Tuesday, March 27, 2012

70-659 Q&A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all
client computers Windows 7 Professional.
The company network consists of an internal LAN and a perimeter network. The two networks are
separated by an internal corporate firewall. An external corporate firewall connects the perimeter
network to the Internet.
The network includes virtual machines (VMs) running on host servers contained in both the
internal network and the perimeter network.
You have recently installed a server named Certkingdom-VMM1 on the internal network. Certkingdom-VMM1 runs
Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and will be used to manage
the virtual environment.
You are now in the process of deploying VMM agents on the host servers. You have configured
the port number for the VMM agents and configured the internal corporate firewall to allow
communications on the appropriate port number.
What else do you need to configure to ensure that the VMM agents can communicate with CertkingdomVMM1?

A. You need to configure the name of the VMM server (Certkingdom-VMM1).
B. You need to configure the Fully Qualified Domain Name (FQDN) of a domain controller.
C. You need to configure the name of a SQL Server.
D. You need to configure an encryption key.

Answer: D

Explanation:


QUESTION 2
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all
client computers Windows 7 Professional.
The company network consists of two subnets. The Development subnet is used by the
Development department. The Production subnet is used by all other company departments.
You install a Windows Server 2008 R2 Hyper-V server named Certkingdom-VMHost1 in the Production
subnet. Certkingdom-VMHost1 contains two network interface cards named NIC1 and NIC2. You have
configured NIC1 as a management interface.
You want to configure Certkingdom-VMHost1 to host virtual machines on both the Production subnet and
the Development subnet.
How should you configure Certkingdom-VMHost1?

A. You should use VLAN tags for the VMs and configure NIC2 to use Trunk Mode.
B. You should assign NIC2 as an additional management interface.
C. You should configure both adapters to support jumbo frames.
D. You should configure NIC1 with an IP address in the Production subnet and configure NIC2
with an IP address in the Development subnet.

Answer: A

Explanation:


QUESTION 3
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2008 R2.
A server named Certkingdom-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008
R2 and is used to manage the company’s virtual environment.
The company includes a Development department. Users in the Development department use
their computers to develop and test software applications for use by other company departments and customers.
You install a Windows Server 2008 R2 Hyper-V server named Certkingdom-VMTest1 in the Development
department. Certkingdom-VMTest1 will host virtual machines (VMs) for the Development department
users to use to test their applications.
You need to ensure that the VMs are completely isolated from production servers.
How can you ensure that the test VMs can communicate with each other while being isolated from
the host server and the rest of the network?

A. By configuring the VMs to connect to a Dedicated virtual network.
B. By configuring the VMs to connect to an Internal virtual network.
C. By configuring the VMs to connect to a Local virtual network.
D. By configuring the VMs to connect to a Private virtual network.

Answer: D

Explanation:


QUESTION 4
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain.
You are configuring a virtual environment for the company. You have an iSCSI storage disk array
that will be used to store virtual machines (VMs).
You install a server named Certkingdom-Host1 that runs a Server Core Installation of Windows Server 2008 R2.
You need to configure Certkingdom-Host1 to store to VMs on the iSCSI disk array.
Which two of the following tools could you use?

A. You could use Disk Management.
B. You could use Diskpart.exe.
C. You could use iSCSICLI.exe.
D. You could use iSCSICPL.exe.

Answer: C,D

Explanation:


QUESTION 5
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain named Certkingdom.com.
The company network consists of an internal LAN and a perimeter network. To comply with
company security policy, servers located in the perimeter network are not members of the
Certkingdom.com domain.
A Microsoft Hyper-V Server 2008 R2 server named Certkingdom-VMHost1 is located in the perimeter network.
You relocate Certkingdom-VMHost1 into the internal network. You now need to join Certkingdom-VMHost1 to the
Certkingdom.com AD DS domain.
How should you join Certkingdom-VMHost1 to the Certkingdom.com domain?

A. You should use the System Properties control panel applet.
B. You should use the Netsh command line utility.
C. You should use the Hyper-V configuration utility (hvconfig).
D. You should use the dcpromo utility.

Answer: D

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, March 26, 2012

T-Mobile to lay off nearly 2,000 call center workers

The affected employees work in seven call centers that T-Mobile plans to close

IDG News Service - A T-Mobile call center consolidation will cost 1,900 people their jobs, as the company works through a restructuring following the failure of AT&T's proposed acquisition of the smaller operator.

In an announcement Thursday, T-Mobile said it would shut down seven call centers, which employ 3,300 people. But it plans to hire 1,400 additional people to work at its 17 remaining call centers. It will invite the laid-off workers to transfer to one of those positions and offer to help them relocate.

In three months, it will close its call centers in Allentown, Penn., Fort Lauderdale, Frisco and Brownsville, Texas; Lenexa, Kan., Thornton, Colo., and Redmond, Ore. Employees at those facilities will continue their work in the meantime, the company said.

T-Mobile will offer workers who don't move to one of the remaining facilities severance pay, access to a career coach and access to "job search training, tools and technologies," it said.

The operator hinted that more layoffs could come. In its statement, T-Mobile said it planned to "restructure and optimize operations in other parts of the business" by the second quarter.

The call center consolidation is part of a plan for growth that T-Mobile introduced in February, two months after AT&T succumbed to pressure from regulators and killed its plan to buy the company. Per the terms of the original deal, after the acquisition collapsed AT&T handed T-Mobile $3 billion and agreed to transfer spectrum licenses to it. T-Mobile's plans now include a network upgrade to LTE.

T-Mobile said the call center consolidation will allow it to reduce costs to meet its goals in the growth plan outlined in February.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, March 19, 2012

What the cloud really means for your IT job

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

As companies adopt cloud services, is there more or less of a need for IT workers?

Depending on which survey or story you read, the cloud can be either a good thing for IT workers and their job security, or it can be terrifying.

For example, a study by Microsoft and IDC recently predicted that cloud computing will create 14 million jobs internationally by 2015. But those aren't just IT jobs, they are jobs spread around the entire world, across all industries.

For IT shops, the news may not be as bright: A study by IT service provider CSC concluded that 14% of companies reduced their IT staff headcount after deploying a cloud strategy.

As businesses embrace the cloud, experts say there will still be a need for IT staff in the enterprise, but there will be a need for different types of IT workers. Instead of managing infrastructure, tending the help desk and commissioning server instances to be created, IT workers of tomorrow are instead more likely to be managing vendor relationships, working across departments and helping clients and workers integrate into the cloud.

RELATED: Study: Cloud will create 14 million jobs by 2014

SLIDESHOW: Forbes' Top Tech Billionaires

"The No. 1 reason most enterprises are going to the cloud is cost savings," says Phil Garland, of PricewaterhouseCooper's CIO advisory business services unit. The largest line items in enterprise budgets are traditionally labor, so as enterprises deploy the cloud, it will reduce the number of staff needed, he says.

But, this doesn't necessarily mean that IT jobs are gone with the wind. In fact, while 14% of businesses surveyed by CSC cut IT staff, another 20% actually increased staff.

"It really depends on what the enterprise is doing in the cloud," Garland adds. "In most cases, it's a shift of responsibilities instead of wholesale cutting or hiring."

Take the example of Underwriters Laboratories in Illinois, a 9,000-person company that provides third-party inspection and certification services to more than 50,000 businesses around the world with its trademark UL symbol.

In August, the company transitioned from an in-house managed deployment of IBM communications systems Lotus Notes and Domino, to a cloud-based SaaS offering of Microsoft Office 365. "We needed something that would be much more elastic," says CIO Christian Anschuetz. The company has executed a handful of mergers and acquisitions in recent years, and it expects more in the future. Anschuetz wanted a simpler way of deploying increased instances of communications systems without the need to add infrastructure to support it.

The migration to the cloud took about eight weeks and it created an almost immediate shift in the firm's IT needs. UL no longer needed workers to manage its communications platform, email servers and chat functions. Despite cutting in those areas, Anschuetz says his investment in cloud personnel has tripled since the cloud adoption.

"Most people think that with such a deployment we would be drawing down our services to make them more cost-effective," he says. "Our internal IT is growing."

The greatest need for services in UL's new system is for customer-facing employees that can help UL clients integrate into the company's platform. As a firm that oversees product development and manufacturing, Anschuetz says customers want UL workers to be involved in the product lifecycle as early as possible. A cloud-based system, he says, allows UL to work more closely with customers on product development. Instead of a face-to-face meeting, or emailing documents back and forth, now documents are hosted in a cloud environment that both UL and the customer have access to, allowing for greater collaboration, he says. "UL has realized the elasticity that the cloud provides us is of great value in the marketplace," he says. "It allows us to develop new applications and regenerate relationships with customers." Because of the value it creates for the business, UL is adding workers that help manage the cloud integration efforts.

This is the reasoning IDC and Microsoft used in its study claiming the cloud will help create 14 million jobs in the next five years.

"By offloading services to the cloud, you increase the amount of budget you have for new projects and initiatives, which are the things that truly lead to new business revenues," says John Gantz, an IDC research who studies technology economics.

Three-quarters of IT spending today, he says, is on legacy systems and upgrades, with the remainder on new products. If an enterprise cuts system management costs, that creates additional resources for new projects and initiatives, which drive revenues and can potentially create jobs. Although, Gantz stresses, those may not be in the IT department.

In the short term, cloud deployments can create an increased need for IT staff to manage the transition and monitor the new cloud system and vendors. In the long term, however, the cloud generally creates efficiencies and reduces IT staffing jobs in an enterprise, he says. On a macroeconomic level, Gantz doesn't see the cloud having a macroeconomic impact. Some of the jobs lost in individual companies could be offset by increases in staffing needs by cloud vendors, he says.

David Moschella, global research director for the Leading Edge Forum at CSC, agrees that IT investments usually lead to a drop in staffing needs for a company.

"Businesses can be run with less people because of technology advancement," he says.

Traditionally there has been an argument that when jobs are eliminated in one area, they can be increased in another. Moschella believes that will be the case, but he says it's too early to tell exactly which areas will be the beneficiaries of the job boom the cloud can provide.

What is expected is that traditional IT roles of managing software and hardware will no longer be needed in the new cloud-heavy world.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Saturday, March 17, 2012

Kaspersky Lab spots malware signed with stolen digital certificate

Mediyes malware looks to seed computers in order to wreak havoc later on

Security firm Kaspersky Lab Thursday said it's identified a malicious program that appears to make use of a compromised Symantec VeriSign digital certificate issued to Conpavi AG, which is known to work with Swiss government agencies. Kaspersky says it has asked Symantec VeriSign to revoke the compromised certificates.

Kaspersky says the malicious program contains what's being called Trojan-Dropper.Win32.Mediyes. A dropper file is a type of malware commonly used by attackers to seed targeted computers in order to easily drop other malware into it in the future for a wide variety of purposes.

Kaspersky Lab researcher Vyacheslav Zakorzhevsky wrote today in a blog that the malicious DLL Trojan.Win32.Mediyes was detected on the computers of about 5,000 users, mainly in Western Europe, including Germany, Switzerland, Sweden, France and Italy.

The Mediyes malware has been seen between December 2011 and March 7, 2012 and in all the cases it was signed with a certificate issued for the Swiss company Conpavi, according to the Kaspersky Lab researcher.

One main purpose of Trojan.Win32.Mediyes is to help facilitate the interception of web browser requests sent to the Google, Yahoo! And Bing search engines, as the search queries are "used by the criminals to earn money as part of the Search 123 partner program that works on a pay-per-click basis," writes Zakorzhevsky. The attackers seem to working with a server in Germany.

"The malware is clearly aimed at users in Europe," Zakorzhevsky writes. "This is backed up by other evidence - the certificate from a Swiss company, the server in Germany, and only the requests made on major international search engines being intercepted."

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, March 15, 2012

IT execs still awaiting Windows 8 on tablets

Would likely run corporate Windows apps, though some wonder if Microsoft's tablet can compete with iPad, Android devices

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Computerworld - PHOENIX -- IT managers say they are eagerly awaiting Windows 8-based tablets due out this fall, though some do wonder whether it's too late for Microsoft to successfully take on Apple iPads and various Android tablets.

"We are waiting with baited breath for Windows 8 on tablets," said Greg Fell, CIO at Terex, a manufacturer of construction products, in an interview at the Computerworld Premier 100 conference here this week.

"We'd like a hybrid tablet with Windows," Fell explained, noting that Terex runs many Windows-based applications that would likely work well with a Windows 8 tablet.

Fell is so eager to hear what Microsoft has planned for Windows 8 tablets that he's attending a special two-day informational meeting with Microsoft officials next week in Redmond, Wash.

Terex workers already use "hundreds" of iPads in various ways, and the company recently ordered 250 more. At this point, Fell said Android tablets aren't considered secure enough.

Whether Microsoft can make any headway against Apple's dominance in the tablet market is questionable, Fell said.

"It's a question of whether Microsoft is too late to the game," he said. "If they stumble, they might be out of the [tablet] market."

Lenovo, which already makes a touchscreen tablet running Android Honeycomb, plans to release a Windows 8 in either September or October that will run on similar hardware, booth representatives at the conference said.

Box Chief Operating Officer Dan Levin said the Los Altos, Calif.-based cloud file system provider is already committed to supporting Windows 8 on tablets and other form factors, "even though we're not big Microsoft fans."

He said the limited success of Windows Phone has had workers at Box "laughing at Microsoft. Both Windows Phone users are in Finland."

But he added: "That [attitude] will change with Windows 8. It is a really good OS."

Levin had similar concerns as others at the conference, wondering "if anybody is going to give Microsoft a chance. It's their first tablet."

He predicted that enterprise customers will give Windows 8 on tablet a chance even if consumers do not. "It's going to give Microsoft a kick back into the big leagues, but the question is whether they are too late," Levin said.

One IT executive at a company in the Fortune 250 who asked not to be named said Windows 8 on tablets "won't be a big hitter. It's too little, too late."

Alex Yohn, assistant director of the office of technology at West Virginia University in Morgantown, W. Va., said Windows-based tablets have "huge potential. If the Windows tablet takes off, I see integration of the Windows tablet with Windows Phone."

Microsoft has released a Windows 8 Consumer Preview, which Yohn said a member of his team is testing. Last month, Microsoft said it would offer a Windows 8 version for ARM-based processors with Office software embedded. However,

Fell said he isn't as interested in an ARM-based tablet as much as one running an x86 processor.

Tuesday, March 13, 2012

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


QUESTION 1
Certkingdom.com has employed you as a Microsoft Dynamics CRM 4.0 administrator. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
The Certkingdom.com management has requested that you draw up a list of facts regarding knowledge
base articles.
Which of the following options would be part of your list?

A. Knowledge base articles can only be viewed by permitted users.
B. A knowledge base article selects the Work Offline option.
C. A knowledge base article displays the data in the Resources Earned Value view.
D. A knowledge base article edits the layout of each page.

Answer: A

Explanation: You should inform management that it can be viewed only by permitted users. If you
are permitted to use Microsoft Dynamics CRM 4.0, you can view the Knowledge Base Articles.
Reference: http://support.microsoft.com/kb/950100


QUESTION 2
Certkingdom.com has employed you as a Microsoft Dynamics CRM 4.0 administrator. Certkingdom.com consists
of a Sales division and a Marketing division. Certkingdom.com is currently promoting the third edition of a
Finance software package. When a fourth edition is released, it is regarded as a major uCertkingdomrade.
The manual for the fourth edition requires a supplementary segment.
You have received instructions from the CIO to retain Third Edition documentation for clients that
continues using that edition of the software. The CIO has also informed you that new
documentation should only be produced for the Fourth Edition of the Finance package.
Which of the following actions should you take?

A. You should bring down the article template for edition 3.0 documents and assimilate a new
article template for edition 3.8 documents.
B. You should configure the content deployment settings to 3.0 documents.
C. You should bring down the article template for edition 3.0 documents and remove the
accounted attribute for edition 3.8 documents.
D. You should delete the projected attribute for edition 3.8 documents.

Answer: A

Explanation: You need to bring down the article template for edition 3.0 documents. You can also
assimilate a new article template for edition 3.8 documents. Article Templates are used when
working with the Knowledge Base (found in the Service section of Microsoft Dynamics CRM).
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


QUESTION 3
Certkingdom.com has employed you as a Microsoft Dynamics CRM 4.0 administrator.
You receive an instruction from the CIO to inform the new interns in your division of the records
that will be linked to the sales literature.
Which two of the following options should you take?

A. You should inform the interns that the Products will be linked.
B. You should inform the interns that the Attention grabbing headlines will be linked.
C. You should inform the interns that the Strong offers will be linked.
D. You should inform the interns that the Half-truths will be linked.

Answer: A

Explanation: You need to inform the interns that the Competitors and the Products are
associated. The Sales Literature consists of documentation about your products designed to be
used by your sales persons. Furthermore, with Sales Literature you can add Products and identify
Competitors.
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


QUESTION 4
You are the Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. Certkingdom.com consists of a Sales
division and a Marketing division. For service management, Certkingdom.com makes use of contracts and
contract lines.
A new Certkingdom.com policy states that all cases must be associated with a contract line because this
information is necessary for analysis and reports. Historically, subject hierarchy was only created
for cases at Certkingdom.com. While analyzing the subject hierarchy, you notice a few previously used
ones that are not required any more.
You have been instructed to update the subject hierarchy.
Which of the following actions should you take?

A. You should navigate to the Views area of the Account Customization window and edit the
Lookup View.
B. The best option is to edit pick list options and current cases under their respective subjects.
C. The best option is to change all messages associated with the hierarchy and put the subjects
with the cases in it.
D. The best option is to reorganize the subject hierarchy.
Thereafter archive parent subject area should be created in the hierarchy and move the redundant
subjects under it.

Answer: D

Explanation: You need to reorganize the subject hierarchy and create an archive parent subject
area in the hierarchy and move the not needed subjects under it.
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


QUESTION 5
You work as a Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. The Certkingdom.com network
consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com consists of a Sales division. Certkingdom.com is using schedules for their Sales division. Some
of the users in the Sales division have permanent contracts, while others are hired on short-term
basis. The short-term users are normally employed for a minimum of two weeks at a time. You
then implement schedules for the users in the Sales division; however, the Sales staff does not
view the schedules. You need to keep the record of the short-term users.
Which of the following actions should you take?

A. You should create new format of the Contact records.
You should then have the short-term users disabled.
B. You should set up a Facility/Equipment record for every short-term user.
You should then remove the record when the short-term user’s contract expires and they depart.
C. You should create Contact entity.
You should then delegate the estimated time of job accomplishment.
D. You should delete the short-term user field from the record.

Answer: B

Explanation: You need to set up a Facility/Equipment record for each short-term user. You should
also delete the record when the short-term user’s contract expires and they depart.
Facilities/Equipment is needed when performing scheduling. It makes up the Resources
component. Delete Entity enables you to completely delete the record.
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Friday, March 9, 2012

Contests hack the heck out of Chrome

Contests hack the heck out of Chrome
Pwn2Own, Pwnium contests batter Google's browser at CanSecWest

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


VANCOUVER -- Dueling browser-exploit contests at the CanSecWest conference yielded immediate results -- two hacks against Google Chrome -- with contestants in both competitions demonstrating exploits within an hour of the contests' opening.

In both cases, contestants first demonstrated they could take over a fully patched Chrome browser and then turned the exploits over to contest officials to verify.

MORE EXPLOITS: 10 scariest hacks from Black Hat and Defcon

In the Chrome Pwnium contest, run by Google, the exploit preyed on two vulnerabilities and won $60,000 for its author, Sergey Glazunov, a member of the Chromium Hall of Fame for finding Chrome bugs and recipient previously of about $88,000 for finding Chrome bugs.

He exploited two vulnerabilities and avoided the Chrome sandbox that is supposed to mitigate exploits to the browser.

In Pwn2Own, French consulting company Vupen took down the browser with a zero-day exploit that used a flaw in the browser itself and also broke out of the browser's sandbox that is supposed to be a secure execution environment. The exploit won the five-man Vupen team 32 points in the competition.

In the Pwnium case, Glazunov turns over details of his entire exploit to Google, which will then patch it. In the Pwn2Own contest, Vupen's CEO turned the exploit against the browser itself to contest officials, who will reveal it to Google for patching.

But Vupen CEO Chaouki Bekrar says he has no intention of turning over details of the sandbox escape. "That vulnerability is very rare. We'll keep it for our own customers," says Bekrar.

Vupen sells exploits against browsers to its clients, mainly government covert agencies from countries around the world. "That's life," he says.

Both Glazunov and Vupen worked on their exploits prior to the competition and merely demonstrated them when the competition opened today.

Glazunov was not at the CanSecWest conference himself, but sent a proxy to demonstrate his zero-day exploit.

Vupen sent a team that has been preparing nearly full time for the competition for six weeks, Bekrar says. It has come with more than one Chrome exploit, and exploits for all the other browsers being targeted in the competition -- Safari, Internet Explorer, Firefox. It will wheel them out as needed in order to win the contest, Vupen says, so some of the exploits may go home with him without being made public.

Pwn2Own is sponsored by the Zero Day Initiative and HP/Tippingpoint. First prize is $60,000, second is $30,000 and third is $15,000, depending on which team accumulates the most points.

Gamesmanship has already started with Vupen scoring 32 points and attacking the second phase of the competition, which calls for writing an exploit that takes advantage of a previously patched flaw. So contestants receive a laptop with earlier versions of browsers that contain vulnerabilities that have been patched in the most current versions, and are tasked with exploiting those specific vulnerabilities.

The presence of Vupen's team has apparently intimidated other competitors, at least in the short term, says Aaron Portnoy, manager of security research for HP/Tippingpoint. In previous years, individuals entered the contest on the first day hoping to win, he says.
But this year the rules have changed. Before, contestants were randomly given a browser to attack. This year, contestants can attempt zero day attacks against any of the browsers being targeted in the contest, Portnoy says.

The Vupen team and its professed ability to zero-day any browser in the contest may have individuals with fewer resources hanging back. "They may scare people off," he says. Portnoy says he knows of other potential competitors who might jump in on the final day to try for second and third place, essentially conceding first to Vupen.

This is the first year for Chrome Pwnium and in previous years, Google has helped sponsor Pwn2Own. This year Google wanted Pwn2Own to require that any sandbox escapes be turned over to Google, and the Zero Day Initiative declined.

The rationale for that as expressed by the blog for HP/Tippingpoint's DVLabs is that nobody would compete if that were a requirement. Sandbox escapes are so rare they are worth more on the open market than the contest organizers could hope to post as prize money. If someone had one, they wouldn't expose it for a mere $60,000 prize.

The blog predicts no one will demonstrate a chrome sandbox escape in Chrome Pwnium. It may get some code execution exploits that are more common, the blog says.

The Zero Day Initiative figures that if contestants don't have to reveal their sandbox escapes, they may well compete and reveal the code exploits that they have come up with. Those code exploit vulnerabilities can then be patched, which makes at least some progress toward improving Chrome security, the blog says.

Thursday, March 8, 2012

7003-1 Q&A / Study Guide / Testing Engine

Cisco CCNA Training, Cisco CCNA Certification

Best Avaya Certification Training and Avaya Exams Training and more Cisco exams log in to Certkingdom.com


QUESTION 1
A technician deployed a Communication Server 1000E with dual homing feature configured. Both
the T and 2T ports are connected on the media Gateway Controller (MGC) one connection is
active to avoid network loops.
Which two statements are true, if the connection to the active port on the MGC is host?
(Choose two)

A. The MGC will issue a link down error.
B. The MGC will switch to the active pert.
C. The MGC and CPPM will have no loss of service.
D. The MGC will switch to the active port after 12 seconds.

Answer: B,C

Explanation:


QUESTION 2
A customer has deployed a Communication Server 100 Rls. 7x system at their site. The technician
has been asked to add the Call pickup feature to the 100 IP telephone in the sales department.
The customer wants to be sure active calls not lost when the changes are made.
Which Phones Configuration feature can be enabled that will ensure changes to the telephone are
not transmitted to the call server until the telephone are busy?

A. Bulk change
B. Courtesy change
C. Group change
D. Template change

Answer: B

Explanation:


QUESTION 3
A customer wants to build a new Ip node on their Communication Server (CS) 1000E system with
three Signaling Servers. This node will support virtual trunks, IP media services, TPS and
personnel directories. A technician logs into Elements manager to complete the configuration,
after creating and saving the node configuration, the transfer now option chosen, then the servers
are selected, the start sync is selected followed by restart application.
What is expected outcome from the system?

A. The node file will be transferred from Signaling Servers to the call servers, and INI files will be
transferred from the call server to the selected servers.
B. The node file will be transferred from Call Servers to the Signaling servers, and the INI files will
be transferred from the Call Servers to the selected servers.
C. The node file will be transferred from Signaling Servers to the Call Server, and the INI files will
be transferred from Call Servers to the Signaling servers.
D. The node will be transferred from Element manager to the call server, and INI files will be
transferred from Element manager to CallServer.

Answer: B

Explanation:


QUESTION 4
A customer wants to deploy an Avaya Server (CS) 1000 Rls. 7x system in Avaya Aura solution.
They plan to have the system support 50,000 users.
Which system type will meet the customer’s needs?

A. CS 1000E Co-Resident Call Server and Signaling Server
B. CS 1000E Standard Availability (SA)
C. CS 1000E High Availability (HA)
D. CS 1000E High Scalability (HS)

Answer: D

Explanation:


QUESTION 5
You are installing a new Communication Server 1000E (CS 1000E) SA release 7x system for your
customer. They have asked you to implement the corporate Directory Feature during the
installation.

A. SFTP must be disabled in LD 117.
B. Valid telephony accounts must already exist in Subscriber Manager.
C. The CS 1000E Call Server must be joined to security domain.
D. Centralized authentication must be disabled.

Answer: C

Explanation:


Cisco CCNA Training, Cisco CCNA Certification

Best Avaya Certification Training and Avaya Exams Training and more Cisco exams log in to Certkingdom.com

Wednesday, March 7, 2012

MCA - Microsoft Certified Architect Program

MCA - Microsoft Certified Architect Program
The Microsoft Certified Architect (MCA) program helps enable the highest-achieving professionals in IT architecture to distinguish their expertise. If you have proven experience as a technology architect who designs and delivers IT solutions for enterprise customers, and technical and leadership skills that surpass those of your peers, consider earning the MCA certification. By doing so, you can validate your advanced proficiency and join an exclusive, world-class community of experts.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Level: Successful candidates generally have ten or more years of IT experience, and five or more years of specific architectural experience. Microsoft Certified Master certification is a prerequisite for all MCA Technology certifications.

Audience: Practicing IT Architect, Microsoft Certified Master

Type: Microsoft Certification

Microsoft Certified Architect Program Overview

Why get certified?
Earning a Microsoft Certification validates your proven experience and knowledge using Microsoft products. Designed to be relevant in today's rapidly changing IT marketplace, Microsoft Certifications help you utilize evolving technologies, fine-tune your troubleshooting skills, and improve your job satisfaction.

Whether you are new to technology, changing jobs, or a seasoned IT professional, earning a Microsoft Certification demonstrates to customers, peers, and employers that you are committed to advancing your skills and taking on greater challenges. In addition, certification provides you with access to exclusive Microsoft Certified Professional (MCP) resources and benefits, including opportunities to connect with a vast, global network of MCPs.

Why get an MCA certification?
Individuals who earn an MCA have achieved the capstone certification from Microsoft, proving their ability to architect large-scale complex solutions with Microsoft technologies. As such, they are recognized by Microsoft and the IT industry worldwide for having achieved the highest level of professional certification on Microsoft server products. MCAs report that their certification has brought them:

More market credibility
More effective deployment services
Increased number of requests for advice or participation in projects
In addition to providing opportunities for career advancement and higher earning potential, an MCA offers these benefits:
Recognition for achieving the capstone certification from Microsoft, proving your ability to architect large-scale complex solutions with Microsoft technologies
Membership on the MCA distribution list in your specific solution area
Promotion of your name and technical services on the Microsoft website
MCA certificate and plaque
Potential to participate on future MCA Review Board panels and in beta exam development

The MCA certification is granted after the candidate successfully passes the MCA Board exam, which includes a portfolio submission, multiple presentations, and an intensive Q&A with a panel of Microsoft Certified Architects on the MCA Review Board. During the MCA Board exam, the candidate must definitively display the six competencies of business acumen and technological proficiency.

MCA certifications
Microsoft currently offers four MCA certifications:
MCA: Microsoft Exchange Server
MCA: Microsoft SharePoint Server
MCA: Microsoft SQL Server
MCA: Windows Server: Directory

These certifications are designed for architects who specialize in using Microsoft technologies to provide solutions for enterprise customers. Professionals who hold an MCA certification are generally recognized by Microsoft and the IT industry worldwide as individuals who hold the highest level of professional certification on Microsoft server products.

Steps to Becoming a Microsoft Certified Architect
Earn a current Microsoft Certified Master (MCM) certification for the technology for which you wish to pursue an MCA technology certification. MCM certification is a prerequisite for all MCA technology programs.

Register for the Microsoft Certified Architect program.
The registration team will review the application to ensure that you have met all of the application requirements.
Note The application fee for the MCA program is US$125. If you are accepted into the program, the fee to take the MCA Board Exam is US$7,500.
Review the program resources.
After you successfully register for the MCA program, you will be granted access to portfolio documentation and resources to help you prepare for your MCA Board exam.

Prepare the required program documentation.
Prepare a portfolio that includes your work history, a project case study, and a project presentation, all of which should show how your skills and work experience directly apply to each of the six MCA competencies.
Review the program competencies

Submit your documentation and schedule your Board Exam.
When your portfolio is complete, submit the documentation for review by the program manager for your technology track. If your portfolio addresses the objective content requirements for an effective Review Board review, the program manager will approve you to schedule an MCA Board Exam. Once the portfolio documentation is approved, you may pay the program fee and schedule your appearance before the Review Board.

The following MCA Review Board dates are currently scheduled for the Microsoft Certified Architect program. All MCA Board Exams will be held in Redmond unless otherwise noted.

Important: Registration deadline for an MCA Board Exam is two months prior to the indicated Review Board date.
Microsoft Certified Architect: Microsoft Exchange Server 2010
Microsoft Certified Architect: Microsoft SharePoint Server 2010
Closed Beta at SharePoint Conference
Microsoft Certified Architect: Microsoft SQL Server 2008
Microsoft Certified Architect: Windows Server 2008 R2: Directory
Note MCA Board Exam dates are subject to change at the sole discretion of Microsoft.
Learn more about the MCA Board Exam
Successfully complete your MCA Board Exam.

You will appear before an MCA Review Board of peers, which consists of Microsoft Certified Architects (MCAs). Your MCA Board Exam will last up to four hours and will include presentations you deliver based on your portfolio and a technology-specific case study, each of which will be followed by intensive Q&A sessions with Review Board members. You will receive performance results by email within two weeks.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, March 5, 2012

MB2-631 Q & A / Sutdy Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. Certkingdom.com has a user
owned custom unit called Certkingdom_Proj that needs to be accessed by employees in Certkingdom.com’s
Research department. The Research department employees want the business unit that they
make use of to host Certkingdom_Proj.
When Certkingdom.com releases A new policy that requires employees to produce their own new
Projects, you decide to have the role of the employees who owns Certkingdom_Proj copied with the
intention of assigning it to the Research department employees.
You now need to configure the security settings for Certkingdom_Proj.
Which two of the following actions should you take?

A. You should consider having the Business Unit disabled.
Thereafter a new Business level should be created with the access level set to Business Unit.
B. You should consider having the Share privilege permitted with the access level set to User.
C. You should consider having the Read privilege assigned to the Business Unit.
D. You should consider having the privilege appended with the access level set to User.
E. You should consider having a privilege created with the access level configured to the User.

Answer: C,E

Explanation:


QUESTION 2
You work as an administrator at Certkingdom.com. You have received instructions from the CIO to modify
the relationships within Certkingdom.com’s Microsoft Dynamics CRM 4.0 environment. The requirements
are listed below:
• The entities CertkingdomSupplier, CertkingdomContact and CertkingdomCustom should have a 1:N relationship.
• CertkingdomSupplier should be the principal entity.
• The entities CertkingdomSupplier, CertkingdomContact and CertkingdomCustom should have a N:N relationship
You now need to need to apply the mapping.
Which of the following actions should you take?

A. You should map a field from the CertkingdomSupplier entity to the CertkingdomContact entity.
B. You should publish the CertkingdomSupplier entity to the CertkingdomCustom entity.
C. You should edit the CertkingdomCustom entity to the CertkingdomSupplier entity.
D. You should change the status of the CertkingdomContact entity to the CertkingdomSupplier entity.

Answer: A

Explanation:


QUESTION 3
You work as a Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. You are in the process of
modifying certain relationships within Certkingdom.com’s Microsoft Dynamics CRM 4.0 environment. You
have received instruction from the CIO to set up the 1:N relationship between the CertkingdomAccount
and CertkingdomIncident entities to comply with the following set criteria:
• As soon as a different employee is assigned to the account, the active incidents must be
available that employee.
• The incidents of the previous employees should be closed.
Which of the following actions should you take?

A. The best option is to set the cascading behavior for the relationship to parental.
B. The best option is to open the form and add a section to cascade User-Owned.
C. The best option is to set an attribute of type varchar with format text to referential.
D. The best option is to set up the cascading behavior to Cascading. You should also set the
cascading rule for Assign to cascade Active.

Answer: D

Explanation:


QUESTION 4
You work as a Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. You are currently adding a
custom feature to the CertkingdomContact entity. CertkingdomContact will be used by Certkingdom.com employees to
hold client data. You have configured CertkingdomContact to hold data in the plain text format.
The CIO has informed you that multiple lines must be available for entering text since the amount
of data is so vast.
Which of the following actions should you take to make sure that the custom feature is able to
maintain a textbox with multiple lines? (Choose all that apply.)

A. You should create a workflow with Microsoft Office SharePoint Designer 2007. You should also
implement a feature of type ntext.
B. You should implement a feature of type varchar with format TextArea. You should also
implement a feature of type ntext.
C. You should implement a new content type and associate it with the relevant document. You
should also implement a feature of type ntext.
D. You should implement the State field to inherit the regional setting. You should also implement
a feature of type ntext.

Answer: B

Explanation:


QUESTION 5
You work as the Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. Certkingdom.com’s Sales
department employs a custom entity named Certkingdom_Sales, which is configured as the primary entity
in the Sales relationship.
During the course of the day you have received numerous complaints from Certkingdom.com users stating
that they are inable to relate existing Sales with Certkingdom_Sales when creating new Accounts in the
Certkingdom_Sales entity.
Which combination of the following actions should you take to address this issue?

A. The best option is to consider adding the Sales relationship attribute to the Certkingdom_Sales.
B. The best option is to consider selecting the Work Offline option adding the relationship.
C. The best option is to consider modifying the site master page to contain the relationship.
D. The best option is to consider publishing the Certkingdom_Sales after creating the relationship.
E. The best option is to consider applying a data connection file the relationship.

Answer: A,D

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Sunday, March 4, 2012

MB2-423 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1:

You work as the Sales Manager at Certkingdom .com. Microsoft CRM 3.0 is
implemented on the Certkingdom .com network.
You need to identify the types of leads that will result in the most opportunity using
Microsoft CRM. A Certkingdom .com employee named Kara Lang works in the Sales
Department. You delegate the task of identifying the types of leads that will result in the most opportunity.
You inform Kara Lang that she must use the most efficient manner?
What should Kara Lang do?

A. She should create a new marketing campaign.
B. She should run the Microsoft CRM Lead Source Effectiveness Report.
C. She should create a Microsoft CRM Advanced Find search.
D. She should create a new View for Lead Types.
E. All of the above.

Answer: B


QUESTION 2:

You work as a CRM consultant at Certkingdom .com. Microsoft CRM 3.0 is
implemented on the Certkingdom .com network. Certkingdom .com is currently running a
marketing campaign. The Manager of the Marketing department is named Clive
Wilson. Clive Wilson wants to track responses from customers.
What should Clive Wilson do?

A. He should make use of the Expected Response.
B. He should make use of the Response Code.
C. He should make use of the Promotion Code.
D. He should make use of the Lead Code.

Answer:


QUESTION 3:

You work as a CRM consultant at Certkingdom .com. Microsoft CRM 3.0 is
implemented on the Certkingdom .com network.
Certkingdom .com has recently hired a new junior sales representative named Mia
Hamm. Mia Hamm is not familiar with Microsoft CRM works in the IT department
and wants to know what the features of contacts in CRM are.
What would you reply? (Choose all that apply.)

A. A feature of the contacts in Microsoft CRM is that the account does not need a contact.
B. A feature of the contacts in Microsoft CRM is that the contact should have only one
parent account but can have more than one sub-contact.
C. Features of contacts in Microsoft CRM are that the contact must have sub-contacts
and you are able to achieve inventory management.
D. A feature of the contacts in Microsoft CRM is that you can achieve inventory
management and have a Many-to-Many supported relationship.

Answer: A, B


QUESTION 4:

Rory Allen works as a Sales consultant at Certkingdom .com. Certkingdom .com has deployed
Microsoft CRM 3.0. Rory Allen wants to know what advantages Certkingdom .com can
achieve by making use of the Microsoft CRM Sales Management module to follow a
defined sales process.
What would you reply? (Choose all that apply.)

A. You should be able to determine qualified opportunities and accomplish inventory management.
B. You should be able to obtain sales data easily for reporting.
C. You should be able to accomplish inventory management and shorter sales cycles.
D. You should be able to accomplish shorter sales cycles and determine qualified opportunities.

Answer: B, D


QUESTION 5:

You work as a Sales consultant at Certkingdom .com. Microsoft CRM 3.0 is
implemented on the Certkingdom .com network.
You need to identify the information needed to schedule a service for a customer.
What should you do?

A. Identify the location where the service will be performed.
B. Identify the time and subject for the appointment.
C. Identify the subject and place for the appointment.
D. Identify the customer as well as the time for the appointment.

Answer: B


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com