98-388 Introduction to Programming Using Java

Published: October 12, 2017
Languages: English, Japanese, Chinese (Traditional), Chinese (Simplified), Spanish, Portuguese (Brazil), French, German, Korean
Audiences: IT professionals, Developers, Information workers
Technology: Java 6 SE
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Understand Java fundamentals (15-20%)
Describe the use of main in a Java application
Signature of main, why it is static; how to consume an instance of your own class; command-line arguments
Perform basic input and output using standard packages
Print statements; import and use the Scanner class
Evaluate the scope of a variable
Declare a variable within a block, class, or method

Work with data types, variables, and expressions (40-45%)
Declare and use primitive data type variables
Data types, including byte, char, int, double, short, long, float, boolean; identify when precision is lost; initialization; how primitives differ from wrapper object types such as Integer and Boolean
Construct and evaluate code that manipulates strings
String class and string literals, comparisons, concatenation, case and length; String.format methods; string operators; converting a primitive data type to a string; the immutable nature of strings; initialization; null
Construct and evaluate code that creates, iterates, and manipulates arrays and array lists
One- and two-dimensional arrays, including initialization, null, size, iterating elements, accessing elements; array lists, including adding and removing elements, traversing the list
Construct and evaluate code that performs parsing, casting and conversion
Implementing code that casts between primitive data types, converts primitive types to equivalent object types, or parses strings to numbers
Construct and evaluate arithmetic expressions
Arithmetic operators, assignment, compound assignment operators, operator precedence

Implement flow control (15-20%)
Construct and evaluate code that uses branching statements
if, else, else if, switch; single-line versus block; nesting; logical and relational operators
Construct and evaluate code that uses loops
while, for, for each, do while; break and continue; nesting; logical, relational, and unary operators

Perform object-oriented programming (10-15%)
Construct and evaluate a class definition
Constructors; constructor overloading; one class per .java file; this keyword; inheritance and overriding at a basic level
Declare, implement, and access data members in a class
private, public, protected; instance data members; static data members; using static final to create constants; describe encapsulation
Declare, implement, and access methods
private, public, protected; method parameters; return type; void; return value; instance methods; static methods; overloading
Instantiate and use a class object in a program
Instantiation; initialization; null; accessing and modifying data members; accessing methods; accessing and modifying static members; importing packages and classes

Compile and debug code (5-10%)

Troubleshoot syntax errors, logic errors, and runtime errors
print statement debugging; output from the javac command; analyzing code for logic errors; console exceptions after running the program; evaluating a stack trace
Implement exception handling
try catch finally; exception class; exception class types; display exception information

Click here to view complete Q&A of 98-388 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-388 Certification, MTA 98-388 Training at certkingdom.com

1Z0-936 Oracle Cloud Platform Enterprise Analytics 2018 Associate

Exam Number: 1Z0-936
Exam Title: Oracle Cloud Platform Enterprise Analytics 2018 Associate
Associated Certification Paths Oracle Cloud Platform Enterprise Analytics 2018 Certified Associate
Duration: 120
Number of Questions: 72
Passing Score: 70%
View passing score policy
Validated Against: Exam has been validated against Oracle Analytics Cloud 18.1.3
Format: Multiple Choice

Complete Recommended Training
Business Analytics Cloud Services Cloud Learning Subscription

Additional Preparation and Information
A combination of Oracle training and hands-on experience (attained via labs and/or field experience) provides the best preparation for passing the exam.

Our certification exams are revised regularly to align with training and product release updates. Information about exam revisions and new topics are found on this page under ‘Validated Statement’ and within the exam topics below. Certifications reflect validated skills for year and product release version date of achievement. If you are preparing for this exam, we recommend you check these topics periodically to ensure your exam prep covers any new topics that may be added based on regular exam revision.

Oracle Analytics Cloud (OAC)
Describe the editions of Oracle Analytics Cloud
Describe the solutions applicable for each OAC edition
Identify the pre-requisites for OAC
Explain the concept of a compute shape

Oracle Analytics Cloud Provisioning and Lifecycle
Provision Database. Storage and Identity Services
Provision Users and Application Roles
Explain how to migrate from OBIEE on prem to Oracle Analytics Cloud
Use the Oracle Baseline Validation Tool (BVT)
Troubleshoot OAC provisioning
Install client administration tools
Monitor server health
Apply OAC patches

Dimensional Modelling
Explain Transactional versus Analytical Systems
Describe Data Warehousing
Describe Dimensions, Facts and Hierarchies
Build Types of Dimensional Modeling
Describe the different layers of the BI Repository
Use the Administration Tool to view and modify the repository
Assign table access permissions to Application Roles

Data Visualization
Explain OAC ‘best visualization’ for a data set
Describe brushing and its benefits
Create a flexible layout of multiple visualizations
Use OAC to present your data as a story
Use BI Ask
Create a custom visualization plugin
Create a filter using a variable to control data that is displayed in a visualization

Data Preparation
Explain the importance of data preparation for the cloud
Describe self service data preparation
Perform operations on a data set
Describe ‘sequence’ in the context of OAC data preparation
Explain how OAC Data Sync works and when it is implemented
Explain the OAC remote data connector

Advanced Analytics
Describe the Advanced Analytics capabilities in OAC
Explain advanced analytic calculations in OAC
Create a trendline
Create a forecast
Use Clustering
Use Outlier Identification

Machine Learning
Use the ‘Explain’ functionality
Create and train a machine learning model
Analyze how effective the model is
Use an ML scenario in a project

Oracle Analytics Cloud Answers, Dashboards and BI Publisher
Use Answers to build an Analysis
Publish Multiple Analyses in a Dashboard
Create pixel perfect reports
Manage content in the Catalog
Troubleshoot OBIEE/BI Publisher Connection

Oracle Analytics Cloud Essbase
Work with Cube Designer
Describe Application Workbooks
Design and maintain Essbase Cubes
Model Data in Private Scenarios
Run MaxL Jobs in Cloud Service
Work with Essbase Command Line Interface (CLI)
Migrate On-Premise and Cloud Service Applications
Configure Cloud Service Resource Limits and Application Properties

Click here to view complete Q&A of 1Z0-936 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best Oracle 1Z0-936 Certification, Oracle 1Z0-936 Training at certkingdom.com

98-383 Introduction to Programming Using HTML and CSS

Published: August 31, 2017
Languages: English, Japanese, Chinese (Traditional), Chinese (Simplified), Spanish, Portuguese (Brazil), French, German, Korean
Audiences: IT professionals, Developers, Information workers
Technology HTML5 and CSS3
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Understand HTML Fundamentals (10-15%)
Construct markup that uses metadata elements
Script; noscript; style; link; meta tags, including encoding, keywords, viewport, and translate
Construct well-formed markup that conforms to industry best practices
DOCTYPE declaration; HTML; head; body; proper syntax, including closing tags and commonly used symbols; comments

Understand CSS Fundamentals (15-20%)
Analyze the impact of using inline styles, internal style sheets, and external style sheets
When to use inline styles; when to use internal style sheets; when to use external style sheets; precedence when using a combination of inline styles and style sheets
Construct and analyze rule sets
Valid syntax for the CSS rule set; selectors, including class, id, elements and pseudo-class
Construct well-formed style sheets that conform to industry best practices
Reusing rules and rule sets; commenting; testing on multiple browsers; web safe fonts

Structure Documents Using HTML (30-35%)
Construct and analyze markup to structure content and organize data
Table tags; h1-h6; p; br; hr; div; span; ul; ol; li
Construct and analyze markup that uses HTML5 semantic elements
Semantic tags; header; nav; section; article; aside; footer; details; summary; figure; caption
Construct and analyze markup that implements navigation
Image links; a; target; bookmark; relative versus absolute links; navigating simple folder hierarchies
Construct and analyze markup that uses form elements
Form attributes; action; method; submission methods; accessibility; input types and restrictions; select; textarea; button; output; option; datalist; fieldset

Present Multimedia Using HTML (10-15%)
Construct and analyze markup that displays images
img and picture elements and their attributes
Describe the appropriate use of the img, svg, and canvas elements
Construct and analyze markup that plays video and audio
Video; audio; track; source; simple iframe implementations

Style Web Pages Using CSS (20-25%)
Construct and analyze styles that position content
Positioning, including float, relative, absolute, max-width, overflow, height, width, and align; inline versus block; visibility; box model, including margins and padding
Construct and analyze styles that format text
Font-family; color; font-style; font-size; font-weight; link colors; text formatting, including text alignment, text decoration, and indentation
Construct and analyze styles that format backgrounds and borders
Border-color; border-style; border-width; backgrounds; divs; colors
Analyze styles that implement a simple responsive layout
Units of measure; responsive effects with CSS, including viewport and media query; percentages versus pixels; frameworks and templates; max width

Click here to view complete Q&A of 98-383 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-383 Certification, MTA 98-383 Training at certkingdom.com

1Z0-320 MySQL Cloud Service 2018 Implementation Essentials

Exam Number: 1Z0-320
Exam Title: MySQL Cloud Service 2018 Implementation Essentials
Associated Certification Paths MySQL Cloud Service 2018 Certified Implementation Specialist
Duration: 120 minutes
Number of Questions:  79
Passing Score: 60%
View passing score policy
Validated Against:  Exam has been validated against MySQL Enterprise Edition 5.7.
Format: Multiple Choice

Complete Recommended Training
Data Management Cloud Learning Subscription (Individuals & Companies | Partners)
Additional Preparation and Information
A combination of Oracle training and hands-on experience (attained via labs and/or field experience) provides the best preparation for passing the exam.
Our certification exams are revised regularly to align with training and product release updates. Information about exam revisions and new topics are found on this page under ‘Validated Statement’ and within the exam topics below. Certifications reflect validated skills for year and product release version date of achievement. If you are preparing for this exam, we recommend you check these topics periodically to ensure your exam prep covers any new topics that may be added based on regular exam revision.

Oracle MySQL Enterprise Product Suite
Describe the difference between MySQL Enterprise Edition and the Community/Standard Edition
Explain the products and features of MySQL Enterprise Products
Identity the Oracle products that are certified to work with MySQL Enterprise Edition

Installation and Architecture
Explain the MySQL infrastructure architecture
Install a MySQL Enterprise Server
Configure settings for a MySQL Enterprise Server
Access MySQL databases with MySQL Workbench
Manage MySQL Database users with MySQL Workbench

Database Design
Describe Datatypes in a MySQL database
Create databases and tables
Create basic SQL queries
Maintain Databases, Tables, and Columns
Configure Indexes and Constraints
Join Tables
Partition MySQL Tables

MySQL Security
Execute MySQL Authorization and Privilege Management
Manage MySQL Password Policies
Describe MySQL Enterprise Authentication
Describe MySQL Enterprise Encryption
Configure MySQL Enterprise Firewall
Configure MySQL Enterprise Audit

Leverage MySQL Enterprise Monitor
Explain MySQL Enterprise Monitor benefits and features
Describe the topology of the MySQL Enterprise Monitor (Service Manager, Agents)
Manage MySQL Query Analyzer
Manage the customizability of MySQL Enterprise Advisors

Leverage MySQL Backup
Import and export data with MySQL Workbench
Describe the MySQL Enterprise Backup process
Install a MySQL Enterprise Backup
Configure MySQL backups
Configure MySQL Encryption and Compression

MySQL Overview of High Availability and Replication
Describe MySQL High Availability solutions
Explain Replication
Set up MySQL Replication using global transaction identifiers (GTID’s) and binlog
Set up MySQL Cluster
Explain Replication utilities
Deploy High Availability and Scalability features

MySQL Cloud Service
Describe Cloud Services options
Establish Cloud Service connection via Secure Shell (SSH)
Describe security rules within Oracle Compute Cloud Service
Configure security rules within Oracle Compute Cloud Service
Troubleshoot Cloud Service connections issues
Describe alerts and notification options using Cloud Service
Configure MySQL Cloud Service Backup


QUESTION 1
The replication for a Master and Slave MySQL Servers is up and running. The disk space for Master Server is continuously growing.
The binlog size keeps growing. Identify two methods to fix the issue.

A. Execute the PURGE BINARY LOGS statement without argument.
B. On the Master server, disable binlog by removing the –log-bin option
C. Delete all binlog files manually on the file system to release storage spaces.
D. Set the expire_logs_days sysem bariable to expire binary log files automatically after a given number of days.
E. To safely purge binary log files, perform the following steps:
1. On each slave server, use SHOW SLAVE STATUS to check which log file it is reading.
2. Obtain a listing of the binary log files on the master server with SHOW BINARY LOGS.
3. Determine the earliest log file among all the slaves. This is the target file. If all the slaves are up to date, this is the last log file on the list.
4. Make a backup of all the log files you are about to delete. (This step is optional, but always advisable.)
5. Purge all log files up to but not including the target file by using the PURGE BINARY LOGS statement.

Answer: B,E


QUESTION 2
A MySQL 5.7 server is monitored via 3306 without a MySQL Agent (agentless Installation). Which two options are not available In such a setup MEM GUI?

A. network related Information and network characteristics
B. security related advisors warning (for examine, password warnings and firewall warnings)
C. MySQL Query Analysis data
D. disk usage and disk characteristics including risk advisors warnings
E. MySQL Replication monitoring

Answer: C,E


QUESTION 3
Which statement would create an index by using the first 10 characters of the name column
in the customer table (assuming that name is a nonbinary string type)?

A. CREATE SUB INDEX part_of_name ON (customer,name,10);
B. CREATE INDEX (10) ON (customer.name);
C. CREATE INDEX part_of_name ON customer (name (10));
D. CREATE PARTIAL INDEX part_of_name ON customer (name,10);
E. CREATE INDEX part_of_name ON cutomer.name LIMIT 10 CHAR;

Answer: A


QUESTION 4
You have the MySQL 5.7 database fuming. MySQL Enterprise Backup 3.12 Is installed and it Is used to bade up the MySQL 5.7 database. The backup has failed. Identify the reason.

A. MySQL Enterprise Backup 3.x does not support MySQL 5.7. MySQL Enterprise Backup 4.x or later is required to back up MySQL 5.7.
B. MySQL Workbench must be Installed with MySQL Enterprise Backup to enable the backup to run successfully.
C. MySQL 5.7 Is supported in MySQL Enterprise Backup 3.x with the MySQL 5.7 extension pack.
D. MySQL 5.7 is supported In MySQL Enterprise Backup 3.x providing that the MySQL 5.7 Is pre registered In the MySQL Enterprise Backup configuration file.
E. mysqlbackup with MySQL Enterprise Backup 3.x must be executed once with the — upgrad on MySQL 5.7 database to allow the mysql.backup_proqress and mysql.backup_history tables to be patched.

Answer: A


QUESTION 5
You have a user on your MySQL instance who is flooding the server with complex queries and large INSERTS, which prevents another user with a higher priority from running queries. Which two choices will limit the number of SELECTS to 10 per hour and the number of INSERTS to 4 per hour for user ‘employee1’ from MvSQL Workbench by first selecting Server > Users and Privileges > employee1?

A. Set Max Updates to 4 for ’employee1′.
B. Set Max. Queries to 14 for ’employee1′.
C. Set Max. Connections to 14 for ’employee1′.
D. Set Max Queries to 10 for ’employee1′.
E. Set Concurrent Connections to 14 for ’employee1′.

Answer: C

Click here to view complete Q&A of 1Z0-320 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best Oracle 1Z0-320 Certification, Oracle 1Z0-320 Training at certkingdom.com

Exam 98-349 Windows Operating System Fundamentals

Published: April 13, 2011
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: Home PC users, academic, information workers, IT professionals, developers
Technology: Windows 10
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of August 31, 2016, this exam includes updates for Windows 10, including the removal of any tools not supported on Windows 10. To learn more about these changes and how they affect the skills measured, please download and review the exam 98-349 change document.

Understanding operating system configurations (15–20%)
Configure Control Panel options
Configure administrative tools, configure accessibility options, configure power settings, configure File Explorer settings
Configure desktop settings
Configure profiles, display settings, and shortcuts; configure and customize Start Menu; configure Task Bar settings; configure toolbars; configure notifications
Configure native applications and tools
Configure Microsoft Edge, configure Cortana, configure Hyper-V, configure settings using MSCONFIG, configure processes and applications using Task Manager, configure computer management
Configure mobility settings
Configure Sync Center, Windows Mobility Center, and Remote Desktop
Configure and use management tools
Configure MMC, configure the Windows PowerShell console and Windows PowerShell ISE

Preparation resources
Administrative Tools in Windows 10
Manage Windows 10 Start and taskbar layout
Windows 10 Start Layout Custimization
Configure Windows 10 Taskbar
Cool Stuff about PowerShell 5.0 in Windows 10

Installing and upgrading client systems (15–20%)
Identify Windows operating system editions
Identify hardware and compatibility requirements, determine appropriate editions per device type
Identify upgrade paths
Identify upgrade paths from previous Windows versions, identify application compatibility
Understand installation types
Perform a clean install, upgrade via Windows Update, migrate from previous Windows versions, perform removable media installation, perform network installation
Understand operating system architecture
Understand kernel mode; understand user mode; understand memory, IRQs, drivers, CPUs, and UI; understand 32-bit versus 64-bit architecture

Preparation resources
Windows 10 Upgrade Path
Windows 10 Compatabililty
Windows 10 deployment considerations
Architecture of Windows 10

Managing applications (15–20%)
Configure applications
Understand local versus network applications, configure desktop applications, configure app startup options, configure Windows features, configure Windows SmartScreen, configure application removal, configure Windows Store apps
Configure user account control (UAC)
Understand standard user versus administrative user, understand types of UAC prompts and levels
Configure antivirus settings
Configure Windows Defender and the Malicious Software Removal tool
Understand services
Understand service start-up types, service accounts, and service dependencies

Preparation resources
User Account Control
Windows Defender Advanced Threat Protection
Windows Defender in Windows 10
Microsoft Malicious Software Removal Tool

Managing files and folders (15–20%)
Understand file systems
Understand FAT32, NTFS, and ReFS
Understand file and print sharing
Configure File System permissions, configure Share Permissions, configure HomeGroup settings, configure print drivers, configure effective permissions, create shares, create mapped drives
Understand encryption
Understand BitLocker and Encrypting File Systems (EFS)
Understand libraries
Understand offline files, configure libraries, add multiple local locations to a library, add networked locations

Preparation resources
BitLocker
HomeGroup from start to finish

Managing devices (15–20%)
Connect devices
Connect, enable, and disable plug-and-play and Bluetooth devices; connect and disconnect printers; install third-party software for devices; install device drivers
Understand storage
Understand disk types, security (encryption), storage device types (eSATA, USB, IEEE 1394, iSCSI, InfiniBand), and storage drive types (basic, primary, extended, logical, dynamic disk, VHDs); configure OneDrive use; optimize drives
Understand printing devices
Understand local printers, network printers, print queues, print-to-file, and Internet printing
Understand system devices
Understand video, audio, and infrared input devices; understand Device Manager

Preparation resources
Storage Spaces in Windows 10
Whats New in Windows 10

Understanding operating system maintenance (15–20%)
Understand backup and recovery methods
Configure System Restore; configure a recovery drive; configure recovery boot options, such as Last Known Good, and various Safe Mode options; recover files from OneDrive
Understand maintenance tools
Understand Disk Defragmenter, Disk Cleanup, Task Scheduler, and System Information
Configure updates
Configure Windows Update options; implement Insider Preview, Current Branch, and Current Branch for Business scenarios; manage update history; roll back updates

Preparation resources

Windows 10 Servicing Options
OneDrive


QUESTION 1
PowerShell is used to:

A. monitor user keystrokes
B. repair damaged hard disk drive sectors
C. automate a routine task
D. extend the life of the battery

Correct Answer: C


QUESTION 2
Windows Aero is a:

A. pointing device
B. device driver
C. desktop theme
D. Windows application

Correct Answer: C


QUESTION 3
Which describes the purpose of Power Saver mode for a portable computer?

A. To lock the computer when it is idle.
B. To prevent unauthorized programs from consuming resources.
C. To protect the display from burned-in images.
D. To shut down idle devices to conserve battery charge.

Correct Answer: D


QUESTION 4
You want to change your default home page in Internet Explorer. In which location should you
modify settings?

A. Trusted Sites
B. View
C. Internet Options
D. Favorites

Correct Answer: B


QUESTION 5
Every time you insert a music CD, you receive a dialog box that asks which action you want
Windows to perform. Which should you configure so that your personal computer automatically
identifies an audio CD and starts playing music?

A. The Autoplay settings
B. The Ease of Access settings
C. a desktop gadget
D. The Personalization settings

Correct Answer: A

Click here to view complete Q&A of 98-349 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-349 Certification, MTA 98-349 Training at certkingdom.com

98-366 Networking Fundamentals

Published: August 2, 2010
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: Academic
Technology: Windows Server 2016
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

There are exam updates effective as of January 31, 2018. To learn more about these changes and how they affect the skills measured, please download and review the Exam 98-366 change document.

Understanding network infrastructures (30–35%)
Understand the concepts of Internet, intranet, and extranet
Virtual Private Network (VPN), security zones, firewalls
Understand local area networks (LANs)
Perimeter networks; addressing; reserved address ranges for local use (including local loopback IP), VLANs; wired LAN and wireless LAN
Understand wide area networks (WANs)
Leased lines, dial-up, ISDN, VPN, T1, T3, E1, E3, DSL, cable modem, and more, and their characteristics (speed, availability)
Understand wireless networking
Types of wireless networking standards and their characteristics (802.11a,b,g,n,ac including different GHz ranges), types of network security (WPA, WEP, 802.1X, and others), point-to-point (P2P) wireless, ad hoc networks, wireless bridging
Understand network topologies and access methods
Star, mesh, ring, bus, logical and physical topologies

Preparation resources
Solution Design Considerations for Network Topologies
Wireless LAN Service Overview
Wired and Wireless Networking with 802.1X Authentication

Understanding network hardware (20–25%)
Understand switches
Transmission speed, number and type of ports, number of uplinks, speed of uplinks, managed or unmanaged switches, VLAN capabilities, Layer 2 and Layer 3 switches and security options, hardware redundancy, support, backplane speed, switching types and MAC table, understand capabilities of hubs versus switches, virtual switches
Understand routers
Transmission speed considerations, directly connected routes, static routing, dynamic routing (routing protocols), RIP vs. OSPF, default routes; routing table and how it selects best route(s); routing table memory, Network Address Translation (NAT), software routing in Windows Server, installing and configuring routing; Quality of Service (QoS)
Understand media types
Cable types and their characteristics, including media segment length and speed; fiber optic; twisted pair shielded or unshielded; catxx cabling, wireless; susceptibility to external interference (machinery and power cables); susceptibility to electricity (lightning), susceptibility to interception

Preparation resources
Computer Hardware and Windows Server
Routing

Understanding protocols and services (45-50%)
Understand the Open Systems Interconnection (OSI) model
OSI model; Transmission Control Protocol (TCP) model; examples of devices, protocols, applications, and which OSI/TCP layer they belong to; TCP and User Datagram Protocol (UDP); well-known ports for most used purposes (not necessarily Internet); packets and frames
Understand IPv4
Subnetting, IPconfig, why use Internet Protocol version 4 (IPv4), addressing, ipv4toipv6 tunneling protocols to ensure backward compatibility, dual IP stack, subnetmask, gateway, ports, packets, reserved address ranges for local use (including local loopback IP)
Understand IPv6
Subnetting, IPconfig, why use IPv6, addressing, ipv4toipv6 tunneling protocols to ensure backward compatibility, dual IP stack, subnetmask, gateway, ports, packets, reserved address ranges for local use (including local loopback IP)
Understand names resolution
DNS, resource records, Windows Internet Name Service (WINS), steps in the name resolution process, HOSTS file, LMHOSTS file
Understand networking services
Dynamic Host Configuration Protocol (DHCP), Network Address Translation (NAT), firewalls, remote access, VPN
Understand TCP/IP
Tools (such as ping), tracert, pathping, Telnet, IPconfig, netstat, reserved address ranges for local use (including local loopback IP), protocols

Preparation resources
IPv6
IPv4 Name Resolution
TCP/IP


QUESTION 1
You are employed as a network designer at ABC.com.
A ABC.com client has requested a network setup for his home office. The network has to be cost
effective, and easy to extend and implement. Furthermore, the client wants his workstations
connected by a single cable.
Which of the following network topologies should you use?

A. A star network topology.
B. A bus network topology.
C. A mesh network topology.
D. A ring network topology.

Answer: B


QUESTION 2
You are employed as a network designer at ABC.com.
You have recently designed a home office network for ABC.com that includes a switch.
Which of the following are TRUE with regards to network switches? (Choose all that apply.)

A. It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for
a particular address only to the port to which it is attached.
B. It keeps track of the IP addresses attached to each of its ports and directs traffic intended for a
particular address only to the port to which it is attached.
C. It operates at the Physical layer of the OSI model.
D. It operates at the Data-Link layer of the OSI model.

Answer: A,D


QUESTION 3
You are employed as a network administrator at ABC.com. The ABC.com network consists of a
single domain named ABC.com.
As part of a training exercise, you have been asked to identify the layer that allows applications
and a number of user functions access to the network.
Which of the following options represents your response?

A. The document layer.
B. The application layer.
C. The system layer.
D. The Data-link layer.

Answer: B

Explanation:


QUESTION 4
You are employed as a network administrator at ABC.com. The ABC.com network consists of a
single domain named ABC.com.
You have been tasked with making sure that ABC.com’s network includes a server that converts
NetBIOS names to IP addresses.
Which of the following actions should you take?

A. You should consider adding a DHCP server to the ABC.com network.
B. You should consider adding a DNS server to the ABC.com network.
C. You should consider adding a Web server to the ABC.com network.
D. You should consider adding a WINS server to the ABC.com network.

Answer: D


QUESTION 5
You are employed as a network designer at ABC.com.
ABC.com’s network is made up of two network segments, named Subnet A and Subnet B. DHCP
clients are located on Subnet
A. A DHCP server, named ABC-SR07, is located on Subnet B.
You need to make sure that DHCP clients are able to connect to ABC-SR07.
Which of the following actions should you take?

A. You should make sure that the RRAS service is configured.
B. You should make sure that the Web service is configured.
C. You should make sure that the DNS service is configured.
D. You should make sure that the DHCP relay agent service is configured.

Answer: D

Explanation:

Click here to view complete Q&A of 98-366 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-366 Certification, MTA 98-366 Training at certkingdom.com

98-367 Security Fundamentals

Published: August 2, 2010
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: Academic
Technology: Windows 10
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of June 23, 2016, this exam includes updates for Windows 10, in addition to updates to security and threat terms. To learn more about these changes and how they affect the skills measured, please

Understand security layers (25–30%)
Understand core security principles
Confidentiality; integrity; availability; how threat and risk impact principles; principle of least privilege; social engineering; attack surface analysis; threat modelling
Understand physical security
Site security; computer security; removable devices and drives; access control; mobile device security; keyloggers
Understand Internet security
Browser security settings; secure websites
Understand wireless security
Advantages and disadvantages of specific security types; keys; service set identifiers (SSIDs); MAC filters

Preparation resources
Windows Server 2008 in an organization’s defense in depth strategy
Secure Windows Server
Using Windows Server 2008: Controlling communication with the Internet

Understand operating system security (35-40%)
Understand user authentication
Multifactor authentication; physical and virtual smart cards; Remote Authentication Dial-In User Service (RADIUS); biometrics; use Run As to perform administrative tasks
Understand permissions
File system permissions; share permissions; registry; Active Directory; enable or disable inheritance; behavior when moving or copying files within the same disk or on another disk; multiple groups with different permissions; basic permissions and advanced permissions; take ownership; delegation; inheritance
Understand password policies
Password complexity; account lockout; password length; password history; time between password changes; enforce by using Group Policies; common attack methods; password reset procedures; protect domain user account passwords
Understand audit policies
Types of auditing; what can be audited; enable auditing; what to audit for specific purposes; where to save audit information; how to secure audit information
Understand encryption
Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files; BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and other uses; virtual private network (VPN); public key/private key; encryption algorithms; certificate properties; certificate services; PKI/certificate services infrastructure; token devices; lock down devices to run only trusted applications
Understand malware
Buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware; ransomware; adware; rootkits; backdoors; zero day attacks

Preparation resources
Windows authentication
Password policy
Audit policies

Understand network security (20–25%)
Understand dedicated firewalls
Types of hardware firewalls and their characteristics; when to use a hardware firewall instead of a software firewall; stateful versus stateless firewall inspection; Security Compliance Manager; security baselines
Understand network isolation
Routing; honeypot; perimeter networks; network address translation (NAT); VPN; IPsec; server and domain isolation
Understand protocol security
Protocol spoofing; IPsec; tunneling; DNSsec; network sniffing; denial-of-service (DoS) attacks; common attack methods

Preparation resources
Windows Firewall
Network Access Protection
IPsec

Understand security software (15–20%)
Understand client protection
Antivirus; protect against unwanted software installations; User Account Control (UAC); keep client operating system and software updated; encrypt offline folders, software restriction policies; principle of least privilege
Understand email protection
Antispam, antivirus, spoofing, phishing, and pharming; client versus server protection; Sender Policy Framework (SPF) records; PTR records
Understand server protection
Separation of services; hardening; keep server updated; secure dynamic Domain Name System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain Controllers (RODC)

Preparation resources

What’s new for operating system hardening and integrity for Windows Server 2008
Software restriction policies
What’s new for server protection in Windows Server 2008


QUESTION 1
A mail system administrator scans for viruses in incoming emails to increase the speed of mail processing.
Select the correct answer if the underlined text does not make the statement correct. Select “No change is needed” if the underlined text makes the statement correct.

A. Decrease the chances of a virus getting to a client machine
B. Verify that the senders of the messages are legitimate
C. Ensure that all links in the messages are trustworthy
D. No change is needed.

Answer: A


QUESTION 2
Coho Winery wants to increase their web presence and hires you to set up a new web server. Coho already has servers for their business and would like to avoid purchasing a new one.
Which server is best to use as a web server, considering the security and performance concerns?

A. SQL Server
B. File Server
C. Domain Controller
D. Application Server

Answer: C


QUESTION 3
To protect systems from buffer overflow errors, you can use:

A. Antivirus software
B. Data Execution Prevention
C. A proxy server
D. An Intruder Prevention System

Answer: B


QUESTION 4
Windows Server Update Services (WSUS) is a tool that:

A. Updates data stored in Windows servers
B. Manages the services that run on a server
C. Updates licensing for Windows servers
D. Manages updates for Microsoft software

Answer: D

Explanation:
Windows Server Update Services (WSUS) enables information technology administrators to deploy the latest Microsoft product updates to computers that are running the Windows operating system. By using WSUS, administrators can fully manage the distribution of updates that are released through Microsoft Update to computers in their network. Reference: https:://technet.microsoft.com/en-us/windowsserver/bb332157.aspx

Click here to view complete Q&A of 98-367 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-367 Certification, MTA 98-367 Training at certkingdom.com

98-369 Cloud Fundamentals

Published: January 5, 2015
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: IT professionalsTechnology:
Office 365, Microsoft Intune
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Understand the cloud (20–25%)
Describe cloud principles and delivery mechanisms
Differentiate between on-premises IT service models; differentiate between subscription or pay-as-you-go versus upfront CapEx/OpEx funding model; use cloud services to expand capacity (elasticity of the cloud), scalability, redundancy, and availability; differentiate between cloud services that are configurable versus on-premises services that are customizable
Describe cloud security requirements and policies
Describe how cloud services manage privacy, how compliance goals are met, how data is secured at rest or on-the-wire, and how data and operations transparency requirements are met
Describe how a cloud service stays up to date and available
Describe the service/feature improvement process; monitor service health, service maintenance, and future roadmap publishing; identify guarantees, service level agreements (SLA), and capping of liability of the cloud service provider
Describe the different types of cloud services
Differentiate between types of cloud services and their characteristics, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS); integrate the cloud with on-premises services in hybrid scenarios

Enable Microsoft cloud services (20–25%)
Identify the requirements and dependencies for using Office 365 and Microsoft Intune
Plan networking and domains, firewall rule, client requirements, bandwidth implications, and DNS
Select a cloud service plan
Understand the different options and plans available for Office 365 and Microsoft Intune
Sign up for cloud services
Name your tenant, set up your first administrator, determine tenant location
Set up the initial configuration of cloud services
Register domains, verify domains, choose the domain purpose; identify required DNS record types

Administer Office 365 and Microsoft Intune (15–20%)
Create users and groups, and assign services and licenses
Differentiate between cloud identities (Online identity, Synchronized identities, Federated identities), create and manage users and identities, delete and restore users (soft delete), create and manage groups, assign and revoke licenses, determine user locations
Assign permissions in Office 365 and Microsoft Intune
Assign or revoke administrative roles; manage delegated admins; manage password policies, subscriptions, and licenses
Monitor service health in Office 365 and Microsoft Intune
Monitor the Service Health dashboard, subscribe to RSS feeds, monitor the maintenance schedule, monitor the message center, log service support requests, configure alerts

Use and configure Microsoft cloud services (20–25%)
Configure Exchange Online
Manage recipients (mailboxes, shared mailboxes, resources, contacts, groups), manage anti-spam and antivirus settings
Configure SharePoint Online, including OneDrive
Create SharePoint team sites, configure external sharing, set up social features using newsfeeds or Yammer, apply themes, set storage and resource limits
Configure Skype for Business Online
Manage Skype for Business user options, manage external communication settings, configure dial-in settings and meeting invitation options, configure Skype for Business Online DNS
Configure Microsoft Intune
Install Microsoft Intune client management software, create and deploy policies, automate installs, identify software requirements, set up notifications, identify mobile device management policies

Support cloud users (15–20%)
Resolve sign-in and Office application installation issues
Troubleshoot sign-in issues, forgotten passwords, connection problems, difficulty activating Office applications, and difficulty connecting mobile devices to Office 365 or Microsoft Intune; choose between 32-bit and 64-bit; identify when an Office repair is required; identify operating system requirements for Office 365 ProPlus; browser requirements and specific versions of Internet Explorer
Resolve email and calendar issues
Troubleshoot issues receiving and sending email, troubleshoot issues accessing a delegated mailbox
Resolve SharePoint and OneDrive issues
Identify storage limits, troubleshoot “Open with Explorer” not working and OneDrive not syncing, recover deleted files
Resolve Skype for Business issues
Troubleshoot Skype for Business sign-in issues, troubleshoot connection issues to Skype for Business Online, troubleshoot communicating to Skype consumer users and users in other companies using Skype for Business


QUESTION 1
This question requires that you evaluate the underlined text to determine if it is correct.
Your company is implementing Microsoft Office 365 and Exchange Online. You plan to configure the necessary public DNS settings. You need to create an SPF record to authorize the email service and present spoofing.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice that makes the statement correct.

A. No change is needed
B. a PTR record
C. an MX record
D. a CNAME record

Answer: A

Explanation: The SPF (TXT) record helps to prevent other people from using your domain to send spam or other malicious email. Sender policy framework (SPF) records work by identifying the servers that are authorized to send email from your domain.
Reference: External DNS records required for Exchange Online
http://howtonetworking.com/msapps/office365-11.htm


QUESTION 2
You are an IT administrator for Contoso, Ltd. You have subscribed to Microsoft Office 365.
You are preparing to set up your domain. Your company already uses the custom domain name contoso.com for other cloud services.
You need to configure Office 365 to simplify the management of user identities.
What should you do before you create new user accounts?

A. Create a new custom domain name specifically for Office 365.
B. Configure Office 365 to use your custom domain
C. Verify that the automatic domain contoso.onmicrosoft.com is functioning
D. Add the .onmicrosoft suffix to your custom domain name.

Answer: A

Explanation: Custom domains
To use your own domain name with Office 365 instead of the domain name that you were given at signup, you add the domain to Office 365.
Reference: https://technet.microsoft.com/en-us/library/office-365-domains.aspx


QUESTION 3
You work in the IT department of a startup company.
The company predicts rapid growth over the next five years and plans of greatly increase its number of employees.
How will a cloud solution such as Microsoft Office 365 help the company prepare for rapid growth?

A. by allowing the company to rely on contract employees to compensate for busy periods
B. by ensuring the company’s IT services have 100 percent up time
C. by allowing the company to add new users more securely than when using traditional IT infrastructure
D. by allowing the company to increase its IT capacity for a lower cost than traditional IT infrastructure

Answer: D

Explanation: * Some of the benefits of moving to the Microsoft cloud include the following:
/ Having predictable and known costs associated with adoption.
/ Reducing cost in not only immediate monetary value but also in efficiency and resource reallocation benefits.
/ Outsourcing the hassle of installing, managing, patching, and upgrading extremely complex software systems.
Etc.
* For organizations experiencing rapid growth, a top-notch productivity solution can be vital to the success of the business. A cloud-based service that’s difficult to manage can divert
attention away from a company’s core mission. What organizations need is a solution that’s simple to use so they can focus on what they do best-growing the business.
Reference: Pros and Cons of the Microsoft Office 365 Cloud
http://www.dummies.com/how-to/content/pros-and-cons-of-the-microsoft-office-365-cloud.html


QUESTION 4
Which two features are available in Microsoft SharePoint to monitor services? Choose two.

A. Content organizer rules
B. Create an alert
C. Subscribe to an RSS feed
D. Sites and workspaces

Answer: B,C

Explanation: To stay updated when documents or items on your site change, set up alerts or subscribe to Really Simple Syndication (RSS) feeds.
Reference: Create an alert or subscribe to an RSS feed
https://support.office.com/en-sg/article/Create-an-alert-or-subscribe-to-an-RSS-feed-e5a79e7b-a146-46da-a9ef-d65409ba8918


QUESTION 5
This question requires that you evaluate the underlined text to determine if it is correct.
You are an intern for an IT analyst at a small company. The company plans to implement Microsoft Office 365.
You want to ensure that your environment can support Office 365.
You need to run the “Office 365 management pack” to check deployment readiness.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement is incorrect, select the answer choice than makes the statement correct.

A. No change is needed
B. Setup Assistant
C. Config 365
D. Client Updater

Answer: B

Explanation: The setup assistant provides information for deployment readiness.

Click here to view complete Q&A of 98-369 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-369 Certification, MTA 98-369 Training at certkingdom.com

98-368 Cloud Fundamentals

Published: January 5, 2015
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: IT professionals
Technology: Office 365, Microsoft Intune
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Understand the cloud (20–25%)
Describe cloud principles and delivery mechanisms
Differentiate between on-premises IT service models; differentiate between subscription or pay-as-you-go versus upfront CapEx/OpEx funding model; use cloud services to expand capacity (elasticity of the cloud), scalability, redundancy, and availability; differentiate between cloud services that are configurable versus on-premises services that are customizable
Describe cloud security requirements and policies
Describe how cloud services manage privacy, how compliance goals are met, how data is secured at rest or on-the-wire, and how data and operations transparency requirements are met
Describe how a cloud service stays up to date and available
Describe the service/feature improvement process; monitor service health, service maintenance, and future roadmap publishing; identify guarantees, service level agreements (SLA), and capping of liability of the cloud service provider
Describe the different types of cloud services
Differentiate between types of cloud services and their characteristics, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS); integrate the cloud with on-premises services in hybrid scenarios

Enable Microsoft cloud services (20–25%)
Identify the requirements and dependencies for using Office 365 and Microsoft Intune
Plan networking and domains, firewall rule, client requirements, bandwidth implications, and DNS
Select a cloud service plan
Understand the different options and plans available for Office 365 and Microsoft Intune
Sign up for cloud services
Name your tenant, set up your first administrator, determine tenant location
Set up the initial configuration of cloud services
Register domains, verify domains, choose the domain purpose; identify required DNS record types

Administer Office 365 and Microsoft Intune (15–20%)
Create users and groups, and assign services and licenses
Differentiate between cloud identities (Online identity, Synchronized identities, Federated identities), create and manage users and identities, delete and restore users (soft delete), create and manage groups, assign and revoke licenses, determine user locations
Assign permissions in Office 365 and Microsoft Intune
Assign or revoke administrative roles; manage delegated admins; manage password policies, subscriptions, and licenses
Monitor service health in Office 365 and Microsoft Intune
Monitor the Service Health dashboard, subscribe to RSS feeds, monitor the maintenance schedule, monitor the message center, log service support requests, configure alerts

Use and configure Microsoft cloud services (20–25%)
Configure Exchange Online
Manage recipients (mailboxes, shared mailboxes, resources, contacts, groups), manage anti-spam and antivirus settings
Configure SharePoint Online, including OneDrive
Create SharePoint team sites, configure external sharing, set up social features using newsfeeds or Yammer, apply themes, set storage and resource limits
Configure Skype for Business Online
Manage Skype for Business user options, manage external communication settings, configure dial-in settings and meeting invitation options, configure Skype for Business Online DNS
Configure Microsoft Intune
Install Microsoft Intune client management software, create and deploy policies, automate installs, identify software requirements, set up notifications, identify mobile device management policies

Support cloud users (15–20%)
Resolve sign-in and Office application installation issues
Troubleshoot sign-in issues, forgotten passwords, connection problems, difficulty activating Office applications, and difficulty connecting mobile devices to Office 365 or Microsoft Intune; choose between 32-bit and 64-bit; identify when an Office repair is required; identify operating system requirements for Office 365 ProPlus; browser requirements and specific versions of Internet Explorer
Resolve email and calendar issues
Troubleshoot issues receiving and sending email, troubleshoot issues accessing a delegated mailbox
Resolve SharePoint and OneDrive issues
Identify storage limits, troubleshoot “Open with Explorer” not working and OneDrive not syncing, recover deleted files
Resolve Skype for Business issues
Troubleshoot Skype for Business sign-in issues, troubleshoot connection issues to Skype for Business Online, troubleshoot communicating to Skype consumer users and users in other companies using Skype for Business

QUESTION 1
What is an example of the way in which a Trojan horse commonly spreads to other computers?

A. It inserts copies of itself into other computer programs
B. It traverses a network by exploiting a vulnerability
C. It pretends to be a document from a friend
D. It downloads from an infected web page

Answer: D

Explanation: Trojan horses are commonly found on websites that offer free software, such as shareware programs. These
communal gathering spots on the Web give Trojan horse writers a degree of anonymity along with the chance of
attacking as many random victims as possible. Since website operators rarely have time to thoroughly examine every file
posted, an occasional Trojan horse can slip through the checking procedures unnoticed. –

Reference: HOW TROJAN HORSES SPREAD
http://etutorials.org/Misc/computer+book/Part+2+Dangerous+Threats+on+the+Internet/Cha pter+8+Trojan+Horses-
+Beware+of+Geeks+Bearing+Gifts/HOW+TROJAN+HORSES+SPREAD/

QUESTION 2
Your company uses Windows 8.1 work folders on personal devices. The devices are all registered in Microsoft Intune.
You need to enforce the following security requirements on the personal devices:
•Company data can be removed if an employee is terminated.
•Company data cannot be accessed if a devise is lost or stolen.
What should you do?

A. Enable selective wipe, and enforce a lock screen and password
B. Enable selective wipe, and secure files transfers with SSL
C. Enable selective wipe, and enforce encryption
D. Enforce encryption and enforce a lock screen and password

Answer: C

Explanation: * Microsoft Intune provides selective wipe, full wipe, remote lock, and passcode reset capabilities. A
selective wipe to remove only company data.
* Encryption on Mobile Devices can be managed with Configuration Manager and Intune
Reference: Help protect your data with remote wipe, remote lock, or passcode reset using
Microsoft Intune
https://technet.microsoft.com/en-us/library/jj676679.aspx
Reference: Managing Encryption on Mobile Devices with Configuration Manager and Intune
http://blogs.technet.com/b/pauljones/archive/2014/08/04/managing-encryption-on-mobile-devices-with-configurationmanager-
and-intune.aspx

QUESTION 3
This question requires that you evaluate the underlined text to determine if it is correct.
The “ExFAT” file system can automatically verify and auto correct data to avoid file system errors.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement
is incorrect, select the answer choice than makes the statement correct.

A. No change is needed
B. NTFS
C. FAT32
D. ReFS

Answer: D

Explanation: Resilient File System (ReFS) is a Microsoft proprietary file system introduced with Windows Server 2012
with the intent of becoming the “next generation” file system after NTFS. ReFS key design advantages are intended to
include automatic integrity checking and data scrubbing, removing the need for chkdsk and protecting against data degradation.

Reference: https:://en.wikipedia.org/wiki/ReFS

QUESTION 4
This question requires that you evaluate the underlined text to determine if it is correct.
The “Simple Spaces” resiliency type in Windows 8.1 Storage Spaces requires at least five drives in order to protect a
system from a single-drive failure.
Instructions: Review the underlined text. If it makes the statement correct, select “No change is needed”. If the statement
is incorrect, select the answer choice than makes the statement correct.

A. No change is needed
B. two-way mirror
C. Parity Spaces
D. three-way mirror

Answer: D

Explanation: Two-way mirror spaces require at least two drives, and three-way mirror spaces require at least five.
Mirror spaces are designed for increased performance and protect your files from drive failure by keeping more than one
copy. Two-way mirror spaces make two copies of your files and can tolerate one drive failure, while three-way mirror
spaces can tolerate two drive failures.

Click here to view complete Q&A of 98-368 exam
Certkingdom Review
, Certkingdom PDF Torrents

 MCTS Training, MCITP Trainnig

 Best Microsoft Technology Associate 98-368 Certification, MTA 98-368 Training at certkingdom.com

 

1Z0-628 Oracle Field Service Cloud Service 2017 Implementation Essentials

Exam Number: 1Z0-628
Exam Title: Oracle Field Service Cloud Service 2017 Implementation Essentials
Associated Certification Paths : Oracle Field Service Cloud Service 2017 Certified Implementation Specialist
Duration: 120 minutes
Number of Questions: 80
Passing Score: 67%
Validated Against: This exam has been validated against Oracle Field Service Cloud 18A. (Previous version of this exam was validated against release 17.8 in 2017)
Format: Multiple Choice

Complete Recommended Training
Oracle Service Cloud Learning Subscription (Individuals & Companies | Partners)
OR
Oracle Field Service Cloud Learning Subscription (Individuals & Companies | Partners)

Additional Preparation and Information
A combination of Oracle training and hands-on experience (attained via labs and/or field experience) provides the best preparation for passing the exam.

Oracle Field Service Cloud Learning Subscription
Our certification exams are revised regularly to align with training and product release updates. Information about exam revisions and new topics are found on this page under ‘Validated Statement’ and within the exam topics below. Certifications reflect validated skills for year and product release version date of achievement. If you are preparing for this exam, we recommend you check these topics periodically to ensure your exam prep covers any new topics that may be added based on regular exam revision.

Resources, Resource Types, and the Resource Tree
Describe Resource Types and Roles
Explain the purpose, structure, and components of the Resource Tree
Configure new Resource Types, Resources, and Users
Configure resources for Routing (Skills, Zones, Calendars, Locations, and Organizations)

Users, User Types, and Screen Configurations
Configure Screens for Core Manage and Mobility

Configure User Types

Time Slots and Time Windows

Describe Time Slots, Service Windows, SLAs, and Delivery Windows
Activity Types

Describe Activity Types and Actions
Configure Activity Types

Inventory Types
Describe Inventory Types, and Inventory consumption and management

Configure an Inventory Type and individual resource inventory

Fields and Custom Properties

Describe the four types of custom properties and native system fields
Create a custom property

Business Rules

Configure Business Rules settings

Work Skills and Conditions
Describe the concepts of Work Skills and Work Skill Conditions
Configure a Work Skill and associated Conditions

Work Zone Configuration
Describe the concepts of Work Zones
Configure Work Zones

Calendar Settings
Describe the Resource Calendar options and their precedence
Configure company-wide Calendar Settings

Display Screen’s Settings
Configure activity and route Alert Settings
Configure general Manage and Mobility Display Settings

Login Policies
Configure a new login policy

Daily Extract Configuration
Describe how Daily Extracts work and can be used with other Oracle Cloud products
Configure Daily Extract files

Activity Link Template
Create Activity Link templates

Glossary

Configure screen text using the OFSC glossary

Activity and Resource Filters

Explain the usage of filters within OFSC
Create a filter

OFSC APIs
Create a Capacity API request
Create a Core API request
Create an Inbound API request
Create a Location API request
Create a Metadata API request
Create an API application
Explain OFSC API capabilities

Statistics Parameters

Configure Activity and Resource Travel Stats fields
Configure the Duration and Travel Time parameters

Routing

Configure a Routing Plan
Describe the Run Schedule, Assignment Parameters, and filtering options in Routing Plans
Describe Routing reoptimization

Quota and Capacity Management

Describe Quota, Capacity Management, and Forecasting
Configure Quota Management for Buckets and Capacity Categories
Configure the Quota Grid

Notification Engine

Describe the various Launch conditions
Configure a Message Scenario

Collaboration

Describe Collaboration features and usage

Oracle Product Integrations

Configure an integration between OFSC and Other Oracle Cloud products

Service Requests

Configure a Service Request

Action Management

Configure an activity action link

Click here to view complete Q&A of 1Z0-628 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best Oracle 1Z0-628 Certification, Oracle 1Z0-628 Training at certkingdom.com

Best Online MCITP Training and Learning blog