What the cloud really means for your IT job

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

As companies adopt cloud services, is there more or less of a need for IT workers?

Depending on which survey or story you read, the cloud can be either a good thing for IT workers and their job security, or it can be terrifying.

For example, a study by Microsoft and IDC recently predicted that cloud computing will create 14 million jobs internationally by 2015. But those aren’t just IT jobs, they are jobs spread around the entire world, across all industries.

For IT shops, the news may not be as bright: A study by IT service provider CSC concluded that 14% of companies reduced their IT staff headcount after deploying a cloud strategy.

As businesses embrace the cloud, experts say there will still be a need for IT staff in the enterprise, but there will be a need for different types of IT workers. Instead of managing infrastructure, tending the help desk and commissioning server instances to be created, IT workers of tomorrow are instead more likely to be managing vendor relationships, working across departments and helping clients and workers integrate into the cloud.

RELATED: Study: Cloud will create 14 million jobs by 2014

SLIDESHOW: Forbes’ Top Tech Billionaires

“The No. 1 reason most enterprises are going to the cloud is cost savings,” says Phil Garland, of PricewaterhouseCooper’s CIO advisory business services unit. The largest line items in enterprise budgets are traditionally labor, so as enterprises deploy the cloud, it will reduce the number of staff needed, he says.

But, this doesn’t necessarily mean that IT jobs are gone with the wind. In fact, while 14% of businesses surveyed by CSC cut IT staff, another 20% actually increased staff.

“It really depends on what the enterprise is doing in the cloud,” Garland adds. “In most cases, it’s a shift of responsibilities instead of wholesale cutting or hiring.”

Take the example of Underwriters Laboratories in Illinois, a 9,000-person company that provides third-party inspection and certification services to more than 50,000 businesses around the world with its trademark UL symbol.

In August, the company transitioned from an in-house managed deployment of IBM communications systems Lotus Notes and Domino, to a cloud-based SaaS offering of Microsoft Office 365. “We needed something that would be much more elastic,” says CIO Christian Anschuetz. The company has executed a handful of mergers and acquisitions in recent years, and it expects more in the future. Anschuetz wanted a simpler way of deploying increased instances of communications systems without the need to add infrastructure to support it.

The migration to the cloud took about eight weeks and it created an almost immediate shift in the firm’s IT needs. UL no longer needed workers to manage its communications platform, email servers and chat functions. Despite cutting in those areas, Anschuetz says his investment in cloud personnel has tripled since the cloud adoption.

“Most people think that with such a deployment we would be drawing down our services to make them more cost-effective,” he says. “Our internal IT is growing.”

The greatest need for services in UL’s new system is for customer-facing employees that can help UL clients integrate into the company’s platform. As a firm that oversees product development and manufacturing, Anschuetz says customers want UL workers to be involved in the product lifecycle as early as possible. A cloud-based system, he says, allows UL to work more closely with customers on product development. Instead of a face-to-face meeting, or emailing documents back and forth, now documents are hosted in a cloud environment that both UL and the customer have access to, allowing for greater collaboration, he says. “UL has realized the elasticity that the cloud provides us is of great value in the marketplace,” he says. “It allows us to develop new applications and regenerate relationships with customers.” Because of the value it creates for the business, UL is adding workers that help manage the cloud integration efforts.

This is the reasoning IDC and Microsoft used in its study claiming the cloud will help create 14 million jobs in the next five years.

“By offloading services to the cloud, you increase the amount of budget you have for new projects and initiatives, which are the things that truly lead to new business revenues,” says John Gantz, an IDC research who studies technology economics.

Three-quarters of IT spending today, he says, is on legacy systems and upgrades, with the remainder on new products. If an enterprise cuts system management costs, that creates additional resources for new projects and initiatives, which drive revenues and can potentially create jobs. Although, Gantz stresses, those may not be in the IT department.

In the short term, cloud deployments can create an increased need for IT staff to manage the transition and monitor the new cloud system and vendors. In the long term, however, the cloud generally creates efficiencies and reduces IT staffing jobs in an enterprise, he says. On a macroeconomic level, Gantz doesn’t see the cloud having a macroeconomic impact. Some of the jobs lost in individual companies could be offset by increases in staffing needs by cloud vendors, he says.

David Moschella, global research director for the Leading Edge Forum at CSC, agrees that IT investments usually lead to a drop in staffing needs for a company.

“Businesses can be run with less people because of technology advancement,” he says.

Traditionally there has been an argument that when jobs are eliminated in one area, they can be increased in another. Moschella believes that will be the case, but he says it’s too early to tell exactly which areas will be the beneficiaries of the job boom the cloud can provide.

What is expected is that traditional IT roles of managing software and hardware will no longer be needed in the new cloud-heavy world.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Windows 8 wants developers to fall into Metro lockstep

A unified approach to applications will make things easier on users

microsoft message to apps developers: Fit into the Metro style of Windows 8 to make things easier on end users, according to two developers.

Microsoft is trying to change users’ expectations about applications in general by creating an environment that remains similar app to app, according to the developers, and that means complying with Metro style and tapping into features grounded in the operating system itself.
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
Dictionary.com, which has written a Windows 8 application for its search service, uses the Windows 8 Search charm — an icon — that appears on the right side of the screen. That way users who want to make a search of the machine don’t have to call up the application and execute a separate search command, says David Wygant, vice president of product and general manager of mobile at Dictionary.com.

Similarly, salespeople go to the same Search charm when they want to look for a given customer’s data in a custom CRM application that has been written by Sonoma Partners for one of its clients.

Over time users will learn that the search charm is where to look for the search function when they are on a Windows 8 machine, regardless of what application they want to search with so long as all developers follow Microsoft’s suggestions, Wygant says. He calls this overarching search feature “persistent search.”

Dictionary.com wrote its application at Microsoft’s request and it is one of the apps available for free download when users download Windows 8 Consumer Preview. It was written with input from Microsoft on how the application should look and be navigated to fit in with the overall Windows 8 user interface, Wygant says.

Microsoft is promoting a global design standard for Metro-style apps so users will feel comfortable on Windows 8 machines regardless of what application they are using and no matter whether they have used it before. Functions specific to applications should reside in an application bar across the bottom of the screen that remains hidden until a finger swipe calls it up. In the Dictionary.com application that includes a verbal pronunciation of words, favorites and pinning.

Having such features located in the same place application to application makes learning new ones faster, Wygant says.

His company’s application also makes use of Live Tiles, a Windows 8 feature that places a tile — a colored square or rectangle — on the computer’s Start screen. It is said to be live because it displays dynamic content, such as Dictionary.com’s word of the day. Users touch the tile to access the full application. “Live tiles let you consume part of the application without opening up the application,” he says.

The Metro style strips away the chrome from applications, chrome being a term for the graphic decorations that can clutter a screen. “Dictionary is about words, content,” Wygant says. “That’s appealing for us. The user double-taps on a word within a definition, and it will look up the definition of that word without additional navigation.”

Microsoft approached Dictionary.com in December 2011 to produce an application for Windows 8, and the company delivered it in January, a rapid turnaround time for one of its apps, Wygant says. Microsoft loaned Dictionary.com a Windows 8 touchscreen tablet to help in the process, but the company has been using the application on an iPad via Parallels and on PCs with a mouse and keyboard.

Wyant recommends picking the right programming language for the application being written. He says a graphics-heavy or processor-intensive app would better be written in C# than Java Script. Java Script works great for apps like Dictionary.com, but he would use C3 if he were writing a game.

As for the other application developer, Sonoma Partners, its application was written for a beer maker that has decided already to turn its mobile CRM application over to Windows 8 tablets. New Belgium Brewing of Fort Collins, Colo., is a Microsoft shop and sticking with Windows for its mobile devices fits with the IT department’s expertise.

The brewers had tried a generic CRM mobile app for cellphones, but the app was so unwieldy that the 100-person salesforce — called beer rangers — didn’t use it, says Jim Steger, a principal with Sonoma Partners. A slate proved too big, but a tablet the size of an iPad is about right, he says.

After riding around with beer rangers, his team got a good idea of what they wanted the application to do and wrote it up. The rangers need to tap into sales databases, check call schedules, enter survey information and drop orders into the backend workflow system.

The application is also hooked into the device’s GPS so it can advise when a beer ranger is within driving distance of a prospective customer.

New Belgium’s application, called Ultimate Beer Ranger, uses the Windows 8 Share charm to post entries to Facebook accounts the rangers have set up. They don’t have to actually access Facebook, just enter the post and press a tile, Steger says. The app uses the Search charm as well to search CRM data.

It’s still up in the air whether custom applications like Ultimate Beer Ranger will be allowed on Windows on ARM (WOA) devices, Steger says. Microsoft has said WOA machines will be maintained via Windows Update and will support applications only from Windows Store.

But having to put custom proprietary apps in the store would stymie development, he says. He wouldn’t want to post such applications where they could be reviewed by competitors. He’s told Microsoft about his concerns and he expects the company to address them by the time Windows 8 and WOA tablets are available, possibly sometime early next year.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

Microsoft’s MAPP reportedly hacked, RDP exploits coming sooner than expected

Microsoft’s early patch information distribution system appears to have been hacked, giving attackers a jumpstart at building a worm.

When Microsoft’s Patch Tuesday release earlier this week revealed a code execution vulnerability for Remote Desktop Protocol (RDP), we knew it wasn’t a good sign. We didn’t expect the situation to get this dangerous so quickly, however, and neither did Microsoft.
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
RELATED: Microsoft incites madness with March’s Patch Tuesday release

Details continue to surface surrounding the RDP exploit, including allegations that the Microsoft Active Protections Program (MAPP), which provides security vendors patch information ahead of its actual release, has been compromised. According to ZDNet blogger Ryan Naraine, several sources claim that the MAPP was breached by hackers in China. Among those making the accusations is security researcher Luigi Auriemma, whom Microsoft credited with discovering the RDP vulnerability in the first place.

RELATED: Don’t Wait on This Patch, Microsoft says

One undisclosed security researcher who spoke to Naraine says he “can say with 100% certainty that MAPP information got into the wrong hands,” a claim that Auriemma supported “with no doubt whatsoever,” Narraine wrote.

Auriemma, in a separate statement emailed to SC Magazine, offers even scarier information for those that are late in making the patch. Two early exploits have been proven to cause the infamous blue screen of death on targeted Windows XP and Server 2003 devices, Auriemma told SC Magazine.

Symantec has since confirmed reports of a Proof of Concept (PoC) for a denial of service attack through the exploit Microsoft tried to patch on Tuesday.

Hackers with access to the MAPP would be able to build and distribute attacks more quickly than their potential targets could protect themselves. Even though Microsoft, and every security researcher I spoke to, urged those running RDP to deploy the patch immediately, “if not sooner,” Microsoft researchers had initially warned in a company blog post that they “anticipate that an exploit for code execution will be developed in the next 30 days.”

Now, some may be wishing for that 30 days.

“The threat level with MS12 -020 is rising rapidly,” Lamar Bailey, director of security research and development for nCircle, says. “Over the weekend attackers will be adding malicious payloads to the exploit code Symantec found and we’ll see that in the wild by Monday, if not sooner. Within a week we’ll see multiple malicious payloads, and it will definitely become a worm.”

Meanwhile, hackers are wasting little time trying to establish a more severe threat, with this financially incentivized request for “a working exploit for CVE-2012-0002 (the new RDP hole) as a Metasploit module” posted on web developer project networking site Gun.io.

If Microsoft’s emphasis of the exploit earlier in the week didn’t grab the attention of enterprise IT, these reports will, especially with the risk level rising as quickly as it is, Bailey says. And it could make for a long St. Patrick’s Day weekend.

“Patch it now or pay later,” Bailey says. “This should be at the top of every enterprise security team’s list every day until their entire network is completely patched.”

Essential browser tools for Web developers

Essential browser tools for Web developers
What the professionals use and recommend to their colleagues

Computerworld – Out of the thousands of cool add-ons out there for Firefox, Chrome and other popular Web browsers, only a select few make it onto the desktops of professional Web developers and designers. Which are the most useful for the day-to-day work of designing and developing websites?

Browser tools for Web devs

Code inspection, editing and debugging
Design assistance
Enhancing performance
Handy utilities
Boosting SEO
Collaboration

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Computerworld asked more than 20 professionals from across the country what they recommend to their colleagues and why. While they stuck mostly with free browser extensions, they couldn’t resist throwing in a few highly useful tools and services that are accessed via a browser rather than being true add-ons.

Here’s their hot list, where you’ll find some old favorites and, we hope, discover some new tools for your arsenal.
Code inspection, editing and debugging

These three tools make the job of viewing website code and prototyping page changes fast and easy. No need to touch the live code until you’re ready to commit to changes.

What it does: Inspects, edits and debugs website code within your browser.

Who recommends it:
• Matt Mayernick, vice president of Web development, Hudson Horizons in Saddle Brook, N.J.
• Josh Singer, president, Web312 in Chicago
• Richard Kesey, president and founder, Razor IT in Syracuse, N.Y.
• Ryan Burney, lead Web developer, 3 Roads Media in Greenwood Village, Col.

Why it’s cool: Probably the best known of all the tools listed here, “Firebug is the greatest add-on ever created,” Mayernick says. It’s not just the fact that Firebug lets developers inspect website code and elements, but how it helps with debugging that makes the tool great. “If I am writing JavaScript that’s changing the background color in a row, Firebug will show what’s happening to the CSS code in real time,” he says.
Firebug
Firebug displays the page’s HTML code in the lower left window and its CSS data in the lower right. Click to view larger image.

Firebug inspects the code by presenting the HTML and the CSS code in two side-by-side windows. “Firebug is indispensable. What’s cool is you can turn styles on or off or add styles on the fly. It lets me make changes live on the page without having to save or reload the files,” says Burney.

“It’s great for finding JavaScript errors,” adds Kesey. “When you click on an Ajax link, it reads out what the action is and gives you the response in an https: format so you can see what the headers were and what’s happening behind the scenes.”
Web Developer
Author: Chris Pederick
Browsers supported: Chrome, Firefox
Price: Free
Where to get it: Install Web Developer for Chrome or Web Developer for Firefox

What it does: Provides a toolkit for viewing, editing and debugging websites.

Who recommends it:
• Darrell Armstead, mobile developer, DeepBlue in Atlanta
• Jen Kramer, senior interface developer, 4Web in Keene, N.H.

Why it’s cool: “I love Web Developer because of the control it gives me over any site. It gives me the ability to strip a site down to its core, and lets me modify and tweak things to get it looking and working the way I want it to,” Armstead says. But that’s not all he likes: “I love the Outline Block Level Elements feature because it gives me a visual representation of how a site is built on the front end.”
Web Developer add-on
Web Developer displays the style sheets associated with a page and lets you edit them to quickly see how changes will look before actually making any changes to the website’s code. (Credit: Jen Kramer)
Click to view larger image.

Kramer chimes in: “What I like about it is the ability to look at CSS. It shows all of the style sheets available on the page, and I can edit those on the fly and see how it looks in the browser,” she says. “That’s particularly helpful to me because I work with content management systems. It allows me to style what’s being sent to the browser.

“Firebug has something similar, but I find it more difficult to use. It’s much harder to get a style sheet out of Firebug and into Joomla,” Kramer adds. For me, Web Developer works better.”
Google Chrome Developer Tools
Author: Google
Browser supported: Chrome
Price: Free
Where to get it: Included with the Chrome browser. Right-click on any Web page in Chrome and choose “Inspect Element,” or choose View –> Developer –> Developer Tools from the menu.

What it does: Provides tools for inspecting, editing and debugging website code.

Who recommends it:
• Jason Hipwell, managing director, Clikzy Creative in Alexandria, Va.
• Shaun Rajewski, lead developer at Web Studios in Erie, Pa.
• Ryan Burney, 3 Roads Media

Why it’s cool: Developer Tools is Google’s answer to Firebug for Firefox, but there’s no add-on to download: Google built it right into the Chrome browser.

“It is my favorite ‘extension’ because of its intuitive design, with HTML on the left, CSS on the right,” says Hipwell. “Inspect Element will highlight elements on a page as you hover over them, which makes it easy to find the div tag I am looking for. It gives me the ability to see changes on a live site, but those changes exist only on my local computer, making it a perfect testing environment. Its simplicity is really what makes the tool so effective.”
Chrome Developer Tools
Using Chrome Developer Tools, Clikzy’s Jason Hipwell has replaced the Computerworld logo with his own in just a few clicks. (Credit: Clikzy Creative) Click to view larger image.

Rajewski is also a big fan. “Developer Tools allows you to see the final output of what is rendered to [the] screen, and has the ability to highlight individual elements, view the elements’ CSS tags and inherited tags, and make ‘live’ changes to the code to see what it looks like in the browser without making file changes,” he says.

“One nice thing about Chrome’s Developer Tools is that it will give you the dimensions of things,” says Burney. Click on the image URL and up pops the image with the associated link, image dimensions and file type displayed. That’s something Firebug doesn’t do, he says. “Being able to know at a glance the dimensions of an object, that’s a big time saver.”

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

MB2-632 Q&A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


QUESTION 1
Certkingdom.com has employed you as a Microsoft Dynamics CRM 4.0 administrator. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
The Certkingdom.com management has requested that you draw up a list of facts regarding knowledge
base articles.
Which of the following options would be part of your list?

A. Knowledge base articles can only be viewed by permitted users.
B. A knowledge base article selects the Work Offline option.
C. A knowledge base article displays the data in the Resources Earned Value view.
D. A knowledge base article edits the layout of each page.

Answer: A

Explanation: You should inform management that it can be viewed only by permitted users. If you
are permitted to use Microsoft Dynamics CRM 4.0, you can view the Knowledge Base Articles.
Reference: https:://support.microsoft.com/kb/950100


QUESTION 2
Certkingdom.com has employed you as a Microsoft Dynamics CRM 4.0 administrator. Certkingdom.com consists
of a Sales division and a Marketing division. Certkingdom.com is currently promoting the third edition of a
Finance software package. When a fourth edition is released, it is regarded as a major uCertkingdomrade.
The manual for the fourth edition requires a supplementary segment.
You have received instructions from the CIO to retain Third Edition documentation for clients that
continues using that edition of the software. The CIO has also informed you that new
documentation should only be produced for the Fourth Edition of the Finance package.
Which of the following actions should you take?

A. You should bring down the article template for edition 3.0 documents and assimilate a new
article template for edition 3.8 documents.
B. You should configure the content deployment settings to 3.0 documents.
C. You should bring down the article template for edition 3.0 documents and remove the
accounted attribute for edition 3.8 documents.
D. You should delete the projected attribute for edition 3.8 documents.

Answer: A

Explanation: You need to bring down the article template for edition 3.0 documents. You can also
assimilate a new article template for edition 3.8 documents. Article Templates are used when
working with the Knowledge Base (found in the Service section of Microsoft Dynamics CRM).
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


QUESTION 3
Certkingdom.com has employed you as a Microsoft Dynamics CRM 4.0 administrator.
You receive an instruction from the CIO to inform the new interns in your division of the records
that will be linked to the sales literature.
Which two of the following options should you take?

A. You should inform the interns that the Products will be linked.
B. You should inform the interns that the Attention grabbing headlines will be linked.
C. You should inform the interns that the Strong offers will be linked.
D. You should inform the interns that the Half-truths will be linked.

Answer: A

Explanation: You need to inform the interns that the Competitors and the Products are
associated. The Sales Literature consists of documentation about your products designed to be
used by your sales persons. Furthermore, with Sales Literature you can add Products and identify
Competitors.
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


QUESTION 4
You are the Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. Certkingdom.com consists of a Sales
division and a Marketing division. For service management, Certkingdom.com makes use of contracts and
contract lines.
A new Certkingdom.com policy states that all cases must be associated with a contract line because this
information is necessary for analysis and reports. Historically, subject hierarchy was only created
for cases at Certkingdom.com. While analyzing the subject hierarchy, you notice a few previously used
ones that are not required any more.
You have been instructed to update the subject hierarchy.
Which of the following actions should you take?

A. You should navigate to the Views area of the Account Customization window and edit the
Lookup View.
B. The best option is to edit pick list options and current cases under their respective subjects.
C. The best option is to change all messages associated with the hierarchy and put the subjects
with the cases in it.
D. The best option is to reorganize the subject hierarchy.
Thereafter archive parent subject area should be created in the hierarchy and move the redundant
subjects under it.

Answer: D

Explanation: You need to reorganize the subject hierarchy and create an archive parent subject
area in the hierarchy and move the not needed subjects under it.
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


QUESTION 5
You work as a Microsoft Dynamics CRM 4.0 administrator at Certkingdom.com. The Certkingdom.com network
consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com consists of a Sales division. Certkingdom.com is using schedules for their Sales division. Some
of the users in the Sales division have permanent contracts, while others are hired on short-term
basis. The short-term users are normally employed for a minimum of two weeks at a time. You
then implement schedules for the users in the Sales division; however, the Sales staff does not
view the schedules. You need to keep the record of the short-term users.
Which of the following actions should you take?

A. You should create new format of the Contact records.
You should then have the short-term users disabled.
B. You should set up a Facility/Equipment record for every short-term user.
You should then remove the record when the short-term user’s contract expires and they depart.
C. You should create Contact entity.
You should then delegate the estimated time of job accomplishment.
D. You should delete the short-term user field from the record.

Answer: B

Explanation: You need to set up a Facility/Equipment record for each short-term user. You should
also delete the record when the short-term user’s contract expires and they depart.
Facilities/Equipment is needed when performing scheduling. It makes up the Resources
component. Delete Entity enables you to completely delete the record.
Reference: Working with Microsoft Dynamics™ CRM 4.0, Second Edition


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

70-576 Q&A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


QUESTION 1
You are employed as a SharePoint administrator at CertKingdom.com. CertKingdom.com has a
SharePoint Server 2010 site.
You need to develop a custom workflow for a document approval process that relies on an
approval chain. The approval chain must consist of several reviewers with each reviewer
approving or rejecting the document as part of the approval process. Once a reviewer has
provided his or her feedback, the status of the document must be changed automatically, an
automated email must be sent to the author and the next reviewer in the approval chain must be
notified automatically. The task for the next reviewer should also be created automatically.
Which of the following actions should you take? (Choose Two.)

A. You should consider including an Association form for feedback from reviewers.
B. You should consider including an Initiation form for feedback from reviewers.
C. You should consider including a Modifications form for feedback from reviewers.
D. You should consider including a Task form for feedback from reviewers.
E. You should consider including a Composite activity for approval and rejection.
F. You should consider including a Logged activity for approval and rejection.
G. You should consider including a Simple activity for approval and rejection.

Answer: D,E


QUESTION 2
You are employed as a SharePoint administrator at CertKingdom.com. CertKingdom.com has a
SharePoint Server 2010 site.
You have been tasked with developing a SharePoint Server 2010 feature that contains a feature
receiver. Whenever the SharePoint Server 2010 feature is activated or deactivated, the feature
receiver runs code that interacts with a Web service. This could result in unmanageable errors.
In the event that the Web service does result in errors, the SharePoint Server 2010 feature should
be prevented from activating or deactivating.
You start by wrapping the code in a Try-Catch block.
Which combination of the following actions should you take NEXT? (Choose two.)

A. You should consider having the error logged.
B. You should consider sending an additional request to the Web service in the Catch block.
C. You should consider throwing an exception in the Catch block.
D. You should consider capturing SPException type exceptions only.
E. You should consider throwing an exception in the Finally block.

Answer: A,C


QUESTION 3
You are employed as a SharePoint administrator at CertKingdom.com.
CertKingdom.com has a Windows Server 2008 computer named CERTKINGDOM-SR76 that has a
RAID-0 volume. CERTKINGDOM-SR76 runs SharePoint Server 2010 with a Microsoft SQL Server
Express 2008 database. CERTKINGDOM-SR76 also hosts a SharePoint site that contains 56 GB of
multimedia content. Some of the files that are included in the multimedia content are as big as 18
MB. The SharePoint site to use the standard SharePoint components and features.
You are required to make sure that CERTKINGDOM-SR76’s hard disk is configured for optimum read
performance.
Which combination of the following actions should you take? (Choose two.)

A. You should make use of Filestream storage on the database.
B. You should make use of Filestream storage on the SharePoint site.
C. You should make use of remote Binary Large Object (BLOB) storage on the SharePoint site.
D. You should make use of external Binary Large Object (BLOB) storage on the SharePoint site.
E. You should make use of Binary Large Object (BLOB) storage on the database.

Answer: A,C


QUESTION 4
You are employed as a SharePoint administrator at CertKingdom.com.
CertKingdom.com runs SharePoint Server 2010 with a Microsoft SQL Server Express 2008 database.
SharePoint hosts a site that contains two lists named Customers and Invoices. Certain customers
have numerous invoices.
You have been tasked with making sure that the two lists need relates to each other.
Which two of the following actions should you take? (Choose two.)

A. You should consider create a one-to-one relationship.
B. You should consider create a one-to-many relationship.
C. You should consider create a many-to-one relationship.
D. You should consider including a Lookup column on the Invoices list.
E. You should consider including a Business Data column on the Invoices list.
F. You should consider including an External Data column on the Customers list.
G. You should consider including a column index on the Invoices list.
H. You should consider including a column index on the Customers list.

Answer: B,D


QUESTION 5
You are employed as an application developer at CertKingdom.com. CertKingdom.com has a SharePoint
Server 2010 site.
You have been tasked with developing a SharePoint Server 2010 solution that has workflows
configured to include code on list items, as well as custom pages for adding, viewing, and
updating list items.
Which of the following is the type of solution that you should develop?

A. A SharePoint Server 2010 sandboxed solution.
B. Multiple SharePoint Server 2010 sandboxed solutions.
C. A SharePoint Server 2010 farm solution.
D. A solution containing the Web Part and its related assemblies.

Answer: C


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

70-573 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


QUESTION 1
A site definition has been purchased from another company. It is used to created SharePoint sites.
Now there is a request to modify the home page for the site definition by adding a Web Part.
What actions need to be taken? Select two.

A. Add..
B. Uninstall..
C. Remove…
D. Modify..
E. Install…
F. ..the file CSTemplate.xsd
G. ..the file Onet.xml
H. ..a Feature receiver
I. ..a Feature dependcy
J. ..the file config.web
K. ..the file web.config

Answer: D,G

Explanation:


QUESTION 2
A customized Site Featured need to be made. There is customized site definition.
The Feature of this site definition must be activated for all additional sites which are created using
it.
What actions need to be taken? Select two.

A. Add..
B. Uninstall..
C. Remove…
D. Modify..
E. Install…
F. ..the file CSTemplate.xsd
G. ..the file Onet.xml
H. ..a Feature receiver
I. ..a Feature dependcy
J. ..the file config.web
K. ..the file web.config

Answer: D,G

Explanation:


QUESTION 3
There is third party site definition named CertKingdom.
A file named TemplateCertKingdom.xsd is included in CertKingdom.
TemplateCertKingdom.xsd contains configuration date.
There is a provision handler for CertKingdom.
The information in TemplateCertKingdom.xsd must be read.
The following property should be used.

Answer:


QUESTION 4
There is a specialized program to import data into SharePoint sites.
There is a specialized site definition named CertKingdom created by MS Visual Studio 2010.
The specialized program code must be run whenever a new site is created by using CertKingdom.
What should be done to ensure this? Select three.

A. Modify..
B. Add…
C. Delete…
D. ..file..
E. ..class..
F. ..feature..
G. .. CSTemplate.xsd
H. ..SPItemEventReceiver
I. .. Onet.xml
J. .. receiver
K. .. SPChangeFile
L. .. SPWebEventReceiver
M. .. dependcy
N. .. SPWebProvisioningProvider
O. ..config.web
P. .. web.config

Answer: B,E,N

Explanation:


QUESTION 5
There is a specialized Web Part named CertKingdomWebpart.
There must be a test to check if CertKingdomWebpart generates leaks in the RAM.
What should be done to ensure this? Select two.

A. Modify..
B. Add…
C. Run..
D. Delete…
E. .. WinDbg.exe
F. .. CSTemplate.xsd
G. ..SPItemEventReceiver
H. .. Onet.xml
I. .. SPDisposeCheck.exe
J. .. SPChangeFile
K. .. SPWebEventReceiver
L. .. SPMetal.exe
M. .. SPWebProvisioningProvider
N. ..config.web
O. .. web.config

Answer: C,I

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

 

Researchers hack IE9 during second day at Pwn2Own

Researchers from VUPEN Security exploited previously unknown vulnerabilities in Internet Explorer 9 at the CanSecWest conference

Internet Explorer 9 was the second browser to succumb to white-hat hackers during the Pwn2Own contest at the CanSecWest security conference in Vancouver.
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
Contest hacks the heck out of Chrome

A team of vulnerability researchers from French security firm VUPEN Security exploited a pair of previously unknown vulnerabilities in the latest version of Microsoft’s browser on Thursday.

The attack was demonstrated on a fully patched 64-bit Windows 7 with Service Pack 1 system and earned the VUPEN team 32 points in the annual Pwn2Own competition sponsored by TippingPoint’s Zero Day Initiative (ZDI) program.

The rules have changed for this year’s Pwn2Own contest, its focus shifting from who can hack a browser faster, as it was in previous editions, to who can write the highest number of reliable exploits. Researchers earn 32 points for exploiting previously unknown browser vulnerabilities, also known as zero-days, and 10 points for exploiting patched vulnerabilities selected by the organizers.

VUPEN is currently in the lead with 124 points, 64 of which were earned for a zero-day exploit against Google Chrome on Wednesday and a similar one against Internet Explorer 9 on Thursday. The team claims to have similar exploits for Apple’s Safari and Mozilla Firefox.

VUPEN’s Internet Explorer 9 exploit leveraged two vulnerabilities — a remote code execution (RCE) that bypassed the browser’s anti-exploitation mechanisms like DEP (Data Execution Prevention) or ASLR (address space layout randomization) and one that bypassed its post-exploitation defense, commonly known as the sandbox, or Protected Mode in Internet Explorer’s case.

The Internet Explorer 9 Protected Mode limits what attackers can do on the OS once they exploit a RCE vulnerability inside the browser. However, according to security researchers, IE’s Protected Mode is less restrictive than Google Chrome’s sandbox. This is expected to improve with Internet Explorer 10 on Windows 8.

It’s also worth noting that the order in which browsers get attacked at this year’s Pwn2Own contest has nothing to do with difficulty. Participating researchers come with their zero-day exploits prepared in advance and the order in which they demonstrate them is purely a matter of personal choice rather than an indication of one browser being harder to hack than another.

The zero-day RCE vulnerabilities are shared with TippingPoint, but not the sandbox-escape ones, which are considered highly valuable and rare. The organizers will share the details with the affected vendors after the contest is over.

Patch Tuesday: Microsoft to release 6 patches, 1 critical

Patch Tuesday: Microsoft to release 6 patches, 1 critical
Microsoft, Patch Tuesday for March: A continued drop in critical security bulletins has the security community overlooking a rise in total patches issued this year.

Microsoft announced today that next week’s Patch Tuesday will be the lightest of 2012, with six security bulletins and just one rated critical.

More: Windows 8’s 8 top apps (so far)

RELATED: Microsoft patch blows ‘perfect game’ but sends important message

The critical patch will pertain to all Windows customers as it addresses a vulnerability that affects the entire family of the operating system, up to and including Windows 7.

Four of the patches address vulnerabilities in Windows, including the critical patch for a remote code execution vulnerability and the moderate patch for a denial-of-service exploit. The remaining two patches, both rated important, target an elevation of privilege vulnerability in Visual Studio and a remote code execution in Expression Design, respectively.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

With six patches this month, Microsoft’s total for the year will reach 22, up from the 17 bulletins issued through March of 2011. The total for the month also exceeded that of last year, when Microsoft issued just three bulletins.

The year-over-year increase comes just one month after Microsoft was able to reduce its total number of bulletins issued in February from 12 in 2011 to nine this year. And while the year is still young, Microsoft is in danger of surpassing the 100 bulletins issued in all of 2011.

However, Lumension security and forensic analyst Paul Henry says those numbers are a poor representation of Microsoft’s progress with security. Citing recent improvements, as well as the novelty that its Internet Explorer web browser went “at least somewhat spared” during the Pwn2Own conference at which Google Chrome took a beating, Henry says the main point to focus on is the decrease in severity of vulnerabilities.

“I think they’re doing a better job. They’ve got the processes in place to better manage their software development in line with security,” Henry says. “They really have put a great deal of effort into this, and if you look at the longer-term trend, I think they’re really starting to bear some fruit from it.”

Both the security community and IT support professionals will welcome an increase in total patches issued if it means the number of critical patches remains low, Henry says.

“Part of the reason for that is that Microsoft, having cleared a large number of critical issues, is now focusing a lot of its attention on moderate and important issues and is just trying to clean things up,” Henry says. “So the number of bulletins won’t actually go down, but the critical bulletins absolutely will.”

Just 32 of the 100 patches Microsoft issued throughout 2011 were deemed critical, the lowest rate since the Patch Tuesday routine launched in 2004. So far this year, Microsoft has issued six critical vulnerabilities, putting it on pace to reduce that rate by 25%.

Colin Neagle covers Microsoft security and network management for Network World. Keep up with his blog: Rated Critical, follow him on Twitter: @ntwrkwrldneagle. Colin’s email is cneagle@nww.com.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

7003-1 Q&A / Study Guide / Testing Engine

Cisco CCNA Training, Cisco CCNA Certification

Best Avaya Certification Training and Avaya Exams Training  and more Cisco exams log in to Certkingdom.com


QUESTION 1
A technician deployed a Communication Server 1000E with dual homing feature configured. Both
the T and 2T ports are connected on the media Gateway Controller (MGC) one connection is
active to avoid network loops.
Which two statements are true, if the connection to the active port on the MGC is host?
(Choose two)

A. The MGC will issue a link down error.
B. The MGC will switch to the active pert.
C. The MGC and CPPM will have no loss of service.
D. The MGC will switch to the active port after 12 seconds.

Answer: B,C

Explanation:


QUESTION 2
A customer has deployed a Communication Server 100 Rls. 7x system at their site. The technician
has been asked to add the Call pickup feature to the 100 IP telephone in the sales department.
The customer wants to be sure active calls not lost when the changes are made.
Which Phones Configuration feature can be enabled that will ensure changes to the telephone are
not transmitted to the call server until the telephone are busy?

A. Bulk change
B. Courtesy change
C. Group change
D. Template change

Answer: B

Explanation:


QUESTION 3
A customer wants to build a new Ip node on their Communication Server (CS) 1000E system with
three Signaling Servers. This node will support virtual trunks, IP media services, TPS and
personnel directories. A technician logs into Elements manager to complete the configuration,
after creating and saving the node configuration, the transfer now option chosen, then the servers
are selected, the start sync is selected followed by restart application.
What is expected outcome from the system?

A. The node file will be transferred from Signaling Servers to the call servers, and INI files will be
transferred from the call server to the selected servers.
B. The node file will be transferred from Call Servers to the Signaling servers, and the INI files will
be transferred from the Call Servers to the selected servers.
C. The node file will be transferred from Signaling Servers to the Call Server, and the INI files will
be transferred from Call Servers to the Signaling servers.
D. The node will be transferred from Element manager to the call server, and INI files will be
transferred from Element manager to CallServer.

Answer: B

Explanation:


QUESTION 4
A customer wants to deploy an Avaya Server (CS) 1000 Rls. 7x system in Avaya Aura solution.
They plan to have the system support 50,000 users.
Which system type will meet the customer’s needs?

A. CS 1000E Co-Resident Call Server and Signaling Server
B. CS 1000E Standard Availability (SA)
C. CS 1000E High Availability (HA)
D. CS 1000E High Scalability (HS)

Answer: D

Explanation:


QUESTION 5
You are installing a new Communication Server 1000E (CS 1000E) SA release 7x system for your
customer. They have asked you to implement the corporate Directory Feature during the
installation.

A. SFTP must be disabled in LD 117.
B. Valid telephony accounts must already exist in Subscriber Manager.
C. The CS 1000E Call Server must be joined to security domain.
D. Centralized authentication must be disabled.

Answer: C

Explanation:


Cisco CCNA Training, Cisco CCNA Certification

Best Avaya Certification Training and Avaya Exams Training  and more Cisco exams log in to Certkingdom.com