Apple sells 4 million iPhone 4S units in first weekend

The iPhone 4S is wildly popular, Apple says.

The iPhone 4S had a huge weekend on store shelves–or more precisely, leaping off store shelves.

Apple said today that it sold 4 million iPhone 4S units worldwide between Friday and Sunday. According to Apple senior vice president for worldwide product marketing, Phil Schiller, that figure is “more than double the iPhone 4 launch during its first three days.” Last year, Apple announced that it sold 1.7 million iPhone 4 units in the smartphone’s first weekend of availability.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

That said, it’s worth noting that at least in the U.S., the iPhone 4S had a bit of an advantage over the iPhone 4. When Apple shipped the iPhone 4 last year, the device was available only to AT&T customers. The handset then came to Verizon Wireless earlier this year and Sprint last week. The iPhone 4S, however, launched with availability on Sprint’s and Verizon’s networks, in addition to AT&T’s service.

Apple’s iPhone 4S, which launched on Friday, features the same design as the iPhone 4, but adds several improvements, including a dual-core processor, 8-megapixel camera, and full 1080p HD video recording. The device also ships with support for virtual personal assistant application, Siri.

Last week, several analysts chimed in on how many unit sales they expected Apple to sell over the weekend. The majority of those folks said that sales would likely hit between 2 million units and 3 million units. However, the Yankee Group thought sales could hit 4 million units.

“The biggest factor driving this is the huge loyalty associated with Apple phones,” Yankee Group analyst Carl Howe said. “They have the highest loyalty of any of the smartphone OSes.”

For the first time, Sprint was a beneficiary of that. The company reported on Friday that as of 10 a.m. PT, it had witnessed a record sales day. But it wasn’t alone: by 1:30 p.m. PT, AT&T said that it had activated a record number of iPhones.

The success of the iPhone 4S in its first weekend of availability seems to eliminate all doubt over consumer reactions to the device. Earlier this month, when Apple unveiled the new iPhone, the company was expected to show off the iPhone 5, as well. That device, rumors suggested, would be the major update consumers were expecting. After it wasn’t revealed, however, many called the event a disappointment. But the smartphone’s early sales figures seem to prove that many consumers had a much different reaction to the smartphone.

It also appears that some folks are moving to the iPhone 4S from other platforms. In a small, informal poll Reuters conducted on Friday, the news service found that nearly 25 percent of iPhone 4S buyers were ditching a BlackBerry, Symbian, or Android smartphone for Apple’s latest device.

Aside from the iPhone 4S, Apple also said that 25 million users have already started using its new mobile operating system version, iOS 5, and 20 million folks have signed up for iCloud.

Although 20 million iCloud users is impressive in its own right, some analysts believe the service will grow to much greater heights in the future. Over the summer, RBC Capital Markets released a study that found 76 percent of the 1,500 iPhone users it polled planned to sign up for iCloud. By applying that percentage to the entire market, the firm said that it believes as many as 150 million users could sign up for iCloud eventually.

70-643 Exam



 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

 




QUESTION 1
You work as the network administrator at Certkingdom.com The Certkingdom.com network has a domain named
Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008 and all client computers
run Windows Vista.
Certkingdom.com recently entered into partnership with Weyland Industries.
You create user accounts in the Certkingdom.com domain for some employees of Weyland Industries.
You place the user accounts into a global security group named WeySecure.
You want to provide members of the WeySecure group access to parts of the Certkingdom.com network
via a Terminal Services Gateway server named ABC-TS01.
What do you need to do to ensure that the WeySecure group is able to access ABC-TS01?

A. You need to configure a Remote Access Policy.
B. You need to create and configure a Connection Authorization Policy.
C. You need to configure Device redirection.
D. You need to configure a Network Access Protection Policy.

Answer: B

Explanation: To provide a security group access to ABC-TS02, you need to create and configure
a Connection Authorization Policy.
A connection authorization policy (CAP) allows you to control who can connect to the Terminal
Server through the Terminal Services Gateway. You can configure what groups can access the
Terminal Server through the TS Gateway.

Reference: Configuring the Windows Server 2008 Terminal Services Gateway (Part 2) / Create a
Terminal Services Gateway CAP
http://www.windowsecurity.com/articles/Configuring-Windows-Server-2008-Terminal-Services-
Gateway-Part2.html


QUESTION 2
You work as a network administrator for Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network either run Windows Server 2008 or
Windows Server 2003.
The Certkingdom.com network contains a Windows Server 2003 server named ABC-SR05 and a Windows
Server 2008 server named ABC-SR06. ABC-SR05 has Microsoft SQL Server 2005 and Microsoft
Windows SharePoint Services (WSS) 2.0 installed.
You receive instruction to uABCrade Windows SharePoint Services (WSS) 2.0 to Windows
SharePoint Services (WSS) 3.0 and have it run on ABC-SR06. You need to have Windows
SharePoint Services (WSS) 3.0 retain the content and settings from Windows SharePoint Services
(WSS) 2.0.
Which of the following steps would be the best way to accomplish this task? (Choose multiple
answers).

A. You should back up the SharePoint configuration as well as the content from ABC-SR05.
B. You should back up the SQL Server 2005 configuration as well as the Microsoft Windows
SharePoint Services (WSS) databases from ABC-SR05.
C. You should uABCrade ABC-SR05 to Windows Server 2008.
D. You should install Microsoft Windows SharePoint Services (WSS) 3.0 on ABC-SR06.
E. You should install Microsoft Windows SharePoint Services (WSS) 2.0 on ABC-SR06.
F. You should restore the backup from ABC-SR05 to ABC-SR06.
G. You should uABCrade Windows SharePoint Services (WSS) 2.0 to Windows SharePoint
Services (WSS) 3.0 on ABC-SR06.

Answer: A,E,F,G

Explanation: In order to migrate to SharePoint Services (WSS) 3.0 from ABC-SR05 to ABC-SR06
with all the configuration and content, you need to install WSS 2.0 on ABC-SR06. You need to
back up the WSS 2.0 configuration and content from ABC-SR05. Then the backup can be restored
from ABC-SR05 to ABC-SR06. Lastly an in-place uABCrade of WSS 2.0 to WSS 3.0 can be
executed on ABC-SR06.
When you run an in-place uABCrade, all content and configuration data is uABCraded in-place, at
one time. When you start the in-place uABCrade process, the Web server and Web sites remain
offline until the uABCrade has been installed. In-place uABCrades are best for a stand-alone
server and small installations as in this case

Reference: Install and configure Office SharePoint Server for an in-place uABCrade
http://technet.microsoft.com/en-us/library/cc263212(TechNet.10).aspx
Determine uABCrade approach (Office SharePoint Server)
http://technet.microsoft.com/en-us/library/cc263447(TechNet.10).aspx


QUESTION 3
You work as the network administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com Certkingdom.com has headquarters in London and branch office in Paris. All servers on
the Certkingdom.com network run Windows Server 2008 and all client computers run Windows Vista.
The Certkingdom.com network contains a member server named ABC-SR01. ABC-SR01 is configured as
the Key Management Service (KMS) server.
You are planning to roll out 20 new Windows Server 2008 computers on the network.
After installing Windows Server 2008 on three of the computers you discover that the servers are
unable to activate using ABC-SR01.
How can you ensure that the new computers are able to activate using ABC-SR01?

A. You should ensure that the new servers have a connection to the internet.
B. You should install the Key Management Service (KMS) on a dedicated Windows Server 2008
computer.
C. You should phone Microsoft Licensing House to Activate the servers by telephone.
D. You should install Windows Server 2008 on at least 7 of the remaining computers.

Answer: D

Explanation: To activate the new server through KMS server, you should complete the installation
of at least 10 servers. The Key Management Service is a Windows service. KMS is a trusted
mechanism that, once the KMS host is activated, allows volume client computers within the
enterprise to activate themselves without any interactions with Microsoft. KMS activation of
Windows Server 2008 follows a hierarchical structure. Each successive product group can activate
all the groups below it, and the KMS can be hosted on any edition that it can activate.


QUESTION 4
You are the network administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008 and all client
computers run Windows XP Professional. Certkingdom.com currently makes use of two computers named
ABC-TS01 and ABC-TS02 which runs the Terminal Server Session Broker role.
Certkingdom.com recently entered into partnership with Weyland Industries who make use of two
computers named WEYLAND-TS01 and WEYLAND-TS02. During the course of the day you
receive instruction from Certkingdom.com and Weyland Industries to configure their Terminal servers for
load balancing whilst ensuring ABC-TS02 is configured as the preferred server.
What program would you use to configure the load balancing?

A. You should use the Terminal Services Resource Authorization policy (RAP).
B. You should use the Terminal Services Configuration utility.
C. You should use the Terminal Services Connection Authorization policy (CAP).
D. You should use the Group Policy Manager utility.

Answer: B

Explanation: In order to configure load balancing for the four terminal servers you need to make
use of the Terminal Services Configuration utility. This will also make ABC-TS02 the preferred
server for TS sessions. Using NLB with Terminal Services provide increased availability,
scalability, and load-balancing performance, as well as the ability to distribute a large number of
Terminal Services clients over a group of terminal servers.


QUESTION 5
You work as an enterprise administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008.
The Certkingdom.com network contains a server named ABC-SR22 which hosts Windows SharePoint
Services (WSS). ABC-SR22 hosts a WSS site for each department in the company.
The Sales department WSS site contains a document library. The Sales manager asks you to
configure the WSS site so that Sales users can send email to the document library. To this end,
you configure ABC-SR22 to accept incoming email.
What else is required to enable users to send email to the document library?

A. You need to modify the incoming email settings for the WSS site in IIS Manager.
B. You need to modify the incoming email settings the Application pool in IIS Manager.
C. You need to modify the incoming email settings for the Sales WSS site
D. You need to modify the incoming email settings for the document library.

Answer: D

Explanation: You need to change the incoming mail settings for the document library. This will
allow the users to send email to the document library.

Reference: https:://technet.microsoft.com/en-us/library/cc262947(TechNet.10).aspx


QUESTION 6
You work as the network administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008. Half the client
computers run Windows XP, and the rest run Windows Vista.
You are responsible for a Terminal Server named ABC-TS01. ABC-TS01 is used to allow remote
users to run the necessary applications required for their daily tasks from their workstations. You
receive instruction to install a Terminal Service application named KingSalesApp2 on ABC-TS01.
KingSalesApp2 does not make use a Microsoft Windows Installer package for the installation and
modifications are made to the current user registry during installation.
Which two of the following steps should you perform to install KingSalesApp2?

A. After installing the application, run the change logon /enable command on ABC-TS01.
B. Before installing the application, run the change logon /enable command on ABC-TS01
C. Before installing the application, run the change user /install command on ABC-TS01.
D. After installing the application, run the change user /install command on ABC-TS01.
E. Before installing the application, run the change user /execute command on ABC-TS01.
F. After installing the application, run the change user /execute command on ABC-TS01.
G. Before installing the application, run the change logon /disable command on ABC-TS01 before
running the application.
H. After installing the application, run the change logon /disable command on ABC-TS01 before
running the application

Answer: C,F

Explanation: In order to install the application to support numerous user sessions in the above
scenario, you need to first run the change user /install command on ABC-TS01because you need
to put a Terminal Services server in Install mode to be able to install or remove programs on the
server. You can put a Terminal Services server in Install mode using the Add/Remove Programs
tool in Control Panel in order to add or remove a program or by using the change user command
at a command prompt. Thereafter you can install the application.
After the installation of the program, you need to return the Terminal Services server to Execute
mode, to be able to execute the application. Therefore, to return to the Execute mode, you need to
run the change user /execute command on ABC-TS01.

Reference: HOW TO: Use the CHANGE USER Command to Switch to Install Mode in Windows
2000 Terminal Services
http://support.microsoft.com/kb/320185


QUESTION 7
You work as a network administrator for Certkingdom.com The domain contains four Windows Server
2008 domain controllers. All domain member servers run Windows Server 2008 and all client
computers run Windows Vista or Windows XP Service Pack 3.
You receive instruction to assign the Terminal Services and Terminal Services Gateway roles to a
server named ABC-TS02.
In order to protect the network you want to make sure that all client computers that connect to
ABC-TS02 have antivirus software and up to date security patches installed.
How can you enforce the security requirements?

A. You should implement a Network Access Protection (NAP) server in the domain and configure
the client computers to send a health option statement in the Terminal Services client access policy.
B. You should configure a Remote Access Policy with the required security settings.
C. You should install Microsoft Baseline Security Analyzer (MBSA) on ABC-TSO2 and configure it
to scan the client computers when they connect.
D. You should install Microsoft Security Assessment Tools (MSAT) on ABC-TSO2 and configure it
to scan the client computers when they connect.

Answer: A

Explanation: Explanation
To ensure that all client computers have firewall, antivirus software and anti-spyware software
installed, you need to set the Request clients to send a health option statement in the Terminal
Services client access policy. You also need to install and configure Network Access Protection
(NAP) on a server in the Certkingdom.com domain.


QUESTION 8
You work as an enterprise administrator at Certkingdom.com The Certkingdom.com network has a domain named
Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008. Half the client
computers run Windows XP Professional, and the rest run Windows Vista.
The Certkingdom.com network contains a server named ABC-SR22 which hosts Windows SharePoint
Services (WSS). ABC-SR22 hosts a WSS site for each department.
You receive instruction to ensure that CertK ing .com users are able to create distribution lists from
the SharePoint site.
How would you configure ABC-SR02 to accomplish this?

A. You need to install the Exchange System Manager software on ABC-SR02.
B. You need to enable IMAP4 on ABC-SR02.
C. You need to enable the SharePoint Directory Management Service on ABC-SR02.
D. You need to modify the incoming email settings on the SharePoint site on ABC-SR02.

Answer: B

Explanation: In order to configure the WSS server in such a way that it permits users to create
distribution lists from a SharePoint site, you need to enable the SharePoint Directory Management
Service on ABC-SR02. A distribution list contains the e-mail addresses of existing address lists as
well as the e-mail addresses of other site members. Distribution lists are available only if the
SharePoint Directory Management Service is enabled in Central Administration.
All new subsites that are created in an e-mail-enabled site collection are automatically e-mailenabled
also. If you choose to use an existing group during site creation, the distribution list for the
parent site (if available) will be associated with the new site

Reference: Introduction to incoming e-mail/ New site creation walkthrough
http://office.microsoft.com/en-us/help/HA100823061033.aspx


QUESTION 9
You work as an enterprise administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008.
The Certkingdom.com network contains a member server named ABC-SR11 that has the IIS server role
installed. ABC-SR10 hosts a Web site called ABCWeb.com. ABCWeb.com is configured to use
both https: and HTTPS connections. An SSL certificate is configured to enable the HTTPS
connections.
There are multiple virtual directories configured within the Web site. Some virtual directories allow
HTTP connections and some require encrypted connections using SSL.
You add another virtual directory named to the Web site. The virtual directory can be accessed at
ABCweb.com/accounts/.
The Certkingdom.com security policy requires that /accounts/ must be accessible to authenticated users
only and to allow authentication types to support all browsers. However, the CIO wants the
authentication traffic to be encrypted by using HTTPS.
How should you configure the /accounts virtual directory without affecting the other virtual
directories? Choose three

A. By enabling Basic Authentication for ABCWeb.com.
B. By enabling the Basic Authentication setting for the /accounts virtual directory.
C. By enabling disabling the Anonymous Authentication setting for ABCWeb.com.
D. By disabling the Anonymous Authentication setting for the /accounts virtual directory.
E. By configuring the Web site to the Require SSL setting.
F. By configuring the /accounts virtual directory to the Require SSL setting.
G. By enabling Digest Authentication setting the /accounts/ virtual directory.

Answer: B,D,F

Explanation: You need to enable the Basic Authentication setting, because it is supported by
mostly all the browsers.
You need to disable the Disable the Anonymous Authentication setting, so that only authenticated
users can access the virtual directory.
You also need to the /accounts/ virtual directory to the Require SSL setting. This will only allow
that the authentication traffic is encrypted and all other directories of the Website must be
accessible to anonymous users and be available without SSL.
You also need to configure the virtual directory for the Web site and not the website.

Reference: How to configure IIS Web site authentication
http://support.microsoft.com/kb/308160


QUESTION 10
You work as an enterprise administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008.
The Certkingdom.com network contains a member server named ABC-SR25 that runs the Web Server
(IIS) role and hosts multiple Websites.
You have received instruction to configure ABC-SR25 to run a new company Intranet Web site.
You want to configure ABC-SR25 to release memory to the new company Intranet Web site
automatically.
How should you configure ABC-SR25 without affecting the other Web sites?

A. The best option is to associate the Intranet website with the Default Application Pool.
B. The best option is to decrease the connection timeout for the Intranet website.
C. The best option is to modify the settings on the Default Web Site.
D. The best option is to configure the settings on the Performance tab of Default Application Pool.
E. The best option is to associate the website with a new application pool.

Answer: E

Explanation: The best option is to create a new application pool and associate the Web site to the
application pool. This will automatically release memory for a single website without affecting the
other Web sites. An application pool is a group of one or more URLs that are served by a worker
process or a set of worker processes. Application pools set boundaries for the applications they
contain, which means that any applications that are running outside a given application pool
cannot affect the applications in the application pool.

Reference: IIS 7.0: Managing Application Pools in IIS 7.0
http://technet2.microsoft.com/windowsserver2008/en/library/1dbaa793-0a05-4914-a065-
4d109db3b9101033.mspx?mfr=true

Reference: IIS 7.0: Configuring Recycling Settings for an Application Pool
http://technet2.microsoft.com/windowsserver2008/en/library/0d5770e3-2f6f-4e11-a47c-
9bab6a69ebc71033.mspx?mfr=true

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Microsoft aims Office 365 at small businesses

For the launch of its first full-fledged online office suite, Office 365, Microsoft is paying particular attention to how the new service could help small and medium-size businesses.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

“While we launched Office 365 for all customers, we wanted to focus today on the small and mid-sized opportunities,” said Kirk Koenigsbauer, Microsoft corporate vice president within the Microsoft Office Division product management group, in an interview with the IDG News Service.

During his presentation in New York, Microsoft CEO Steve Ballmer dropped the names of large companies already using Microsoft cloud services, including DuPont, Hyatt, Starbucks and Volvo. However, the company’s overall marketing emphasis was centered on making Office 365 as appealing as possible to small and medium-size businesses (SMBs), which spend US$800 billion annually on IT products, according to Gartner estimates.

That market is fragmented in terms of what Microsoft products are being used, Koenigsbauer elaborated. Some may be using older versions of Exchange or Microsoft Office, or may just may be using a mish-mash of different products. Worse, many organizations have small, if not non-existent, IT departments.

“Cloud services are a great value propositions for SMBs,” Koenigsbauer said. “They have very small IT staffs. They don’t have the infrastructure. They don’t have the capital to buy new racks of servers.”

More than 70 percent of the users of the Office 365 beta versions were small and medium-size businesses, Ballmer said. He ticked off a list of potential types of users for the new service, including real estate agents, accountants, lawyers, cleaning services and auto dealerships.

Office 365 can be exciting “particularly for companies that have little or no IT support and very little time and financial resources to dedicate to technology,” he said. “Office 365 … is a big step forward. These businesses really will be able to let their employees share information in new ways.”

At the press event, Microsoft gathered representatives from a number of small and mid-sized organizations that have tried Office 365 in its beta form. Chiefly, these businesses seemed most interested in using Office 365 as a way to avoid maintaining in-house Microsoft Exchange servers.

One company considering its use is the Hendrick Automotive Group, which operates 75 car dealerships throughout the U.S.

“For us, one of the reasons we’re looking at Office 365 is that we have a very small IT department. By moving services to the cloud we will be able to realign those resources to those applications that are unique to our industry,” said Robert Taylor, who is the director of information technology for Hendrick. “We’ll be able to deliver applications faster to our users.”

Currently, the company runs a centralized pool of Exchange servers. Its IT services department supports around 4,000 users with a staff of only 13. The company also uses Microsoft SharePoint as an aid to help train employees, and get personnel from new dealerships up to speed.

Another company testing the technology is Perkins Eastman, an architecture firm. Based in New York, the firm has 600 employees across 13 offices worldwide, which are supported by an IT staff of 14. “We’re constantly looking for ways to be more efficient,” said Hamilton Esi, who is director of practice applications for the firm. “Office 365 was a natural transition for us, because of its value proposition.”

The company has been testing the service since December, first with 15 e-mail accounts, then with 50 mailboxes. “Down the road, I see the entire organization moving over to the cloud,” Esi said.

Chief to the appeal of Office 365 for Esi is the ability to quickly spin up new accounts for new offices. The company is rapidly expanding, and plans to open two offices this year. With Office 365, the company can centrally provision email accounts without the need to set up separate servers in new locations. Employees can get their email accounts even before the office is fitted with a new Internet connection. “We now have the ability to set up the office in record time,” Esi said.

One area in which Microsoft will still have to prove its mettle is with the service’s up-time. The company’s precursor to Office 365, BPOS (Business Productivity Online Suite), had experienced a number of outages.

Koenigsbauer has noted that Office 365 apps inherently are different from BPOS ones in that they were designed to work in multi-tenant environments, which should minimize troubles. Ballmer promised that the SLA (Service Level Agreements) for Office 365 will be “the best in the industry.”

Office 365 may ultimately prove to be more reliable, agreed Scott Gode, vice president of product management and marketing for Azaleos. Azaleos offers a service to manage federated Active Directory instances, which will be essential for blending internal office use and Office 365 deployments under a single-sign-on.

The mistakes Microsoft made with BPOS come with the territory of ramping up a new service, he explained. However, Office 365 is a higher profile service for the company, and so Microsoft has probably devoted more resources to keeping it running. Engineers have also probably learned from running BPOS.

“We’ve been affected by the [downtime], but we don’t expect it to be totally without hitches,” said Chris Robert, senior manager for information security for Scripps Network Interactive, which runs a number of cable channels such as the HGTV.

When Scripps was spun out from its parent company, Scripps Co., management decided to switch over to BPOS for all employee e-mail needs. The company has been using the service for several years now. “Overall, we’re pretty happy with the [BPOS] service. It is quite a bit more stable,” than a typical in-house implementation, Robert said, noting that in-house email servers can go offline as well. “People have forgotten. It’s not like we’ve never had downtime,” he said.

New Firefox interface to speed up Firefox on Android

Mozilla has decided that when it comes to Android devices, performance is more important than the wealth of add-ons that can be used to customize Firefox.

Yesterday, Mozilla’s Director of Firefox Engineering Johnathan Nightingale announced on a mailing list that Firefox will move to Android’s native user interface, ditching the XUL technology that has been in use by Mozilla since before there even was a Firefox.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

“Firefox on Android is a critical part of supporting the open Web, and this decision puts us in a position to build the best Firefox possible,” Nightingale said.

Firefox is widely used on personal computers but a rarity on mobile phones, where–unlike Apple’s Safari or the unbranded browser Google builds for Android–it’s not installed on any phones by default. Firefox is the chief way Mozilla tries to implement its vision of empowering users of the Web and keeping that Web an open technology.

Firefox with a native Android interface should mean faster start-up, less memory usage, and smoother zooming and panning, Nightingale said. The native UI project page for mobile Firefox, aka Fennec, also listed better battery life as a benefit.

It’s not clear when the rebuilt version will arrive, but it won’t be for either the beta or Aurora versions currently in testing, Nightingale said.

Start-up time is a big deal when comparing Firefox to the built-in browser on Android, especially since Firefox often gets kicked out of memory when not in use, forcing another sluggish load when a person taps a link and needs the browser again.

“After substantial discussion, we have decided to build future versions of Firefox on Android with a native UI [user interface] instead of the current XUL implementation,” Nightingale said.

Only the user interface will change; the browser will still use the underlying Gecko engine for processing Web page elements. But leaving XUL behind will be a big deal for anyone who built Firefox add-ons using the technology, and it complicates the process of translating Firefox into different languages, too.

“It’s still early days, so we have a lot of questions to answer,” Nightingale said. “We’re talking with the Add-on SDK team about the best way to support extensions. We’re talking with l10n [localization] about how to ensure we support Firefox users wherever they live around the world.”

One possibility, according to Some meeting notes on native-UI Firefox is blunter: “Extensions are gone.” The notes raise the possibility of using Mozilla’s Add-On Software Developer Kit (SDK), an online tool for creating add-ons, but at present that works only for new-style “Jetpack” add-ons that aren’t available on mobile right now.

For now, there’s a lot of planning to do about the transition.

“By the end of next week, we will have a clearer outline of the work ahead,” Nightingale said.

70-519 Exam

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com


 

 

 

QUESTION 1
There is ASP NET 3.5 Web application CertKingdomApp.
You are required to upgrade CertKingdomApp to ASP.NET 4.0.
You need to make sure that CertKingdomApp is optimized for search engines.
In particular this optimization must include HTML that is generated by CertKingdomApp and URLs
local within CertKingdomApp.
Within CertKingdomApp there is a Data List control CertKingdomC.
CertKingdomApp must be able to load data at runtime into CertKingdomC with the help of the current
URL.
What is appropriate in this scenario? Select four.

A. Use property Repeat Layout of..
B. Use property Data List Layout of..
C. Use property Render Outer table Layout of..
D. ..Web Forms routing and set the property to…
E. .. permanent redirect and set the property to..
F. .. temporary redirect and set the property to..
G. ..Null..
H. ..True..
I. ..False..
J. ..Table..
K. ..List..
L. .. on all list controls.
M. ..on all controls.
N. .. all Form View controls.

Answer: B,D,I,N

Explanation:


QUESTION 2
There a ASP.NET MVC 2 application CertKingdomApp.
Consider unhandled exceptions.
CertKingdomApp must manage and log these unhandled exceptions.
What would be best to achieve this if you want to put the logic into a single place?

A. Use a custom Handle Error attribute to…
B. Use the default Handle Error attribute to…
C. For every method..
D. For each controller..
E. .. override the Exception method.
F. .. override the OneException method.
G. .. and apply it to all controllers.
H. ..use try and catch.

Answer: A,G

Explanation:


QUESTION 3
There is an ASP.NET Web application CertKingdomApp.
CertKingdomApp has pages that are available for public users.
CertKingdomApp has pages that are available for only administrative purposes.
Consider error handling code for these pages.
The same code must be used for the public pages and the administrative pages.
Errors must be handled in one way for the public pages and in another way for the administrative
pages.
How can this be achieved? Select two.

A. Use file Global.asax.cs (or Global.asax.vb)
B. Use file code-behind.
C. Use the Page_Error method(s).
D. ..for every public page and for every administrative page.
E. ..of the subclasses of System.Web.UI.Page.
F. ..of the subclasses of System.Web.URL.Page.
G. ..use the Application_error method.
H. .. for each master page.

Answer: C,E

Explanation:


QUESTION 4
CertKingdom has multiple ASP.NET Web applications.
There is a class library CertKingdomLib that are used by all these application.
There is a variable CertKingdomVar in CertKingdomLib.
CertKingdomVar is within the helper class.
CertKingdomVar contains secret information.
CertKingdomVar must not be seen by developers debugging applications.
How can this be achieved?

Answer:


QUESTION 5
There is an ASP.NET Web application CertKingdomApp.
CertKingdomApp has a Menu Control CertKingdomMC.
For unauthorized users CertKingdomMC shows a menu of public pages.
For authorized users CertKingdomMC shows a menu of both public pages and some private pages.
For security you need to ensure that the private pages (both the menu options and the URLs) are
not shown to unauthorized user.
What is appropriate in this scenario? Select four.

A. The event handler..
B. The attribute..
C. The method..
D. The exception handler..
E. ..Page_Refresh should be used..
F. ..Page_Load should be used..
G. ..window.onload should be used..
H. ..window.update should be used..
I. ..window.onupdate should be used..
J. ..Page_Init should be used..
K. .. JavaScript document ready should be used..
L. ..VBS (or C# script) document ready should be used..
M. …to add pages to CertKingdomMC that are to be accessed by all users
N. ..to hide the private pages from the list of pages shown on CertKingdomMC.
O. ..to add pages to CertKingdomMC that are to be accessed by authorized users.
P. ..to add pages to CertKingdomMC that are to be accessed by unauthorized users.

Answer: C,F,O

Explanation:


QUESTION 6
There is an ASP.NET Web application CertKingdomApp.
A user of CertKingdomApp can send customized e-mails to several thousand receivers at a time
through a form CertKingdomForm.
CertKingdomApp has around 3000 users about half of which can be accessing CertKingdomApp at a
specific point of time.
How can you optimize the performance of CertKingdomApp? Select three.

A. Use the On Load method..
B. Use the On Click method..
C. ..of CertKingdomForm..
D. ..of CertKingdomApp..
E. ..as a separate process.
F. ..as multiple processes.
G. .. from the System.Net.Mail namespace classes.
H. .. from the System.Mail namespace classes.
I. .. from the Machine.Web.Mail namespace classes.
J. .. from the System.Web.Mail namespace classes.

Answer: B,C,E

Explanation:


QUESTION 7
There is an ASP.NET Web application CertKingdomApp.
CertKingdomApp is used to edit pictures online within your web browser.
Clients can upload pictures to CertKingdomApp.
Clients can edit the uploaded pictures through special features CertKingdomApp.
Some of these features are very computationally demanding.
These specific features should be run on a GPU (Graphics Processing Unit).
Other features of CertKingdomApp, the ones that are not so CPU intensive, should be run on the
server.
Bandwidth usage is also a critical part of the required solution. It should be minimized.
What action should you take?

Answer:


QUESTION 8
There is an ASP.NET Web application CertKingdomApp.
You are required to enforce that CertKingdomApp is using data caching at all times.
You are required to enforce that CertKingdomApp keeps the session state at all points of time.
CertKingdomApp must maintain session state and data caching.
What is appropriate in this scenario? Select two.

A. Mixed process session state should be used.
B. out-of-process session state should be used.
C. in-process session state should be used.
D. in&out process session state should be used.
E. out-of-process transaction state should be used.
F. in-process transaction state should be used.
G. in&out process transaction state should be used.
H. input caching should be used.
I. output caching should be used.
J. Static caching should be used.
K. Caching should be enabled.
L. distributed caching should be used.
M. multiple caching should be used.

Answer: B,L

Explanation:


QUESTION 9
There is an ASP.NET Web application CertKingdomApp.
CertKingdomApp is rewritten.
Now CertKingdomApp should be deployed.
What is appropriate in this scenario? Select two or three.

A. Use a web pool..
B. Use an application pool…
C. Use a rewritten pool..
D. Use the global assembly cache…
E. ..which includes only ASP.NET 2.0, ASP.NET 3.0, ASP NET 3.5, and ASP.NET.4 Web
applications…
F. ..which includes only ASP.NET. 3.5 Web applications…
G. ..which includes only ASP.NET.4 Web applications…
H. ..which includes only ASP.NET 2.0, ASP.NET 3.0, and ASP NET 3.5Web applications…
I. ..which includes only ASP.NET 1.0, ASP.NET 2.0, ASP.NET 3.0, and ASP NET 3.5Web
applications…
J. ..and add CertKingdomApp to it.
K. .. and compile and deploy CertKingdomApp to it.
L. ..and deploy CertKingdomApp to it.

Answer: B,G,J

Explanation:


QUESTION 10
There is an ASP.NET Web application CertKingdomApp.
There is a MS SQL Server database CertKingdomDB on server CertKingdomSrv.
CertKingdomDB is used to store user authorization data.
CertKingdomDB also store some other secret information used by CertKingdomApp.
CertKingdomApp must not access CertKingdomSrv directly.
CertKingdomApp should not include programming code for authorization.
Some Web pages, the ones that displays secret information, should only show information for
authenticated users.
Visitors should only be able to see pages that do not contain any secret data.
Which type of solution should be used in this scenario?

A. Third party authentication solution.
B. SQL Service
C. WCF service.
D. Separate library.
E. Standard library
F. SQL XML Services.
G. SQL HTML Services.
H. stored procedures.

Answer: C

Explanation:

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Microsoft Corp is considering a bid for Yahoo Inc, resurfacing as a potential buyer after a bitter and unsuccessful fight to take over the Internet company in 2008, sources close to the situation said on Wednesday.

Microsoft joins a host of other companies looking at Yahoo, which has a market value of about $20 billion and is readying financial pitch books for potential buyers, they said.

Those companies include buyout shops Providence Equity Partners, Hellman & Friedman and Silver Lake Partners, as well as Chinese e-commerce giant Alibaba and Russian technology investment firm DST Global, the sources said.

Yahoo shares jumped 10.1 percent on the news to close at $15.92 on Nasdaq, but fell back to $15.34 in after-hours trading. Microsoft shares ended 2.2 percent higher at $25.89.

Microsoft may seek a partner to go after Yahoo, one of the sources said, without identifying any parties.

No decision has been made and a bid may not materialize as there are internal divisions at the software company on whether it should pursue Yahoo again, a high-ranking Microsoft executive said.

One camp inside Microsoft is hot for the deal, believing that it would obliterate AOL Inc as a competitor and create a strong Web portal that can offer better products to audiences, advertisers and end users, the executive said.

However, another camp is against the deal, feeling that if Microsoft is going to invest billions of dollars in an acquisition it should be one that has more growth potential. Microsoft last tried buying Yahoo in 2008, offering to pay as much as $47.5 billion, or $33 per share.

“Yahoo’s value hasn’t grown in years, and some executives feel we should buy something that is more forward-looking,” said the executive, who spoke on condition of anonymity.

MCTS Certification, MCITP Certification

Microsoft MCTS CertificationMCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Yahoo, Microsoft and the other potential buyers declined to comment.

Any auction process for Yahoo is still in the early stages, and the company’s financial advisers — Goldman Sachs and Allen & Co — are preparing to send financial information to potential bidders, sources have said previously.

BIG BITE

Shortly after ousting Carol Bartz as CEO in early September, Yahoo said it was exploring strategic alternatives after receiving “inbound interest” from a number of parties.

The once-dominant Internet pioneer is pursuing parallel tracks, sounding out deal options as well as engaging in a search for a new CEO.

Yahoo would be a big bite for any single private equity firm, especially at a time when financing markets for leveraged buyouts have dried up.

Industry sources said private equity firms could take over the U.S. operations and sell Yahoo’s Asian assets to a buyer such as Alibaba.

“There are many reasons why this thing probably makes sense,” said Sid Parakh, analyst at fund firm McAdams Wright Ragen. “If you strip out the variety of assets Yahoo owns, you are pretty much paying nothing for the core business.”

One Wall Street analyst recently valued Yahoo at just over $20 billion, with its core search and display advertising business worth $7.7 billion, its Asian assets worth $9.2 billion, plus $3.2 billion in cash.

Yahoo owns about 40 percent of Alibaba as well as about 35 percent of Yahoo Japan.

If Microsoft fully combined its Bing Internet search business with Yahoo’s, it would give it more than 30 percent of the U.S. search market and make it a credible competitor to Google, said Parakh.

Under a 10-year deal struck in 2009, Microsoft’s Bing already powers Yahoo search, but it cedes 88 percent of resulting advertising revenue back to Yahoo.

Microsoft, with a cash pile of $53 billion, could certainly afford a deal, but some doubted the world’s largest software company would actually pursue it, given its previously failed bid and the existing Yahoo agreement.

“I think it’s unlikely because they (Microsoft) have been down this path before,” said Ben Schachter, an analyst with Macquarie Research.

“In a lot of ways they’ve gotten what they want out of it already, with the (Yahoo) search deal. I could make a case for a lot of synergies. But it’s certainly not a strategic priority in any way.”

Silicon Valley sources said Jack Ma, the founder and CEO of Chinese e-commerce giant Alibaba — who last month expressed interest in buying Yahoo — could team up with private equity to make a deal.

Or it may make more sense for Ma to team up with Microsoft, said Susquehanna Financial Group analyst Herman Leung.

“If Microsoft gets involved, then you don’t need private equity,” said Leung. “The problem for Jack Ma is capital. Microsoft has $53 billion in cash. Why have to deal with bondholders and all this stuff when Microsoft can make that all happen for you?”

CULTURE CLASH

Some also have expressed concerns about cultural fit and Microsoft’s ability to manage such a large deal.

Microsoft CEO Steve Ballmer has had an antagonistic relationship with Yahoo, and the company has never successfully integrated a large acquisition.

Microsoft’s 2007 deal to buy online ad firm aQuantive for $6 billion was a flat-out failure. Its $8.5 billion deal to buy Internet phone service Skype has not yet been completed, so integration efforts have not yet begun.

Microsoft is making slow progress in combating Google’s dominance in search advertising. According to the latest figures from research firm comScore, Google has 64.8 percent of the U.S. search market, Yahoo has 16.3 pct and Microsoft 14.7 percent.

But even with traffic from Yahoo, Microsoft still has not attracted enough advertising dollars and profitability in search is a long way off.

Last quarter, Microsoft’s online services unit — which includes Bing and the MSN web portal — lost $728 million. It has lost almost $6.5 billion over last three fiscal years.

Report: A Third of Organizations Use SharePoint as an Enterprise CMS

While we have seen over the week just gone by the massive interest in SharePoint and a steady increase in the deployment of SharePoint 2010, how it is being used across the enterprise varies. A new EMC-sponsored AIIM report shows that one of those uses is as an enterprise content management system.
SharePoint Deployments

The report — entitled Using SharePoint for ECM: How well is it meeting expectations? by Doug Miles and based on the results of 674 surveys carried out across AIIM members between April 15 and May 5 — confirms that, already, SharePoint 2010 is being used by a large number of enterprises for content management.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Recently published, it shows, in fact, that over a third of organizations are using SharePoint to manage content across the enterprise, and over half believe that SharePoint will become their primary enterprise CMS in the future.

While it is debatable whether this is a good or bad thing, it also shows that over 60% of users are showing strong interest in third-party additions and integrations, which can fill perceived functionality gaps.

Behind those figures, though, there are some notable caveats. While many are using it for content management, traditional enterprise CMS applications such as scanning and capture, forms processing, document workflow and records management have yet to be widely adopted.

There are other problems too. While we have noted before that planning deployments is still a major issue for many enterprises, both this research and other research released by OpenText during the SharePoint Anaheim conference shows that deployment still appears to be haphazard.
Where is SharePoint Now?

It is not really surprising that interest in SharePoint as an enterprise content management system is as high as it is, given adoption rates across all verticals and in all business segments from SMBs to Fortune 100 companies.

Over the past ten years, since the first release, it has moved from being an intranet and basic collaboration application to something that is now used for portals, collaboration, forms processing, business intelligence, business process management and content management.

According to Miles, who heads AIIM’s Market Intelligence Division, its adoption is in the region of 60-70%, and with the improved functionality in SharePoint 2010 of content management, records management and business process management capabilities of SharePoint, this is set to increase.

While there is still no agreement as to whether it provides true enterprise CMS capabilities in comparison to traditional suites, there is no doubt from this research that where it is deemed to be lacking by enterprises, third-party add-ons are being used instead.

While the popularity of SharePoint is indisputable, and despite much talk about upgrading to the 2010 version since it was released in May last year, it seems enterprises have been slow to make the jump, the research shows.

According to Miles, only 8% of SharePoint users have completed the upgrade to 2010, while the rest are either happy to stay with the 2007 version, or just haven’t got around to moving yet.

That said, 21% have deployed SharePoint 2010 as a first use with 6% of those live already and a further 28% moving from 2007 to 2010, with half of those expecting to be fully live by the end of the year.

Microsoft looks to business tools for health care

Craig Mundie, Microsoft’s chief research and strategy officer, demonstrated some applications on Thursday that apply current technologies to problems facing the health care industry.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

He spoke at the Pacific Health Summit in Seattle.

Technology developments aimed at businesses can help the medical field more than many people in health care may think, he said. For example, health care organizations often say that they have so much data, including patients’ medical, billing and insurance information, that it will be a challenge for technology companies to build applications around the data, Mundie said.

But Mundie discovered that, in fact, the data collected by some businesses far surpasses that of health care groups. His researchers found that every five hours, consumers upload enough video to YouTube to match all data that the Beth Israel hospital system in Boston has collected in total over the past 27 years. Similarly, every day, consumers upload a volume of data in Facebook photos that equals all of the hospital’s data, he said.

Beth Israel was the largest single health care system in terms of data that Microsoft could find in the U.S. in order to make this comparison, he said.

“While yes, medical data is big and complicated, by today’s standard it’s actually not very big,” Mundie said.

The volume of medical data is set to grow, though, as an increasingly tech-savvy population begins to use devices that collect health information and transmit it to back-end databases. For example, bathroom scales and hearth monitors can automatically send data to databases.

By combining such user-generated data with information produced in the clinical care environment, “we’ll be enlightened,” Mundie said.

His researchers are working on ways to analyze that data and apply machine learning to improve care and reduce costs in health care. Microsoft did one experiment in which it used machine learning to look at 10 years of data from a hospital to try to predict whether a patient was likely to be readmitted to the hospital. It used all the data from the hospital, including clinical data and billing information.

“We set about to answer the question of, if you look at things that are expensive in medicine, is there a way to not ask doctors what the answers are, but can you ask the data instead and would you get a different answer,” he said.

Microsoft’s tool looked at data for people who had congestive heart failure and found many of the same correlations that doctors look for to determine if the person was likely to require readmittance. But the tool also found new scenarios. For example, it found that patients who were given drugs for gastric disorders and those with depressive issues had higher incidences of return visits.

The idea is to use machine learning to identify patients who are likely to have additional problems, and then doctors can decide to intervene in advance, he said.

“We think we’re just scratching the surface of what can be done using machine learning technology,” Mundie said.

Microsoft uses machine learning for a number of its own products, such as its Bing search engine.

He also showed off ways that health workers could use Microsoft’s Kinect sensor, currently used in conjunction with the Xbox 360 game console. Kinect lets users move their arms, bodies and voices rather than a game controller to interact with games.

Mundie showed an example where a health care worker could use voice commands to sift through patients to identify those who might be eligible to be entered into a new program. He was presented with photographs of the patients and could choose one in order to see visual representations of clinical data. For example, a chart showed one patient’s weight, and Mundie could drag an incident where the patient sprained her ankle onto the chart to see how that incident correlated with changes in weight.

He also showed a scenario where diabetes patients could be part of a virtual support group. The group appeared as avatars sitting in a room, and members used Kinect sensors to interact in the virtual group. The application uses avatars for individuals because some people would prefer not to use their true image, as they would in a video chat. But the avatars move and reflect facial expressions just like the real person does. That could allow a health care worker to review a recorded video of the session to look for clues that individuals may not be engaged by the sessions, Mundie said.

Mundie has spoken at the Pacific Health Summit many times in the past, and often the futuristic technologies he demonstrates become commercial, he said. For example, he once discussed ways that inkjet printers could inject medicines onto pills or other surfaces, and this year a major drug company is completing a trial doing just that. He also once showed off robots that could be used in health care, and there are now 400 of them being used commercially.

Certkingdom 70-647 Exam Q & A



Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com



QUESTION 1
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008.
The Certkingdom.com network has a file server named ABC-SR07 that hosts a shared folder named
ABCDocs. Several Microsoft Word documents are stored in the ABCDocs share. You want to
enable document version history on these documents. You also want the documents in the
ABCDocs share to be accessed through a Web page.
Which of the following roles or services would you install on ABC-SR07 to achieve the desired
results cost effectively?

A. FTP Server role.
B. Application Server role.
C. Microsoft Windows SharePoint Services (WSS) 3.0.
D. File and Print Services role.
E. Microsoft Office SharePoint Server (MOSS) 2007.
F. SMTP Server role.

Answer: C

Explanation:
To achieve the desired results without requiring any additional cost, you need to use Microsoft
Windows SharePoint Services (WSS) 3.0.
Reference: Microsoft Windows SharePoint Services 3.0 and the Mobile Workplace
http://download.microsoft.com/download/b/b/6/bb6672dd-252c-4a21-89de-
78cfc8e0b69e/WSS%20Mobile%20Workplace.doc


QUESTION 2
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com with a single site named Site
A. All servers in the Certkingdom.com network run Windows Server
2008.
You reorganize the Active Directory infrastructure to include a second site named SiteB with its
own domain controller.
How would you configured the firewall to allow replication between SiteA and SiteB?

A. Enable IPSec traffic to pass through the firewall.
B. Enable RPC traffic to pass through the firewall.
C. Enable SMTP traffic to pass through the firewall.
D. Enable NNTP traffic to pass through the firewall.
E. Enable FTP traffic to pass through the firewall.

Answer: B

Explanation:
You should permit RPC traffic through the firewall to enable the domain controllers to replicate
between the two sites because the Active Directory relies on remote procedure call (RPC) for
replication between domain controllers. You can open the firewall wide to permit RPC’s native
dynamic behavior.
Reference: Active Directory Replication over Firewalls
http://technet.microsoft.com/en-us/library/bb727063.aspx


QUESTION 3
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008.
Certkingdom.com runs a critical application that accesses data that is stored in a Microsoft SQL Server
2005 database server named ABC-DB02. Which of the following options would you choose to
ensure that the database is always available?

A. Two Windows Server 2008 servers running MS SQL Server 2005 Standard Edition in a
Network Load Balancing (NLB) cluster.
B. Two Windows Server 2008 servers running MS SQL Server 2005 Enterprise Edition in a
Network Load Balancing (NLB) cluster
C. Two Windows Server 2008 servers running MS SQL Server 2005 Standard Edition in a failover
cluster.
D. Two Windows Server 2008 servers running MS SQL Server 2005 Enterprise Edition in a
failover cluster.

Answer: D

Explanation:
To ensure the high availability of the data store, you need to use a Windows Server 2008 failover
cluster with shared storage.
Failover clustering can help you build redundancy into your network and eliminate single points of
failure.
Administrators have better control and can achieve better performance with storage than was
possible in previous releases. Failover clusters now support GUID partition table (GPT) disks that
can have capacities of larger than 2 terabytes, for increased disk size and robustness.
Administrators can now modify resource dependencies while resources are online, which means
they can make an additional disk available without interrupting access to the application that will
use it. And administrators can run tools in Maintenance Mode to check, fix, back up, or restore
disks more easily and with less disruption to the cluster
You should not use Network Load Balancing (NLB) because it only allows you to distribute TCP/IP
requests to multiple systems in order to optimize resource utilization, decrease computing time,
and ensure system availability.
Reference: High Availability
http://www.microsoft.com/windowsserver2008/en/us/high-availability.aspx


QUESTION 4
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008. Certkingdom.com has its
headquarters in Chicago and sub-divisions in Boston, Atlanta, Miami and Dallas. All domain
controllers are currently installed in the Chicago.
You need to have new domain controllers installed in the Boston, Atlanta, Miami and Dallas subdivisions.
Certkingdom.com issues a security policy for the new domain controllers that states the
following:
• Unauthorized user must not be able to access the Active Directory database.
• Unauthorized user must not be able to boot a domain controller from an alternate boot disk.
Which of the following options would you choose to implement the security policy?

A. Modify the permissions of the ntds.dat file.
B. Configure a read-only domain controller (RODC) in the Boston, Atlanta, Miami and Dallas.
C. Disable replication of the Sysvol folder on the new domain controllers.
D. Configure Windows BitLocker Drive Encryption (BitLocker) on the new domain controllers.
E. Disable the Global Catalog role on the new domain controllers.
F. Configure EFS encryption on the new domain controllers.

Answer: D

Explanation:
To configure domain controller at each branch office to ensure that no unauthorized user should
be allowed to copy the Active Directory database from a branch office domain controller by starting
the server from an alternate startup disk, you need to use Windows BitLocker Drive Encryption
(BitLocker)
BitLocker allows you to encrypt all data stored on the Windows operating system volume and use
the security of using a Trusted Platform Module (TPM) that helps protect user data and to ensure
that a computer running Windows Vista or Server 2008 have not been tampered with while the
system was offline.
In addition, BitLocker offers the option to lock the normal startup process until the user supplies a
personal identification number (PIN) or inserts a removable USB device, such as a flash drive, that
contains a startup key. This process will ensure that users can only access all files on the servers
if they have the PIN. You cannot use an alternate startup disk to boot the server.
Reference: BitLocker Drive Encryption Technical Overview
http://technet2.microsoft.com/windowsserver2008/en/library/a2ba17e6-153b-4269-bc46-
6866df4b253c1033.mspx?mfr=true


QUESTION 5
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com that runs at the domain functional level of Windows Server 2008.
Which of the following options can be used for tracking any modification to Active Directory
Objections?

A. Configure a Group Policy to run the Security Configuration Wizard on all computers in the ABC
network.
B. Configure the Default Domain Controllers Group Policy to audit Directory Services.
C. Configure the Default Domain Group Policy to audit Directory Services.
D. Enable auditing of the ntds.dat file in the Default Domain Group Policy.
E. Enable auditing of the ntds.dat file in the Default Domain Group Policy.

Answer: B

Explanation:
To implement an audit and compliance policy and ensure that all changes made to Active
Directory objects are recorded, you need to configure a Directory Services Auditing policy in the
Default Domain Controller Policy
In Windows Server 2008, you can enable Audit Directory Service Access policy to log events in
the Security event log whenever certain operations are performed on objects stored in Active
Directory.
Enabling the global audit policy, Audit directory service access, enables all directory service policy
subcategories. You can set this global audit policy in the Default Domain Controllers Group Policy
(under Security Settings\Local Policies\Audit Policy).
Reference: Windows Server 2008 Auditing AD DS Changes Step-by-Step Guide
http://technet2.microsoft.com/windowsserver2008/en/library/a9c25483-89e2-4202-881cea8e02b4b2a51033.
mspx?mfr=true


QUESTION 6
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2003.
You want to install a read-only domain controller (RODC) without uABCrading the existing domain
controllers Windows Server 2008.
What action should you take? (Each correct option will form a part of the answer. Select TWO.)

A. Raise the forest functional level to Windows 2000.
B. Raise the forest functional level to Windows 2003.
C. Raise the forest functional level to Windows 2008.
D. Raise the domain functional level to Windows Server 2000
E. Raise the domain functional level to Windows Server 2003
F. Raise the domain functional level to Windows Server 2008

Answer: B,E

Explanation:
To create an Active Directory forest and domain functional levels to support Read-only domain
controllers (RODC) and Windows Server 2003 domain controllers, you need to create both the
forest and domain functional levels of Windows Server 2003. This is because only when you use
both the forest and domain functional levels of Windows Server 2003, you will be able to support
Read-only domain controllers (RODC) and Windows Server 2003 domain controllers.
Reference: Appendix of Functional Level Features
http://technet2.microsoft.com/windowsserver2008/en/library/34678199-98f1-465f-9156-
c600f723b31f1033.mspx?mfr=true


QUESTION 7
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a forest named
and Certkingdom.com that runs at the forest functional level of Windows Server 2003. Certkingdom.com has a
subsidiary company named TestLabs, Inc. The TestLabs, Inc. network has a forest named and
testlabs.com that runs at the forest functional level of Windows Server 2003. All domain controllers
on both the Certkingdom.com network and the TestLabs, Inc. network run Windows Server 2008.
Certkingdom.com users do not have access to network resources in TestLabs, Inc.
TestLabs, Inc. has a file server named TESTLABS-SR07. Certkingdom.com users must be able to access
shared folders on TESTLABS-SR07. However, Certkingdom.com users must not be able to access any
other network resources in TestLabs, Inc.
Which of the following options would you choose to accomplish this task? (Each correct option will
form a part of the answer. Select TWO.)

A. By raising the forest functional level of Certkingdom.com and testlabs.com to Windows Server 2008.
B. By raising the domain functional level of all domains in Certkingdom.com and testlabs.com to Windows
Server 2008.
C. By creating a forest trust between Certkingdom.com and testlabs.com.
D. By setting the Allowed to Authenticate for TESTLABS-SR07.
E. By setting the Allowed to Authenticate right on the computer object for the testlabs.com
infrastructure operations master object.

Answer: C,D

Explanation:
To ensure that the users in ABC-south.com are denied access to all the resources ABC-north.com
except the resources on ABC-SR07, you need to create a forest trust between ABC-south.com
and ABC-north.com so that resources can be shared between both the forests. You can however
set the trust authentication setting to selective authentication so that only selected authentication
is allowed.
Next you need to set the Allowed to Authenticate right on the computer object for ABC-SR07 so
that each user must be explicitly granted the Allowed to Authenticate permission to access
resources on ABC-SR07.
You should not set the Allowed to Authenticate right on the computer object for the ABC-north.com
infrastructure operations master object because Allowed to Authenticate right is set for the users in
a trusted Windows Server 2003 domain or forest to be able to access resources in a trusting
Windows Server 2003 domain or forest, where the trust authentication setting has been set to
selective authentication, each user must be explicitly granted the ‘Allowed to Authenticate’
permission on the security descriptor of the computer objects (resource computers) that reside in
the trusting domain or forest.
Reference: Grant the Allowed to Authenticate permission on computers in the trusting domain or
forest
http://technet2.microsoft.com/windowsserver/en/library/b4d96434-0fde-4370-bd29-
39e4b3cc7da81033.mspx?mfr=true


QUESTION 8
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008. Certkingdom.com has its
headquarters in Chicago and branch offices in Boston. The Boston office is connected to the
Chicago by a WAN link. The Chicago office has a DNS Sever named ABC-SR04 that is configured
as a single DNS zone. The Boston office has two servers named ABC-SR07 and ABC-SR08.
ABC-SR08 hosts shared folders that are only accessed by Certkingdom.com users in the Boston office.
You work in the Chicago office while a network administrator named Rory Allen works in the
Boston office.
Certkingdom.com wants you to ensure that users at the Boston office can log on to the Certkingdom.com domain
and can connect to the shared folders on ABC-SR08 even when the WAN link is down. You must
allow Rory Allen to configure the servers in the Boston office without allowing him to modify the
Active Directory configuration.
Which actions should you take to accomplish this task? (Each correct option will form a part of the
answer. Choose THREE.)

A. By promoting ABC-SR07 to a domain controller.
B. By promoting ABC-SR07 to a read-only domain controller (RODC).
C. By installing USMT role on ABC-SR07.
D. By installing ADMT role on ABC-SR07.
E. By installing DNS role on ABC-SR07.
F. By adding Rory Allen to the Domain Admins group.
G. By creating an organizational unit (OU) for the Boston office.
H. By assigning administrative rights to Rory Allen.

Answer: B,E,H

Explanation:
To ensure that the users in the branch office are able to log on to the domain even if the WAN link
fails, you need to promote the member server to a read-only domain controller (RODC) because
the RODC works as a domain controller and allows log in to the domains except allowing
modifications and changes to the Active directory domain.
Delegating administrative rights to the local branch office administrator after promoting a member
server to a RODC will make sure that branch office administrator is not allowed to initiate any
changes to Active Directory but should be allowed to make configuration changes to the servers in
the branch office.
Configuring the DNS role to the member server, will ensure that the users are allowed to access
file shares on the local server in the absence of the WAN link. Without name resolution and the
other services that are provided by DNS servers, client access to remote host computers would be
prohibitively difficult. DNS servers need to be configured because in intranets computer users
rarely know the IP addresses of computers on their local area network (LAN).
Reference: DNS Server Role: Read-only domain controller support/ Who will be interested in this
server role?
http://technet2.microsoft.com/windowsserver2008/en/library/533a1cfc-5173-4248-914c-
433bd018f66d1033.mspx?mfr=true


QUESTION 9
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com and a workgroup named ABCGROUP. All servers in the Certkingdom.com network run Windows
Server 2008 and all the client computers run Windows Vist
A. The Certkingdom.com network has
unmanaged network switches and has two servers named ABC-SR07 and ABC-SR08. ABC-SR07
is configured with the Active Directory Domain Services (AD DS), the Active Directory Certificate
Services (AD CS) and the Dynamic Host Configuration Protocol (DHCP) service while ABC-SR08
is configured with the Routing and Remote Access Service (RRAS), the Network Policy Service
(NPS) and Health Registration Authority (HRA).
You notice that the latest Microsoft updates have not been applied to all client computers that are
part of the ABCGROUP workgroup. You are concerned that Certkingdom.com users are accessing the
local area network (LAN) from these client computers.
You want to implement Network Access Protection (NAP) to secure the network by preventing
client computers that are not members of the Certkingdom.com network or do not have the latest Microsoft
updates from accessing any network servers that are members of the Certkingdom.com domain.
Which of the following option would you choose?

A. TCP/IP
B. 802.1z
C. PPTP
D. DHCP
E. L2TP
F. IPsec

Answer: F

Explanation:
To ensure that only the computers that have the latest Microsoft updates installed should be able
to connect to servers in the domain and that only the computers that are joined to the domain
should be able to connect to servers in the domain, you need to use the IPSec NAP enforcement
method. IPsec domain and server isolation methods are used to prevent unmanaged computers
from accessing network resources. This method enforces health policies when a client computer
attempts to communicate with another computer using IPsec.
Reference: Protecting a Network from Unmanaged Clients / Solutions
http://www.microsoft.com/technet/security/midsizebusiness/topics/serversecurity/unmanagedclient
s.mspx
Reference: Network Access Protection (NAP) Deployment Planning / Choosing Enforcement
Methods
http://blogs.technet.com/nap/archive/2007/07/28/network-access-protection-deploymentplanning.
aspx


QUESTION 10
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008. The Certkingdom.com network
has two web servers named ABC-SR07 and ABC-SR08. Certkingdom.com wants to hosts the company’s
e-commerce Web site named sales.Certkingdom.com on the two web servers. You receive instructions
from the CEO to ensure that the Web site is available even when one of the Web servers is offline.
The CEO also wants the session state of the web site to be available should one of the web
servers be offline. Additionally, you must be able to support the Web site on up to six Web servers
with each Web server having a dedicated IP address.
What action should you take?

A. Configure a two-failover cluster on ABC-SR07 and ABC-SR08.
B. Configure multiple ports for the sales.Certkingdom.com web site.
C. Configure Network Load Balancing on ABC-SR07 and ABC-SR08.
D. Configure the sales.Certkingdom.com web site on each server with the site content on a network share.
E. Configure multiple host headers for the sales.Certkingdom.com website.
F. Configure multiple IP addresses for the sales.Certkingdom.com website.

Answer: C

Explanation:
To ensure that the users of the website would be able to access the Web site if a single server
fails. The website should be scalable to as many as seven Web servers and the web servers
should be able to store session-state information for all users. It should also provide support for
multiple dedicated IP addresses for each Web server.
The Network Load Balancing (NLB) feature in Windows Server 2008 enhances the availability and
scalability of Internet server applications such as those used on Web, FTP, firewall, proxy, virtual
private network (VPN), and other mission-critical servers. NLB provides high availability of a
website by detecting and recovering from a cluster host that fails or goes offline.
You should not use failover clustering in this scenario because failover clustering requires shared
storage which is not mentioned in this question.
Reference: Overview of Network Load Balancing
http://technet2.microsoft.com/windowsserver2008/en/library/11dfa41c-f49e-4ee5-8664-
8b81f6fb8af31033.mspx?mfr=true

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Certkingdom 70-647 Exam Q & A


QUESTION 1
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008.
The Certkingdom.com network has a file server named ABC-SR07 that hosts a shared folder named
ABCDocs. Several Microsoft Word documents are stored in the ABCDocs share. You want to
enable document version history on these documents. You also want the documents in the
ABCDocs share to be accessed through a Web page.
Which of the following roles or services would you install on ABC-SR07 to achieve the desired
results cost effectively?

A. FTP Server role.
B. Application Server role.
C. Microsoft Windows SharePoint Services (WSS) 3.0.
D. File and Print Services role.
E. Microsoft Office SharePoint Server (MOSS) 2007.
F. SMTP Server role.

Answer: C

Explanation:
To achieve the desired results without requiring any additional cost, you need to use Microsoft
Windows SharePoint Services (WSS) 3.0.
Reference: Microsoft Windows SharePoint Services 3.0 and the Mobile Workplace
http://download.microsoft.com/download/b/b/6/bb6672dd-252c-4a21-89de-
78cfc8e0b69e/WSS%20Mobile%20Workplace.doc

 

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com


QUESTION 2
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com with a single site named Site
A. All servers in the Certkingdom.com network run Windows Server
2008.
You reorganize the Active Directory infrastructure to include a second site named SiteB with its
own domain controller.
How would you configured the firewall to allow replication between SiteA and SiteB?

A. Enable IPSec traffic to pass through the firewall.
B. Enable RPC traffic to pass through the firewall.
C. Enable SMTP traffic to pass through the firewall.
D. Enable NNTP traffic to pass through the firewall.
E. Enable FTP traffic to pass through the firewall.

Answer: B

Explanation:
You should permit RPC traffic through the firewall to enable the domain controllers to replicate
between the two sites because the Active Directory relies on remote procedure call (RPC) for
replication between domain controllers. You can open the firewall wide to permit RPC’s native
dynamic behavior.
Reference: Active Directory Replication over Firewalls
http://technet.microsoft.com/en-us/library/bb727063.aspx


QUESTION 3
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008.
Certkingdom.com runs a critical application that accesses data that is stored in a Microsoft SQL Server
2005 database server named ABC-DB02. Which of the following options would you choose to
ensure that the database is always available?

A. Two Windows Server 2008 servers running MS SQL Server 2005 Standard Edition in a
Network Load Balancing (NLB) cluster.
B. Two Windows Server 2008 servers running MS SQL Server 2005 Enterprise Edition in a
Network Load Balancing (NLB) cluster
C. Two Windows Server 2008 servers running MS SQL Server 2005 Standard Edition in a failover
cluster.
D. Two Windows Server 2008 servers running MS SQL Server 2005 Enterprise Edition in a
failover cluster.

Answer: D

Explanation:
To ensure the high availability of the data store, you need to use a Windows Server 2008 failover
cluster with shared storage.
Failover clustering can help you build redundancy into your network and eliminate single points of
failure.
Administrators have better control and can achieve better performance with storage than was
possible in previous releases. Failover clusters now support GUID partition table (GPT) disks that
can have capacities of larger than 2 terabytes, for increased disk size and robustness.
Administrators can now modify resource dependencies while resources are online, which means
they can make an additional disk available without interrupting access to the application that will
use it. And administrators can run tools in Maintenance Mode to check, fix, back up, or restore
disks more easily and with less disruption to the cluster
You should not use Network Load Balancing (NLB) because it only allows you to distribute TCP/IP
requests to multiple systems in order to optimize resource utilization, decrease computing time,
and ensure system availability.
Reference: High Availability
http://www.microsoft.com/windowsserver2008/en/us/high-availability.aspx


QUESTION 4
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008. Certkingdom.com has its
headquarters in Chicago and sub-divisions in Boston, Atlanta, Miami and Dallas. All domain
controllers are currently installed in the Chicago.
You need to have new domain controllers installed in the Boston, Atlanta, Miami and Dallas subdivisions.
Certkingdom.com issues a security policy for the new domain controllers that states the
following:
• Unauthorized user must not be able to access the Active Directory database.
• Unauthorized user must not be able to boot a domain controller from an alternate boot disk.
Which of the following options would you choose to implement the security policy?

A. Modify the permissions of the ntds.dat file.
B. Configure a read-only domain controller (RODC) in the Boston, Atlanta, Miami and Dallas.
C. Disable replication of the Sysvol folder on the new domain controllers.
D. Configure Windows BitLocker Drive Encryption (BitLocker) on the new domain controllers.
E. Disable the Global Catalog role on the new domain controllers.
F. Configure EFS encryption on the new domain controllers.

Answer: D

Explanation:
To configure domain controller at each branch office to ensure that no unauthorized user should
be allowed to copy the Active Directory database from a branch office domain controller by starting
the server from an alternate startup disk, you need to use Windows BitLocker Drive Encryption
(BitLocker)
BitLocker allows you to encrypt all data stored on the Windows operating system volume and use
the security of using a Trusted Platform Module (TPM) that helps protect user data and to ensure
that a computer running Windows Vista or Server 2008 have not been tampered with while the
system was offline.
In addition, BitLocker offers the option to lock the normal startup process until the user supplies a
personal identification number (PIN) or inserts a removable USB device, such as a flash drive, that
contains a startup key. This process will ensure that users can only access all files on the servers
if they have the PIN. You cannot use an alternate startup disk to boot the server.
Reference: BitLocker Drive Encryption Technical Overview
http://technet2.microsoft.com/windowsserver2008/en/library/a2ba17e6-153b-4269-bc46-
6866df4b253c1033.mspx?mfr=true


QUESTION 5
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com that runs at the domain functional level of Windows Server 2008.
Which of the following options can be used for tracking any modification to Active Directory
Objections?

A. Configure a Group Policy to run the Security Configuration Wizard on all computers in the ABC
network.
B. Configure the Default Domain Controllers Group Policy to audit Directory Services.
C. Configure the Default Domain Group Policy to audit Directory Services.
D. Enable auditing of the ntds.dat file in the Default Domain Group Policy.
E. Enable auditing of the ntds.dat file in the Default Domain Group Policy.

Answer: B

Explanation:
To implement an audit and compliance policy and ensure that all changes made to Active
Directory objects are recorded, you need to configure a Directory Services Auditing policy in the
Default Domain Controller Policy
In Windows Server 2008, you can enable Audit Directory Service Access policy to log events in
the Security event log whenever certain operations are performed on objects stored in Active
Directory.
Enabling the global audit policy, Audit directory service access, enables all directory service policy
subcategories. You can set this global audit policy in the Default Domain Controllers Group Policy
(under Security Settings\Local Policies\Audit Policy).
Reference: Windows Server 2008 Auditing AD DS Changes Step-by-Step Guide
http://technet2.microsoft.com/windowsserver2008/en/library/a9c25483-89e2-4202-881cea8e02b4b2a51033.
mspx?mfr=true


QUESTION 6
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2003.
You want to install a read-only domain controller (RODC) without uABCrading the existing domain
controllers Windows Server 2008.
What action should you take? (Each correct option will form a part of the answer. Select TWO.)

A. Raise the forest functional level to Windows 2000.
B. Raise the forest functional level to Windows 2003.
C. Raise the forest functional level to Windows 2008.
D. Raise the domain functional level to Windows Server 2000
E. Raise the domain functional level to Windows Server 2003
F. Raise the domain functional level to Windows Server 2008

Answer: B,E

Explanation:
To create an Active Directory forest and domain functional levels to support Read-only domain
controllers (RODC) and Windows Server 2003 domain controllers, you need to create both the
forest and domain functional levels of Windows Server 2003. This is because only when you use
both the forest and domain functional levels of Windows Server 2003, you will be able to support
Read-only domain controllers (RODC) and Windows Server 2003 domain controllers.
Reference: Appendix of Functional Level Features
http://technet2.microsoft.com/windowsserver2008/en/library/34678199-98f1-465f-9156-
c600f723b31f1033.mspx?mfr=true


QUESTION 7
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a forest named
and Certkingdom.com that runs at the forest functional level of Windows Server 2003. Certkingdom.com has a
subsidiary company named TestLabs, Inc. The TestLabs, Inc. network has a forest named and
testlabs.com that runs at the forest functional level of Windows Server 2003. All domain controllers
on both the Certkingdom.com network and the TestLabs, Inc. network run Windows Server 2008.
Certkingdom.com users do not have access to network resources in TestLabs, Inc.
TestLabs, Inc. has a file server named TESTLABS-SR07. Certkingdom.com users must be able to access
shared folders on TESTLABS-SR07. However, Certkingdom.com users must not be able to access any
other network resources in TestLabs, Inc.
Which of the following options would you choose to accomplish this task? (Each correct option will
form a part of the answer. Select TWO.)

A. By raising the forest functional level of Certkingdom.com and testlabs.com to Windows Server 2008.
B. By raising the domain functional level of all domains in Certkingdom.com and testlabs.com to Windows
Server 2008.
C. By creating a forest trust between Certkingdom.com and testlabs.com.
D. By setting the Allowed to Authenticate for TESTLABS-SR07.
E. By setting the Allowed to Authenticate right on the computer object for the testlabs.com
infrastructure operations master object.

Answer: C,D

Explanation:
To ensure that the users in ABC-south.com are denied access to all the resources ABC-north.com
except the resources on ABC-SR07, you need to create a forest trust between ABC-south.com
and ABC-north.com so that resources can be shared between both the forests. You can however
set the trust authentication setting to selective authentication so that only selected authentication
is allowed.
Next you need to set the Allowed to Authenticate right on the computer object for ABC-SR07 so
that each user must be explicitly granted the Allowed to Authenticate permission to access
resources on ABC-SR07.
You should not set the Allowed to Authenticate right on the computer object for the ABC-north.com
infrastructure operations master object because Allowed to Authenticate right is set for the users in
a trusted Windows Server 2003 domain or forest to be able to access resources in a trusting
Windows Server 2003 domain or forest, where the trust authentication setting has been set to
selective authentication, each user must be explicitly granted the ‘Allowed to Authenticate’
permission on the security descriptor of the computer objects (resource computers) that reside in
the trusting domain or forest.
Reference: Grant the Allowed to Authenticate permission on computers in the trusting domain or
forest
http://technet2.microsoft.com/windowsserver/en/library/b4d96434-0fde-4370-bd29-
39e4b3cc7da81033.mspx?mfr=true


QUESTION 8
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008. Certkingdom.com has its
headquarters in Chicago and branch offices in Boston. The Boston office is connected to the
Chicago by a WAN link. The Chicago office has a DNS Sever named ABC-SR04 that is configured
as a single DNS zone. The Boston office has two servers named ABC-SR07 and ABC-SR08.
ABC-SR08 hosts shared folders that are only accessed by Certkingdom.com users in the Boston office.
You work in the Chicago office while a network administrator named Rory Allen works in the
Boston office.
Certkingdom.com wants you to ensure that users at the Boston office can log on to the Certkingdom.com domain
and can connect to the shared folders on ABC-SR08 even when the WAN link is down. You must
allow Rory Allen to configure the servers in the Boston office without allowing him to modify the
Active Directory configuration.
Which actions should you take to accomplish this task? (Each correct option will form a part of the
answer. Choose THREE.)

A. By promoting ABC-SR07 to a domain controller.
B. By promoting ABC-SR07 to a read-only domain controller (RODC).
C. By installing USMT role on ABC-SR07.
D. By installing ADMT role on ABC-SR07.
E. By installing DNS role on ABC-SR07.
F. By adding Rory Allen to the Domain Admins group.
G. By creating an organizational unit (OU) for the Boston office.
H. By assigning administrative rights to Rory Allen.

Answer: B,E,H

Explanation:
To ensure that the users in the branch office are able to log on to the domain even if the WAN link
fails, you need to promote the member server to a read-only domain controller (RODC) because
the RODC works as a domain controller and allows log in to the domains except allowing
modifications and changes to the Active directory domain.
Delegating administrative rights to the local branch office administrator after promoting a member
server to a RODC will make sure that branch office administrator is not allowed to initiate any
changes to Active Directory but should be allowed to make configuration changes to the servers in
the branch office.
Configuring the DNS role to the member server, will ensure that the users are allowed to access
file shares on the local server in the absence of the WAN link. Without name resolution and the
other services that are provided by DNS servers, client access to remote host computers would be
prohibitively difficult. DNS servers need to be configured because in intranets computer users
rarely know the IP addresses of computers on their local area network (LAN).
Reference: DNS Server Role: Read-only domain controller support/ Who will be interested in this
server role?
http://technet2.microsoft.com/windowsserver2008/en/library/533a1cfc-5173-4248-914c-
433bd018f66d1033.mspx?mfr=true


QUESTION 9
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com and a workgroup named ABCGROUP. All servers in the Certkingdom.com network run Windows
Server 2008 and all the client computers run Windows Vist
A. The Certkingdom.com network has
unmanaged network switches and has two servers named ABC-SR07 and ABC-SR08. ABC-SR07
is configured with the Active Directory Domain Services (AD DS), the Active Directory Certificate
Services (AD CS) and the Dynamic Host Configuration Protocol (DHCP) service while ABC-SR08
is configured with the Routing and Remote Access Service (RRAS), the Network Policy Service
(NPS) and Health Registration Authority (HRA).
You notice that the latest Microsoft updates have not been applied to all client computers that are
part of the ABCGROUP workgroup. You are concerned that Certkingdom.com users are accessing the
local area network (LAN) from these client computers.
You want to implement Network Access Protection (NAP) to secure the network by preventing
client computers that are not members of the Certkingdom.com network or do not have the latest Microsoft
updates from accessing any network servers that are members of the Certkingdom.com domain.
Which of the following option would you choose?

A. TCP/IP
B. 802.1z
C. PPTP
D. DHCP
E. L2TP
F. IPsec

Answer: F

Explanation:
To ensure that only the computers that have the latest Microsoft updates installed should be able
to connect to servers in the domain and that only the computers that are joined to the domain
should be able to connect to servers in the domain, you need to use the IPSec NAP enforcement
method. IPsec domain and server isolation methods are used to prevent unmanaged computers
from accessing network resources. This method enforces health policies when a client computer
attempts to communicate with another computer using IPsec.
Reference: Protecting a Network from Unmanaged Clients / Solutions
http://www.microsoft.com/technet/security/midsizebusiness/topics/serversecurity/unmanagedclient
s.mspx
Reference: Network Access Protection (NAP) Deployment Planning / Choosing Enforcement
Methods
http://blogs.technet.com/nap/archive/2007/07/28/network-access-protection-deploymentplanning.
aspx


QUESTION 10
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008. The Certkingdom.com network
has two web servers named ABC-SR07 and ABC-SR08. Certkingdom.com wants to hosts the company’s
e-commerce Web site named sales.Certkingdom.com on the two web servers. You receive instructions
from the CEO to ensure that the Web site is available even when one of the Web servers is offline.
The CEO also wants the session state of the web site to be available should one of the web
servers be offline. Additionally, you must be able to support the Web site on up to six Web servers
with each Web server having a dedicated IP address.
What action should you take?

A. Configure a two-failover cluster on ABC-SR07 and ABC-SR08.
B. Configure multiple ports for the sales.Certkingdom.com web site.
C. Configure Network Load Balancing on ABC-SR07 and ABC-SR08.
D. Configure the sales.Certkingdom.com web site on each server with the site content on a network share.
E. Configure multiple host headers for the sales.Certkingdom.com website.
F. Configure multiple IP addresses for the sales.Certkingdom.com website.

Answer: C

Explanation:
To ensure that the users of the website would be able to access the Web site if a single server
fails. The website should be scalable to as many as seven Web servers and the web servers
should be able to store session-state information for all users. It should also provide support for
multiple dedicated IP addresses for each Web server.
The Network Load Balancing (NLB) feature in Windows Server 2008 enhances the availability and
scalability of Internet server applications such as those used on Web, FTP, firewall, proxy, virtual
private network (VPN), and other mission-critical servers. NLB provides high availability of a
website by detecting and recovering from a cluster host that fails or goes offline.
You should not use failover clustering in this scenario because failover clustering requires shared
storage which is not mentioned in this question.
Reference: Overview of Network Load Balancing
http://technet2.microsoft.com/windowsserver2008/en/library/11dfa41c-f49e-4ee5-8664-
8b81f6fb8af31033.mspx?mfr=true