Monday, January 30, 2012

640-802 Q & A / Study Guide / Testing Engine

MCTS Certification, MCITP Certification

Microsoft CCNA Certification, CCNA Training and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


QUESTION 1
Refer to the exhibit. What could be possible causes for the "Serial0/0 is down" interface status?
(Choose two.)
A. A Layer 1 problem exists.
B. The bandwidth is set too low.
C. A protocol mismatch exists
D. An incorrect cable is being used.
E. There is an incorrect IP address on the Serial 0/0 interface.
Answer: A,D
Explanation:


QUESTION 2
Before installing a new, upgraded version of the IOS, what should be checked on the router, and
which command should be used to gather this information? (Choose two.)
A. the amount of available ROM
B. the amount of available flash and RAM memory
C. the version of the bootstrap software present on the router
D. show version
E. show processes
F. show running-config
Answer: B,D
Explanation:


QUESTION 3
Refer to the exhibit. Which two statements are true about interVLAN routing in the topology that is
shown in the exhibit? (Choose two.)
A. Host E and host F use the same IP gateway address.
B. Router1 and Switch2 should be connected via a crossover cable.
C. Router1 will not play a role in communications between host A and host D.
D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces.
E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit.
F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using
the same encapsulation type.
Answer: D,F
Explanation:


QUESTION 4
Refer to the exhibit. Which two statements are true about the loopback address that is configured
on RouterB? (Choose two.)
A. It ensures that data will be forwarded by RouterB.
B. It provides stability for the OSPF process on RouterB.
C. It specifies that the router ID for RouterB should be 10.0.0.1.
D. It decreases the metric for routes that are advertised from RouterB.
E. It indicates that RouterB should be elected the DR for the LAN.
Answer: B,C
Explanation:


QUESTION 5
If you are a network administrator, how will you explain VTP configuration to a new technician?
(Choose three.)
A. In the VTP client mode, a switch is unable to update its local VLAN database.
B. Configure a trunk link between the switches to forward VTP updates.
C. In the VTP server mode, a switch is able to update a switch in the VTP transparent mode.
D. In the VTP transparent mode, a switch will forward the received updates to other switches.
E. A switch in the VTP server mode only updates switches in the VTP client mode that have a
higher VTP revision number.
F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the
configured VTP domain membership.
Answer: A,B,D
Explanation:
VTP operates in one of three modes:
Server - In this VTP mode you can create, remove, and modify VLANs. You can also set other
configuration options like the VTP version and also turn on/off VTP pruning for the entire VTP
domain. VTP servers advertise their VLAN configuration to other switches in the same VTP
domain and synchronize their VLAN configuration with other switches based on messages
received over trunk links. VTP server is the default mode. The VLANs information are stored on
NVRAM and they are not lost after a reboot.
Client - VTP clients behave the same way as VTP servers, but you cannot create, change, or
delete VLANs on the local device. In VTP client mode, VLAN configurations are not saved in
NVRAM.


QUESTION 6
Cisco IOS (originally Internetwork Operating System) is the software used on the vast majority of
Cisco Systems routers and all current Cisco network switches. Which two of the following devices
could you configure as a source for the IOS image in the boot system command? (Choose two.)
A. RAM
B. NVRAM
C. flash memory
D. HTTP server
E. TFTP server
F. Telnet server
Answer: C,E
Explanation:


QUESTION 7
What are two reasons a network administrator would use CDP? (Choose two.)
A. to obtain VLAN information from directly connected switches
B. to determine the status of network services on a remote device
C. to determine the status of the routing protocols between directly connected routers
D. to verify the type of cable interconnecting two devices
E. to verify Layer 2 connectivity between two devices when Layer 3 fails
F. to obtain the IP address of a connected device in order to telnet to the device
Answer: E,F
Explanation:
Cisco Discovery Protocol (CDP) is primarily used to obtain protocol addresses of neighboring
devices and discover the platform of those devices. CDP can also be used to show information
about the interfaces your router uses. CDP is an independent media protocol and runs on all
Cisco-manufactured devices including routers, bridges, access servers, and switches. It should be
noted that CDP is a protocol which works on the layer2. By default, multicast advertise is sent
every 60 seconds to 01-00-0 c-cc-cc-cc as the destination address . When reaching the holdtime
of 180 seconds , if not receiving the advertise from neighboring devices yet, the information of
neighboring devices will be cleared.
Cisco Discovery Protocol (CDP) is a proprietary protocol designed by Cisco to help administrators
collect information about both locally attached and remote devices. By using CDP, you can gather
hardware and protocol information about neighbor devices, which is useful info for troubleshooting
and documenting the network.
You can use:
Show cdp neighbor
Show cdp neighbor details
Commands to gather the information of connected neighbors.


QUESTION 8
Refer to the exhibit. Both switches are using a default configuration. Which two destination
addresses will host 4 use to send data to host 1? (Choose two.)
A. the IP address of host 1
B. the IP address of host 4
C. the MAC address of host 1
D. the MAC address of host 4
E. the MAC address of the Fa0/0 interface of the R1 router
F. the MAC address of the Fa0/1 interface of the R1 router
Answer: A,F
Explanation:


QUESTION 9
Exhibit:
Refer to the exhibit. The router has been configured with these commands:
What are the two results of this configuration? (Choose two.)
A. The default route should have a next hop address of 64.100.0.3.
B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing.
C. The address of the subnet segment with the WWW server will support seven more servers.
D. The addressing scheme allows users on the Internet to access the WWW server.
E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internet
without address translation.
Answer: D,E
Explanation:
Since the hosts on the Fast Ethernet 0/1 network are using private RFC 1918 IP addressing
(192.168.10.0/24) their IP addresses will need to be translated into a publicly routable address in
order to access the Internet. However, the server is using the 198.133.219.9 IP address, which is
publicly routable and so Internet users can indeed access this server (assuming that the
198.133.219.9 IP address has been correctly assigned to the network)


QUESTION 10
Your Company has installed IP phones. Both the phones and the office computers connect to the
same device. The phone traffic and the office computer data traffic must be on different networks
to ensure maximum throughput for the phone data. Which network device can be best connected
to the phones and computers, and which technology will be performed on this device? (Choose
two.)
A. hub
B. router
C. switch
D. stp
E. subinterfaces
F. VLAN
Answer: C,F
Explanation:
You can configure VLANs on the switch to distinguish two types of data traffic.

MCTS Certification, MCITP Certification

Microsoft CCNA Certification, CCNA Training and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

Monday, January 23, 2012

Satisfy Your Counterintelligence Training Requirement With An Intelligence Degree Online

Counterintelligence is a necessity in the military, the government, and, in a slightly different form, in business. Counterintelligence serves an important purpose for military, government, and business entities because it offers an important defensive function. Those defensive functions involve security and counterespionage. Accordingly, counterintelligence operations will generally involve security investigations, investigations into financial records, individual profiling, and other methods to both catch spies and discourage treason.

MCTS Certification, MCITP Certification

Microsoft CCNA Certification, CCNA Training and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Counterintelligence is obviously a sophisticated field that requires appropriate education and training. Indeed, advanced training in the area of counterintelligence is indicated by the nuanced and difficult fact that a major target of counterintelligence is foreign intelligence services. The aim of targeting a foreign intelligence service is to analyze its processes so it can eventually be modeled. Once the intelligence process has been modeled it can be approached in a manner that allows the opposite intelligence service the upper hand in any future dealings with that foreign entity. Therefore, counterintelligence workers will have to apply their methodologies to discover secrets that are actively being kept secret.


The approach to counterintelligence discussed by Clark is a rather innovative approach to counterintelligence work. Counterintelligence traditionally focused on a defensive denial and deception. Clark, however, proposed an offensive approach that included covert action, denial, and deception, but it also included the application of the opposing intelligence service's model so it can be used as a way of defeating the opponent.

Just from this cursory description, it is apparent that counterintelligence requires proper counterintelligence training. Appropriate counterintelligence training does not only have to be on-the-job training, however. Conceivably, it would be of great utility that the employee seeking work in this field comes to the job with background in the process of the counterintelligence field and perhaps other relevant knowledge. Indeed, it would be difficult to obtain the broad understanding of the field while also gaining an understanding of the "target's" political, economic, and military status and other nuances on an entry level.


That is why counterintelligence training is so important. One can earn a counterintelligence degree or a closely related degree, such as an intelligence degree online, to satisfy such a training requirement. Earning a counterintelligence degree would provide a substantial amount of training on the processes of counterintelligence, and it would expose the student to other developments in the counterintelligence field and closely related fields.

The value of counterintelligence training is growing. That value is a direct result of the need for skilled intelligence workers. The value of an intelligence degree online or a counterintelligence degree that is obtained online is similar to the value a criminal justice degree brings to advanced law enforcement work or a cyber security degree brings to computer security work. These degrees help the person learn important aspects of the profession, such as traditional strengths and weakness common to the field. The degree programs also expose the person to current literature in the field so the person can remain current on important issues, and so they can add to the fund of knowledge in the field.

The value of an intelligence degree online or a counterintelligence degree that is obtained online cannot be understated. Counterintelligence training that is gained from formal education will advance the security interests of one's employer while also advancing one's career.

Sunday, January 22, 2012

Apple's new vision of education

On Thursday, Apple made it clear that one of the next industries it hopes to disrupt and reinvent is education. It's an arena the company has a long history of working with: schools have been one of Apple's biggest market since the days of the Apple II.

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com



While there have been pilot projects and full-scale deployments of the iPad as an educational tool, you can't say yet that it has truly revolutionized learning. While it's made researching information, viewing video, and working with interactive content more portable and more tactile, for mainstream education, many of those tasks have been available to desktops and laptops in the classroom for a generation.

Now, Apple has clearly set its sights on making the iPad a more fundamental part of the school experience -- and is out to transform that experience in the process.
iBooks 2

The newest version of iBooks offers students of all ages something that's more than the sum of its parts. In many ways, it simply consolidates all the learning tools technology had already brought to the classroom - audio and video, electronic texts, interactive quizzes, searchable indexes and glossaries, and the age-old ability to highlight and notate text for future reference. But, as Apple products often do, iBooks 2 not only consolidates features but pares them back to focus on the actual task at hand: learning.

This is what makes iBooks 2 and the handful of textbooks already available in the iBookstore unique among the many education tools that have come across computer screens over the past 30-plus years. There are features centered around the task of absorbing information, each tackling a subtly different way of learning -- visually through static and interactive graphics, by reading text, and through video clips. In typical Apple fashion, there are no unneeded bells and whistles.

The ability to highlight and take notes right in the text of a digital book is great by itself, and it certainly works better than scribbling in the margins or having to use a separate notebook because someone else will get the textbook during the next school year. Apple kept that feature relatively basic and focused on function. The ability to use notes as study cards is as simple and minimalist as it effective.

Having worked with schools and colleges for a decade as a technology professional, I'm most struck by the fact that no part of the iBooks 2 textbook interface is dumbed down or gimmicky. The experience respects that students are growing up as digital natives and don't need any Fisher-Price styling to learn. Instead, Apple stuck to its core minimalist aesthetic; the result brilliantly lets the content and the lessons take center stage, which makes the act of learning more effective and engaging.
iBooks Author

From my initial experience with Apple's new iBooks Author tool, I can say that the simplicity and effectiveness is astounding. Having worked with teachers and professors to develop digital curriculums (and having prepared and taught such cirriculae myself), iBooks Author makes the process surprisingly painless. While some might compare it to Apple's iWork, the closest analog I see is the company's now defunct iWeb application.

For educators and others interested in self-distribution of ebooks rather than sales through Apple's iBookstore, there's an option to simply export your books. Students and others can then use iTunes on a computer to add the book to their iPad, or it can be sent via email.

While Apple played up the one-click publishing option to the iBookstore, the process does require some legwork before you can get to that single click. As with selling anything in the iTunes Store, the process requires applying for and creating an account to sell through and appears to require that any books be submitted with an ISBN number. It also requires creating a sample version of your book.

If you're considering iBooks Author as a way of self-publishing, you should be aware that Apple's end user license agreement is particularly restrictive. It stipulates that although users can distribute ebooks created with iBooks Author outside of Apple's iBookstore, they can't do so for a fee or as part of subscription service. It also states that Apple will take its standard 30% cut of sales through the iBookstore and reserves the right to deny distribution of ebooks for any reason it sees fit. How Apple will enforce this isn't clear.

It also isn't clear how this will impact sales of the same content packaged outside of iBooks Author. What happens if you use a Word document as the source for both iBooks Author and other tools for distribution to Amazon's Kindle or Barnes & Noble's Nook stores, or create a limited print run sold on consignment to independent bookstores?
iTunes U

I've always been a fan of iTunes U. It's a great service for adults looking to informally continue their education and pursue interests and passions. It's also an amazing professional development tool for virtually any career. My biggest complaints have always been that isn't particularly easy to locate specific courses and that the sheer volume of downloaded audio and/or video is massive.

The new iTunes U app addresses those to complaints by offering an iBook-like storefront where you can search, browse, and rate courses and by offering the option of streaming or downloading lectures and related material. In fact, the entire app is very much like iBooks.

The brilliant part of iTunes U's relaunch is that it isn't limited to just lecture recordings. The entire syllabus of a course including assignments, reading material, references, and other easily available resources. That helps put the lecture portions in context and it takes iTunes U from hobbyist tool to being a complete learning and professional development solution. About the only thing this new format doesn't offer is credit for courses that you take (or, more accurately, audit) - though I wouldn't put it past Apple to work with at least one or two universities to offer credit through iTunes U.

So far, only a limited number of courses use all of the potential new features of iTunes U. That said, they are well worth checking out, both to get acquainted with the app and to learn about the topics that interest you. Personally, I can't wait to get started with the Open Yale Astronomy: Frontiers and Controversies course.

All previous iTunes U lectures are also available in the new app. You can easily differentiate lecture-only courses that take full advantage of new iTunes U features by the spiral-bound notebook icon in the iTunes U Catalog, as well as from their descriptions.

For schools and educators interested in creating courses, there's a relatively straightforward application process (which needs to be completed from a school-wide perspective) and a series of web-based creation and management tools.
Can Apple re-invent education?

Apple's new education tools are revolutionary, both in concept and in execution. The question, however, is whether Apple can reinvent how we learn (and teach) just as it changed the music and home entertainment industries or how we think about and use smartphones and other mobile devices.

I can only speak from a U.S. education perspective, but my years of working with public, private and special needs schools -- as well as community colleges and universities -- leaves me a bit skeptical that Apple can pull off an education revolution.

Public school districts in the U.S. will face big challenges trying to turn Apple's vision into reality. Even though some may succeed, there are many that can't -- lagely for financial reasons. School districts across the country are cutting programs, laying off teachers and staff, consolidating classes and even closing schools in an effort to make do with less money. The economy is making it difficult for schools to meet their financial needs through property taxes and with many cities and states facing major budget shortfalls, there may not be enough money for many districts to even contemplate investing in iPads and digital textbooks.

One of the challenges for districts is the need to provide equal access for all students. That means shouldering the burden of investing in iPads and digital textbook copies. There's an argument to be made that in time, they'll save money on replacing textbooks, but many middle and high school subjects are evergreen - algebra and geometry don't change much. Neither do foreign languages. That means those books can be reused year after year and even shared between students.

Then there's the challenge -- even where money is available -- of rolling out new teaching methods and technologies. The revolt among teachers and the teachers' union in Idaho against state-wide technology requirements in the classroom shows the resistance that remains to modernizing teaching in public schools. This issue alone may prove insurmountable in some communities.

There's also the issue of choosing textbooks. That includes not just selecting the texts a district or given teacher wants. There are regulatory issues that involve administration decisions and state-wide requirements when it comes to instructional materials and syllabi.

Implementation, of course, goes beyond just buying the iPads. Schools will also need the IT resources to deploy, manage, and support them. In poorer or rural schools, even on-campus Wi-Fi may not be an option, to say nothing about purchasing a mobile device management solution. IT departments will also need to work hand-in-hand with teachers to get them up to speed and comfortable with using iPads in the classroom.

Even in the most prepared districts, getting all the pieces -- human and technical-- in place and thoroughly tested will take time. Few districts are likely to get everything in place for the next school year. Many would be lucky to even get a pilot project with a handful of teachers and students in place by then.

Overall, Apple may be able to lead the way here, but it's going to be a long process.
Private schools - iPad and digital heaven

Private schools will most definitely have an easier time implementing iPads and digital textbooks. Private schools are funded by tuition and other fund-raising options like private grants, alumni membership fees and donations. Private schools also have the option of setting and requiring that supplies and materials be purchased by the families of students. That option can offset the cost of digital textbooks, and even iPads, if the cost isn't bundled into student tuition.

Private schools also have more operational freedom than public schools. While they still must adhere to government-mandated syllabi, they have a good deal of freedom when it comes to texts, materials and teaching methods to meet those requirements and are free to include their own additional curricula.

This means there will be far fewer barriers to entry when it comes to Apple's vision of digital learning. It also means that teachers have more flexibility in structuring lessons and more opportunities for professional development. And that should help ease a transition to the iPad and digital textbooks, as well as encourage creation of class and school-specific resources like textbooks and iTunes U programs.
Higher Education

Although Apple included the new iTunes U app in this week's announcement, there was little focus on higher education. This may be in part because technology use in higher education is a different ballgame than in K-12 schools. Students are expected to provide their own devices and manage them and their course work themselves.

While there is certainly a place in colleges and universities for digital textbooks, a much broader selection of texts and reference sources is available to faculty members, who often devise their own syllabus, lectures, assignments and materials. The iBookstore isn't likely to deliver the same cost advantage at colleges as it might for high school students. Even with partnerships with the major textbook vendors, Apple may not be able to keep costs down to acceptable levels. Indeed, a recent study in The Chronicle of Higher Education indicates that electronic texts don't generate significant cost savings to students.

That said, both iBooks Author and the ability to create and manage an iTunes U course have a lot of potential for higher education. In particular, the ability to distribute ebooks that are class-specific and private to a department or school may be particularly attractive.

It's also worth noting that Apple faces different competition in the higher education textbook arena, including college bookstores.
Continuing ed and professional development

As noted earlier, iTunes U is an amazing resource for adult learners and people looking to update or advance existing professional skills. For them, the revamped iTunes U is a potential goldmine. The combination of lectures, texts and related resources will give anyone access to a classroom experience. The new face of iTunes U also benefits Apple in that supporting material like books, apps and audiovisual content will be available though its various storefronts.

Lifelong learning may be one of the most incredible and yet easily overlooked achievements in Apple's vision of 21st century education. The company is making all of this learning content and tools available to virtually anyone, anywhere and at impressively low costs.

While Apple's education efforts will directly or indirectly affect how future generations learn as they grow up, perhaps the biggest feat is removing barriers to knowledge and supporting multiple learning styles from childhood through adulthood.

Thursday, January 19, 2012

Feds charge 7 in 'massive' case against Megaupload online piracy ring

A day after thousands of websites went on strike protesting controversial anti-piracy legislation in the U.S., federal authorities today announced they have busted a pirate ring that allegedly hauled in $175 million.

MCTS Certification, MCITP Certification

Microsoft CCNA Certification, CCNA Training and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Seven individuals and two companies were charged with multiple counts of racketeering, copyright infringement, and money laundering, the U.S. Department of Justice (DOJ) said in a statement.

The two companies -- Megaupload Limited and Vestor Limited -- operated sites under the Megaupload name, including megaupload.com from servers located in the U.S., Canada and the Netherlands.

According to federal officials, the gang generated $175 million in revenue from advertising sales and premium memberships, and caused more than $500 million in damages to the legitimate copyright holders.

Among the pirated content the Megaupload sites distributed were movies, television programs, music, e-books and business and entertainment software.

"This action is among the largest criminal copyright cases ever brought by the United States," the DOJ said in a statement Thursday. Prosecutors also called the Megaupload group "an international organized criminal enterprise allegedly responsible for massive worldwide online piracy."

Of the seven men indicted by a Virginia grand jury earlier this month, four were arrested today in New Zealand by local authorities. The three others -- who live in Estonia, Germany and Slovakia -- remain at large.

Alongside today's arrests, the FBI also seized $50 million in Megaupload assets, and served 20 search warrants in the U.S. and elsewhere to grab the servers used by the websites.

A U.S. District Court also ordered the seizure of 18 domain names belonging to Megaupload.

According to the grand jury's indictment, Megaupload.com was seeing 50 million visitors daily and accounted for 4% of all Internet traffic.

The Alexa site ranking service currently lists the site as the seventy-second-largest in the world. Over the last three months, the site's visitors averaged 1.4% of all Internet users.

Today's arrests followed on the heels of a widespread "Internet strike" Wednesday, when thousands of sites, including Google and Wikipedia, went partially or completely dark in protest against the Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA).

Those bills -- drafted by the U.S. House of Representatives and the U.S. Senate, respectively -- are designed to make it easier for copyright holders to take down foreign websites that distribute pirated movies, music and software. Opponents, however, have argued that the legislation will give content owners too much power.

The seven men each face a maximum of 55 years in prison if convicted on all counts.

Tuesday, January 17, 2012

SAP buys training software from Germany-based Datango

SAP has acquired software from Datango that will allow it to add multilingual online help and training materials to enterprise software applications.

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com



The move will broaden SAP's software training portfolio and could help its customers cut support costs through improved user training.

The Datango software makes it easier for enterprises to create documentation, classroom training presentations, e-learning materials and online help, which can then be translated into more than 40 languages at the click of a button, according to Datango's website.

A typical Datango training session might introduce users to a new application with a demo to explain its features, then allow them to practice what they saw in a simulated environment before performing specific tasks in the simulated environment with direct feedback. Datango's software can also show users the correct operating steps in a separate window that runs on top of the live system and add context-sensitive information to help users.

The end result should be fewer support calls and less time spent correcting errors, according to Datango.

SAP isn't providing much information on how it will use Datango's software, saying only that the two companies will capitalize on a trend toward creating applications with self-help and auto-teaching functions, it said.

SAP said it had acquired software and related assets from Datango, but didn't say whether any Datango employees are covered by the deal. The transaction, for an undisclosed sum, is scheduled to close by the end of March.

Saturday, January 14, 2012

Rise in number of students getting a first or 2:1

The number of firsts and 2:1s awarded by UK universities has continued to rise, now accounting for almost two thirds of undergraduates completing their first degree.

MCTS Certification, MCITP Certification

Microsoft CCNA Certification, CCNA Training and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


This is among the facts established in new data from by the Higher Education Statistics Agency, which show that the proportion who gained a first or upper second “has shown a steady increase from 60 per cent in 2006-07 to 64 per cent in 2010-11”.

The figures also show that women scored better than men, with 66 per cent of their first degree classifications being firsts or 2:1s, compared to 61 per cent for men.

The overall number of student enrolments stood at 2,501,295 in 2010-11, according to Hesa, showing no percentage change from the previous year.

Postgraduate enrolments rose 2 per cent between 2009-10 and 2010-11.

The total number of first year undergraduate enrolments, meanwhile, stood at 1,145,970, a fall of 3 per cent on the year before.

While the number of full-time first-year enrolments showed no percentage change, part-time first-year enrolments fell by 8 per cent.

That may concern universities with large numbers of part-time students, as many observers believe the higher fee regime to be introduced this autumn will lead to a further fall in part-time numbers.

There was a significant rise in the number of student enrolments from outside the European Union (up 6 per cent), while the number of UK-domiciled students fell from 2,087,615 to 2,073,070, a 1 per cent decrease.

The data also show a sharp increase in the number of students studying wholly overseas for UK qualifications, up from 408,685 to 503,795.

Friday, January 13, 2012

HP extends access to Paul McCartney's digital library to the public

Paul McCartney’s digital library of music, photos and much more is now available to the public with help from HP.

For the first time, Hewlett-Packard is opening up access to the public for Paul McCartney’s digital treasure trove of both professional and personal multimedia content.

Cisco CCNA Training, Cisco CCNA Certification

Best HP Certification Training and HP Exams Training and more Cisco exams log in to Certkingdom.com



The online portal, which could be considered the first of its kind, is a hub for the former Beatle’s extensive library of digital music, lyrics, photos, collections, merchandise, blogs and more. Visitors to the site can get a tour and see a few items for free, but full access requires a premium (meaning, paid) membership.

HP built the digital library last year after being approached by McCartney’s team. Originally, the cloud-based digital library was intended solely for McCartney’s use.

At the time, it raised questions as to whether or not the content would be made public, and if this could open up a potential new revenue option for both cloud providers and the music industry.

Now, it looks like both of those possibilities are coming true. There are probably few musicians that have the kind of wealth of media content that McCartney does.

But this could definitely provide the music industry, which continuously needs to look up for new ways to make money in the face of piracy, with an innovative way to strengthen fan bases.

Wednesday, January 11, 2012

LTE explodes at CES

LTE has exploded at this week's Consumer Electronics Show, where the three top U.S. wireless carriers and dozens of other vendors are showing off how they plan to use the high-speed technology with new smartphones, tablets and even ATM's.

MCTS Certification, MCITP Certification

Best IBM Certification Training and IBM Exams Training and more Cisco exams log in to examkingdom.com



Alcatel-Lucent, which supplies LTE switches to the carriers, manned a booth showing several high-tech examples of how LTE wireless technology can support consumers, industry and government, such as providing police departments with the ability to transmit high definition, real-time video and data on crime suspects to officers in patrol cars.

The company also showed how video cameras installed inside police vehicles and connected by LTE to a cloud data respository can scan a crowd of people with facial recognition software or target license plates to identify car owners.

Alcatel-Lucent also displayed a utility vehicle, called Striker1, that was equipped with wireless bridging equipment designed to help police and fire personnel using different different radio frequencies frequencies to communicate with each other as well as with smartphones and tablets over IP, said Wayne Eveland, an Alcatel-Lucent engineer and former captain in the New Jersey State Police.

The Paris-based telecommunications firm also showed how inexpensive (compared to ruggedized laptops) Android tablets mounted inside a vehicle can use LTE to be a primary interface to the cloud. A plumber or utility worker could transmit to a remote expert a video image of a utility switching box and highlight with a finger or stylus where trouble had occurred.

Jason Collins, vice president of emerging technology at Alcatel Lucent, said Striker1 and other technologies displayed in its booth are designed to show how carriers and third party vendors can use LTE technology to improve practical applications.

The demonstrations were created based on the work of Alcatel-Lucent's NG Connect Program, a collaboration of 125 companies.

Much of the LTE news at CES centered on how well the carriers and infrastructure providers are working with a wide variety of partners to show potential users the benefist of faster wireless connections, especially for video communications and fast transfer of rich data content.

Of the three biggest U.S. carriers, Verizon Wireless has the biggest head start with 4G LTE networks operating in some 200 cities. The LTE networks offer average download speeds of more than 10Mbps, or about 10 times faster than predecessor 3G speeds.

Verizon's booth offered CES attendees a look at many demonstrations, including a Diebold ATM machine that uses bandwidth-rich LTE to send and receive live video, along with features that can help reduce theft and better help out customers.

Verizon and Samsung also jointly announced at CES that the Galaxy Tab 10.1, which runs over the Verizon 4G LTE network, has been certified that it meets Federal Information Processing Standard (FIPS) specifications, opening its use to financial professionals and government workers whose work requires the FIPS security gold star.

In a panel discussion on wireless innovation, John Stratton, president of Verizon's Enterprise Solutions Group, said that independent developers are working with Verizon's innovation centers in San Francisco and near Boston to develop new mobile applications.

AT&T, which runs LTE networks in 26 cities, announced five Android smartphones and a tablet that use LTE, as well as two Windows Phone 7.5-based smartphones at CES. AT&T also set up an Application Programming Interface platform with tools for independent developers.

Sprint, the first carrier to launch a 4G wireless technology on Wimax, said it will have LTE networks in 11 cities by mid-year.

Sprint also announced at CES that it plans to offer 15 devices, including the Android 4.0-based Samsung Galaxy Nexus smartphone, for its LTE networks. The Sprint devices will include particulars such as a Google Wallet application that works in point-of-sale applications with Near Field Communication technology.

Verizon Wireless sells the Galaxy Nexus with NFC but Google Wallet point-of-sales purchasing does not function over that network.

Sprint product managers were quick to acknowledge that while they lag behind Verizon and AT&T on LTE rollouts, its suppport for Google Wallet and other features, and its unique applications will give it a quick edge with consumers.

Fareed Adib, vice president of product development at Sprint, contended that the company can match Verizon and AT&T in innovation and support of independent developers.

"We've got one of the oldest carrier-developer communities, but now the focus has shifted and is really about getting apps to market faster with tools to support that," Adib said.

T-Mobile USA, which lost momentum when its planned $39 billion merger with AT&T collapsed in December under the weight of government concerns, has focused on continuing to build out its 4G HSPA+ network.

T-Mobile USA CEO Philipp Humm told reporters at a CES gathering that "T-Mobile is back," though analysts said the future of the carrier will ultimately depend on what parent firm Deustche Telekom wants to do with the U.S. subsidiary.

Some observers have speculated for months that T-Mobile will still be be sold off.

Saturday, January 7, 2012

70-432 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

QUESTION 4
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance. The SQL Server 2008 instance hosts quite a few applications. ABC also has a server
named ABC-SR43 that is used to store log files.
You have to set up a new job that stores log files on ABC-SR43. You create a new account
ABC\Log_Account. You set it up to be run by the SQL Server Agent Services.
However, your job fails to store any log files on ABC-SR43. After some investigation you notice
that the job does not have permissions to store files on ABC-SR43.
How should you remedy the situation? Select the best option.

A. You should set up ABC\Log_Accoun as a Remote Service account.
B. You should set up ABC\Log_Accoun as a Domain service account.
C. You should set up ABC\Log_Accoun as a Local Service account.
D. You should set up ABC\Log_Accoun as a Local System account.
E. You should set up ABC\Log_Accoun as a Network Service account.
F. You should set up ABC\Log_Account as a Domain account.

Answer: F

Explanation:
The service startup account defines the Microsoft Windows account in which SQL Server Agent
runs and its network permissions. SQL Server Agent runs as a specified user account. For
compatibility with earlier versions of SQL Server, SQL Server Agent can also run as the Local
System account.
In this scenario you should select a Domain account, which allows sufficient permissions and
improved security.


QUESTION 5
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance that has a table named ABC_Training. ABC_ Training contains a column named
ABC_Distance. A new Certkingdom.com training policy states that the training (ie. The ABC_Distance
column in the ABC_Training table) cannot be increased or decreased by more than 3%.
How should you implement the ABC Training Policy?

A. You should consider developing a view which rolls back non-compliant Certkingdom.com policy
changes to ABC_Distance.
B. You should consider developing a stored procedure which rolls back non-compliant Certkingdom.com
policy compliant changes to the ABC_Distance column.
C. You should consider developing a primary key constraint to the ABC_training table which only
contains valid values on ABC_Distance.
D. You should consider developing a create trigger which rolls back non-compliant Certkingdom.com
policy changes to the ABC_Distance column.
E. You should consider developing an update trigger which rolls back non-compliant Certkingdom.com
policy changes to the ABC_Distance column.
F. You should consider developing a delete trigger which rolls back non-compliant Certkingdom.com policy
changes to the ABC_Distance column.

Answer: E

Explanation:


QUESTION 6
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance that contains a database named ABC_DB. Certkingdom.com contains a lot of customer data
which is processed by the Web application. You need to keep the customer information safe since
it is confidential. This information includes files of data, backups, and log files.
How can this be achieved and still keep the performance and functionality of the web application?
Select one or two.

A. You should consider adding a transaction Log on ABC_DB, and set the information to be
encrypted for a fixed time.
B. Use BitLocker Drive Encryption on the hard drives on the SQL Server.
C. Use EFS (Encrypting File System) on the hard drives on the SQL Server.
D. You should consider enabling the Transparent Database Encryption on ABC_DB and back up
the transaction log.
E. You should consider enabling the Transparent Database Encryption on ABC_DB and enabling
the Transparent Database Encryption on master database.
F. Use cell-level encryption for the specific data that needs to be kept safe.

Answer: D

Explanation:
With the introduction of transparent data encryption (TDE) in SQL Server 2008, users now have
the choice between cell-level encryption as in SQL Server 2005, full database-level encryption by
using TDE, or the file-level encryption options provided by Windows. TDE is the optimal choice for
bulk encryption to meet regulatory compliance or corporate data security standards. TDE works at
the file level, which is similar to two Windows® features: the Encrypting File System (EFS) and
BitLocker™ Drive Encryption, the new volume-level encryption introduced in Windows Vista®,
both of which also encrypt data on the hard drive. TDE does not replace cell-level encryption,
EFS, or BitLocker.


QUESTION 7
You work as a database administrator at Certkingdom.com. Certkingdom.com is using two SQL Server 2008
sample named ABCSmp1 and ABCSmp2. Furthermore, ABCSmp1 contains a database named
ABC_DB. A Certkingdom.com user named Mia Hamm uses her logon MiaHamm to log on to the database
on ABCSmp1. During the week you have transferred ABC_DB to ABCSmp2. You manually
recreate the Mia Hamm login on ABCSmp2. However, when she tries to login on ABC_DB at
ABCSmp2, she received an error message stating that she is not allowed access. Mia Hamm
needs to access ABC_DB and you need to make it happen.
What T-SQL code should you use? (Each correct option is part of the answer. Choose TWO)

A. Use Certkingdom.com;
B. Use ABC_DB; *
C. Use ABCSmp1;
D. Use ABCSmp2;
E. ALTER LOGIN MiaHamm WITH DEFAULT_DATABASE = ABC_DB;
F. CHANGE LOGIN MiaHamm WITH DEFAULT_DATABASE = ABC_DB;
G. ALTER LOGIN MiaHamm WITH PASSWORD = 'pwd1234' UNLOCK;
H. CHANGE LOGIN MiaHamm WITH PASSWORD = 'pwd1234' UNLOCK;
I. CHANGE USER MiaHamm WITH LOGIN = MiaHamm;
J. ALTER USER MiaHamm WITH LOGIN = MiaHamm; *
K. ALTER LOGIN MiaHamm ENABLE;
L. CHANGE LOGIN MiaHamm ENABLE;

Answer: B,J

Explanation:


QUESTION 8
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008 instance.
Your junior assistant is curious about on how to move a table, such as ABC_table, from its current
scheme (scheme1) to another scheme (scheme2)
How can you accomplish this in T-SQL?

A. You should consider using the following:
ALTER TABLE Schema1.ABC_Table SWITCH TO Schema2.ABC_table;

B. You should consider using the following:
ALTER AUTHORIZATION ON Schema1.ABC_Table TO Schema2;

C. You should consider using the following:
ALTER SCHEMA schema2 TRANSFER schema1.ABC_table;

D. You should consider using the following:
ALTER SCHEMA schema1 TRANSFER schema2.ABC_table;

E. You should consider using the following:
ALTER USER Schema1 WITH DEFAULT_SCHEMA = Schema2;

F. You should consider using the following:
MOVE ABC_Table FROM SCHEMA schema1 TO schema2

G. You should consider using the following:
MOVE ABC_Table FROM schema1 TO schema2

Answer: C

Explanation:
ALTER SCHEMA can only be used to move securables between schemas in the same database.
To change or drop a securable within a schema, use the ALTER or DROP statement specific to
that securable.


QUESTION 9
You work as a database administrator at Certkingdom.com. Certkingdom.com is using a SQL Server 2008
instance. You have received instructions from management to allow the users at Certkingdom.com on the
SQL Server sample to use the OPENROWSET() function to search remote information sources.
You study incomplete code in the exhibit carefully. (Line numbers are used for reference purposes only)
Exhibit:
01. sp_configure 'show advanced options', 1
02. RECONFIGURE
03.
04. RECONFIGURE
05. GO
06.
07. SELECT a.*
08. FROM OPENROWSET('SQLNCLI', 'Server=Madrid;Trusted_Connection=yes;',
09. 'SELECT GroupName, Name, DepartmentID
10. FROM AdventureWorks.HumanResources.Department
11. ORDER BY GroupName, Name') AS a;
12. GO
Which T-SQL statement should you insert at line 03 to make the batch meet the requirement in
this scenario?

A. sp_configure 'Router control', 1
B. sp_configure 'Router control', 0
C. sp_configure 'Transaction Logs', 1
D. sp_configure 'Transaction Logs', 0
E. sp_configure 'Ad Lib Distributed Queries ', 1
F. sp_configure 'Ad Lib Distributed Queries ', 0
G. sp_configure 'Ad Hoc Distributed Queries', 1
H. sp_configure 'Ad Hoc Distributed Queries', 0

Answer: G

Explanation:
By default, SQL Server does not allow ad hoc distributed queries using OPENROWSET and
OPENDATASOURCE. When this option is set to 1, SQL Server allows ad hoc access. When this
option is not set or is set to 0, SQL Server does not allow ad hoc access.
Ad hoc distributed queries use the OPENROWSET and OPENDATASOURCE functions to
connect to remote data sources that use OLE DB. OPENROWSET and OPENDATASOURCE
should be used only to reference OLE DB data sources that are accessed infrequently. For any
data sources that will be accessed more than several times, define a linked server.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Friday, January 6, 2012

Knoa Software - managing end user experience

Knoa Software focuses on helping organizations observe and manage application performance, end user experience, process optimization and user behavior that may indicate a security threat.

MCTS Certification, MCITP Certification

Best Oracle Certification Training and Oracle Exams Training and more Cisco exams log in to examkingdom.com



Organizations often have a patchwork quilt of management software. Some of this software addresses the need to manage the basic hardware infrastructure. Other tools are needed to address needs of the operating systems, the virtual machine software, database software, application frameworks and applications. While these tools make it possible to monitor the back end of a distributed computing workload, they don’t really address the end-to-end experience staff and customers have. Knoa Software’s CEO, Thad Eidman, took some time this week to discuss the problems many organizations have and how his company is addressing them.

Eidman suggests that end user performance management tools need to be able to address the following issues:

Application performance
Overall performance for the entire user environment
Process optimization
Threat management (by watching user behavior over time)

Knoa Software offers one tools that monitors the end-to-end performance for applications such as SAP, Oracle’s E-Business Suite, Oracle Siebel CRM, JD Edwards, PeopleSoftware Enterprise Suite and Amdocs. Another tool tracks usage of desktop applications, web-based applications accessable by Internet Explorer, Citrix and Microsoft access virtualization-based applications and can determine utilization time per user and per application.

Eidman pointed out that all of the products are based upon the the company’s “universal end-user experience and performance monitoring” technology. This technology provides the following capabilities:

Passive monitoring of end-user experience, behavior and performance
Sensing technology to support targeted field-level monitoring
Data collection tools for specific enterprise solution software
Data aggregation and modeling making it possible to easily go from raw data to useful specific understanding of what is happening — by application, user role, business process and management objective
Data presentation console to provide views of what has been observed
A reporting framework allowing organizations to develop their own specific reporting
An API framework allowing organizations to integrate their own custom applications and integrate Knoa’s products with application management products already in use

Knoa is already serving the needs of 200 major enterprise customers around the world.

Knoa, however, faces quite a bit of competition. I’ve spoken to at least 20 different suppliers of application performance management products over the last year alone. Eidman responded by telling me that Knoa’s focus is different that most of the others. Knoa, he pointed out, is trying to observe and report upon actual end user experience for business-critical applications rather than trying to be everything to everyone. That focus, he said, results in highly usable, powerful products.

Thursday, January 5, 2012

70-431 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server. CERTKINGDOM-DB01
contains a database named CKD_Sales.
CertKingdom.com intends migrating CERTKINGDOM-DB01 to SQL Server 2005 in the near future. To
prepare for the migration, you decide to install SQL Server 2005 Express on a server named
CERTKINGDOM-SR31. You verify that CERTKINGDOM-SR31 exceeds the minimum recommended
hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-SR31 to Windows Sever 2003 and install Service Pack 1.
B. Install and run the SQL Server Upgrade Advisor on CERTKINGDOM-SR31.
C. Install SQL Server 2000 on CERTKINGDOM-SR31.
D. Download and install the .NET Framework 2.0.

Answer: D

Explanation:
SQL Server 2005 requires the.NET Framework 2.0. This is automatically installed when SQL
Server 2005 is installed but is not automatically installed when SQL Server 2005 Express is installed.

Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-SR31 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 Express can be installed on Windows 2000 Server. You will need to install
Service Pack 4 for Windows 2000 Server though.
B: You should run the SQL Server Upgrade Advisor when you want to upgrade an instance of a
SQL Server 2000 database to SQL Server 2005.
C: You do not need to install SQL Server 2000 before installing SQL Server 2005 Express.

Reference: Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server
Express, before installing


QUESTION 2
You work as a database administrator at CertKingdom.com. The CertKingdom.com network consists of a
single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003 with the latest Service Packs and Hotfixes, while the client computers
run Windows XP Professional, Windows 98 Second Edition, and Novell NetWare 6.5.
You install SQL Server 2005 on a member server named CERTKINGDOM-SR21. CERTKINGDOMSR21
will host a database named CKD_Sales. All CertKingdom.com users must be able to connect to
CERTKINGDOM-SR21 by computer name. A CertKingdom.com network administrator named Rory Allen
must ensure that the client computers will be able to connect to CERTKINGDOM-SR21.
Which protocols can CertKingdom.com users use to CERTKINGDOM-SR21?

A. TCP/IP and Named Pipes
B. TCP/IP and IPX/SPX
C. Virtual Interface Adapter (VIA)
D. Shared Memory

Answer: A

Explanation:
By default, clients have TCP and Named Pipes as available protocols. You can manipulate the
protocol ordering by using the SQL Server Client utility. The client application uses the protocols
in the order specified on the client computer. If you are using SQL Server 2005, the protocol order
is stored in the ProtocolOrder registry entry under the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0
Incorrect Answers:
B: SQL Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as
NetWare 6.5, support TCP/IP which makes it the common protocol for all clients.
C: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.
D: Shared Memory can only be used on the local computer and cannot be used as a network protocol.

Reference:Microsoft SQL Server 2005 Books Online (2006), Index: client connections
[SQL Server], about client network connections, choosing a network protocol


QUESTION 3
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server. CERTKINGDOM-DB01
contains a database named CKD_Sales.
CertKingdom.com intends migrating CERTKINGDOM-DB01 to SQL Server 2005 in the near future. To
prepare for the migration, you decide to install SQL Server 2005 Express on a server named
CERTKINGDOM-SR23. CERTKINGDOM-SR31 was used for previously used by application developer
and contains Microsoft Visual Studio 2003, .NET Framework 1.2 and Internet Explorer 5.5. You
verify that CERTKINGDOM-SR23 exceeds the minimum recommended hardware requirements for
SQL Server 2005.
What should you do next? (Each correct answer provides part of the solution. Choose THREE.)

A. Upgrade CERTKINGDOM-SR23 to Windows Sever 2003 and install Service Pack 1 for Windows Sever 2003.
B. Install Service Pack 4 for Windows 2000 Sever on CERTKINGDOM-SR23.
C. Upgrade the .NET Framework 1.2 to .NET Framework 2.0 on CERTKINGDOM-SR23.
D. Uninstall the .NET Framework 1.2 and install the .NET Framework 2.0 on CERTKINGDOM-SR23.
E. Upgrade Internet Explorer 5.5 to Internet Explorer 6.0 and install Service Pack 1 for Internet
Explorer 6.0 on CERTKINGDOM-SR23.
F. Upgrade Microsoft Visual Studio 2003 to Microsoft Visual Studio 2005 and install Service Pack
1 for Microsoft Visual Studio 2005 on CERTKINGDOM-SR23.

Answer: B,D,E

Explanation:
SQL Server 2005 requires Service Pack 4 for Windows 2000 Sever, Internet Explorer 6.0 with
Service Pack 1 and the .NET Framework 2.0. The .NET Framework 2.0 is automatically installed
with other versions of SQL Server 2005 but is not automatically installed with SQL Server 2005
Express. You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET
Framework 2.0 but .NET Framework 1.2 must be uninstalled first.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-SR31 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 Express can be installed on a Windows 2000 Server once you install Service
Pack 4 for Windows 2000 Server.
C: You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET Framework
2.0 but .NET Framework 1.2 must be uninstalled first.
F: SQL Server 2005 Express does not require any version of Microsoft Visual Studio.
Reference:Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server
Express, before installing


QUESTION 4
You work as a database administrator at CertKingdom.com. The CertKingdom.com network consists of a
single Active Directory domain named CertKingdom.com.
You have received instruction from the CIO to prepare a new installation of SQL Server 2005. The
new SQL Server 2005 database server is named CERTKINGDOM-DB01. A CertKingdom.com user
named Mia Hamm is a member of the Marketing department. You instruct her to identify the
protocols that the client computers might use to connect to the server. Mia Hamm needs to identify
the protocols that are needed to accomplish this goal.
What should she identify? (Choose all that apply)

A. She should use the Multiprotocol.
B. Mia Hamm should use the Named Pipes.
C. She should use the Shared Memory.
D. She should use the TCP/IP
E. Mia Hamm should use the Virtual Interface Adapter (VIA).

Answer: B,D

Explanation:
The clients have by default TCP and Named Pipes as available protocols. You can make use of
the SQL Server Client utility to manipulate the protocol ordering. The client application uses the
protocols in the order specified on the client computer. When you make use of the SQL Server
2005, the protocol order is stored in the ProtocolOrder registry entry under the following registry
subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0
Incorrect Answers:
C: Shared Memory can only be used on the local computer and cannot be used as a network
protocol.
E: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.Reference:Microsoft SQL
Server 2005 Books Online (2006), Index: client connections [SQL Server], about client network
connections, choosing a network protocol


QUESTION 5
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 2000 database
server named CERTKINGDOM-DB01 that runs on Windows 2000 Server Service Pack 4.
CERTKINGDOM-DB01 contains a database named CKD_Trading.
CertKingdom.com wants to migrate CERTKINGDOM-DB01 to SQL Server 2005 but wants to retain the
CKD_Trading database with the same instance name. You decide to perform an in-place upgrade to
SQL Server 2005. You verify that CERTKINGDOM-DB01 exceeds the minimum recommended
hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-DB01 to Windows Sever 2003 Service Pack 1.
B. Run the SQL Server Upgrade Advisor on CERTKINGDOM-DB01.
C. Detach the CKD_Trading database on CERTKINGDOM-DB01.
D. Run the SQL Server 2005 Setup utility.

Answer: B

Explanation:
Before you perform an in-place upgrade of an existing database, you should run the SQL Server
Upgrade Advisor. The SQL Server Upgrade Advisor produces a list of items that must be
addressed before and after performing the upgrade. This list of items is specific to the existing
installation.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-DB01 to Windows Sever 2003 Service Pack 1 as
SQL Server 2005 can be installed on Windows 2000 Server with Service Pack 4.
C: You need to detach a database when you need to move the database to another database
instance or another database server. You do not need to detach the database before performing
an in-place upgrade.
D: You should run the SQL Server Upgrade Advisor before you run the SQL Server 2005 Setup
utility. The SQL Server Upgrade Advisor produces a list of items that must be addressed before
and after performing the upgrade. This list of items is specific to the existing
installation.Reference:Microsoft SQL Server 2005 Books Online (2006), Index: updating
databases, detaching and attaching databases


QUESTION 6
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows 2000 Server. The CertKingdom.com network contains a SQL Server 7.0 database server
named CERTKINGDOM-DB01 that runs on Windows 2000 Server. Service Pack 4 for Windows 2000
Server id installed on CERTKINGDOM-DB01.
CertKingdom.com wants to migrate CERTKINGDOM-DB01 to SQL Server 2005. You decide to perform
an in-place upgrade to SQL Server 2005. You verify that CERTKINGDOM-DB01 exceeds the
recommended hardware requirements for SQL Server 2005.
What should you do next?

A. Upgrade CERTKINGDOM-DB01 to Windows Sever 2003.
B. Install Service Pack 4 for SQL Server 7.0 on CERTKINGDOM-DB01.
C. Upgrade SQL Server 7.0 on CERTKINGDOM-DB01 to SQL Server 2000.
D. Run the SQL Server 2005 Setup utility on CERTKINGDOM-DB01 and upgrade directly to SQL
Server 2005.

Answer: B

Explanation:
You can upgrade from SQL Server 7.0 with Service Pack 4 directly to SQL Server 2005. Thus you
need only install Service Pack 4 for SQL Server 7.0.
Incorrect Answers:
A: You do not need to upgrade CERTKINGDOM-DB01 to Windows Sever 2003 as SQL Server 2005
can be installed on Windows 2000 Server with Service Pack 4.
C: You do not need to upgrade CERTKINGDOM-DB01 to SQL Server 200 as SQL Server 7.0 with
Service Pack 4 can be upgraded directly to SQL Server 2005. Besides, you will need to install
Service Pack 3 for SQL Server 2000 before you can upgrade it to SQL Server 2005.
D: You need to install Service Pack 4 for SQL Server 7.0 before you can upgrade it directly to SQL
Server 2005.Reference:Microsoft SQL Server 2005 Books Online (2006), Index: upgrading SQL
Server, upgrading to SQL Server 2005


QUESTION 7
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003 and all client computers run Windows XP Professional. The
CertKingdom.com network contains two SQL Server 2000 database servers named CERTKINGDOMDB01
and CERTKINGDOM-DB02 that are configured for log shipping. CERTKINGDOM-DB01 is the
primary server and hosts a database named CKD_Trading. Both CERTKINGDOM-DB01 and
CERTKINGDOM-DB02 have Service Pack 3 for SQL Server 2000 installed.
CertKingdom.com wants to upgrade CERTKINGDOM-DB01 and CERTKINGDOM-DB02 to SQL Server
2005 Enterprise Edition but the CKD_Trading database must remain available during the upgrade
process. You verify that both CERTKINGDOM-DB01 and CERTKINGDOM-DB02 exceed the
recommended hardware requirements for SQL Server 2005 Enterprise Edition. You then install
Service Pack 1 for Windows Server 2003 on CERTKINGDOM-DB01 and CERTKINGDOM-DB02.
What should you do next?

A. Install Service Pack 4 for SQL Server 2000 on both database servers.
B. Enable failover in the SQL Server 2000 log shipping configuration and upgrade CERTKINGDOMDB02
to SQL Server 2005.
C. Run the Database Maintenance Plan Wizard on CERTKINGDOM-DB01 to upgrade it to SQL
Server 2005.
D. Upgrade CERTKINGDOM-DB02 to SQL Server 2005 and then upgrade CERTKINGDOM-DB01 to
SQL Server 2005.

Answer: B

Explanation:
SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral to
log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL
Server 2000 log shipping configuration directly to SQL Server 2005. To upgrade log shipping to
SQL Server 2005, you must migrate the database servers to SQL Server 2005. If you want the
database to remain available during the migration process, you must migrate with failover. To
migrate with failover you must enable failover and upgrade CERTKINGDOM-DB02. Then you need
to failover to CERTKINGDOM-DB02 and upgrade CERTKINGDOM-DB01. Then configure log shipping
with the CERTKINGDOM-DB02 becoming the primary server and CERTKINGDOM-DB01 becoming the
secondary server.
Incorrect Answers:
A: You do not need to install Service Pack 4 for SQL Server 2000 on the database servers as SQL
Server 2000 with Service Pack 3 can be upgraded to SQL Server 2005. However, SQL Server
2005 does not support the Database Maintenance Plan Wizard which was integral to log shipping
in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL Server 2000
log shipping configuration directly to SQL Server 2005.
C: SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral
to log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a
SQL Server 2000 log shipping configuration directly to SQL Server 2005.
D: Removing log shipping from CERTKINGDOM-DB02 and upgrading CERTKINGDOM-DB01 to SQL
Server 2005 will not ensure that the CKD_Trading database remains available. Reference:Microsoft
SQL Server 2005 Books Online (2006), Index: log shipping [SQL Server], upgrading


QUESTION 8
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run Windows Server 2003. The CertKingdom.com network contains a Domain Controller named
CERTKINGDOM-DC01 and a member server named CERTKINGDOM-SR21.
CertKingdom.com wants to implement a SQL Server 2005 database that will store sales data. All
CertKingdom.com users will require access to the Sales_DB database. You have been instructed to
install SQL Server 2005 on CERTKINGDOM-SR21 and to create a database named Sales_DB. You
need to ensure that CertKingdom.com users and applications can connect to the database instance by
using only the computer name.
What should you do during the installation of SQL Server 2005 on CERTKINGDOM-SR21?

A. Select the Named Instance and use MSSQLSERVER as the instance name.
B. Select the Named Instance and use CERTKINGDOM-DC01 as the instance name.
C. Select the Default Instance and accept the default instance name.
D. Select the Named Instance and use CERTKINGDOM-SR21 as the instance name.

Answer: C

Explanation:
To ensure that users and applications can connect to the instance using the computer name, you
should select the Default Instance and accept the default instance name, MSSQLSERVER.
Incorrect Answers:
A: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.
B: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.
D: You cannot use a Named Instance as users and applications will need to specify the server
name and the instance name when connection to the database.


QUESTION 9
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run on Windows Server2003 while the client computers run Windows XP Professional, Windows
98 Second Edition, and Novell NetWare 6.5. All computers are members of the CertKingdom.com
Active Directory domain. The CertKingdom.com network contains a SQL Server 2005 database server
named CERTKINGDOM-DB01 that hosts a database instance named MSSQLSERVR.
CertKingdom.com wants to implement another SQL Server 2005 instance for a database named
Sales_DB. Sales_DB will store sales data for the company. All CertKingdom.com users will require
access to the Sales_DB database. You have been instructed to create the SQL Server 2005
instance for the Sales_DB database. You need to ensure that all users will be able to connect to
the Sales_DB database. You cannot make configuration changes to the client computers. Your
solution must optimize network traffic.
What should you do?

A. Install the instance as a Named Instance and configure it to support Mixed Mode
Authentication. The enable TCP/IP for the instance.
B. Install the instance as a Default Instance and configure it to support Windows Authentication.
The enable TCP/IP for the instance.
C. Install the instance as a Named Instance and configure it to support SQL Authentication. The
enable IPX/SPX for the instance.
D. Install the instance as a Default Instance and configure it to support Windows Authentication.
The enable IPX/SPX for the instance.

Answer: A

Explanation:
The default instance is named MSSQLSERVER. This instance name is already in use; therefore
you should use a Named Instance. You should use Mixed Mode Authentication to support
NetWare users.
Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use. Furthermore, you need to use Mixed Mode Authentication as Windows
Authentication does not support NetWare users.
C: You can use SQL Authentication, but this will require that you create SQL Logins for all users
and groups. It would be easier to use Windows Authentication for clients that user Windows XP
Professional and Windows 98 SE, and create SQL Logins for the NetWare 6.5 users. Also, SQL
Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as NetWare 6.5,
support TCP/IP which makes it the common protocol for all clients.
D: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use. Furthermore, you need to use Mixed Mode Authentication as Windows
Authentication does not support NetWare users. Also, SQL Server 2005 does not support
IPX/SPX. The newer versions of NetWare, such as NetWare 6.5, support TCP/IP which makes it
the common protocol for all clients.


QUESTION 10
You work as the database administrator at CertKingdom.com. The CertKingdom.com network consists of
a single Active Directory domain named CertKingdom.com. All servers on the CertKingdom.com network
run on Windows Server2003 and all client computers run Windows XP Professional. The
CertKingdom.com network contains two SQL Server 2005 database servers that are configured in a
cluster with two nodes named NodeA and NodeB. NodeA hosts a default database instance
named MSSQLSERVR.
CertKingdom.com wants to implement another SQL Server 2005 instance for a database named
Sales_DB. Sales_DB will store sales data for the company. All CertKingdom.com users will require
access to the Sales_DB database. You have been instructed to create the SQL Server 2005
instance for the Sales_DB database on Node
A. You need to ensure that all users will be able to
connect to the Sales_DB database.
What should you do?

A. Run the SQL Server 2005 Setup utility on NodeA and select a Named Instance for the
Sales_DB database.
B. Run the SQL Server 2005 Setup utility on NodeA and select the Default Instance for the
Sales_DB database.
C. Move the existing instance from NodeA to NodeB. Run the SQL Server 2005 Setup utility on
Node
A. Select the Default Instance and accept the default instance name
D. Run the SQL Server 2005 Setup utility on NodeB and select a Named Instance for the
Sales_DB database.

Answer: A

Explanation:
The default instance is named MSSQLSERVER. This instance name is already in use on NodeA;
therefore you should use a Named Instance.
Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is
already in use.
C: You do not need to move the existing instance as you can install up to 50 instances on a SQL
Server 2005 database server.
D: You need to install the instance on NodeA not NodeB. You can install a new instance on
NodeA if you use a Named Instance.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Wednesday, January 4, 2012

What Network Administrators Need to Know About Network Inventory Solutions?

If you need to check what CPU is installed on your computer or how many memory do you have, you can open a System information in Windows and find required information there. But it is missing information about a number of occupied and free memory slots, that is required if you plan a memory update. Information about other hardware components is available in other Windows dialogs or through drivers, but in total over 90% of all inventory information isn't available. Nevertheless, it's available for a system and you can use various system utilities to extract detailed specification for installed memory modules, for example. Other utilities can be used to report information about a graphic card, so you have to use different tools to extract inventory information about a computer. Just imagine how many time you need to extract this information about all computers from a local network.

MCTS Certification, MCITP Certification

Microsoft CCNA Certification, CCNA Training and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


If you need to collect inventory information from multiple computers you can visit them one-by-one, install required system utilities, export collected data and import it into a centralized inventory database in order to create inventory reports. But there is a less daunting way and you can use specialized network inventory software that is designed to collect inventory information from multiple computers into a centralized repository. Network inventory tools allow collecting information remotely from computers connected to a local network, so you can get inventory data from selected computers in automatic mode with no time-consuming manual actions.

Network inventory software can be classified by approach used to extract inventory information. First category of applications require installation of client modules on network computers. Software and hardware audit information is extracted locally by this module and then inventory tool communicates with this module to extract collected data into a centralized database. It is possible to extract any kind of inventory information available for Windows using this approach, but it requires installation of client modules on all network computers that can take a significant amount of time. Also it's hard to maintain client modules in order to upgrade their versions, install them on all new computers, etc.

Another category of inventory software is called clientless because such tools can collect inventory information from network computers without installing client modules on them. Usually such tools use Windows Management Instrumentation (WMI) technology from Microsoft to collect inventory data over a network. For security reasons on latest operation systems starting from Vista WMI is disabled by default, so if you like to use a network inventory tool based on WMI you need to configure your network environment. You need to use an administrative account to connect to network computers, turn off a set of standard services and configure firewalls on computers to enable communication using WMI.

There are some inventory tools that also use a clientless approach, but don't use WMI to extract inventory data due to WMI security holes. Usually such tools can extract hardware and software inventory information remotely by connecting to registry on network computers. All inventory information is stored in the Windows registry, so it's possible to extract it directly over a network. This approach requires minimal configuration - you need to use administrative credentials to access remote computers and make sure that remote registry service is enabled, so it's the fastest and easiest way to collect inventory information.

Are you looking for ways to improve your network administration skills or personal performance? Learn more about network inventory software and try it in your network to be able to control all software and hardware assets across entire company or organization.

Tuesday, January 3, 2012

70-642 Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Table of Contents

Table of Contents................................................................................................................ 1

Course Overview ................................................................................................................ 3

Section 0.1: Introduction..................................................................................................... 5

Section 0.2: Server Management ........................................................................................ 6

Section 0.3: Remote Management ...................................................................................... 7

Section 0.4: Mathematical Foundations.............................................................................. 8

Section 1.1: IPv4 Addressing.............................................................................................. 9

Section 1.2: IPv4 Subnetting............................................................................................. 10

Section 1.3: IPv4 Host Configuration............................................................................... 11

Section 2.1: IPv6............................................................................................................... 12

Section 2.2: IPv6 Addressing............................................................................................ 13

Section 2.3: IPv6 Configuration ....................................................................................... 14

Section 2.4: IPv6 Implementation..................................................................................... 15

Section 3.1: DHCP Configuration .................................................................................... 16

Section 3.2: DHCP Options .............................................................................................. 17

Section 3.3: Advanced DHCPv4 Settings......................................................................... 18

Section 3.4: Server Placement .......................................................................................... 19

Section 3.5: Superscopes and Split Scopes....................................................................... 20

Section 3.6: DHCPv6........................................................................................................ 21

Section 4.1: DNS Concepts............................................................................................... 22

Section 4.2: Name Resolution........................................................................................... 23

Section 4.3: Zone Configuration....................................................................................... 24

Section 4.4: Active Directory-integrated Zones ............................................................... 25

Section 4.5: Resource Records ......................................................................................... 26

Section 4.6: Client Configuration ..................................................................................... 27

Section 4.7: Dynamic DNS............................................................................................... 28

Section 4.8: Stub Zones and Forwarding.......................................................................... 29

Section 4.9: Root Hints and Root Zone ............................................................................ 30

Section 4.10: Zone Delegation.......................................................................................... 31

Section 4.11: WINS and GlobalNames ............................................................................ 32

Section 4.12: DNS Features.............................................................................................. 33

Section 4.13: DNS Design ................................................................................................ 34

Section 5.1: Routing.......................................................................................................... 35

Section 5.2: RIP ................................................................................................................ 36

Section 5.3: Demand-dial Routing.................................................................................... 37

Section 5.4: ICS and NAT ................................................................................................ 38

Section 6.1: Remote Access Concepts.............................................................................. 39

Section 6.2: Dial-up and VPN .......................................................................................... 40

Section 6.3: SSTP ............................................................................................................. 41

Section 6.4: CMAK .......................................................................................................... 42

Section 7.1: Network Location Profiles............................................................................ 43

Section 7.2: Wireless ........................................................................................................ 44

Section 7.3: RADIUS........................................................................................................ 45

Section 7.4: Network Access Protection (NAP) ............................................................... 46

Section 7.5: Network Authentication................................................................................ 47

Section 7.6: Firewall ......................................................................................................... 48

Section 7.7: IPsec.............................................................................................................. 49

Section 8.1: File Services.................................................................................................. 50

Section 8.2: File Shares..................................................................................................... 51

Section 8.3: Offline Files .................................................................................................. 52

Section 8.4: NTFS Permissions ........................................................................................ 53

Section 8.5: Share and NTFS Permissions ....................................................................... 54

Section 8.6: EFS................................................................................................................ 55

Section 8.7: Distributed File System (DFS) ..................................................................... 56

Section 8.8: Shadow Copy................................................................................................ 57

Section 8.9: Backup and Restore ...................................................................................... 58

Section 8.10: Disk Quotas................................................................................................. 59

Section 8.11: FSRM Features ........................................................................................... 60

Section 8.12: Print Services .............................................................................................. 61

Section 9.1: WSUS ........................................................................................................... 62

Section 9.2: Client Configuration ..................................................................................... 63

Section 9.3: MBSA ........................................................................................................... 64

Section 10.1: Reliability and Performance Monitor ......................................................... 65

Section 10.2: Event Viewer .............................................................................................. 66

Section 10.3: Network Monitor ........................................................................................ 67

Section 10.4: SNMP.......................................................................................................... 68

Practice Exams.................................................................................................................. 69

Course Overview

This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. It focuses on the details of configuring the infrastructure of a network.

Module 0 – Introduction
This module introduces Microsoft’s recommendations of the technical experience a candidate should have before attempting the certification test. Students will become familiar with server and remote management tools. This module provides the mathematical calculations of how to convert numbers from binary to decimal and hexadecimal. This mathematical foundation is necessary for students to understand the IPv4 and IPv6 addresses they will be studying in the course.

Module 1 – IPv4
This module discusses the details of configuring IPv4 addressing and subnetting. This includes topics of converting IPv4 addresses from binary to decimal, converting subnet masks to slant notation, identifying Ipv4 classes and ranges of IP addresses, and determining local and non-local hosts. Students will learn how to customize the number of subnets and hosts allowed on each subnet.

Module 2 – IPv6
In this module students will learn why it will become necessary to migrate to IPv6. They will learn the basic format of IPv6 addresses, identifying IPv6 address types, and configuring IPv6 addresses using the GUI and command line. Interoperability strategies for implementing IPv4 and IPv6 are explored.

Module 3 – DHCP
This module covers DHCP configuration, customization options, and advanced settings. Students will learn proper server placement to assure client communication with the DHCP server, the rationale for creating superscopes and split scopes, and DHCPv6 options.

Module 4 – DNS
In Module 4 students will learn the details of how DNS translates host names to IP addresses and the process of DNS name resolution for both the client and server. Topics will also include; creating zone and zone transfers, creating or converting an Active Directory-integrated zone, creating and editing resource records, configuring client registration, automatically updating DNS using Dynamic DNS, resolving queries using stub zones and forwarding, using root hints and a root zone, managing zones through zone delegation, creating WINS-integrated zones and GlobalNames zones support, and implementing strategies and goals when designing a DNS solution.

Module 5 – Routing
Module 5 teaches the students the basics of routing and how to manage routing table entries. Students will become familiar with installing RRAS components, and configuring RIP, demand-dial routing, and NAT solutions.

Module 6 – Remote Access
Module 6 discusses the details of configuring remote access and network authentication. Topics include; configuring a Remote Access server to use Dial-up and VPN connections, configuring client connections, configuring a VPN using SSTP, and using CMAK to manage remote access.

Module 7 – Network Access and Security
In Module 7 students will learn several strategies for controlling network access and enhancing network security. These will include: controlling network location profiles, configuring wireless connection, configuring a RADIUS client, server and proxy, configuring a DHCP server as an enforcement point, enforcing network authentication using Kerberos and NTLM, configuring a firewall, and configuring IPsec to protect IP packets during transmission.

Module 8 – File and Print
This module discusses managing network files and printing. Topics include: managing network file sharing and shared folders, controlling access using NTFS and share permissions, encrypting files and folders, protecting integrity of data through shadow copy, and backup and restore, restricting disk space using disk quotas and FSRM, and managing print services.

Module 9 – WSUS
In this module students will learn how to configure a WSUS server and client to manage the updating of software. They will also learn how to use MBSA to scan for security compliance.

Module 10 – Performance and Reliability
This module covers tools that are used to collect and monitor network data for performance and reliability. The Reliability and Performance Monitor provides network performance statistics. Event Viewer is used to monitor event logs. Network Monitor is used to gather information about network traffic. SNMP is used to manage networkattached devices.

Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the certification test.


Section 0.1: Introduction

Preparation
This course prepares students for the 70-642 Technology Specialist exam: Windows Server 2008 Network Infrastructure, Configuring. Microsoft recommends at least one year experience in the following underlying technologies:
IP addressing and services
Names resolution
File and print services
Network access and remote access
Monitoring network services

This section introduces the instructor and the concepts that will be covered in this course.

Time

About 2 minutes

Section 0.2: Server Management

Preparation
This section discusses a new management console, Server Manager, used to install and manage server components. Server Manager uses the following elements:
Role
Role services
Feature

Server Core, a scaled-down version of Server 2008, provides a reduced foot print, reduced maintenance, less crashes and downtimes, and uses less disk space. To provide these benefits a limited set of server roles are supported. Student will learn how to configure and manage a server using Server Manager. They will also learn how to install roles on a Server Core server.

Configuring Server 2008 Network Infrastructure Objectives
102. Configure Dynamic Host Configuration Protocol (DHCP)
201. Configure a Domain Name System (DNS) server.

Lecture Focus Questions:
What are the differences among roles, role services, and features?
How are dependencies handled during role installation?
How does the server core installation differ from a standard server installation?
What are the limitations of a server core installation? What are the advantages?

Time
About 20 minutes

Section 0.3: Remote Management

Preparation

This section examines remote management options. Students will learn how to enable Remote Desktop on a Server Core, enable remote management of the firewall, and open firewall ports to allow remote use of MMC snap-ins.

Lecture Focus Questions:

How do firewall ports affect your ability to remotely manage a server?
What firewall port must be opened for Remote Desktop connections?
What advantage does using TS Gateway have over using Remote

Desktop?
What is the effect of enabling the Remote Administration exception in the firewall?
What are the operating system requirements for RSAT?
Which remote administration tools could you use if the firewall had only ports 80 and 443 open?

Time
About 25 minutes

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com