Archive for the ‘MCTS’ Category

Exam 70-696 Administering System Center Configuration Manager and Intune

Published: January 23, 2015
Languages: English, Spanish, Chinese (Simplified), Chinese (Traditional), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows 8.1, Windows Server 2012 R2, Microsoft Intune
Credit toward certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of February 2016, this exam was updated to reflect Windows 10 scenarios, requirements, and any related service pack updates. To learn more about these changes and how they affect the skills measured, please download and review the Exam 70-696 change document.

Deploy and manage virtual applications (10–15%)
Prepare virtual applications
Sequence applications, install and configure the sequencer environment, prepare applications for deployment in different environments, configure virtual application interaction and sharing
Manage application virtualization environments
Configure App-V, manage application cache, configure System Tray/SFTTray.exe switches, configure application extensions with virtualized applications, configure application settings using group policies
Deploy and manage RemoteApp
Configure RemoteApp and Desktop Connections settings, configure Group Policy Objects (GPOs) for signed packages, subscribe to the RemoteApp and Desktop Connections feeds, support iOS and Android, configure Remote Desktop web access for RemoteApp distribution, configure and deploy Azure RemoteApp

Deploy and manage desktop and mobile applications (15–20%)
Plan an application distribution strategy
Considerations, including impact on clients due to offline access, deployment infrastructure, and remote locations; choose the appropriate application distribution method; plan to distribute applications to mobile devices, including Windows Phone, iOS, and Android, by using Microsoft Intune; plan to distribute applications to devices including Windows Store Apps
Deploy applications using Microsoft System Center Configuration Manager
Choose and configure deployment types, configure user device affinity, configure requirements, manage the software library and application catalog
Deploy applications using Microsoft Intune
Choose between automatic and manual deployment, configure application deployment policies, add software packages, configure the company portal
Plan for application upgrades
Considerations, including application version co-existence, compatibility issues, and migrating application settings and configurations; re-sequence/redeploy applications
Monitor applications
Monitor offline application usage; monitor real-time sessions; monitor application licensing usage; configure Asset Intelligence in Configuration Manager; monitor applications, using Software Center
Manage content distribution
Manage distribution points, distribution point groups, and Content Library; monitor log files

Plan and implement software updates (15–20%)
Plan and deploy third-party updates
Plan for third-party support, integrate System Center Updates Publisher with Configuration Manager
Deploy software updates by using Configuration Manager and Windows Server Update Services (WSUS)
Configure software update point synchronization to Windows Update, use reports and In Console Monitoring to identify required updates, create update groups, create and monitor deployments, analyze log files, configure Automatic Deployment Rules (ADR), provide secondary access to Windows Update, configure GPO settings
Servicing Windows using Microsoft Intune and the Windows as a Service Model
Use reports and In Console Monitoring to identify required updates, approve or decline updates, configure automatic approval settings, configure deadlines for update installations, deploy Microsoft and non-Microsoft updates, plan for a service branch

Manage compliance and Endpoint Protection settings (15–20%)
Build a Configuration Item (CI)
Create a CI, import a CI, set CI versioning, remediate rules
Create and monitor a baseline
Deploy a baseline, import a configuration pack, build a custom baseline
Configure Endpoint Protection
Create and manage the Endpoint Protection policy; configure definitions within the client policy; export policies; choose which template to use; select exclusions; configure Endpoint Protection, using Microsoft Intune; use In Console Monitoring to monitor client compliance

Manage Configuration Manager clients (15–20%)
Deploy and manage the client agent
Identify deployment methods, manage client agent settings
Manage collections
Plan the collection structure; define rules for collections; customize collection-specific settings, including maintenance windows and power management
Configure and monitor client status
Configure client status settings, use In Console Monitoring to determine client health, configure alert thresholds, configure client health auto-remediation

Manage inventory using Configuration Manager (10–15%)
Manage hardware and software inventory
Extend hardware inventory WMI classes, export and import WMI class settings, configure standardized vendor names, analyze the identified inventory and generate reports
Manage software metering
Create software metering rules, enable or disable auto-generated rules, report software metering results
Create reports
Clone and modify reports, create custom reports, import and export reports, manage asset intelligence, install the asset intelligence sync point, enable the WMI classes, modify categories and labels, analyze reports

Provision and manage mobile devices (10–15%)
Integrate Configuration Manager with the Exchange ActiveSync Connector
Configure and apply ActiveSync policies, view inventory on mobile devices, configure connection to an on-premises or Hosted Exchange server environment, monitor the Exchange connector log file
Manage devices with Microsoft Intune
Provision user accounts, enroll devices, integrate Microsoft Intune with Configuration Manager, view and manage all managed devices, configure the Microsoft Intune subscriptions, configure the Microsoft Intune connector site system role, manage profiles and conditional access by using Microsoft Intune
Manage connection profiles, by using Configuration Manager
Configure Remote Desktop profiles, certificate profiles, email profiles, and Wi-Fi profiles
 


Question 1
You need to recommend a deployment solution for App6.
What is the best recommendation? More than one answer choice may achieve the goal.
Select the BEST answer.

B. a local installation
C. a RemoteApp program
D. a Microsoft Application Virtualization (App-V) package

Answer: D


Question 2
You need to resolve the Windows update issue.
What should you do?

A. Modify the Group Policy objects (GPOs) in Active Directory.
B. Synchronize software updates from Configuration Manager.
C. Create an automatic deployment rule.
D. Add distribution points to each branch office.

Answer: D
 


Question 3
You need to ensure that the personal devices that run Windows 8.1 meet the corporate
security policy requirements.
What should you do first?

A. Create a federated trust with Windows Azure Active Directory.
B. Create a federated identity relationship with the Microsoft Federation Gateway.
C. Enroll the device in Windows Intune.
D. Join the devices to the domain by using an offline domain join.

Answer: C
 


Question 4
You need to make App4 available to all of the users.
What should you do?

A. Package App4 as an MSI package and upload the installer to Windows Intune.
B. Sequence App4 and use streaming delivery.
C. Deploy App4 as a Configuration Manager package.
D. Deploy App4 to a Remote Desktop Session Host (RD Session Host) server.

Answer: D

Click here to view complete Q&A of 70-696 exam
Certkingdom Review
, Certkingdom PDF 70-696

MCTS Training, MCITP Trainnig

Best Microsoft Office Specialist 70-696 Certification, Microsoft 70-696 Training at certkingdom.com

Exam MB2-876 Extending Microsoft Dynamics CRM 2011

Published: December 29, 2011
Languages: English
Audiences: Developers
Technology: Microsoft Dynamics CRM 2011
Credit toward certification: MCTS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Plan to deploy Microsoft Dynamics CRM (11%)
Identify the layers in the Microsoft Dynamics CRM 2011 architecture
Application layer; Platform layer; Database layer
Identify the deployment considerations
Describe the deployment model, identify support for Microsoft Outlook clients, identify the extensibility points, identify types of reporting, identify the web resources

Preparation resources
Microsoft Dynamics CRM 2011 planning guide
Microsoft Dynamics CRM 2011 implementation guide
Microsoft Dynamics CRM 2011 system requirements and required components

Perform common platform operations (12%)
Describe how to use IDiscoveryService
What is the IDiscoveryService used for?
Describe how to use IOrganizationService
What is the IOrganizationService used for?
Describe how to use early-bound entry classes
What is an early-bound entry class used for?
Describe how to use late-bound entry classes
What is a late-bound entry class used for?
Describe data types
Describe how to use methods
Create, Retrieve, Update, Delete, RetrieveMultiple
Describe how to handle SOAP exception

Preparation resources
IDiscoveryService methods
IOrganizationService.Update method
Handling exceptions

Perform advanced platform operations (12%)
Identify different ways to query data
QueryExpression, QueryByAttribute, LINQ queries, FetchXML, filtered views
Save queries
Identify how to use the Execute() method
Identify how to use requests and responses
Identify how to use late-bound versus early-bound
Identify how to use the Entity class
Identify how to use the IOrganizationService web service

Preparation resources
Build queries with QueryExpression
Sample: Execute multiple requests
Use the IOrganizationService web service to read and write data or metadata

Create custom workflow activities and utilize Windows Workflow Foundation (10%)
Describe process architecture
Describe workflow
Actions and conditions, input arguments, variables
Describe dialog
Rules, events, pages, prompts and responses, actions and conditions
Set up custom workflow activity assemblies
Create custom workflow activities
Debug custom workflow activities
Create and modify workflows in Windows Workflow Foundation

Preparation resources
Processes, workflows, and dialogs for Microsoft Dynamics CRM
Process architecture for Microsoft Dynamics CRM
Custom workflow activities (workflow assemblies) for Microsoft Dynamics CRM

Create plug-ins (11%)
Describe plug-ins
What is a plug-in, when to use a plug-in, cascading events, information available in plug-ins, plug-ins and Microsoft Dynamics CRM 2011 for Microsoft Office Outlook
Describe event framework
Key features, event execution pipeline
Describe plug-in isolation, trusts, and statistics
Sandbox
Develop plug-ins
Data context, exception handling, impersonation, registration and deployment
Describe the Entity class and its uses
Describe the integration of Microsoft Azure with Microsoft Dynamics CRM 2011
Overview of the Azure platform, integration with Microsoft Dynamics CRM 2011, creation of a Listener for an Azure solution, send data over the AppFabric Service Bus, create an Azure–aware plug-in

Preparation resources
Plug-in development for Microsoft Dynamics CRM
Introduction to Windows Azure integration with Microsoft Dynamics CRM
Entity class

Implement application events (11%)
Describe the use of JScript web resources and how they are used for client-side events
Overview of web resources, reference web resources, use the Jscript web resource
Describe form and field events
OnChange, OnLoad, OnSave, TabStateChange, OnReadyStateComplete
Describe form event handler execution context
Set event dependencies
Identify best practices in writing client-side code
Debug client-side code
Request external data
Pass parameters
Access Microsoft Dynamics CRM 2011 web services

Preparation resources
Use JavaScript with Microsoft Dynamics CRM
Use form and field events
Client-side programming reference

Program application events (11%)
Describe form types
Describe global variables and functions
Implement XrmPagecontext
Implement XrmPagedataentity
Implement XrmPageui
Implement GetGlobalContext

Preparation resources
Global variables
GetGlobalContext function

Customize application integration (11%)
Describe ways to customize the user interface
Customize the site map XML
Customize the ribbon XML
Customize the form XML
Describe how customizations impact Microsoft Outlook
Implement IFrames in entity forms
Describe IFrame considerations, retrieve data by using parameters, dynamic IFrame
Describe URL-addressable forms and views
Describe application integration with Microsoft SharePoint Server

Preparation resources
Customize Microsoft Dynamics CRM
Use an IFRAME and web resource controls on a form
URL addressable forms and views

Implement web resources (11%)

Implement webpage (HTML) web resources
Creation, limitations, passing parameters
Implement data (XML) web resources
Creation, limitations, referencing
Implement style sheet (CSS) web resources
Creation, limitations, referencing
Implement style sheet (XSL) web resources
Creation, limitations, referencing
Implement image (PNG, JPG, GIF, ICO) web resources
Creation, limitations, referencing
Implement Silverlight (XAP) web resources
Create Silverlight web resources, access context data, pass data to a Silverlight web resource, use the REST endpoint, test and debug

Preparation resources
Data (XML) web resources
Style Sheet (CSS) web resources
Silverlight (XAP) web resources

QUESTION 1
You need to create a fixed asset that records depreciation quarterly.
Which form should you use to configure the period frequency for posting depreciation?

A. Value models
B. Depreciation profiles
C. Special depreciation allowance
D. Depreciation books

Answer: A


QUESTION 2
Which three methods can you use to assign bar codes to fixed assets? Each correct answer presents a complete solution.

A. Automatically assign the bar codes when you create fixed assets.
B. Assign the bar codes to fixed assets groups.
C. Automatically assign the bar codes based on the fixed asset journal type.
D. Assign the bar codes to current fixed assets.
E. Manually assign the bar codes when you create fixed assets.

Answer: A,B,D


QUESTION 3
You need to configure a workflow to approve all budget amounts at the line level.
Which workflow configuration type should you use?

A. Budget register entry workflow
B. Ledger fixed assets budget journal workflow
C. Budget plan workflows
D. Budget account entry workflow

Answer: A


QUESTION 4
You need to ensure that you have the most current data to manage customer collections.
What should you create first?

A. A customer account statement
B. A customer balance list
C. A customer aging snapshot
D. A customer pool

Answer: B


QUESTION 5
Which two elements are required to create a budget plan in Microsoft Dynamics AX 2012? Each correct answer presents part of the solution.

A. Budget plan priority
B. Budget plan preparer
C. Budget planning user group
D. Budget planning process

Answer: A,C

Click here to view complete Q&A of MB2-876 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MB2-876 Training at certkingdom.com

Exam 70-673 TS: Designing, Assessing, and Optimizing Software Asset Management (SAM)

Published: November 4, 2008
Languages: English
Audiences: IT professionals
Technology: Windows Server 2008
Credit toward certification: MCTS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Assess software asset management (SAM) programs by using the SAM Optimization Model (18%)
Define the scope of a SAM program assessment
Identify infrastructure groups and locations, estimated quantity of hardware and software assets, functional descriptions for each group, and key points of contact
Assess SAM processes throughout an organization
Assess infrastructure groups for the existence of documented SAM procedures, roles, and responsibilities
Assign maturity levels according to the 10 components of the SAM Optimization Model
Assign one of four maturity levels to each component
Perform a gap analysis between the current maturity level and the desired maturity level
Review assigned maturity levels, compare assigned maturity levels with desired maturity levels

Preparation resources
Software Asset Management Assessment
Microsoft inventory and assessment tools
SAM Assessment report workbook

Perform software license reviews (21%)

Collect and manage complete hardware and software inventories
Review an organization’s hardware and software inventory collection processes and data to ensure completeness
Validate inventory accuracy
Normalize software inventories and reconcile them against other data sources to verify the accuracy of specified license metrics, such as user counts based on HR employee records
Collect, validate, and manage license entitlement records
Gather, store, normalize, and validate license entitlement records; provide reports as needed
Perform a periodic reconciliation of software inventories and license entitlements
Reconcile software inventory data against software license entitlements data to determine and report license compliance status

Preparation resources
SAM and licensing
Taking inventory
Software and hardware spreadsheet template

Coordinate data collection technologies (21%)
Manage data collection
Identify machine type, agent installation requirements, collection schedules, and discrepancies between inventories; define data schemas; identify data storage locations; normalize the collected data
Coordinate data collection between operations groups
Facilitate data transfer and synchronization between various IT groups, validate data between these groups, and ensure that overall SAM processes are being followed
Manage data interfaces between disparate data sources
Identify the process of matching common fields, cross-referencing, determine whether an individual record in one data source requires the updating of other data sources by using manual or automated techniques; manage the data transfer process
Manage reporting
Gather requirements for general user and executive reports, generate and maintain periodic reports, maintain the infrastructure necessary for ad-hoc reporting requests

Preparation resources
Managing your data-collection packages

Design and manage a SAM program (19%)
Secure executive sponsorship
Identify stakeholders, create proposal materials, and obtain explicit executive authorization
Secure funding
Estimate operational costs in both consulting hours and employee time, create a project plan and budget, and obtain from each infrastructure group funding for each task that is associated with managing a SAM program
Design a SAM program
Identify resources and objectives for a SAM program, align resources with customer requirements and schedules, and coordinate acquisition strategies that may include optimization methods, such as software as a service (SaaS) and application virtualization
Implement a SAM program
Create a SAM stakeholder group to oversee the project; assess and benchmark the current state of SAM; implement technologies to support asset discovery; enhance purchasing processes to include storage and retrieval of license entitlement information; perform an initial license reconciliation; create policies, processes, and procedures to support SAM efforts; secure support from all associated departments; educate employees
Maintain a SAM program
Monitor adherence to the policies, processes, and procedures of an organization’s SAM life cycle; standardize SAM processes across all domains and organizational units; perform periodic license reconciliation; and provide ongoing SAM awareness training
Create and manage a SAM program improvement plan
Incorporate SAM analytical data into strategic IT and business unit planning; create detailed metrics and reports to measure SAM adoption, maturity, and adherence to plan; report return on investment (ROI), cost avoidance, and end-user satisfaction to all stakeholders; evangelize SAM maturity benefits

Preparation resources
Creating policies and procedures
Microsoft Licensing suggestions table
Maintaining SAM

Manage the software asset life cycle (21%)
Manage the acquisition process
Identify and manage approved and unapproved purchasing processes within an organization, identify suppliers, and manage software approval and receiving processes
Manage the deployment process
Validate the availability of software and licenses, select the correct media, specify the software identification characteristics, and track the deployment of software
Maintain assets
Manage software and hardware during the install, move, add, change (IMAC) processes throughout the software asset life cycle
Manage the retirement process
Identify hardware for retirement, retire software, harvest software licenses, decommissioning or destruction of storage media

Preparation resources
SAM Optimization Model
Software acquisition policy
Software use policy


QUESTION 1
How many years of experience do you have designing, assessing, and optimizing Software Asset Management (SAM)?

A. I have not done this yet.
B. Less than 3 months
C. 3-6 months
D. More than 6 months but less than 1 year
E. 1-2 years
F. 2-3 years
G. 3 or more years

Answer: A

Explanation:


QUESTION 2
Rate your level of proficiency with assessing SAM programs by using the SAM Optimization Model, including defining scope, assessing SAM processes throughout an organization, assigning maturity levels according to the 10 components of the SAM Optimization Model, and performing gap analysis between current and desired maturity levels.

A. Very High
B. High
C. Moderate
D. Low
E. Very Low

Answer: A

Explanation:


QUESTION 3
Rate your level of proficiency with performing software license reviews, including conducting inventories, validating and managing license entitlement records, and reconciling software inventories and report license compliance status.

A. Very High
B. High
C. Moderate
D. Low
E. Very Low

Answer: A

Explanation:


QUESTION 4
Rate your level of proficiency with coordinating technologies, including managing data collection, data interfaces between disparate data sources, and reporting.

A. Very High
B. High
C. Moderate
D. Low
E. Very Low

Answer: A

Explanation:


QUESTION 5
Rate your level of proficiency with designing, implementing, and managing a SAM program, including securing executive sponsorship and funding.

A. Very High
B. High
C. Moderate
D. Low
E. Very Low

Answer: A

Explanation:

Click here to view complete Q&A of 70-673 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-673 Training at certkingdom.com

Exam 70-642 Windows Server 2008 Network Infrastructure, Configuring

Published: March 6, 2008
Languages: English, German, Japanese
Audiences: IT professionals
Technology: Windows Server 2008
Credit toward certification: MCP, MCSA, MCTS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Configuring addressing and services (21%)
Configure IPv4 and IPv6 addressing
Configure IP address options; subnetting; supernetting; multi-homed; interoperability between IPv4 and IPv6
Configure Dynamic Host Configuration Protocol (DHCP)
DHCP options; creating new options; PXE boot; default user profiles; DHCP relay agents; exclusions; authorize server in Active Directory; scopes; DHCPv6
Configure routing
Static routing; persistent routing; Routing Internet Protocol (RIP); metrics; choosing a default gateway; maintaining a routing table; demand-dial routing; IGMP proxy
Configure Windows Firewall with advanced security
Inbound and outbound rules; custom rules; authorized users; authorized computers; configure firewall by using Group Policy; network location profiles; service groups; import/export policies; isolation policy; IPsec group policies; Connection Security Rules

Preparation resources
Configuring TCP/IP networking
Dynamic Host Configuration Protocol (DHCP)
Windows firewall and IPsec policy deployment step-by-step guide

Configuring names resolution (22%)
Configure a Domain Name System (DNS) server
Conditional forwarding; external forwarders; root hints; cache-only; socket pooling; cache locking
Configure DNS zones
Zone scavenging; zone types; Active Directory integration; Dynamic Domain Name System (DDNS); Secure DDNS; GlobalNames; zone delegation; DNS Security Extensions (DNSSEC); reverse lookup zones
Configure DNS records
Record types; Time to live (TTL); weighting records; registering records; netmask ordering; DnsUpdateProxy group; round robin; DNS record security; auditing
Configure DNS replication
DNS secondary zones; DNS stub zones; Active Directory Integrated replication scopes; securing zone transfer; SOA refresh; auditing
Configure name resolution for client computers
Configuring HOSTS file; Link-Local Multicast Name Resolution (LLMNR); broadcasting; resolver cache; DNS server list; Suffix Search order; DNS devolution

Preparation resources
IPv4 name resolution
Configure a DNS server to use forwarders
Configuring zone properties

Configuring network access (18%)
Configure remote access
Dial-up; Remote Access Policy; Network Address Translation (NAT); VPN protocols, such as Secure Socket Tunneling Protocol (SSTP) and IKEv2; Routing and Remote Access Services (RRAS); packet filters; Connection Manager; VPN reconnect; RAS authentication by using MS-CHAP, MS-CHAP v2, and EAP
Configure Network Access Protection (NAP)
Network layer protection; DHCP enforcement; VPN enforcement; RDS enforcement; configure NAP health policies; IPsec enforcement; 802.1x enforcement; flexible host isolation; multi-configuration System Health Validator (SHV)
Configure DirectAccess
IPv6; IPsec; server requirements; client requirements; perimeter network; name resolution policy table
Configure Network Policy Server (NPS)
IEEE 802.11 wireless; IEEE 802.3 wired; Group Policy for wireless; RADIUS accounting; Connection Request policies; RADIUS proxy; NPS templates

Preparation resources
Network access protection deployment guide
DirectAccess configuration, tips, tricks, and best practices
Administering NPS

Configuring file and print services (20%)
Configure a file server
File share publishing; Offline Files; share permissions; NTFS permissions; encrypting file system (EFS); BitLocker; Access-Based Enumeration (ABE); branch cache; Share and Storage Management console
Configure Distributed File System (DFS)
DFS namespace; DFS configuration and application; creating and configuring targets; DFS replication; read-only replicated folder; failover cluster support; health reporting
Configure backup and restore
Backup types; backup schedules; managing remotely; restoring data; shadow copy services; volume snapshot services (VSS); bare metal restore; backup to remote file share
Manage file server resources
FSRM; quota by volume or quota by user; quota entries; quota templates; file classification; Storage Manager for SANs; file management tasks; file screening
Configure and monitor print services
Printer share; publish printers to Active Directory; printer permissions; deploy printer connections; install printer drivers; export and import print queues and printer settings; add counters to Performance Monitor to monitor print servers; print pooling; print priority; print driver isolation; location-aware printing; print management delegation

Preparation resources
File services for Windows Server 2008
Windows Server 2008 file services: Deep dive
Print and document services

Monitoring and managing a network infrastructure (20%)
Configure Windows Server Update Services (WSUS) server settings
Update type selection; client settings; Group Policy object (GPO); client targeting; software updates; test and approval; disconnected networks
Configure performance monitoring
Data Collector Sets; Performance Monitor; Reliability Monitor; monitoring System Stability Index; page files; analyze performance data
Configure event logs
Custom views; application and services logs; subscriptions; attaching tasks to events find and filter
Gather network data
Simple Network Management Protocol (SNMP); Network Monitor; Connection Security Rules monitoring

Preparation resources
Managing Windows Server Update Services 3.0 servers
Performance and reliability monitoring getting started guide for Windows Server 2008
Monitoring and status tools


QUESTION 1
Your network contains 100 servers that run Windows Server 2008 R2.
A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network.
You need to define the Custom Event Delivery Optimization settings on Server1.
Which tool should you use?

A. Event Viewer
B. Task Scheduler
C. Wecutil
D. Wevtutil

Answer: C


QUESTION 2
Your network contains a server that runs Windows Server 2008 R2. You plan to create a custom script.
You need to ensure that each time the script runs, an entry is added to the Application event log.
Which tool should you use?

A. Eventcreate
B. Eventvwr
C. Wecutil
D. Wevtutil

Answer: A

Explanation:
You can create custom events in an event log by using the Eventcreate utility. This can be useful as a diagnostic tool in scripts when you record an error or event directly into the logs without using VBScript or another language to log the event.
http://support.microsoft.com/kb/324145


QUESTION 3
Your network contains a server that has the SNMP Service installed.
You need to configure the SNMP security settings on the server.
Which tool should you use?

A. Local Security Policy
B. Scw
C. Secedit
D. Services console

Answer: D


QUESTION 4
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the SNMP Service installed.
You perform an SNMP query against Server1 and discover that the query returns the incorrect identification information.
You need to change the identification information returned by Server1.
What should you do?

A. From the properties of the SNMP Service, modify the Agent settings.
B. From the properties of the SNMP Service, modify the General settings.
C. From the properties of the SNMP Trap Service, modify the Logon settings.
D. From the properties of the SNMP Trap Service, modify the General settings.

Answer: A


QUESTION 5
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00.
What should you do?

A. Create a scheduled task that runs the Netsh tool.
B. Create a scheduled task that runs the Nmcap tool.
C. From Network Monitor, configure the General options.
D. From Network Monitor, configure the Capture options.

Answer: B

Explanation:
nmcap /networks * /capture LDAP /file c:\file.cap If you want a timer add the following
/startwhen /timeafter x hours

Click here to view complete Q&A of 70-642 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-642 Training at certkingdom.com

 

Exam 70-640 Windows Server 2008 Active Directory, Configuring

Published: March 6, 2008
Languages: English, German, Japanese
Audiences: IT professionals
Technology: Windows Server 2008
Credit toward certification: MCP, MCTS, MCITP, MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Configuring Domain Name System (DNS) for Active Directory (18%)
Configure zones
Dynamic DNS (DDNS), Non-dynamic DNS (NDDNS), and Secure Dynamic DNS (SDDNS); Time to Live (TTL); GlobalNames; Primary, Secondary, Active Directory Integrated, Stub; SOA; zone scavenging; forward lookup; reverse lookup
Configure DNS server settings
Forwarding; root hints; configure zone delegation; round robin; disable recursion; debug logging; server scavenging
Configure zone transfers and replication
Configure replication scope (forestDNSzone; domainDNSzone); incremental zone transfers; DNS Notify; secure zone transfers; configure name servers; application directory partitions

Preparation resources
Configuring zone properties
Configure a DNS server for use with Active Directory Domain Services
Modify zone transfer settings

Configuring the Active Directory infrastructure (17%)
Configure a forest or a domain
Remove a domain; perform an unattended installation; Active Directory Migration Tool (ADMT); change forest and domain functional levels; interoperability with previous versions of Active Directory; multiple user principal name (UPN) suffixes; forestprep; domainprep
Configure trusts
Forest trust; selective authentication vs. forest-wide authentication; transitive trust; external trust; shortcut trust; SID filtering
Configure sites
Create Active Directory subnets; configure site links; configure site link costing; configure sites infrastructure
Configure Active Directory replication
DFSR; one-way replication; Bridgehead server; replication scheduling; configure replication protocols; force intersite replication
Configure the global catalog
Universal Group Membership Caching (UGMC); partial attribute set; promote to global catalog
Configure operations masters
Seize and transfer; backup operations master; operations master placement; Schema Master; extending the schema; time service

Preparation resources
Deploying a Windows Server 2008 forest root domain
Securing domain and forest trusts
Active Directory replication tools and settings

Configuring Active Directory roles and services (14%)
Configure Active Directory Lightweight Directory Service (AD LDS)
Migration to AD LDS; configure data within AD LDS; configure an authentication server; Server Core installation
Configure Active Directory Rights Management Service (AD RMS)
Certificate request and installation; self-enrollments; delegation; create RMS templates; RMS administrative roles; RM add-on for IE
Configure the read-only domain controller (RODC)
Replication; Administrator role separation; read-only DNS; BitLocker; credential caching; password replication; syskey; read-only SYSVOL; staged install
Configure Active Directory Federation Services (AD FSv2)
Install AD FS server role; exchange certificate with AD FS agents; configure trust policies; configure user and group claim mapping; import and export trust policies

Preparation resources
AD LDS getting started step-by-step guide
Read-only domain controllers step-by-step guide
AD FS step-by-step guide

Creating and maintaining Active Directory objects (18%)
Automate creation of Active Directory accounts
Bulk import; configure the UPN; create computer, user, and group accounts (scripts, import, migration); template accounts; contacts; distribution lists; offline domain join
Maintain Active Directory accounts
Manage computer accounts; configure group membership; account resets; delegation; AGDLP/AGGUDLP; deny domain local group; local vs. domain; Protected Admin; disabling accounts vs. deleting accounts; deprovisioning; contacts; creating organizational units (OUs); delegation of control; protecting AD objects from deletion; managed service accounts
Create and apply Group Policy objects (GPOs)
Enforce, OU hierarchy, block inheritance, and enabling user objects; group policy processing priority; WMI; group policy filtering; group policy loopback; Group Policy Preferences (GPP)
Configure GPO templates
User rights; ADMX Central Store; administrative templates; security templates; restricted groups; security options; starter GPOs; shell access policies
Deploy and manage software by using GPOs
Publishing to users; assigning software to users; assigning to computers; software removal; software restriction policies; AppLocker
Configure account policies
Domain password policy; account lockout policy; fine-grain password policies
Configure audit policy by using GPOs
Audit logon events; audit account logon events; audit policy change; audit access privilege use; audit directory service access; audit object access; advanced audit policies; global object access auditing; “Reason for Access” reporting

Preparation resources
Active Directory how to…
Group policy planning and deployment guide
Account policies

Maintaining the Active Directory environment (18%)
Configure backup and recovery
Using Windows Server Backup; back up files and system state data to media; backup and restore by using removable media; perform an authoritative or non-authoritative restores; linked value replication; Directory Services Recovery Mode (DSRM); backup and restore GPOs; configure AD recycle bin
Perform offline maintenance
Offline defragmentation and compaction; Restartable Active Directory; Active Directory database mounting tool
Monitor Active Directory
Event viewer subscriptions; data collector sets; real-time monitoring; analyzing logs; WMI queries; PowerShell

Preparation resources
Windows Server backup step-by-step guide for Windows Server 2008
Compact the directory database file (offline defragmentation)
Restartable AD DS step-by-step guide

Configuring Active Directory Certificate Services (15%)

Install Active Directory Certificate Services
Certificate authority (CA) types, including standalone, enterprise, root, and subordinate; role services; prepare for multiple-forest deployments
Configure CA server settings
Key archival; certificate database backup and restore; assigning administration roles; high-volume CAs; auditing
Manage certificate templates
Certificate template types; securing template permissions; managing different certificate template versions; key recovery agent
Manage enrollments
Network device enrollment service (NDES); auto enrollment; Web enrollment; extranet enrollment; smart card enrollment; authentication mechanism assurance; creating enrollment agents; deploying multiple-forest certificates; x.509 certificate mapping
Manage certificate revocations
Configure Online Responders; Certificate Revocation List (CRL); CRL Distribution Point (CDP); Authority Information Access (AIA)

Preparation resources
Active Directory certificate services step-by-step guide
Setting up a certification authority
Administering certificate templates


QUESTION 1
Your company has a main office and three branch offices. Each office is configured as a separate Active Directory site that has its own domain controller.
You disable an account that has administrative rights.
You need to immediately replicate the disabled account information to all sites.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A. From the Active Directory Sites and Services console, configure all domain controllers
as global catalog servers.
B. From the Active Directory Sites and Services console, select the existing connection objects and force replication.
C. Use Repadmin.exe to force replication between the site connection objects.
D. Use Dsmod.exe to configure all domain controllers as global catalog servers.

Answer: B,C

Explanation:
http://technet.microsoft.com/en-us/library/cc835086%28v=ws.10%29.aspx
Repadmin /syncall Synchronizes a specified domain controller with all of its replication partners. http://ivan.dretvic.com/2012/01/how-to-force-replication-of-domain-controllers/
How to force replication of Domain Controllers From time to time its necessary to kick off AD replication to speed up a task you may be doing, or just a good too to check the status of replication between DC’s.
Below is a command to replicate from a specified DC to all other DC’s.
Repadmin /syncall DC_name /Aped By running a repadmin /syncall with the /A(ll partitions) P(ush) e(nterprise, cross sites) d(istinguished names) parameters, you have duplicated exactly what Replmon used to do in Windows 2003, except that you did it in one step, not many.And with the benefit of seeing immediate results on how the operations are proceeding.
If I am running it on the DC itself, I don’t even have to specify the server name. http://technet.microsoft.com/en-us/library/cc776188%28v=ws.10%29.aspx Force replication over a connection
To force replication over a connection
1. Open Active Directory Sites and Services.
C:\Documents and Settings\usernwz1\Desktop\1.PNG


QUESTION 2
Your company has a branch office that is configured as a separate Active Directory site and has an Active Directory domain controller.
The Active Directory site requires a local Global Catalog server to support a new application.
You need to configure the domain controller as a Global Catalog server.
Which tool should you use?

A. The Server Manager console
B. The Active Directory Sites and Services console
C. The Dcpromo.exe utility
D. The Computer Management console
E. The Active Directory Domains and Trusts console

Answer: B

Explanation:

Answer: The Active Directory Sites and Services console http://technet.microsoft.com/en-us/library/cc781329%28v=ws.10%29.aspx Configure a domain controller as a global catalog server
To configure a domain controller as a global catalog server 1. Open Active Directory Sites and Services.
Further information: http://technet.microsoft.com/en-us/library/cc728188%28v=ws.10%29.aspx What Is the Global Catalog?
The global catalog is a distributed data repository that contains a searchable, partial representation of every object in every domain in a multidomain Active Directory Domain Services (AD DS) forest. The global catalog is stored on domain controllers that have been designated as global catalog servers and is distributed through multimaster replication. Searches that are directed to the global catalog are faster because they do not involve referrals to different domain controllers.
In addition to configuration and schema directory partition replicas, every domain controller in a forest stores a full, writable replica of a single domain directory partition. Therefore, a domain controller can locate only the objects in its domain. Locating an object in a different domain would require the user or application to provide the domain of the requested object. The global catalog provides the ability to locate objects from any domain without having to know the domain name. A global catalog server is a domain controller that, in addition to its
full, writable domain directory partition replica, also stores a partial, read-only replica of all other domain directory partitions in the forest. The additional domain directory partitions are partial because only a limited set of attributes is included for each object. By including only the attributes that are most used for searching, every object in every domain in even the largest forest can be represented in the database of a single global catalog server.
Note: A global catalog server can also store a full, writable replica of an application directory partition, but objects in application directory partitions are not replicated to the global catalog as partial, read-only directory partitions.
The global catalog is built and updated automatically by the AD DS replication system. The attributes that are replicated to the global catalog are identified in the schema as the partial attribute set (PAS) and are defined by default by Microsoft. However, to optimize searching, you can edit the schema by adding or removing attributes that are stored in the global catalog.
In Windows 2000 Server environments, any change to the PAS results in full synchronization (update of all attributes) of the global catalog. Later versions of Windows Server reduce the impact of updating the global catalog by replicating only the attributes that change.
In a single-domain forest, a global catalog server stores a full, writable replica of the domain and does not store any partial replica. A global catalog server in a single-domain forest functions in the same manner as a nonglobal-catalog server except for the processing of forest-wide searches.


QUESTION 3
Your company has an Active Directory domain. You have a two-tier PKI infrastructure that contains an offline root CA and an online issuing CA.
The Enterprise certification authority is running Windows Server 2008 R2.
You need to ensure users are able to enroll new certificates.
What should you do?

A. Renew the Certificate Revocation List (CRL) on the root CA. Copy the CRL to the CertEnroll folder on the issuing CA.
B. Renew the Certificate Revocation List (CRL) on the issuing CA, Copy the CRL to the SysternCertificates folder in the users’ profile.
C. Import the root CA certificate into the Trusted Root Certification Authorities store on all client workstations.
D. Import the issuing CA certificate into the Intermediate Certification Authorities store on all client workstations.

Answer: A

Explanation:
http://social.technet.microsoft.com/wiki/contents/articles/2900.offline-root-certification-authority-ca.aspx
Offline Root Certification Authority (CA)
A root certification authority (CA) is the top of a public key infrastructure (PKI) and generates a self-signed certificate. This means that the root CA is validating itself (self-validating). This root CA could then have subordinate CAs that effectively trust it. The subordinate CAs receive a certificate signed by the root CA, so the subordinate CAs can issue certificates that are validated by the root C
A. This establishes a CA hierarchy and trust path.
CA Compromise
If a root CA is in some way compromised (broken into, hacked, stolen, or accessed by an unauthorized or malicious person), then all of the certificates that were issued by that CA are also compromised. Since certificates are used for data protection, identification, and authorization, the compromise of a CA could compromise the security of an entire organizational network. For that reason, many organizations that run internal PKIs install their root CA offline. That is, the CA is never connected to the company network, which makes the root CA an offline root C
A. Make sure that you keep all CAs in secure areas with limited access.
To ensure the reliability of your CA infrastructure, specify that any root and non-issuing intermediate CAs must be offline. A non-issuing CA is one that is not expected to provide certificates to client computers, network devices, and so on. This minimizes the risk of the CA private keys becoming compromised, which would in turn compromise all the certificates that were issued by the CA.
How Do Offline CAs issue certificates?
Offline root CAs can issue certificates to removable media devices (e.g. floppy disk, USB drive, CD/DVD) and then physically transported to the subordinate CAs that need the certificate in order to perform their tasks. If the subordinate CA is a non-issuing intermediate that is offline, then it will also be used to generate a certificate and that certificate will be placed on removable media. Each CA receives its authorization to issue certificates from the CA directly above it in the CA hierarchy. However, you can have multiple CAs at the same level of the CA hierarchy. Issuing CAs are typically online and used to issue certificates to client computers, network
devices, mobile devices, and so on. Do not join offline CAs to an Active Directory Domain Services domain Since offline CAs should not be connected to a network, it does not make sense to join them to an Active Directory Domain Services (AD DS) domain, even with the
Offline Domain Join [This link is external to TechNet Wiki. It will open in a new window.] option introduced with Windows 7 and Windows Server 2008 R2.
Furthermore, installing an offline CA on a server that is a member of a domain can cause problems with a secure channel when you bring the CA back online after a long offline period. This is because the computer account password changes every 30 days. You can get around this by problem and better protect your CA by making it a member of a workgroup, instead of a domain. Since Enterprise CAs need to be joined to an AD DS domain, do not attempt to install an offline CA as a Windows Server Enterprise C
A. http://technet.microsoft.com/en-us/library/cc740209%28v=ws.10%29.aspx
Renewing a certification authority
A certification authority may need to be renewed for either of the following reasons: Change in the policy of certificates issued by the CA
Expiration of the CA’s issuing certificate


QUESTION 4
You have a Windows Server 2008 R2 Enterprise Root certification authority (CA).
You need to grant members of the Account Operators group the ability to only manage Basic EFS certificates.
You grant the Account Operators group the Issue and Manage Certificates permission on the CA.
Which three tasks should you perform next? (Each correct answer presents part of the solution.
Choose three.)

A. Enable the Restrict Enrollment Agents option on the CA.
B. Enable the Restrict Certificate Managers option on the CA.
C. Add the Basic EFS certificate template for the Account Operators group.
D. Grant the Account Operators group the Manage CA permission on the CA.
E. Remove all unnecessary certificate templates that are assigned to the Account Operators group.

Answer: B,C,E


QUESTION 5
Your company has an Active Directory domain.
You log on to the domain controller. The Active Directory Schema snap-in is not available in the Microsoft Management Console (MMC).
You need to access the Active Directory Schema snap-in.
What should you do?

A. Add the Active Directory Lightweight Directory Services (AD LDS) role to the domain controller by using Server Manager.
B. Log off and log on again by using an account that is a member of the Schema Administrators group.
C. Use the Ntdsutil.exe command to connect to the Schema Master operations master and open the schema for writing.
D. Register Schmmgmt.dll.

Answer: D

Explanation:
http://technet.microsoft.com/en-us/library/cc732110.aspx Install the Active Directory Schema Snap-In
You can use this procedure to first register the dynamic-link library (DLL) that is required for the Active Directory Schema snap-in. You can then add the snap-in to Microsoft Management Console (MMC).
To install the Active Directory Schema snap-in
1. To open an elevated command prompt, click Start, type command prompt and then right-click Command
Prompt when it appears in the Start menu. Next, click Run as administrator and then click OK.
To open an elevated command prompt in Windows Server 2012, click Start, type cmd, right click cmd and then click Run as administrator.
2. Type the following command, and then press ENTER:
regsvr32 schmmgmt.dll
3. Click Start, click Run, type mmc and then click OK.
4. On the File menu, click Add/Remove Snap-in.
5. Under Available snap-ins, click Active Directory Schema, click Add and then click OK.
6. To save this console, on the File menu, click Save.
7. In the Save As dialog box, do one of the following:
* To place the snap-in in the Administrative Tools folder, in File name, type a name for the snap-in, and then click Save.
* To save the snap-in to a location other than the Administrative Tools folder, in Save in
navigate to a location for the snap-in. In File name, type a name for the snap-in, and then
click Save


QUESTION 6
You have an Active Directory domain that runs Windows Server 2008 R2.
You need to implement a certification authority (CA) server that meets the following requirements:
Allows the certification authority to automatically issue certificates
Integrates with Active Directory Domain Services
What should you do?

A. Install and configure the Active Directory Certificate Services server role as a Standalone Root CA.
B. Install and configure the Active Directory Certificate Services server role as an Enterprise Root CA.
C. Purchase a certificate from a third-party certification authority, Install and configure the Active Directory
Certificate Services server role as a Standalone Subordinate CA.
D. Purchase a certificate from a third-party certification authority, Import the certificate into the computer store of the schema master.

Answer: B

Click here to view complete Q&A of 70-640 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-640 Training at certkingdom.com

 

Exam 70-573 TS: Microsoft SharePoint 2010, Application Development

Published: July 12, 2010
Languages: English
Audiences: Developers
Technology: Microsoft SharePoint Server 2010
Credit toward certification: MCTS, MCPD

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Working with the SharePoint user interface (19%)
Manage SPSite and SPWeb programmatically by using Visual Studio 2010
Creating sub webs, referencing SPFiles, manipulating property bag, when to call Update, referencing SPContext, SPSite, SPWeb, SPSite.OpenWeb, SPWeb.Webs, feature activation and deactivation
This objective does not include: trivial cases such as setting title and other loose properties of the objects
Implement a dialog by using the dialog framework
Create dialogs from JavaScript or from server side, display dialogs
Create a custom ribbon object
Adding custom actions to the ribbon, customizing groups, customizing tabs, customizing the existing ribbon
Customize navigation programmatically
TopNav bar, quick launch, custom actions
This objective does not include: custom menu controls, custom site map providers
Create and apply branding to a SharePoint site
Applying custom master pages to content pages and application pages, placeholders, page layouts, programmatically working with themes, deploying CSS, CSSlink, ScriptLink
This objective does not include: graphic design, creating a CSS

Preparation resources
User interface customization resource center | SharePoint 2010
SharePoint 2010 UI customization
Customizing and extending the SharePoint 2010 Server ribbon

Developing web parts and controls (21%)
Create web parts
Including properties, controls using render vs. CreateChildControl, life cycle, visual, standard web parts
This objective does not include: trivial case where developer uses visual web part project template
Create connectable web parts
Implement consumer/provider interfaces
Debug web parts
ULS log, and event log, debug.log tracing, developer dashboard
Create and implement delegate controls
Overriding existing controls with lower sequence, developing and using .ascx files

Preparation resources
Walkthrough: Creating a basic web part
SharePoint 2010: Developing connected web parts
How to: Customize a delegate control

Developing business logic (19%)
Implement a custom workflow in Visual Studio 2010
Work with initiation data or association data to create a SharePoint task, extend a workflow imported from SharePoint Designer 2010, use a HandleExternalEvent and CallExternalMethod to interact with a custom local service, work with initiation data or association data in a site workflow, correlation token
This objective does not include: trivial cases such as workflows with no custom actions, initiation data, association data
Create a custom workflow action
Create a custom SPD action, create and add a custom activity to a Visual Studio workflow, define an action.xml file
Create and implement event receivers
Accessing event properties, list, item, site, email, avoiding recursion, cancelling events, choosing synchronization state
Customize Enterprise Content Management (ECM)
Creating a content type that inherit from appropriate parent, creating and implementing a custom publishing field control that is page mode aware, activating a master page programmatically including token usage
This objective does not include: page layouts, formatting
Create, implement and debug a timer job
Configuration, programmatic scheduling, queuing, attaching debugger to the timer service
Create and modify Business Connectivity Service model in Visual Studio 2010
Create a BDC model in Visual Studio 2010, define insert, update and delete methods, create and read items, make data searchable
Manage users, groups, permissions
SPGroups, SPUser, permission inheritance, all securable objects, SPRoleDefinition, SPRole, SPRoleAssignment

Preparation resources
Workflow development in Visual Studio
Enterprise Content Management (ECM) development in SharePoint Server 2010
Using the SharePoint Business Data Connectivity designer in VS 2010

Working with SharePoint data (22%)
Access list data by using the Server object model
SPQuery, LINQ, SPList, SPSiteDataQuery, schema management, working with a query governor, create LINQ query that includes a join statement, SPQuery vs. SPSiteDataQuery
Access SharePoint data by using WCF data services
WCF ListData.svc, RESTFUL URLs conventions, create and use a client service reference
Access (CRUD) data by using the client object model
Javascript, .NET, Silverlight, build Silverlight user interface for SharePoint using client object model, query data by using CAML over the client object model in Silverlight, non-data API (site, web, list, access)
Work with documents programmatically
SPFile, SPFolder, SPVersion, upload document and set meta data
Work with the meta data
Access data from user profiles, taxonomy, folksonomy
Extending SharePoint search
Creating a custom query using full text query or keyword query, customize the look and feel of the search result using XSLT
Implement and debug code that executes in an alternative security context
Create code that uses the RunWithElevatedPrivileges delegate (including debugging), create code that uses the system account, create code that impersonate a different user
Create and modify a custom content type
Declaratively and programmatically creating and upgrading content type using Visual Studio 2010, modifying an existing content type, site columns

Preparation resources
Using the client object model
Accessing SharePoint 2010 lists by using WCF data services
Extending search

Stabilizing and deploying SharePoint components (19%)
Manage a solution in Visual Studio 2010
Modify the contained features in the solution, add an assembly that is not included in the visual studio solution, manage mapped folders for localization, sandbox and farm solutions, customize manifest.xml
Manage a feature by using Visual Studio 2010
Upgrading, localizing, versioning, developing features, feature receivers (activating and installing) that interact with their parent object, customizing feature.xml
This objective does not include: features without elements
Store and retrieve configuration data
App config, web config, persisted object, list, xml, file system, cookies, property bag
Create a site definition by using Visual Studio 2010
Feature activation, site provisioning, localization
This objective does not include: list definitions and modules defined in ONET.xml, SharePoint Designer
Manage SharePoint object life cycle by using the dispose API
SPWeb, SPContext, IDisposable, Try…Catch…Finally, using blocks
Develop, debug, and deploy sandboxed solutions
APIs that are allowed or not allowed in sandbox, use a full trust proxy

Preparation resources
SharePoint development in Visual Studio
Creating SharePoint 2010 site definitions in Visual Studio 2010
Developing, deploying, and monitoring sandboxed solutions in SharePoint 2010


QUESTION 1
You create a Web Part by using Microsoft Visual Studio 2010. You need to execute SPDisposeCheck.exe before the Web Part is deployed. What should you do?

A. Configure a pre-deployment command line.
B. Configure SPDisposeCheck.exe as an external tool.
C. Change the configuration from Active (Debug) to Release.
D. Change the active deployment configuration to No Activation.

Answer: A

Explanation:
MNEMONIC RULE: “before deployed = pre-deployment”
How to: Set SharePoint Deployment Commands
http://msdn.microsoft.com/en-us/library/ee231534.aspx


QUESTION 2
You have a SharePoint site collection. The root Web of the site collection has the URL http://intranet.
You plan to create a sandboxed solution that will contain a Web Part. The Web Part will display the title of the root Web.
You write the following code segment for the Web Part. (Line numbers are included for reference only.)
01 SPSite currentSite = new SPSite(“http://intranet”);
02
03 Label currentTitle = new Label();
04 currentTitle.Text = currentSite.RootWeb.Title;
You add the Web Part to a page in the root Web and receive the following error message: “Web Part Error: Unhandled exception was thrown by the sandboxed code wrapper’s Execute method in the partial trust app domain: An unexpected error has occurred.”
You need to prevent the error from occurring.
What should you do?

A. Add the following line of code at line 02: currentSite.OpenWeb();
B. Add the following line of code at line 02: currentSite.OpenWeb(“http://intranet”);
C. Change line 01 to the following code segment: SPSite currentSite = SPContext.Current.Site;
D. Change line 04 to the following code segment: currentTitle.Text = currentSite.OpenWeb().Title;

Answer: C

Explanation:
MNEMONIC RULE: “sandboxed = SPContext”
OpenWeb() method returns SPWeb object, so answers A and B are incorrect, since they assume OpenWeb()method doesn’t return an object.
Answer D is incorrect for the same reason.
This constructor is allowed in sandboxed solutions. in that case, the value of the requestUrl parameter mustresolve to the parent site collection in which the sandboxed solution is deployed. If the value of the requestUrl parameter resolves to the URL of any other site collection, the constructor throwsan exception because a sandboxed solution is not allowed to access any SharePoint objects outside its hostingsite collection.
SPSite Constructor (String) http://msdn.microsoft.com/en-us/library/ms466911.aspx


QUESTION 3
You are creating a Web Part that will be deployed as a sandboxed solution. You need to ensure that the Web Part can write debugging information to the SharePoint trace logs. Which class should the logging component inherit?

A. SPDelegate
B. SPLog
C. SPPersistedObject
D. SPProxyOperation

Answer: D

Explanation:
MNEMONIC RULE: “sandboxed solution needs SPProxyOperation”
You can implement your full-trust functionality in classes that derive from the SPProxyOperation abstract classand deploy the assembly to the global assembly cache. These classes expose a full-trust proxy that you cancall from within the sandbox environment.
Full-trust proxies can provide a useful way to expose logging and configuration functionality to sandboxedapplications.
Hybrid Approaches http://msdn.microsoft.com/en-us/library/ff798433.aspx


QUESTION 4
You need to create a Web Part that will store and retrieve information for the current subsite. Which object should you use?

A. SPContext.Current.Site.RootWeb.AllProperties
B. SPContext.Current.Site.RootWeb.Configuration
C. SPContext.Current.Web.Configuration
D. SPContext.Current.Web.Properties

Answer: D

Explanation:
MNEMONIC RULE: “information is in Web.Properties” SPContext.Current.Web is SPWeb object.
Properties is the SPPropertyBag object with the metadata for the website. SPWeb.Properties Property http://msdn.microsoft.com/en-us/library/microsoft.sharepoint.spweb.properties.aspx


QUESTION 5
You create a SharePoint solution. You deploy the SharePoint solution by using Microsoft Visual Studio 2010. You need to prevent the Feature that is contained in the solution from being automatically activated when you deploy the solution. What should you configure in Visual Studio 2010?

A. the active deployment configuration
B. the build configuration
C. the pre-deployment command line
D. the startup item

Answer: A

Explanation:
MNEMONIC RULE: “deploy the solution = active deployment configuration” How to: Edit a SharePoint Deployment Configuration http://msdn.microsoft.com/en-us/library/ee231587.aspx
Walkthrough: Creating a Custom Deployment Step for SharePoint Projects http://msdn.microsoft.com/en-us/library/ee256698.aspx

Click here to view complete Q&A of 70-573 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-573 Training at certkingdom.com

Exam 70-516 TS: Accessing Data with Microsoft .NET Framework 4

Published: September 17, 2012
Languages: English
Audiences: IT professionals
Technology: Windows Server 2012
Credit toward certification: Microsoft Certified Technology Specialist (MCTS)

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Model data (20%)
Map entities and relationships by using the Entity Data Model
Use the Visual Designer, build an Entity Data Model from an existing database, manage complex entity mappings in EDMX, edit EDM XML, map to stored procedures, create user-defined associations between entities, generate classes with inheritance and map them to tables
This objective does not include: using MetadataWorkspace
Map entities and relationships by using LINQ to SQL
Use the Visual Designer, build a LINQ to SQL model from an existing database, map to stored procedures
Create and customize entity objects
Configure changes to an Entity Framework entity, use the ADO.NET EntityObject Generator (T4), extending, self-tracking entities, snapshot change tracking, ObjectStateManager, partial classes, partial methods in the Entity Framework
Connect a POCO model to the Entity Framework
Implement the Entity Framework with persistence ignorance, user-created POCO entities
This objective does not include: use the POCO templates
Create the database from the Entity Framework model
Customize the Data Definition Language (DDL) (templates) generation process, generate scripts for a database, Entity Data Model tools
Create model-defined functions
Edit the Conceptual Schema Definition Language (CSDL), enable model-defined functions by using the EdmFunction attribute, complex types

Manage connections and context (18%)
Configure connection strings and providers
Manage connection strings, including Entity Framework connection strings; use the Configuration Manager; correctly address the Microsoft SQL Server instance; implement connection pooling; manage User Instance and AttachDBfilename; switch providers; implement multiple active result sets (MARS)
This objective does not include: use the ConnectionStringBuilder, Oracle data provider, create and use a custom provider, use third-party providers
Create and manage a data connection
Connect to a data source, close connections, maintain the life cycle of a connection
Secure a connection
Encrypt and decrypt connection strings, use Security Support Provider Interface (SSPI) or SQL Server authentication, read-only versus read/write connections
This objective does not include: Secure Sockets Layer (SSL)
Manage the DataContext and ObjectContext
Manage the life cycle of DataContext and ObjectContext, extend the DataContext and ObjectContext, support POCO
Implement eager loading
Configure loading strategy by using LazyLoadingEnabled, support lazy loading with POCO, explicitly loading entities
Cache data
DataContext and ObjectContext cache, including identity map; local data cache
This objective does not include: Velocity, SqlCacheDependency
Configure ADO.NET Data Services
Create access rules for entities, configure authorization and authentication, configure HTTP verbs

Query data (22%)
Execute a SQL query
DBCommand, DataReader, DataAdapters, DataSets, manage data retrieval by using stored procedures, use parameters, System.Data.Common namespace classes
Create a LINQ query
Syntax-based and method-based queries, join, filter, sort, group, aggregation, lambda expressions, paging, projection
This objective does not include: compile queries
Create an Entity SQL (ESQL) query
Join, filter, sort, group, aggregation, paging, use functions, query plan caching, return a reference to an entity instance, use parameters with ESQL, functionality related to EntityClient classes
Handle special data types
Query BLOBs, filestream, spatial and table-valued parameters
This objective does not include: implement data types for unstructured data, user-defined types, Common Language Runtime (CLR) types
Query XML
LINQ to XML, XmlReader, XmlDocuments, XPath
This objective does not include: XSLT, XmlWriter
Query data by using WCF.NET Data Services
Implement filtering and entitlement in WCF.NET Data Services, address resources, create a query expression, access payload formats, Data Services interceptors

Manipulate data (22%)
Create, update, or delete data by using SQL statements
Create/Update/Delete (CUD), use DataSets, call stored procedures, use parameters
Create, update, or delete data by using DataContext
CUD, call stored procedures, use parameters
This objective does not include: ObjectTrackingEnabled
Create, update, or delete data by using ObjectContext
CUD, calling stored procedures, using parameters, setting SaveOptions
Manage transactions
System.Transactions, DBTransaction, roll back a transaction, Lightweight Transaction Manager (LTM)
This objective does not include: distributed transactions, multiple updates within a transaction, multiple synchronization of data within an acidic transaction
Create disconnected objects
Create self-tracking entities in the Entity Framework, attach objects, DataSets, table adapters

Develop and deploy reliable applications (18%)
Monitor and collect performance data
Log generated SQL (ToTraceString), collect response times, implement performance counters, implement logging, implement instrumentation
Handle exceptions
Resolve data concurrency issues (handle OptimisticConcurrency exception, Refresh method), handle errors, transaction exceptions, connection exceptions, timeout exceptions, handle an exception from the Entity Framework disconnected object, security exceptions
Protect data
Encryption, digital signature, hashing, salting, least privilege
Synchronize data
Online/offline Entity Framework, synchronization services, save locally
Deploy ADO.NET components
Package and publish from Visual Studio, deploy an ADO.NET Services application, package and deploy Entity Framework metadata
This objective does not include: configure IIS, MSDeploy, MSBuild

QUESTION 1
You are developing a Microsoft .NET Framework 4 application.
You need to collect performance data to the event log after the application is deployed to the production environment.
Which two components should you include in the project? (Each correct answer presents part of the solution. Choose two.)

A. A trace listener
B. A debug listener
C. Debug.Asset() statements
D. Debug.WriteLine() statements
E. Trace.WriteLine() statements
Answer: B,C
Explanation: Tracing is a way for you to monitor the execution of your application while it is running.
Example:
For example, suppose you set up two listeners: a TextWriterTraceListener and an EventLogTraceListener. Each listener receives the same message. The TextWriterTraceListener would direct its output to a stream, and the EventLogTraceListener would direct its output to an event log.
The following example shows how to send output to the Listeners collection. C#VB
// Use this example when debugging. System.Diagnostics.Debug.WriteLine(“Error in Widget 42”);
// Use this example when tracing. System.Diagnostics.Trace.WriteLine(“Error in Widget 42”);


QUESTION 2
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an
application. The application uses the ADO.NET Entity Framework to model entities.
You need to create a database from your model.
What should you do?

A. Run the edmgen.exe tool in FullGeneration mode.
B. Run the edmgen.exe tool in FromSSDLGeneration mode.
C. Use the Update Model Wizard in Visual Studio.
D. Use the Generate Database Wizard in Visual Studio. Run the resulting script against a Microsoft SQL Server database.
Answer: D
Explanation:
To update the database, right-click the Entity Framework designer surface and choose Generate Database From Model.
The Generate Database Wizard produces a SQL script file that you can edit and execute.


QUESTION 3
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to develop an application that uses the Entity Framework. The application has an entity model that includes SalesTerritory and SalesPerson entities as shown in the following diagram.


You need to calculate the total bonus for all sales people in each sales territory.
Which code segment should you use?
A. from person in model.SalesPersons group person by person.SalesTerritory into territoriesByPerson
select new
{
SalesTerritory = territoriesByPerson.Key,
TotalBonus = territoriesByPerson.Sum(person => person.Bonus) };
B. from territory in model.SalesTerritories group territory by territory.SalesPersons into personByterritories
select new
{
SalesTerritory = personByterritories.Key,
TotalBonus = personByterritories.Key.Sum(person => person.Bonus) };
C. model.SalesPersons
.GroupBy(person => person.SalesTerritory)
.SelectMany(group => group.Key.SalesPersons)
.Sum(person => person.Bonus); D. model.SalesTerritories
.GroupBy(territory => territory.SalesPersons)
.SelectMany(group => group.Key)
.Sum(person => person.Bonus);
Answer: A


QUESTION 4
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an application. The application connects to a Microsoft SQL Server database. The application uses DataContexts to query the database.
The application meets the following requirements:
Stores customer data offline.
Allows users to update customer records while they are disconnected from the server.
Enables offline changes to be submitted back to the SQL Server by using the DataContext object.
You need to ensure that the application can detect all conflicts that occur between the offline customer information submitted to the SQL Server and the server version.
You also need to ensure that you can roll back local changes.
What should you do?

A. Add a try/catch statement around calls to the SubmitChanges method of the DataContext object and catch ChangeConflictExceptions.
B. Add a try/catch statement around calls to the SubmitChanges method of the DataContext object and catch SqlExceptions.
C. Override the Update operation of the DataContext object. Call the ExecuteDynamicUpdate method to generate the update SQL.
D. Call the SubmitChanges method of the DataContext object.
Pass System.Data.Linq.ConflictMode.ContinueOnConflict to the method.
Answer: D
Explanation:
FailOnFirstConflict Specifies that attempts to update the database should stop immediately when the first concurrency conflict error is detected.
ContinueOnConflict Specifies that all updates to the database should be tried, and that concurrency conflicts should be accumulated and returned at the end of the process. ExecuteDynamicUpdate() Method Called inside update override methods to redelegate to LINQ to SQL the task of generating and executing dynamic SQL for update operations. ConflictMode Enumeration
(http://msdn.microsoft.com/en-us/library/bb345922.aspx) DataContext.ExecuteDynamicUpdate Method (http://msdn.microsoft.com/en-us/library/system.data.linq.datacontext.executedynamicupdate.aspx)


QUESTION 5
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an
application. The application connects to a Microsoft SQL Server database. You use the ADO.NET Entity Framework to model entities.
You need to add a new type to your model that organizes scalar values within an entity.
You also need to map stored procedures for managing instances of the type.
What should you do?

A. Add the stored procedures in the SSDL file along with a Function attribute. Define a complex type in the CSDL file.
Map the stored procedure in the MSL file with a ModificationFunctionElement.
B. Add the stored procedures in the SSDL file along with a Function attribute. Define a complex type in the CSDL file.
Map the stored procedure in the MSL file with an AssociationEnd element.
C. Use the edmx designer to import the stored procedures.
Derive an entity class from the existing entity as a complex type.
Map the stored procedure in the MSL file with an AssociationEnd element. D. Add the stored procedures in the SSDL file along with a Function attribute. Derive an entity class from the existing entity as a complex type.
Map the stored procedure in the MSL file with a ModificationFunctionElement.
Answer: A
Explanation:
EndProperty Element (MSL) (http://msdn.microsoft.com/en-us/library/bb399578.aspx) AssosiationEnd Attribute (http://msdn.microsoft.com/en-us/library/cc716774.aspx)

Click here to view complete Q&A of 70-516 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-516 Training at certkingdom.com

Exam 70-515 TS: Web Applications Development with Microsoft .NET Framework 4

Published: July 2, 2010
Languages: English
Audiences: Developers
Technology: Microsoft Visual Studio 2012
Credit toward certification: MCTS, MCPD

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Developing web forms pages (19%)
Configure web forms pages
Page directives such as ViewState, request validation, event validation, MasterPageFile; ClientIDMode; using web.config; setting the html doctype
This objective does not include: referencing a master page; adding a title to a web form
Implement master pages and themes
Creating and applying themes; adding multiple content placeholders; nested master pages; control skins; passing messages between master pages; switching between themes at runtime; loading themes at run time; applying a validation schema
This objective does not include: creating a master page; basic content pages
Implement globalization
Resource files, browser files, CurrentCulture, currentUICulture, ASP:Localize
Handle page life cycle events
IsPostback, IsValid, dynamically creating controls, control availability within the page life cycle, accessing control values on postback, overriding page events
Implement caching
Data caching; page output caching; control output caching; cache dependencies; setting cache lifetimes; substitution control
This objective does not include: distributed caching (Velocity)
Manage state
Server-side technologies, for example, session and application; client-side technologies, for example, cookies and ViewState; configuring session state (in proc, state server, Microsoft SQL Server; cookieless); session state compression; persisting data by using ViewState; compressing ViewState; moving ViewState

Preparation resources
ASP.NET web pages
ASP.NET page lifecycle overview
Caching in .NET Framework applications

Developing and using web forms controls (18%)

Validate user input
Client side, server side, and via AJAX; custom validation controls; regex validation; validation groups; datatype check; jQuery validation
This objective does not include: RangeValidator and RequiredValidator
Create page layout
AssociatedControlID; Web parts; navigation controls; FileUpload controls
This objective does not include: label; placeholder, panel controls; CSS, HTML, referencing CSS files, inlining
Implement user controls
a control; adding a user control; referencing a user control; dynamically loading a user control; custom event; custom properties; setting toolbox visibility
Implement server controls
Composite controls, INamingContainer, adding a server control to the toolbox, global assembly cache, creating a custom control event, globally registering from web.config; TypeConverters
This objective does not include: postback data handler, custom databound controls, templated control
Manipulate user interface controls from code-behind
HTML encoding to avoid cross-site scripting, navigating through and manipulating the control hierarchy; FindControl; controlRenderingCompatibilityVersion; URL encoding; RenderOuterTable
This objective does not include: visibility, text, enabled properties

Preparation resources
Walkthrough: Validating user input in a web forms page
ASP.NET user controls
ASP.NET web server controls overview

Implementing client-side scripting and AJAX (16%)
Add dynamic features to a page by using JavaScript
Referencing client ID; script manager; script combining; Page.clientscript.registerclientscriptblock; Page.clientscript.registerclientscriptinclude; sys.require (scriptloader)
This objective does not include: interacting with the server; referencing JavaScript files; inlining JavaScript
Alter a page dynamically by manipulating the DOM
Using jQuery, adding, modifying, or removing page elements, adding effects, jQuery selectors
This objective does not include: AJAX
Handle JavaScript events
DOM events, custom events, handling events by using jQuery
Implement ASP.NET AJAX
Client-side templating, creating a script service, extenders (ASP.NET AJAX control toolkit), interacting with the server, Microsoft AJAX client library, custom extenders; multiple update panels; triggers; UpdatePanel.UpdateMode; timer
This objective does not include: basic update panel and progress
Implement AJAX by using jQuery
$.get, $.post, $.getJSON, $.ajax, xml, html, JavaScript Object Notation (JSON), handling return types
This objective does not include: creating a service

Preparation resources
Client script in ASP.NET web pages
Walkthrough: Creating an Ajax-enabled web site
Creating custom client events

Configuring and extending a web application (15%)
Configure authentication and authorization
Using membership, using login controls, roles, location element, protecting an area of a site or a page
This objective does not include: Windows Live; Microsoft Passport; Windows and forms authentication
Configure providers
Role, membership, personalization, aspnet_regsql.exe
This objective does not include: creating custom providers
Create and configure HttpHandlers and HttpModules
Generic handlers, asynchronous handlers, setting MIME types and other content headers, wiring modules to application events
Configure initialization and error handling
Handling Application_Start, Session_Start, and Application_BeginRequest in global.asax, capturing unhandled exceptions, custom error section of web.config, redirecting to an error page; try and catch; creating custom exceptions
Reference and configure ASMX and WCF services
Adding service reference, adding web reference, changing endpoints, wsdl.exe, svcutil.exe; updating service URL; shared WCF contracts assembly
This objective does not include: creating WCF and ASMX services
Configure projects and solutions, and reference assemblies
Local assemblies, shared assemblies (global assembly cache), web application projects, solutions, settings file, configuring a web application by using web.config or multiple .config files; assemblyinfo
Debug a web application
Remote, local, JavaScript debugging, attaching to process, logging and tracing, using local IIS, aspnet_regiis.exe
Deploy a web application
Pre-compilation, publishing methods (e.g., MSDeploy, xcopy, and FTP), deploying an MVC application
This objective does not include: application pools, IIS configuration

Preparation resources
ASP.NET authentication
HTTP handlers and HTTP modules overview
ASP.NET debugging overview

Displaying and manipulating data (19%)
Implement data-bound controls
Advanced customization of DataList, Repeater, ListView, FormsView, DetailsView, TreeView, DataPager, Chart, GridView
This objective does not include: working in design mode
Implement DataSource controls
ObjectDataSource, LinqDataSource, XmlDataSource, SqlDataSource, QueryExtender, EntityDataSource
This objective does not include: AccessDataSource, SiteMapDataSource
Query and manipulate data by using LINQ
Transforming data by using LINQ to create XML or JSON, LINQ to SQL, LINQ to entities, LINQ to objects, managing DataContext lifetime
This objective does not include: basic LINQ to SQL
Create and consume a data service
WCF, web service; server to server calls; JSON serialization, XML serialization
This objective does not include: client side, ADO.NET data services
Create and configure a dynamic data project
Dynamic data controls, custom field templates; connecting to DataContext and ObjectContext

Preparation resources
ASP.NET data-bound web server controls overview
Data source controls overview
Walkthrough: Manipulating data (Visual Basic) (LINQ to SQL)

Developing a web application by using ASP.NET MVC 2 (13%)
Create custom routes
Route constraints, route defaults, ignore routes, custom route parameters
Create controllers and actions
Visual Studio support for right-click context menus; action filters (including Authorize, AcceptVerbs, and custom) and model binders; ActionResult sub-classes
Structure an ASP.NET MVC application
Single project areas (for example, route registration, Visual Studio tooling, and inter-area links); organizing controllers into areas; shared views; content files and folders
Create and customize views
Built-in and custom HTML helpers (for example, HTML.RenderAction and HTML.RenderPartial), strongly typed views, static page checking, templated input helpers, ViewMasterPage, ViewUserControl
This objective does not include: Microsoft.Web.Mvc futures assembly

Preparation resources
ASP.NET MVC 2
Controllers and action methods in ASP.NET MVC applications
Developer Review – Four ASP.NET MVC view engines

(“lblRegion”) lblRegion.Text = Me.Region

Answer: B

Explanation:
http://www.test4pass.com/70-515-exam.html
http://pdf.it-pruefungen.de/70-515.pdf
http://www.slideshare.net/bhupey/latest-70-515-exam-braindumps


QUESTION 2
You have created an ASP.NET server control named ShoppingCart for use by other developers. Some developers report that the ShoppingCart control does not function properly with ViewState disabled. You want to ensure that all instances of the ShoppingCart control work even if ViewState is disabled. What should you do?

A. Require developers to set EnableViewStateMac to true.
B. Store state in ControlState instead of ViewState.
C. Serialize the state into an Application state entry called “MyControl”.
D. Require developers to change the session state mode to SQLServer.

Answer: B


QUESTION 3
You are implementing an ASP.NET Web site that will be accessed by an international audience. The site contains global and local resources for display elements that must be translated into the language that is selected by the user. You need to ensure that the Label control named lblCompany displays text in the users selected language from the global resource file. Which control markup should you use?

A. <asp:Label ID=”lblCompany” runat=”server” meta:resourcekey=”lblCompany” />
B. <asp:Label ID=”lblCompany” runat=”server” Text=”meta:lblCompany.Text” />
C. <asp:Label ID=”lblCompany” runat=”server” Text=”<%$ Resources:lblCompanyText %>” />
D. <asp:Label ID=”lblCompany” runat=”server”
Text=”<%$ Resources:WebResources, lblCompanyText %>” />

Answer: D


QUESTION 4
You are developing an ASP.NET Web page that contains input controls, validation controls, and a button named btnSubmit.
The page has the following code-behind. (Line numbers are included for reference only.)
01 Public Class _Default
02 Inherits System.Web.UI.Page
03
04 Protected Sub SaveToDatabase()
05
06 End Sub
07
08 Protected Sub btnSubmit_Click(ByVal sender As Object,
09 ByVal e As EventArgs) Handles btnSubmit.Click
10
11 End Sub
12
13 End Class
You need to ensure that all data that is submitted passes validation before the data is saved in a database. What should you do?

A. Add the following method override.
Protected Overrides Sub OnInit(ByVal e As EventArgs)
MyBase.OnInit(e)
If (Page.IsValid) Then Me.SaveToDatabase()
End Sub
B. Add the following method override.
Protected Overrides Sub OnLoad(ByVal e As EventArgs)
MyBase.OnLoad(e)
If (Page.IsValid) Then Me.SaveToDatabase()
End Sub
C. Add the following method override.
Protected Overrides Sub OnPreRender(ByVal e As EventArgs)
MyBase.OnPreRender(e)
If (Page.IsValid) Then Me.SaveToDatabase()
End Sub
D. Add the following code segment at line 10.
If (Page.IsValid) Then Me.SaveToDatabase()

Answer: D


QUESTION 5
You are implementing an ASP.NET application that uses data-bound GridView controls in multiple pages. You add JavaScript code to periodically update specific types of data items in these GridView controls. You need to ensure that the JavaScript code can locate the HTML elements created for each row in these GridView controls, without needing to be changed if the controls are moved from one page to another. What should you do?

A. Replace the GridView control with a ListView control.
B. Set the ClientIDMode attribute to Predictable in the web.config file.
C. Set the ClientIDRowSuffix attribute of each unique GridView control to a different value.
D. Set the @ OutputCache directives VaryByControl attribute to the ID of the GridView control.

Answer: C

Click here to view complete Q&A of 70-515 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-515 Training at certkingdom.com

Exam 70-513 TS: Windows Communication Foundation Development with Microsoft .NET Framework 4

Published: July 2, 2010
Languages: English
Audiences: Developers
Technology: Microsoft Visual Studio 2010
Credit toward certification: Microsoft Certified Technology Specialist (MCTS), Microsoft Certified Professional Developer (MCPD)

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Create services (20%)
Create service and operation contracts
One-way, duplex, and request reply; create and specify fault contracts; configuration-based contracts; expose service metadata; select serialization (for example data contract serializer versus XML serializer)
This objective does not include: design service and operation contracts; transactions, instantiation, security-related attributes
Create data contracts
Manage Known Types, control data serialization, use required and order attributes on data members, implement versioning use IExtensibleDataObject, POCOs
This objective does not include: using custom serializer (ISerializationSurrogate)
Create message contracts
Application-level styles, overriding styles, style inheritance, Generic.xaml, theming attributes
This objective does not include: data-grid view style sharing
Implement generic message handling
Create a catch-all contract, read and write messages, work with properties, work with headers
This objective does not include: inherit from Message class, use BodyWriter, create Fault messages
Implement RESTful services
Access HTTP context; WebGet/WebInvoke, UriTemplates; JSON/POX
Create and configure a Routing service
Filters, static and dynamic, context-based routing, content-based routing; router interfaces
Create and configure a Discovery service
Configure ad hoc and managed modes, Discovery scopes, service announcements

Host and configure services (18%)
Create and configure endpoints
Default and standard bindings; custom bindings created from standard binding elements; standard endpoints; transports, including HTTP, TCP, named pipes, UDP, MSMQ code-based service configuration; message encoding
This objective does not include: create a custom binding element; create new standard endpoints, load configuration from a location other than the default application configuration file, security, transaction, reliable sessions
Configure behaviors
Apply service, endpoint, and operation behaviors in configuration and code
This objective does not include: create a custom behavior; create and use dispatch behaviors, load configuration from a location other than the default application configuration file
Implement self-hosting
Configure and instantiate a service host
This objective does not include: implement a custom service host
Implement web server hosting
Configure IIS/WAS for WCF, deploy to IIS/WAS, file-less configuration, specify a ServiceHost
This objective does not include: Windows Application Server

Consume services (18%)
Create a service proxy
Use a proxy class or channel factory to create a proxy, create a proxy for an asynchronous communication, create a proxy for a duplex communication
This objective does not include: SvcUtil command-line switches
Configure client endpoints
Standard bindings, custom bindings created from standard binding elements, configure behaviors; code-based and configuration-based bindings; configure addresses
This objective does not include: security; create custom behaviors
Invoke a service
Invoke a service operation synchronously and asynchronously, handle service faults, use the Message class, manage the life cycle of the proxy (open channels, close channels, abort channels, handle faulted channels), implement duplex communication
Consume RESTful services
Access HTTP context, JSON/POX
Implement service discovery
Configure target scope, monitor service announcements

Secure services (17%)
Configure secure bindings
Transport, message, mixed mode
Configure message security
Specify protection levels on different message parts
Implement authentication
Microsoft ASP.NET Membership Provider, Custom Provider, Windows Integrated Security, certificates (X.509), Federated Authentication endpoint identity; configuring client credentials; Custom Validator
This objective does not include: Geneva Framework
Implement authorization
Role-based, claim-based; configure role providers for endpoints; principal permission attribute
This objective does not include: rights-management authorization such as Active Directory Rights Management Services (AD RMS)
Implement impersonation
Configuration and code, configure WCF-specific Internet Information Services (IIS) impersonation properties, configure impersonation options, operation-based and service-based
Implement security auditing
Use serviceSecurityAudit behavior, service audit, audit log

Manage the service instance life cycle (13%)
Manage service instances
Per call, per session, single, code and configuration, activation and deactivation, durable services, throttling
Manage sessions
Code and configuration, session management attributes, throttling, reliable sessions, transport-level and application-level sessions, invoke a callback contract
Implement transactions
Distributed transactions, transactional queues, transaction flow; configure transaction binding attributes, WS-AtomicTransaction (WS-AT), transactional behavior attributes at the service and operation level, use transactions in code
Manage concurrency
Single, multiple, and reentrant concurrency modes; SynchronizationContext and CallbackBehavior
This objective does not include: deadlocks and other multithreading issues
Manage consistency between instances, sessions, transactions, and concurrency
Possible combinations between instances, sessions, transactions, and concurrency (for example, instance mode single with concurrency mode multiple)

Monitor and troubleshoot distributed systems (13%)
Configure message logging
Configure message listeners, logging level, message filters, configure logging known PII
This objective does not include: secure message logs
Configure diagnostics
WMI, performance counters, event logging
Debug client-service interactions
Send server exception details to client, end-to-end tracing, interpret output from the trace viewer (single message and end-to-end)
This objective does not include: trace viewer features outside of viewing traces


 

QUESTION 2
You have an existing Windows Communication Foundation (WCF) service.
You need to ensure that other services are notified when the service is started.
What should you do?

A. Add the following standard endpoint to the service. <endpoint name=”udpAnnouncementEndpoint” kind=”udpDiscoveryEndpoint” />
B. Add the following standard endpoint to the service. <endpoint name=”udpDiscoveryEndpoint” kind=”udpAnnouncementEndpoint” />
C. Add a service behavior with the following element. <serviceDiscovery>
<announcementEndpoints>
<endpoint kind=”udpDiscoveryEndpoint” /> </announcementEndpoints> </serviceDiscovery>
D. Add a service behavior with the following element. <serviceDiscovery>
<announcementEndpoints>
<endpoint kind=”udpAnnouncementEndpoint” /> </announcementEndpoints> </serviceDiscovery>

Answer: D


QUESTION 3
You develop a Windows Communication Foundation (WCF) service. You enable all performance counters and run multiple calls to the service.
The service must isolate session data for each user.
You need to monitor the instancing behavior used in the service.
Which performance counter should you monitor?

A. ServiceModelService 4.0.0.0\Calls
B. ServiceModelService 4.0.0.0\Instances
C. ASP.NET State Service\State Server Sessions Active
D. ASP.NET State Service\State Server Sessions Total

Answer: B


QUESTION 4
You develop a Windows Communication Foundation (WCF) service.
You name the service MovieService in the Movie namespace. The service is hosted in Microsoft Internet Information Services (IIS).
You copy the assembly containing the service to the bin folder in the virtual directory path.
You need to set up the URI that is mapped to the service.
What should you do?

A. Add the following code segment to the web.config file. <serviceHostingEnvironment>
<serviceActivations>
odd relativeAddress=”./Movie” service=”Movie.MovieService”/> </serviceAct ivations>
</serviceHostingEnvironment>
B. Add a Movie.svc file in the root of the virtual path with the following line. <%8ServiceHost language=”C#” Service=”MovieService”*>
C. Add the following code segment to the web.config file. <serviceHostingEnvironment>
<serviceActivations>
odd relativeAddress=” . /Movie, svc” service=”Hovie.MovieService”/> </serviceActivations>
</serviceHostingEnvirorunent>
D. Add a Movie.svc file in the root of the virtual path with the following line. <%8ServiceHost language=”C#” Service=”MovieService.svc”%>

Answer: B


QUESTION 5
A Windows Communication Foundation (WCF) service that handles corporate accounting must be changed to comply with government regulations of auditing and accountability.
You need to configure the WCF service to execute under the Windows logged-on identity of the calling application.
What should you do?

A. Within the service configuration, add a serviceAuthorization behavior to the service, and set impersonateCallerForAllOperations to true.
B. Within the service configuration, add a serviceAuthenticationManager behavior to the service, and set serviceAuthenticationManagerType to Impersonate.
C. Within the service configuration, add a serviceSecurityAudit behavior to the service, and set serviceAuthorizationAuditLevel to SuccessOrFailure.
D. Within the service configuration, add a serviceCredentials behavior to the service, and set type to Impersonate.

Answer: A


QUESTION 6
A Windows Communication Foundation (WCF) solution uses the following contract to share a message across its clients. (Line numbers are included for reference only.)
01 <ServiceContract()>
02 Public Interface ITeamMessageService
03
04 <OperationContract()>
05 Function GetMessage() As String
06
07 <OperationContract()>
08 Sub PutMessage(ByVal message As String)
09 End Interface
The code for the service class is as follows.
10 Public Class TeamMessageService
11 Implements ITeamMessageService
12
13 Dim key As Guid = Guid.NewGuid()
14 Dim message As String = “Today s Message”
15
16 Public Function GetMessage() As String _
17 Implements ITeamMessageService.GetMessage
18
19 Return String.Format(“Message:{0}. Key:{1}”, message, key)
20 End Function
21
22 Public Sub PutMessage(ByVal message As String) _
23 Implements ITeamMessageService.PutMessage
24
25 Me.message = message
26 End Sub
27
28 End Class
The service is self-hosted. The hosting code is as follows.
29 Dim host As ServiceHost =
New ServiceHost(GetType(TeamMessageService)) 30 Dim binding As BasicHttpBinding =
New BasicHttpBinding(BasicHttpSecurityMode.None)
31 host.AddServiceEndpoint( “MyApplication.ITeamMessageService”, binding, “http://localhost:12345”)
32 host.Open()
You need to ensure that all clients calling GetMessage will retrieve the updated string if the message is updated by any client calling PutMessage.
What should you do?

A. Add the following attribute to the TeamMessageService class, before line 10. <ServiceBehavior(InstanceContextMode:=InstanceContextMode.Single)>
B. Add the following attribute to the TeamMessageService class, before line 10002E <ServiceBehavior(InstanceContextMode:=
InstanceContextMode.PerSession)>
C. Pass a service instance to the instancing code in line 29, as follows.
Dim host As ServiceHost = New ServiceHost(New TeamMessageService())
D. Redefine the message string in line 14, as follows. Shared message As String = “Today s Message”
E. Then change the implementation of PutMessage in lines 22-26 to the following. Public Sub PutMessage(ByVal message As String) _
Implements ITeamMessageService.PutMessage TeamMessageService.message = message End Sub

Answer: A


QUESTION 7
You are creating a Window s Communication Foundation (WCF) service application. The application needs to service many clients and requests simultaneously.
The application also needs to ensure subsequent individual client requests provide a stateful conversation.
You need to configure the service to support these requirements.
Which attribute should you add to the class that is implementing the service?

A. [ ServiceBehavior ( InstanceContextMode = InstanceContextMode.PerSession, ConcurrencyMode = ConcurrencyMode.Single )]
B. [ ServiceBehavior ( InstanceContextMode = InstanceContextMode.PerCall,
ConcurrencyMode = ConcurrencyMode.Reentrant )]
C. [ ServiceBehavior ( InstanceContextMode = InstanceContextMode.PerSession, ConcurrencyMode = ConcurrencyMode.Multiple )]
D. [ ServiceBehavior ( InstanceContextMode = InstanceContextMode.PerCall, ConcurrencyMode = ConcurrencyMode.Multiple )]

Answer: C


QUESTION 8
You are configuring services to be discoverable. The services must be discoverable without relying on a central server. Client applications that consume the services are on a network segment that is separate from the network segment that the services are located on.
A firewall blocks all TCP ports between the two network segments, but allows other protocols to pass through.
You need to ensure that the client applications can discover the services.
What should you do?

A. Use ad-hoc discovery mode over HTTP.
B. Use ad-hoc discovery mode over UDP.
C. Use managed discovery mode over HTTP.
D. Use managed discovery mode over UDP.

Answer: B

Explanation: Explanation/Reference:
Managed discovery modes are incorrect, they require central server for discovery. By default the .NET Framework contains support for Ad-Hoc discovery over the UDP protocol

Click here to view complete Q&A of 70-513 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-513 Training at certkingdom.com

Exam 70-511 TS: Windows Applications Development with Microsoft .NET Framework 4

Published: July 2, 2010
Languages: English
Audiences: Developers
Technology: Microsoft Visual Studio 2010
Credit toward certification: MCTS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Building a user interface by using basic techniques (23%)
Choose the most appropriate control class
Evaluating design requirements and then selecting the most appropriate control based on those requirements; recognizing when none of the standard controls meet requirements; item controls, menu controls, content controls
This objective does not include: designing a custom control
Implement screen layout by using nested control hierarchies
Using panel-derived controls, attaching properties
This objective does not include: items controls, control customization
Create and apply styles and theming
Application-level styles, overriding styles, style inheritance, Generic.xaml, theming attributes
This objective does not include: data-grid view style sharing
Manage reusable resources
Fonts, styles, data sources, images, resource dictionaries, resource-only DLLs
Implement an animation in WPF
Creating a storyboard; controlling timelines; controlling the behavior when the animation completes; double, color, and point animations; starting an animation from code and from XAML
This objective does not include: direct rendering updates, implementing key frame animations

Preparation resources
Styling and templating
Layout system
Animation tips and tricks

Enhancing a user interface by using advanced techniques (21%)
Manage routed events in WPF
Tunneling vs. bubbling events, handling and cancelling events
This objective does not include: simple event handling; creating custom events
Configure WPF commanding
Defining WPF commands based on RoutedCommand; associating commands to controls; handling commands; command bindings; input gestures
This objective does not include: creating custom commands by implementing ICommand
Modify the visual interface at run time
Adding/removing controls at run time; manipulating the visual tree; control life cycle; generating a template dynamically
This objective does not include: instantiating forms and simple modification of control properties at runtime
Implement user-defined controls
Deciding whether to use a user/composite, extended, or custom control; creating a user/composite control; extending from an existing control
This objective does not include: creating a custom control by inheriting directly from the control class and writing code
Create and display graphics
Creating and displaying graphics by using geometric transformation; brushes; drawing shapes; clipping; double buffering; overriding render (WPF) and OnPaint (WinForms); differentiating between retained and non-retained graphics
This objective does not include: creating and displaying three-dimensional graphics; hit testing; creating images
Add multimedia content to an application in WPF
Media player vs. media element; adding a sound player; images
This objective does not include: buffering
Create and apply control templates in WPF
Template binding
This objective does not include: styling and theming; data templating
Create data, event, and property triggers in WPF

Preparation resources
Input and commands how-to topics
Control styles and templates

Managing data at the user interface layer (23%)
Implement data binding
Binding options, static and dynamic resources, element bindings, setting the correct binding mode and update mode; binding to nullable values
This objective does not include: binding to a specific data source
Implement value converters in WPF
Implementing custom value converters, implementing multivalue converters
Implement data validation
Handling validation and providing user feedback via the error provider (WinForms) or data templates (WPF), IDataErrorInfo, validation control, form validation and control validation
Implement and consume change notification interfaces
Implementing INotifyPropertyChanged; using INotifyCollectionChanged (ObservableCollection)
Prepare collections of data for display
Filtering, sorting, and grouping data; LINQ; CollectionView (WPF), BindingSource object (WinForms)
Bind to hierarchical data
TreeView; MenuControl
Implement data-bound controls
Using the DataGridView (WinForms) or DataGrid (WPF) control to display and update the data contained in a data source, implementing complex data binding to integrate data from multiple sources; ItemsControl-derived controls (WPF)
Create a data template in WPF
Implementing a data template selector; using templates with ItemsControl

Preparation resources
Data binding (WPF)
DataGrid

Enhancing the functionality and usability of a solution (17%)
Integrate WinForms and WPF within an application
Using ElementHosts within WinForms and ControlHosts within WPF; using the PropertyMap property
Implement asynchronous processes and threading
Implementing asynchronous programming patterns; marshalling between threads; freezing UI elements; using timers; task parallel library; parallel LINQ; using the dispatcher; BackgroundWorker component
Incorporate globalization and localization features
Loading resources by locale; marking localizable elements; using culture settings in validators and converters; using language properties and rendering direction properties; working with resource files for localization; determining installed locales; regional settings
Implement drag and drop operations within and across applications
This objective does not include: Dynamic Data Exchange (DDE)
Implement security features of an application
Configuring Software Restriction Policy (SRP); full trust and partially trusted security; interoperability with legacy CAS policy; User Account Control (UAC)
Manage user and application settings
Creating application settings; creating user settings; loading and saving settings
This objective does not include: persisting to database
Implement dependency properties
Enabling data binding and animation, property metadata, property change callbacks

Preparation resources
WPF and Windows Forms interoperation
How to: Perform drag-and-drop operations between applications
Dependency properties overview

Stabilizing and releasing a solution (16%)
Implement a WPF test strategy
Automation peer, UI automation, IntelliTrace
Debug XAML by using the WPF visualizer
Accessing the visualizer, drilling down into the visual tree, viewing and changing properties
This objective does not include: setting a breakpoint and stepping through code
Debug WPF issues by using PresentationTraceSources
Animation, data binding, dependency properties
Configure a ClickOnce deployment
Configuring the installation of a WinForms, WPF, or XBAP application by using ClickOnce technology; choosing appropriate settings to manage upgrades
Create and configure a Windows installer project
Configuring a setup project to add icons during setup, setting deployment project properties, configuring conditional installation based on operating system versions, setting appropriate launch conditions based on the .NET framework version, adding custom actions to a setup project, adding error-handling code to a setup project
Configure deployment security settings
Configuring and integrating UAC by using ClickOnce deployments; setting appropriate security permissions to deploy the application

Preparation resources
Debugging WPF – WPF Tree Visualizer and helper class
PresentationTraceSources class
How to: Use ClickOnce to deploy applications that can run on multiple versions of the .NET Framework


QUESTION 1
You use Microsoft .NET Framework 4 to create a Windows Forms application.
You add a new class named Customer to the application. You select the Customer class to create a new object data source.
You add the following components to a Windows Form:
? A BindingSource component named customerBindingSource that is data-bound to the Customer object data source.
? A set of TextBox controls to display and edit the Customer object properties. Each TextBox control is data-bound to a property of the customerBindingSource component.
? An ErrorProvider component named errorProvider that validates the input values for each TextBox control.
You need to ensure that the input data for each TextBox control is automatically validated by using the ErrorProvider component.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Implement the validation rules inside the Validating event handler of each TextBox control by throwing an exception when the value is invalid.
B. Implement the validation rules inside the TextChanged event handler of each TextBox control by throwing an exception when the value is invalid.
C. Implement the validation rules inside the setter of each property of the Customer class by throwing an exception when the value is invalid.
D. Add the following code segment to the InitializeComponent method of the Windows Form.
this.errorProvider.DataSource = this.customerBindingSource;
E. Add the following code segment to the InitializeComponent method of the Windows Form.
this.errorProvider.DataSource = this.customerBindingSource.DataSource; this. errorProvider. DataMember = this. customerBindingSource. DataMember;

Answer: C,D


QUESTION 2
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application.
The application contains a ListBox control named IbxItems that is data-bound to a collection of objects. Each object has a DisplayValue property.
You add a Button control to the application.
You need to ensure that the Content property of the Button control is data-bound to the DisplayValue property of the selected item of IbxItems.
Which binding expression should you use?

A. {Binding ElementName= IbxItems, Source=SelectedItem, Path=DisplayValue}
B. {Binding Source=lbxItems, ElementName=SelectedItem, Path=DisplayValue}
C. {Binding ElementName=lbxItems, Path=SelectedItem.DisplayValue}
D. {Binding Source=lbxItems, Path=SelectedItem.DisplayValue}

Answer: C


QUESTION 3
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application.
You write the following code fragment.
< TextBox Text=”{Binding Path=StringMember} ” / >
You need to ensure that the StringMember property of the data-bound object is updated immediately when the user types in the TextBox control.
Which binding expression should you use?

A. { Binding Path=StringMember, Mode=TwoWay }
B. { Binding Path=StringMember, NotifyOnSourceUpdated=True }
C. { Binding Path-StringMember, NotifyOnTargetUpdated=True }
D. { Binding Path=StringMember, UpdateSourceTrigger=PropertyChanged }

Answer: D


QUESTION 4
You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application.
You add a ListBox control to the application. The ListBox control is data-bound to an instance of a custom collection class of the Product objects named ProductList.
The number of items of the data-bound collection is fixed. However, users can modify the properties of each of the Product objects in the collection.
You need to ensure that changes made on the Product objects are automatically reflected in the ListBox control.
What should you do?

A. Implement the INotifyPropertyChanged interface in the Product class.
B. Implement the INotifyCollectionChanged interface in the ProductList class.
C. Set the Mode property of the Binding object of the ListBox control to TwoWay.
D. Set the UpdateSourceTrigger property of the Binding object of the ListBox control to PropertyChanged.

Answer: A

Click here to view complete Q&A of 70-511 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-511 Training at certkingdom.com

Exam MB6-886 Microsoft Dynamics AX 2012 Process Manufacturing Production and Logistics

Published: March 23, 2012
Languages: English
Audiences: Information workers
Technology: Microsoft Dynamics AX 2012
Credit toward certification: MCTS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Prepare for process manufacturing (13%)
Understand process manufacturing concepts
Define process manufacturing prerequisites, differentiate between formula items and bill of materials (BOM) items, create a product at enterprise level, create and apply a product template
Set up fields related to process manufacturing
Set up fields related to catch weight, item model group, tracking dimension group, shelf life, production type, approved vendor, packaging for bulk and packed items, batch attributes, and compliance

Preparation resources
Introduction to process manufacturing production and logistics [Microsoft Dynamics AX 2012]
Setting up and maintaining batch attributes [Microsoft Dynamics AX 2012]
Setting up and maintaining bills of materials [Microsoft Dynamics AX 2012]

Manage formulas and batch orders (14%)
Understand formula concepts
Production types used in released products, difference between formula item and planning item, definition of lines and versions, access and use the Formula designer and Formula forms from different forms, use formulas and routes in multi-site production environments
Manage formula versions
Control formula versions by date, quantity, or site; create a formula with versions; use a plan group to substitute items; use step consumption functionality
Set up and enhance formula calculations
Define variances impacting batch order costing; define prerequisites for a formula calculation; set up a costing version, calculation group, cost group, or costing sheet; create and activate item prices in the costing version; allocate costs to co-products; distribute the burden for by-products
Calculate and estimate prices
Define variances that impact batch order costing, calculate cost price and sales price for formula items, open and use the Formula calculation form from different forms, review formula calculation details, perform batch order costing of planned co-products and by-products, enter and allocate costs to unplanned co-products and by-products, assign standard costing to formula items and co-products, estimate price for formula items from a sales order
Process batch orders
Define the batch order life cycle, create a batch order, process a batch order in the Batch order form; process a batch order by using the Manufacturing Execution System (MES) functionality, define the purpose and benefits of MES, explain MES registration types, clock in and clock out, start a job in batch order, report feedback about jobs in batch order, bundle jobs

Preparation resources
About formulas [Microsoft Dynamics AX 2012]
Create multiple versions of a formula [Microsoft Dynamics AX 2012]
Setting up and maintaining batch orders [Microsoft Dynamics AX 2012]

Manage master planning (12%)
Perform master planning
Set up master planning specific to process manufacturing, define prerequisites for multi-site master planning, set up multi-site master planning, set up master planning across sites within a legal entity
Perform intercompany planning
Define intercompany planning, set up an intercompany planning group, create an intercompany purchase order, create an intercompany sales order, configure intercompany direct deliveries
Plan co-products
Create and use a planning item, create and use a planning formula

Preparation resources
Master planning
About creating intercompany purchase orders or sales orders in several companies [Microsoft Dynamics AX 2012]
Setting up and maintaining co-products and by-products [Microsoft Dynamics AX 2012]

Manage containerized packaging and catch weight, and integrate with warehouse management (12%)
Set up containerized packaging
Identify purpose and benefits of containerized packaging, convert bulk items, create a formula for a packed item, identify a bulk item on a formula version
Manage consolidated orders
Identify advantages of consolidated orders, firm or consolidate a planned batch order, add a batch order to or remove a batch order from a consolidated batch order, process consolidated batch orders, review the consolidated on-hand inventory
Set up catch weight items
Define preconditions for catch weight items, set up a catch weight item, set up a partial visibility or full visibility catch weight item
Create catch weight transactions
Create a purchase agreement, sales agreement, purchase order, or sales order in a catch weight unit; enter a delivery schedule on the purchase order line or sales order line in a catch weight unit; create a supply forecast in a catch weight unit; view net requirements in a catch weight unit; view pegging requirements in planned orders in a catch weight unit; create shipment staging or output orders in a catch weight unit; view on-hand inventory for a catch weight item
Incorporate catch weight in advanced warehouse management functions
Configure catch weight products for use with advanced warehouse management functions, perform inbound and outbound processes using catch weight units
Manage reservations in advanced warehouse management functions
Set up for reservation in process manufacturing, reservation principles specific to process manufacturing, sort reservations in the shipment process, reserve inventory specific to process manufacturing, set up automatic batch reservation

Preparation resources
Setting up and maintaining consolidated batch orders [Microsoft Dynamics AX 2012]
Setting up and maintaining catch weight items [Microsoft Dynamics AX 2012]
Set up warehouse reservations [Microsoft Dynamics AX 2012]

Manage lot and batch control and batch attributes (11%)
Manage batch disposition codes
Define prerequisites for batch disposition codes, set up prerequisites for batch disposition codes, configure a batch disposition code, define batch disposition master fields, reset a batch disposition code
Configure shelf life for items
Set shelf advice, shelf life, and best before dates; process shelf life-related queries; update shelf advice, expiry date, and best before dates; set up shelf life in master planning; configure customer sellable days; plan First Expiry-First Out (FEFO) date–controlled formula items
Create and maintain batch attributes
Create a batch attribute, add values to an enumerate type batch attribute, update a batch attribute, create a batch attribute group
Assign batch attributes
Assign product-specific or customer-specific batch attributes, reserve batches by attributes

Preparation resources
Create a batch disposition code [Microsoft Dynamics AX 2012]
Set up an item as a shelf life item [Microsoft Dynamics AX 2012]
Assign batch attributes to a potency item [Microsoft Dynamics AX 2012]

Manage vendor information (10%)
Set up and maintain approved vendors for products
Set up an Approved Vendor List (AVL) in the item model group, set up an AVL check method, authorize approved vendors, add an approved vendor to an item, delete an approved vendor from an item, change the effective date or expiration date for an approved vendor
View and validate approved vendor information
View approved vendors by item, view approved vendors in various modules and forms, view approved vendor expiration, inquire on an approved vendor’s items in various forms

Preparation resources
Setting up and maintaining approved vendors [Microsoft Dynamics AX 2012]
Approved vendor list configuration key (PdsAVL) [Microsoft Dynamics AX 2012]
Working with approved vendors [Microsoft Dynamics AX 2012]

Manage commodity pricing (10%)
Set up commodity pricing
Set up commodity pricing default parameters, set up commodity pricing in the inventory and warehouse management parameters
Set up a pricing calculation for a commodity item
Define the commodity pricing cycle, create price and margin data, create a pricing template, use a quantity and margin template, calculate the cost and sales price of an item

Preparation resources
Setting up and maintaining commodity pricing [Microsoft Dynamics AX 2012]
Set up commodity cost basis pricing for a pricing calculation [Microsoft Dynamics AX 2012]
Set up commodity pricing default parameters [Microsoft Dynamics AX 2012]

Manage product compliance (10%)
Set up and maintain product compliance
Define product compliance terms, set up for product compliance, set up restricted products, set up regulated products, set up a product safety data sheet (PSDS)
Implement product compliance
Associate product compliance to released products, validate PSDS information in purchase orders and sales orders

Preparation resources
Setting up and maintaining product compliance [Microsoft Dynamics AX 2012]
Set up product compliance parameters [Microsoft Dynamics AX 2012]
Product compliance configuration key (PdsMRC) [Microsoft Dynamics AX 2012]

Manage rebates (9%)
Set up rebates and rebate groups
Define the rebate process cycle, define prerequisites for rebates, set up rebates, set up rebate program types
Create rebate groups
Create customer rebate groups, create customer Trade and Merchandising Allowance (TMA) groups, create item freight groups, create item rebate groups
Create rebate agreements
Create a rebate agreement based on customer and item relationships, create a rebate agreement based on customer and item rebate groups
Set up rebate processing
Define the rebate process cycle, cumulate rebates, approve rebates, process rebates, purge rebates

Preparation resources
Create a customer rebate group [Microsoft Dynamics AX 2012]
Create a customer rebate agreement [Microsoft Dynamics AX 2012]
Rebates configuration key (PdsRebate) [Microsoft Dynamics AX 2012]

 


QUESTION 1
Which of the following statements about implementing product compliance in Microsoft Dynamics AX 2012 are true? (Each correct answer is a complete solution. Choose three.)

A. Regulated products can be defined in Microsoft Dynamics AX 2012.
B. Safety data sheets can be created in Microsoft Dynamics AX 2012.
C. Restricted products can be defined in Microsoft Dynamics AX 2012.
D. Safety data sheets can be stored in Microsoft Dynamics AX 2012.

Answer: A,B,C


QUESTION 2
A customer requests information about the physical and chemical properties of a product and the recommended precautions for handling storage and disposal of the product. Which of the following should you provide to the customer?

A. Restricted products regional list
B. product safety data sheet
C. product attributes list
D. Regulated products regional list

Answer: B


QUESTION 3
You are implementing product compliance in Microsoft Dynamics AX 2012. What is the purpose of the Archive directory as it relates to document handling?

A. to define the archive criteria
B. to describe the type of documents stored
C. to define the file type
D. to define the path to the document storage location

Answer: D


QUESTION 4
You need to ensure that a notification is sent to the compliance manager when a sales order is entered for a product if the corresponding product safety data sheet has expired. Which product compliance parameter should you set?

A. Expiry advice interval in purchase
B. Expiry advice interval in sales
C. Expiry in purchase
D. Expiry In sales

Answer: D


QUESTION 5
In Microsoft Dynamics AX 2012which of the following describes a reported product?

A. An item that requires continuous compliance.
B. An item that is sourced through intercompany planning.
C. An item with distribution that is limited or constrained by a government authority.
D. An item that is regulated by national regional and local authorities.

Answer: D

Click here to view complete Q&A of MB6-886 exam

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MB6-886 Training at certkingdom.com

5 ways, shore, security, BYOD strategy

Ask most computer pros to talk about IT security, and you’ll likely hear about all sorts of external threats, like malware, hackers, spyware, DOS attacks and the like. But what if the bigger – and more costly – threat comes from within?

The now infamous Ashley Madison website has had a pretty successful run at helping its clientele be disloyal. So perhaps some would view it as poetic justice if the website became one of the most scandalous breaches in history at the hands of one of its own.

At least that is the conclusion of IT security analyst John McAfee, who noted recently “yes, it is true. Ashley Madison was not hacked – the data was stolen by a woman operating on her own who worked for Avid Life Media.”

If true, the fact that the Ashley Madison breach was due to an internal, and not external, threat shouldn’t come as too big a surprise. Many IT security studies this year have pointed to the growing threat of insider data theft and corporate breaches.

In some cases, insider threats can be more financially damaging and more difficult to defend against. After all, external threats involve someone trying to break in. The insider threat already has the keys to the front door and knows where the family jewels are stored.

Still, external and internal threats often share one key motive – the desire to profit from data. With external threats, hackers are traditionally looking to steal data that they can sell in the black market. With internal threats, the incident may involve an employee – or former employee – looking to cash in on something they developed or strategic information that competitors want.

That was the case this January in Boston, when the Proctor & Gamble Company filed suit against four former Gillette Company employees, accusing them of wrongfully using and disclosing confidential information and trade secrets to a direct competitor.

In July, an employee of Merit Health Northwest Mississippi was accused of removing patient information from the facility over a two year period without authorization. The employee reportedly stole patient names, addresses, dates of birth, Social Security numbers, health plan information and clinical information, all for the purpose of identity theft.

Perhaps the most difficult to defend against is the disgruntled employee, notes Jane LeClair, chief operating officer at the National Cybersecurity Institute, which tracks data breach incidents. One might be tempted to think the NCI spends the lion’s share of its time on external data breaches, but insider threats have become a top concern.

“Insider threats are something that most organizations don’t have a terribly high focus on today,” LeClair believes. “I think there is a lot to be done in that area. We, as Americans, are really a very trusting people. So it’s hard for a lot of organizations – especially smaller organizations – [to view employees as a primary threat].”

Obviously most aren’t. But enough are, or could be, that employers need to be looking over both shoulders – one facing outside and the other in, LeClair indicates.

“In many cases, when we talk insider threat, the person may no longer be with the company – so if you add that piece to the definition you can see why it becomes pretty big; much bigger than people probably think about,” LeClair notes. “People who leave may be angry or frustrated, or are laid off. You can understand why the company wants to get them out quickly because they can have that need for revenge in some cases.”

Or they may still be with the company but are disengaged.
“They feel unappreciated or unfulfilled. They are hard workers but they don’t feel that the organization is appreciating them or recognizing them, or perhaps not paying them what they feel they’re worth. That’s another level of dissatisfaction that is very frequently thought about. I would say that’s probably one of the bigger reasons.”

Then there is a relatively new insider threat which may prove to be among the most dangerous – the politically motivated perpetrator.

“I’ve always looked at from the human perspective,” explains Candy Alexander, an IT security consultant and former chief information security officer. “It’s important to note if you are a security person or an IT person to pay attention to what is going on in our society with current events. It will be reflected into the electronic world. In our society and culture today there is a lot of intolerance for lots of things. We’re seeing that through sorts of events.”

A different moral compass

Could social conscious be a motivating factor in the Ashley Madison case? It’s still too early to tell, but some IT security experts tell CIO that it is certainly possible.

Since word of the Ashley Madison breach broke in July, many IT security experts and forensics professionals began debating the source of the attack, which revealed the email addresses of millions of account holders and site visitors. Many immediately suspected an insider threat, since the culprit(s) seemed to know too much about the firm’s technology.

Clearly some individual, or individuals, had an all access pass to the company’s systems.

Accidental exposure

Many top IT security experts believe that the most common form of insider data threat is that of accidental exposure – an employee unintentionally and unwittingly creating a vulnerable situation or allowing data to be accessed. That certainly accounts for many threat incidents.

“All companies are going to have the possibility of this occurring because accidents do commonly occur, and I do believe that accidental exposure is much more common than intentional harm,” explains Meg Anderson, chief information security officer at Principal Financial Group.

“So lack of awareness is one cause of accidents – such as lost laptops, misdirected email, even paper reports that are still walking out of companies,” Anderson says. “Those are relatively small incidents. But we also have data on all kinds of new devices now, so we’ve added possibilities of iPhones being hacked, tablets, etc.” They all run the risk of financial loss, fines, lost customers, plus the potential loss of reputation.

Insider threats also vary depending on what the organization does and the type of data it collects, Anderson says.

“There are a lot of scenarios and I think a lot of it depends on the organization. You cannot discount financial gain. There are going to be insiders that want to make money on your data and on your intellectual property. It could involve insider trading – having authorized access and passing that along to somebody else. “

“The third thing I can think of is that a lot of times employees think that they own what they work on while they’re at work. One thing that is often compromised is source code – programmers thinking they own their source code. They may also be temporary contract employees that work for us. They take that code from company to company, because you do reuse code, and it makes sense to them that it is their property.”

Still, Anderson agrees that it the disgruntled employee that probably poses the greatest theat.

“When we talk about intentional damage it could be far more impactful because it’s less likely to be noticed and it also could go on for some time – a ‘slow flow’ sort of approach,” Anderson says.

To spot a thief

So how do you spot the potential data thief in your midst?

It starts with observing behavior, notes Ganesan (Ravi) Ravishanker, CIO at Wellesley College, in Massachusetts.

“We do the usual best practices,” Ravishanker says. “Most of us rely on the annual audit. We create the best practice controls and do the best we can. We also rely on the business units to partner with us to be able to develop controls, to develop reports; we do have very comprehensive reports that we generate on which users have access to what data. That gets adjusted because people’s roles change. We need to make sure that we keep people’s access as limited as possible.”

But technology is only part of the solution. It is equally important is to watch for changes in user behavior, Ravishanker says.

“One of the big things is really looking at changes in employee behavior,” LeClair agrees. “Maybe their work performance is dropping off or they’re arriving later. Conceivably it could even be better work performance in that they’re grabbing data. Or behavior toward other employees might be something that you notice.”

Finally, in addition to all the best security practices that an organization should focus on, the bottom line is how well the organization treats its workers.

“The thing I feel best about is that we have a Best Place to Work, and it’s on the Best Place to Work list for a reason,” Anderson concludes. “I do think that if you have fully engaged employees that feel appreciated and that their work is being recognized, they are less likely to feel that they want to commit crime on the job.”

Click here to view complete Q&A of 70-642 exam

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 70-642 Training at certkingdom.com

 

Privacy settings smackdown: Facebook vs. Twitter vs. LinkedIn vs. Google+

Hey, control freak, here’s how the top 4 social networks let you manage your privacy.

Not all privacy settings are created equal
Nearly three-quarters of people with access to the Internet use social networking sites, a number that has skyrocketed since early 2005, according to the Pew Research Center. As social networks continue to permeate our everyday lives, so do the privacy and security risks associated with our accounts.

Here’s a look at how Facebook, Twitter, LinkedIn and Google+ stack up on user privacy and security settings, plus instructions for finding and updating these options to maintain control over your account. And if you prefer your privacy comparisons on one page, here they are in one handy chart.

Limits profile visibility upon sign-up
Facebook: Facebook’s default privacy setting for new users is set to Friends Only. To review or update this, visit Settings > Privacy > Who can see your future posts?

Twitter: By default, your posts are public. The only privacy setting to limit the audience of your tweets is to set your profile to Protected, which means only followers you approve will see your tweets. Settings > Security and privacy > Privacy > Tweet Privacy > Protect my Tweets.

LinkedIn: By default, your profile is public. To change this: Settings > Account > Helpful Links > Edit your public profile. You can choose to make your public profile visible to no one, or pick and choose which details you’d like to display.

Google+: By default, your posts are public. To change this setting, type the name of a Circle in the “To” field below your post before you publish it. More on audience selection here.
control how users can search for you 2

Control how people can search for you
Facebook: Facebook lets others find your profile by searching for your email address and phone number. To change this, visit Settings > Privacy > Who can look me up? Click Edit next to the email address and phone number options.

Twitter: Settings > Security and privacy > Privacy > Discoverability. Check or uncheck the email address and phone number options, then click Save.

LinkedIn: Privacy & Settings > Profile > Privacy Controls > Manage who can discover you by your phone number.

Control who can connect with you
Facebook: By default, anyone can add you as a friend on Facebook. To change this, visit Settings > Privacy > Who can contact me.

Twitter: You cannot choose who can connect with you; anyone can follow your posts. If your profile is protected, you will have to approve users on an individual basis.

LinkedIn: Privacy & Settings > Communications > Member Communications > Select who can send you invitations.

Control whether people can message you
Facebook: Messages may appear in two folders: your inbox and “other” folder. To control which messages appear in your inbox, visit Settings > Privacy > Who can contact me. Then, click Edit next to “Whose messages do I want filtered into my Inbox?”

Twitter: By default, you can receive Direct Messages from anyone you follow, and you can opt to allow anyone to send you a Direct Message. But you cannot turn off Direct Messages. See the Twitter Help Center for more on Direct Messages.

LinkedIn: Privacy & Settings > Communications > Member Communications > Select the types of messages you’re willing to receive. You cannot disable all messages.

Control who can see your connections
Facebook: From your profile, click the Friends tab, then click the pencil icon next to Friend Requests and Find Friends. This set of options lets you choose who can see your friend list, people you follow and who follows you.

Prevent users from tagging you in posts
Facebook: Settings > Timeline and Tagging > How can I manage tags people add and tagging suggestions? The three options in this section let you apply settings for reviewing tags and audiences.

Twitter: You cannot prevent users from tagging you in a Twitter message.

LinkedIn: You cannot prevent users from tagging you in a post on LinkedIn, but you can delete the mention by moving your cursor over the linked name and clicking “remove”.

Block users
Facebook: Settings > Blocking > Block users. Then, add the user’s name or email address and click Block.

Twitter: Visit the user’s profile, then click the gear icon on their page. Select Block from the menu, then click Block to confirm. You can view and manage the accounts you have blocked here: https://twitter.com/settings/blocked.

LinkedIn: Visit the user’s profile and select “Block or Report” from the drop-down menu at the top of the profile summary.

Google+: Search for the user you want to block. On their profile, click the drop-down menu next to their name. Click Report/block, check the box next to Block, then click Done. Google will block them within 24 hours. For more on blocking, read Google+ Help.

Opt out of photo tagging
Facebook: You cannot opt out of photo tagging, but you can review when friends tag you before it appears on your timeline. Settings > Timeline and Tagging > Who can add things to my timeline. Switch the second option to On.

Twitter: Settings > Security and privacy > Privacy > Photo tagging. Then click Save Changes at the bottom.

LinkedIn: LinkedIn does not support photo tagging.
Google+: You cannot opt out of photo tagging, but you can manage automatically approved tags. Settings > Photos and Videos. At the bottom of this section, type in the people whose tags of you are automatically approved to be added to the “Photos of you” section of your profile.

Disable facial recognition
Facebook: Settings > Timeline and Tagging > How can I manage tags people add and tagging suggestions? Then, click Edit next to “Who sees tag suggestions when photos that look like you are uploaded?”

LinkedIn: LinkedIn does not use facial recognition.
Google+: Settings > Photos and Videos, then uncheck the box next to “Find my face in photos and videos and prompt people I know to tag me.” For more on how Find my Face works, see Google+ Help.
opt out of search engine indexing 10
See larger image
Image courtesy ITworld/Stephen Sauer
Opt out of search engine indexing

Facebook: By default, Facebook will let search engines link to your timeline. To opt out, visit Settings > Privacy > Who can look me up, then click Edit next to “Do you want other search engines to link to your timeline?”

Review recent logins
Google+: To receive an alert if Google suspects suspicious activity on your Google Account (which includes Google+), open Gmail. Click Details below “Last account activity” at the bottom-right of the page. Click Change next to “Alert preference” and select “Show an alert for unusual activity.”

Twitter: To enable login verifications: Settings > Security and privacy > Security > Login verification, then click Save Changes at the bottom.

Facebook: To review which applications you’ve granted access to your account, visit Settings > Apps. To remove an app you no longer use, hover over it and click the X to delete it.

Turn off location tracking
Facebook: For iOS devices, go to Settings, then tap Privacy > Location Services. Scroll to find Facebook, then adjust the settings. For Android, go to your phone’s Settings > Location services, then turn off “Access to my location.” You may lose access to some Facebook features if you turn off location services.

Twitter: From the desktop, visit Settings > Security and privacy > Privacy > Tweet location. Click Save Changes at the bottom.

Delete location information
Facebook: Visit your Activity Log > Location History. You may need to click More on the left-side navigation to find it. Then, click Clear Location History at the top or remove individual posts.

Manage advertising
Facebook: Hover over an ad in your Facebook feed and click the drop-down menu. From here, you can remove it from your feed or hide all ads from that particular company. To view and manage your ad preferences, which determine the types of ads you see, select “Why am I seeing this?” from the menu, then click “Manage Your Ad Preferences.” This page will let you add and remove advertisers based on category.

Opt out of all advertising
Facebook: You cannot opt out of all advertising on Facebook, but you can opt out of social ads. These ads may indicate that you’ve liked a page. To opt out, visit Settings > Ads > Ads and Friends. Next to “Pair my social actions with ads for,” choose “No one.”

Twitter: You cannot opt out of all advertising on Twitter. You can turn off tailored ads, which will prevent Twitter from matching your account to information shared by ad partners. Settings > Security and privacy > Privacy > Promoted content. Uncheck the box and click Save.

LinkedIn: You cannot opt out of all advertising on LinkedIn. You can disable the use of cookies and similar technologies on third-party sites that target ads: Privacy & Settings > Account > Privacy Controls > Manage Advertising Preferences.

Google+: You cannot opt out of all advertising on Google+ or throughout your Google Account, but you can opt out of interest-based ads. See the Ads Help page for more on how to opt out and what it does and
Delete your account
Facebook: Follow the instructions in Facebook’s Help Center to permanently delete your Facebook account.

Twitter: Settings > Account. At the bottom of the page, click Deactivate my account. This puts your account in a queue for permanent deletion.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Microsoft Exam 70-668, PRO: Microsoft SharePoint 2010, Administrator – See more at:

Microsoft MCTS 70-668
PRO: Microsoft SharePoint 2010, Administrator

Examination Details:
This certificate examination is all about Administrating Microsoft SharePoint. This certification was originated on July 12, 2010 and designed in different languages such as English, Japanese, Portuguese, German and French. It’s developed mainly for IT professionals who want to develop their career.

Audience Profile
Candidates for this exam are required to design and deploy SharePoint Online and on-premise SharePoint. The candidates can be senior administrators who act as the technical hear over a group of administrators. Applicants with minimum of two of experience of deployment, managing, administering, upgrading, designing and migrating are ideal.

Candidates are mainly required to plan, design, and maintain:
Infrastructure capacity
Disaster recovery and availability
Physical topologies and services architecture
Migration, coexistence, and upgrade
Farm performance and availability
Information architecture
Security and compliance requirements
Information search strategy integration
Deployment of Client application services

Applicants should have a deep understanding of:
Windows Power-Shell scripting
Performance concepts and Server availability
Authentication methods and Security concepts
Windows Server 2008
Active Directory administration
Networking infrastructure services (DNS and IIS)

Skills to be measured:
The applicants will be tested on the following topics. However, this is not an exhaustive list of topics and they might change and questions other than these areas can also be asked to evaluate the candidate’s knowledge.

Designing SharePoint’s Farm Topology (27 percent)
Designing a physical architecture.
Designing SharePoint integration with network infrastructure.
Designing logical taxonomy.
Planning for sandbox solutions.
Planning for farm deployment.
Planning for availability.

Planning SharePoint’s Deployment (26 percent)
Planning service applications.
Planning a SharePoint component strategy.
Planning an upgrade strategy.
Designing a migration strategy.
Designing security architecture.
Planning and deploying authentication methods.

Defining SharePoint’s Business Continuity and Operations Strategy (25 percent)
Designing a maintenance strategy.
Recommending provisioning strategies.
Establishing enterprise monitoring plan.
Planning SharePoint backup and restore.

Planning for Business Solutions (22 percent)
Defining search requirements.
Planning search topology.
Planning an enterprise search strategy.
Planning enterprise content management.
Planning for social computing and collaboration.
Planning for a business intelligence strategy

Preparation:
Microsoft offers an array of training resources. From classroom training to online sessions, they have it all. You can join forums, newsgroups and chats to take peers advice and talk to certified Microsoft professionals if you have any doubts regarding the course. Take up practice test to analyze where you stand and determine your weak areas. Microsoft recommends that you purchase the study material for clearing the exam with a high score. You will not be disappointed after purchasing the material which comes with money back guarantee.

 


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

The Big Question Rises How To Become Microsoft, Cisco, ComTIA Certified

The big question rises how to become the Microsoft certified , All Microsoft certifications are acquired by simply taking a series of exams. If you can self-study for said exams, and then pass them, then you can acquire the certification for the mere cost of the exam (and maybe whatever self-study materials you purchase).

You’ll also need, at minimum (in addition to the MCTS), the CompTIA A+, Network+ and Security+ certs; as well as the Cisco CCNA cert.

Microsoft Certified Technology Specialist (MCTS) – This is the basic entry point of Microsoft Certifications. You only need to pass a single certification test to be considered an MCTS and there are numerous different courses and certifications that would grant you this after passing one. If you are shooting for some of the higher certifications that will be discussed below, then you’ll get this on your way there.

Microsoft Certified Professional Developer (MCPD) – This certification was Microsoft’s previous “Developer Certification” meaning that this was the highest certification that was offered that consisted strictly of development-related material. Receiving it involved passing four exams within specific areas (based on the focus of your certification). You can find the complete list of courses and paths required for the MCPD here.

Microsoft Certified Solutions Developer (MCSD) – This is Microsoft’s most recent “Developer Certification” which will replace the MCPD Certification (which is being deprecated / retired in July of 2013). The MCSD focuses within three major areas of very recent Microsoft development technologies and would likely be the best to persue if you wanted to focus on current and emerging skills that will be relevant in the coming years. You can find the complete list of courses and paths required for the MCSD here.

The Microsoft Certifications that you listed are basically all of the major ones within the realm of development. I’ll cover each of the major ones and what they are :

Most people, however, take some kind of course. Some colleges — especially career and some community colleges — offer such courses (though usually they’re non-credit). Other providers of such courses are private… some of them Microsoft Certified vendors of one type or another, who offer the courses in such settings as sitting around a conference table in their offices. Still others specialize in Microsoft certification training, and so have nice classrooms set up in their offices.

There are also some online (and other forms of distance learning) courses to help prepare for the exams.

The cost of taking classes to prepare can vary wildly. Some are actually free (or very nearly so), while others can cost hundreds of dollars. It all just depends on the provider.

And here’s a Google search of MCTS training resources (which can be mind-numbing in their sheer numbers and types, so be careful what you choose):

There are some pretty good, yet relatively inexpensive, ways to get vendor certificate training. Be careful not to sign-up for something expensive and involved when something cheaper — like subscribing to an “all the certificates you care to study for one flat rate” web site — would, in addition to purchasing a study guide or two at a bookstore, likely be better.

If you want a career in IT, then you need to have both an accredited degree in same (preferably a bachelors over an associates), and also a variety of IT certifications. The MCTS is but one that you will need.

You should probably also get the Microsoft MCSE and/or MCSA. The ICS CISSP. And the ITIL.

There are others, but if you have those, you’ll be evidencing a broad range of IT expertise that will be useful, generally. Then, in addition, if the particular IT job in which you end-up requires additional specialist certification, then you can get that, too (hopefully at the expense of your employer who requires it of you).

Then, whenever (if ever) you’re interested in a masters in IT, here’s something really cool of which you should be aware…

There’s a big (and fully-accredited, fully-legitimate) university in Australia which has partnered with Microsoft and several other vendors to structure distance learning degrees which include various certifications; and in which degrees, considerable amounts of credit may be earned simply by acquiring said certifications. It’s WAY cool.

One can, for example, get up to half of the credit toward a Masters degree in information technology by simply getting an MCSE (though the exams which make it up must be certain ones which correspond with the university’s courses). I’ve always said that if one were going to get an MCSE, first consult the web site of this university and make sure that one takes the specific MCSE exams that this school requires so that if ever one later decided to enter said school’s masters program, one will have already earned up to half its degree’s credits by simply having the MCSE under his/her belt. Is that cool, or what?

I wouldn’t rely on them over experience (which is far and away the most valuable asset out there) but they are worth pursuing especially if you don’t feel like you have enough experience and need to demonstrate that you have the necessary skills to land a position as a developer.

If you are going to pursue a certification, I would recommend going after the MCSD (Web Applications Track) as it is a very recent certification that focuses on several emerging technologies that will still be very relevant (if not more-so) in the coming years. You’ll pick up the MCTS along the way and then you’ll have both of those under your belt. MCPD would be very difficult to achieve based on the short time constraints (passing four quite difficult tests within just a few months is feasible, but I don’t believe that it is worth it since it will be “retired” soon after).

No job experience at all is necessary for any of the Microsoft Certifications, you can take them at any time as long as you feel confident enough with the materials of the specific exam you should be fine. The tests are quite difficult by most standards and typically cover large amounts of material, but with what it sounds like a good bit of time to study and prepare you should be fine.

Certifications, in addition to degrees, are so important in the IT field, now, that one may almost no longer get a job in that field without both. The certifications, though, are so important that one who has a little IT experience can get a pretty good job even without a degree as long as he has all the right certs. But don’t do that. Definitely get the degree… and not merely an associates. Get the bachelors in IT; and make sure it’s from a “regionally” accredited school.

Then get the certs I mentioned (being mindful, if you think you’ll ever get an IT masters, to take the specific exams that that Strut masters program requires so that you’ll have already earned up to half the credit just from the certs).

If you already have two years of experience in working in the .NET environment, a certification isn’t going to guarantee that you will get employed, a salary increase or any other bonuses for achieving the honor. However, it can help supplement your resume by indicating that you are familiar with specific technologies enough to apply them in real-world applications to solve problems.

If your ready for career change and looking for Microsoft MCTS Training, Microsoft MCITP Training or any other Microsoft Certification preparation get the best online training from Certkingdom.com they offer all Microsoft, Cisco, Comptia certification exams training in just one Unlimited Life Time Access Pack, included self study training kits including, Q&A, Study Guides, Testing Engines, Videos, Audio, Preparation Labs for over 2000+ exams, save your money on boot camps, training institutes, It’s also save your traveling and time. All training materials are “Guaranteed” to pass your exams and get you certified on the fist attempt, due to best training they become no1 site 2012.

MCTS Training, MCITP Trainnig

Best Microsoft MTA Certification, Microsoft MCTS Training at certkingdom.com

A Hotels in Malta Theme. Designed by Malta Hotel and Malta Hotels