................................................... 64

Section 10.1: Reliability and Performance Monitor ......................................................... 65

Section 10.2: Event Viewer .............................................................................................. 66

Section 10.3: Network Monitor ........................................................................................ 67

Section 10.4: SNMP.......................................................................................................... 68

Practice Exams.................................................................................................................. 69

Course Overview

This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. It focuses on the details of configuring the infrastructure of a network.

Module 0 – Introduction
This module introduces Microsoft’s recommendations of the technical experience a candidate should have before attempting the certification test. Students will become familiar with server and remote management tools. This module provides the mathematical calculations of how to convert numbers from binary to decimal and hexadecimal. This mathematical foundation is necessary for students to understand the IPv4 and IPv6 addresses they will be studying in the course.

Module 1 – IPv4
This module discusses the details of configuring IPv4 addressing and subnetting. This includes topics of converting IPv4 addresses from binary to decimal, converting subnet masks to slant notation, identifying Ipv4 classes and ranges of IP addresses, and determining local and non-local hosts. Students will learn how to customize the number of subnets and hosts allowed on each subnet.

Module 2 – IPv6
In this module students will learn why it will become necessary to migrate to IPv6. They will learn the basic format of IPv6 addresses, identifying IPv6 address types, and configuring IPv6 addresses using the GUI and command line. Interoperability strategies for implementing IPv4 and IPv6 are explored.

Module 3 – DHCP
This module covers DHCP configuration, customization options, and advanced settings. Students will learn proper server placement to assure client communication with the DHCP server, the rationale for creating superscopes and split scopes, and DHCPv6 options.

Module 4 – DNS
In Module 4 students will learn the details of how DNS translates host names to IP addresses and the process of DNS name resolution for both the client and server. Topics will also include; creating zone and zone transfers, creating or converting an Active Directory-integrated zone, creating and editing resource records, configuring client registration, automatically updating DNS using Dynamic DNS, resolving queries using stub zones and forwarding, using root hints and a root zone, managing zones through zone delegation, creating WINS-integrated zones and GlobalNames zones support, and implementing strategies and goals when designing a DNS solution.

Module 5 – Routing
Module 5 teaches the students the basics of routing and how to manage routing table entries. Students will become familiar with installing RRAS components, and configuring RIP, demand-dial routing, and NAT solutions.

Module 6 – Remote Access
Module 6 discusses the details of configuring remote access and network authentication. Topics include; configuring a Remote Access server to use Dial-up and VPN connections, configuring client connections, configuring a VPN using SSTP, and using CMAK to manage remote access.

Module 7 – Network Access and Security
In Module 7 students will learn several strategies for controlling network access and enhancing network security. These will include: controlling network location profiles, configuring wireless connection, configuring a RADIUS client, server and proxy, configuring a DHCP server as an enforcement point, enforcing network authentication using Kerberos and NTLM, configuring a firewall, and configuring IPsec to protect IP packets during transmission.

Module 8 – File and Print
This module discusses managing network files and printing. Topics include: managing network file sharing and shared folders, controlling access using NTFS and share permissions, encrypting files and folders, protecting integrity of data through shadow copy, and backup and restore, restricting disk space using disk quotas and FSRM, and managing print services.

Module 9 – WSUS
In this module students will learn how to configure a WSUS server and client to manage the updating of software. They will also learn how to use MBSA to scan for security compliance.

Module 10 – Performance and Reliability
This module covers tools that are used to collect and monitor network data for performance and reliability. The Reliability and Performance Monitor provides network performance statistics. Event Viewer is used to monitor event logs. Network Monitor is used to gather information about network traffic. SNMP is used to manage networkattached devices.

Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification test.


Section 0.1: Introduction

Preparation
This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. Microsoft recommends at least one year experience in the following underlying technologies:
IP addressing and services
Names resolution
File and print services
Network access and remote access
Monitoring network services

This section introduces the instructor and the concepts that will be covered in this course.

Time

About 2 minutes

Section 0.2: Server Management

Preparation
This section discusses a new management console, Server Manager, used to install and manage server components. Server Manager uses the following elements:
Role
Role services
Feature

Server Core, a scaled-down version of Server 2008, provides a reduced foot print, reduced maintenance, less crashes and downtimes, and uses less disk space. To provide these benefits a limited set of server roles are supported. Student will learn how to configure and manage a server using Server Manager. They will also learn how to install roles on a Server Core server.

Configuring Server 2008 Network Infrastructure Objectives
102. Configure Dynamic Host Configuration Protocol (DHCP)
201. Configure a Domain Name System (DNS) server.

Lecture Focus Questions:
What are the differences among roles, role services, and features?
How are dependencies handled during role installation?
How does the server core installation differ from a standard server installation?
What are the limitations of a server core installation? What are the advantages?

Time
About 20 minutes

Section 0.3: Remote Management

Preparation

This section examines remote management options. Students will learn how to enable Remote Desktop on a Server Core, enable remote management of the firewall, and open firewall ports to allow remote use of MMC snap-ins.

Lecture Focus Questions:

How do firewall ports affect your ability to remotely manage a server?
What firewall port must be opened for Remote Desktop connections?
What advantage does using TS Gateway have over using Remote

Desktop?
What is the effect of enabling the Remote Administration exception in the firewall?
What are the operating system requirements for RSAT?
Which remote administration tools could you use if the firewall had only ports 80 and 443 open?

Time
About 25 minutes

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, January 2, 2012

70-294 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the IT Admin at Certkingdom.com. The Certkingdom.com network has a forest that operates at the
forest functional level of Windows Server 2003. The forest has a root domain named Certkingdom.com,
and two child domains named north.Certkingdom.com and south.Certkingdom.com. Each domain has a security
group named Research which holds the user accounts for that domain.
Two domain controllers are situated in each of these domains. One domain controller in each
domain hosts a copy of the global catalog.
The global catalog server in the Certkingdom.com domain holds the domain naming and the schema
master roles. The global catalog server in north.Certkingdom.com and south.Certkingdom.com holds the relative
ID (RID), infrastructure, and PDC emulator master roles.
A Certkingdom.com user named Ally Wagner, in the south.Certkingdom.com domain, was recently married. When
Ally Wagner got back, she asked you to change her surname in her user account. After changing
Ally Wagner’s user account to Ally Hamm, you notice that her user account is still incorrectly
specified as Ally Wagner in the Research group.
Which of the following master roles should you move to the domain controller that does not have
the Global Catalog in each domain?

A. The domain naming master role.
B. The infrastructure master role.
C. The RID master role.
D. The schema master role.
E. The PDC emulator master role.

Answer: B

Explanation: Problems like this can occur when the Infrastructure master role is on the same
domain controller as the Global Catalog. The infrastructure master updates the group-to-user
reference whenever group memberships change and replicates these changes across the domain.
The infrastructure master compares its data with that of a global catalog. Global catalogs receive
regular updates for objects in all domains through replication, so the global catalog data will
always be up to date. If the infrastructure master finds that its data is out of date, it requests the
updated data from a global catalog. The infrastructure master then replicates that updated data to
the other domain controllers in the domain.
Unless there is only one domain controller in the domain, the infrastructure master role should not
be assigned to the domain controller that is hosting the global catalog. If the infrastructure master
and global catalog are on the same domain controller, the infrastructure master will not function.
The infrastructure master will never find data that is out of date, so it will never replicate any
changes to the other domain controllers in the domain. Transferring the Infrastructure master role
to a different computer would resolve this problem. There is no reason to transfer any other master
roles.
Reference:
Michael Cross, Jeffery
A. Martin, Todd
A. Walls, Martin Grasdal, Debra Littlejohn Shinder & Dr.
Thomas W. Shinder, MCSE: Exam 70-294: Planning, Implementing, and Maintaining a Windows
Server 2003 Active Directory Infrastructure Study Guide & DVD Training System, Syngress
Publishing, Rockland, MA, 2003, pp. 505-509.


QUESTION 2
You work as the IT Network Admin at Certkingdom.com. The Certkingdom.com network has a forest with two child
domains named us.Certkingdom.com and uk.Certkingdom.com. All servers and domain controllers on the
Certkingdom.com network have Windows 2000 Server installed.
You have been given the task to uABCrade the domain controllers in uk.Certkingdom.com to Windows
Server 2003. You therefore need to take the appropriate steps that are required to prepare the
forest for the impending deployment.
Which of the following actions should you take?
Answer by selecting the appropriate steps from the column on the left and place it in the correct
order in the column on the left.



Answer:




QUESTION 3
You work as the IT Admin at Certkingdom.com. The Certkingdom.com network has a domain named Certkingdom.com.
Certkingdom.com has offices in London and Berlin, which are configured as separate sites.
A Backup of Certkingdom.com’s Ntds.dit file is performed outside of business hours, seven days a week.
The domain has an OU named Research that currently holds no Active Directory objects. During
the course of the business day an administrator in Berlin removes the Research OU, while an
administrator in London simultaneously places existing Active Directory objects in it. The London
administrator is later informed of the removal, and now realizes that the objects that were placed
into the Research OU are missing.
The CIO has subsequently instructed you to make sure that a Research OU and the missing
Active Directory objects are available to the London administrator. The CIO also informs you that
your solution should have no impact on network connectivity and resources. You have already
created a new OU, and named it Research.
Which of the following actions should you take NEXT?

A. You should transfer the objects from the LostAndFound container to the new Research OU
B. You should recreate the objects and then place the replicas in a Domain Group Policy that
should be linked to all OUs.
C. You should restore the objects to the new Research OU nonauthoritatively.
D. You should restore the objects to the new Research OU authoritatively.

Answer: A

Explanation: You moved the objects to an OU that had just been deleted. When you move
objects to an object that is no longer there, the objects get moved to the LostAndFound container.
This means that we haven’t lost the objects, so we can just re-create the Research OU and move
the users from the LostAndFound container to the new OU.
Reference:
Michael Cross, Jeffery
A. Martin, Todd
A. Walls, Martin Grasdal, Debra Littlejohn Shinder & Dr.
Thomas W. Shinder, MCSE: Exam 70-294: Planning, Implementing, and Maintaining a Windows
Server 2003 Active Directory Infrastructure Study Guide & DVD Training System, Syngress
Publishing, Rockland, MA, 2003, pp. 38-39, 99-101


QUESTION 4
You work as a IT Admin at Certkingdom.com. Certkingdom.com has its headquarters located in Dallas and branch
division in Miami. The Dallas and Miami division represent separate sites. The Dallas and Miami
divisions are linked to each other via a WAN link.
You have added a domain controller named ABC-SR01 to the Miami division and configured it as
a global catalog server. You have just completed configuring the site link between the Dallas and
Miami divisions.
The CIO at Certkingdom.com has instructed you to make sure that Miami workstations authenticate to the
network via ABC-SR01. The CIO also informs you that the replication of domain changes has to
happen instantaneously.
Which of the following actions should you take?

A. You should reduce the site link interval.
B. You should reduce the site link cost.
C. You should combine the Dallas and Miami sites into a single site
D. You should increase the site link cost.

Answer: A

Explanation:


QUESTION 1
You work as the IT Admin at Certkingdom.com. The Certkingdom.com network has a forest that operates at the
forest functional level of Windows Server 2003. The forest has a root domain named Certkingdom.com,
and two child domains named north.Certkingdom.com and south.Certkingdom.com. Each domain has a security
group named Research which holds the user accounts for that domain.
Two domain controllers are situated in each of these domains. One domain controller in each
domain hosts a copy of the global catalog.
The global catalog server in the Certkingdom.com domain holds the domain naming and the schema
master roles. The global catalog server in north.Certkingdom.com and south.Certkingdom.com holds the relative
ID (RID), infrastructure, and PDC emulator master roles.
A Certkingdom.com user named Ally Wagner, in the south.Certkingdom.com domain, was recently married. When
Ally Wagner got back, she asked you to change her surname in her user account. After changing
Ally Wagner’s user account to Ally Hamm, you notice that her user account is still incorrectly
specified as Ally Wagner in the Research group.
Which of the following master roles should you move to the domain controller that does not have
the Global Catalog in each domain?

A. The domain naming master role.
B. The infrastructure master role.
C. The RID master role.
D. The schema master role.
E. The PDC emulator master role.

Answer: B

Explanation: Problems like this can occur when the Infrastructure master role is on the same
domain controller as the Global Catalog. The infrastructure master updates the group-to-user
reference whenever group memberships change and replicates these changes across the domain.
The infrastructure master compares its data with that of a global catalog. Global catalogs receive
regular updates for objects in all domains through replication, so the global catalog data will
always be up to date. If the infrastructure master finds that its data is out of date, it requests the
updated data from a global catalog. The infrastructure master then replicates that updated data to
the other domain controllers in the domain.
Unless there is only one domain controller in the domain, the infrastructure master role should not
be assigned to the domain controller that is hosting the global catalog. If the infrastructure master
and global catalog are on the same domain controller, the infrastructure master will not function.
The infrastructure master will never find data that is out of date, so it will never replicate any
changes to the other domain controllers in the domain. Transferring the Infrastructure master role
to a different computer would resolve this problem. There is no reason to transfer any other master
roles.
Reference:
Michael Cross, Jeffery
A. Martin, Todd
A. Walls, Martin Grasdal, Debra Littlejohn Shinder & Dr.
Thomas W. Shinder, MCSE: Exam 70-294: Planning, Implementing, and Maintaining a Windows
Server 2003 Active Directory Infrastructure Study Guide & DVD Training System, Syngress
Publishing, Rockland, MA, 2003, pp. 505-509.


QUESTION 2
You work as the IT Network Admin at Certkingdom.com. The Certkingdom.com network has a forest with two child
domains named us.Certkingdom.com and uk.Certkingdom.com. All servers and domain controllers on the
Certkingdom.com network have Windows 2000 Server installed.
You have been given the task to uABCrade the domain controllers in uk.Certkingdom.com to Windows
Server 2003. You therefore need to take the appropriate steps that are required to prepare the
forest for the impending deployment.
Which of the following actions should you take?
Answer by selecting the appropriate steps from the column on the left and place it in the correct
order in the column on the left.



Answer:




QUESTION 3
You work as the IT Admin at Certkingdom.com. The Certkingdom.com network has a domain named Certkingdom.com.
Certkingdom.com has offices in London and Berlin, which are configured as separate sites.
A Backup of Certkingdom.com’s Ntds.dit file is performed outside of business hours, seven days a week.
The domain has an OU named Research that currently holds no Active Directory objects. During
the course of the business day an administrator in Berlin removes the Research OU, while an
administrator in London simultaneously places existing Active Directory objects in it. The London
administrator is later informed of the removal, and now realizes that the objects that were placed
into the Research OU are missing.
The CIO has subsequently instructed you to make sure that a Research OU and the missing
Active Directory objects are available to the London administrator. The CIO also informs you that
your solution should have no impact on network connectivity and resources. You have already
created a new OU, and named it Research.
Which of the following actions should you take NEXT?

A. You should transfer the objects from the LostAndFound container to the new Research OU
B. You should recreate the objects and then place the replicas in a Domain Group Policy that
should be linked to all OUs.
C. You should restore the objects to the new Research OU nonauthoritatively.
D. You should restore the objects to the new Research OU authoritatively.

Answer: A

Explanation: You moved the objects to an OU that had just been deleted. When you move
objects to an object that is no longer there, the objects get moved to the LostAndFound container.
This means that we haven’t lost the objects, so we can just re-create the Research OU and move
the users from the LostAndFound container to the new OU.
Reference:
Michael Cross, Jeffery
A. Martin, Todd
A. Walls, Martin Grasdal, Debra Littlejohn Shinder & Dr.
Thomas W. Shinder, MCSE: Exam 70-294: Planning, Implementing, and Maintaining a Windows
Server 2003 Active Directory Infrastructure Study Guide & DVD Training System, Syngress
Publishing, Rockland, MA, 2003, pp. 38-39, 99-101


QUESTION 4
You work as a IT Admin at Certkingdom.com. Certkingdom.com has its headquarters located in Dallas and branch
division in Miami. The Dallas and Miami division represent separate sites. The Dallas and Miami
divisions are linked to each other via a WAN link.
You have added a domain controller named ABC-SR01 to the Miami division and configured it as
a global catalog server. You have just completed configuring the site link between the Dallas and
Miami divisions.
The CIO at Certkingdom.com has instructed you to make sure that Miami workstations authenticate to the
network via ABC-SR01. The CIO also informs you that the replication of domain changes has to
happen instantaneously.
Which of the following actions should you take?

A. You should reduce the site link interval.
B. You should reduce the site link cost.
C. You should combine the Dallas and Miami sites into a single site
D. You should increase the site link cost.

Answer: A

Explanation:


QUESTION 5
You work as the IT Admin at Certkingdom.com. The Certkingdom.com network has a domain named Certkingdom.com. All
servers on the Certkingdom.com network have Windows Server 2003 installed and all workstations have
Windows XP Professional installed.
Certkingdom.com is made up of four divisions named Sales, Marketing, Finance and Research. The
Certkingdom.com network has an organizational unit (OU) named after each division that holds the user
accounts of all employees working in that specific division.
You need to install a new application for all employees in the Marketing division. You start by
creating an installation package and a Group Policy object (GPO). You plan to make use of the
new GPO to deploy the package to the workstations in the Marketing division. You therefore
connect the GPO to the Marketing OU. However, the application does not install.
The CIO informs you that the application must be installed and that you should make sure that
marketing application is not installed on workstations in the other Certkingdom.com divisions.
How will you accomplish the task?

A. Advise the Marketing users to reboot their workstations.
B. Edit the GPO and assign the application to user accounts with Marketing OU membership.
C. Connect the GPO to the Certkingdom.com domain.
D. Connect the GPO to the OU that contains computer accounts and not the Marketing OU.

Answer: B

Explanation: It is likely that the application was assigned to the computer accounts, rather than
the user accounts.
Reference:
Jill Spealman, Kurt Hudson & Melissa Craft, MCSE Self-Paced Training Kit (Exam 70-294);
Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory
Infrastructure, Microsoft Press, Redmond, Washington, 2004, pp. 12-3 to 12-10, 12-13 to 12-28,
12-34 to 12-39

QUESTION 5
You work as the IT Admin at Certkingdom.com. The Certkingdom.com network has a domain named Certkingdom.com. All
servers on the Certkingdom.com network have Windows Server 2003 installed and all workstations have
Windows XP Professional installed.
Certkingdom.com is made up of four divisions named Sales, Marketing, Finance and Research. The
Certkingdom.com network has an organizational unit (OU) named after each division that holds the user
accounts of all employees working in that specific division.
You need to install a new application for all employees in the Marketing division. You start by
creating an installation package and a Group Policy object (GPO). You plan to make use of the
new GPO to deploy the package to the workstations in the Marketing division. You therefore
connect the GPO to the Marketing OU. However, the application does not install.
The CIO informs you that the application must be installed and that you should make sure that
marketing application is not installed on workstations in the other Certkingdom.com divisions.
How will you accomplish the task?

A. Advise the Marketing users to reboot their workstations.
B. Edit the GPO and assign the application to user accounts with Marketing OU membership.
C. Connect the GPO to the Certkingdom.com domain.
D. Connect the GPO to the OU that contains computer accounts and not the Marketing OU.

Answer: B

Explanation: It is likely that the application was assigned to the computer accounts, rather than
the user accounts.
Reference:
Jill Spealman, Kurt Hudson & Melissa Craft, MCSE Self-Paced Training Kit (Exam 70-294);
Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory
Infrastructure, Microsoft Press, Redmond, Washington, 2004, pp. 12-3 to 12-10, 12-13 to 12-28,
12-34 to 12-39

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com