Microsft 70-638 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Network Administrator at Certkingdom.com. Your role includes the management of the
company’s communication system which comprises of servers running Microsoft Office
Communications Server 2007 Standard Edition.
A server named Certkingdom-WebConf1 is configured as a Web Conferencing Server. Certkingdom-WebConf1
runs Windows Server 2008 and is configured with a C: drive and a D: drive.
You create two shared folders on the D: drive of Certkingdom-WebConf1 named Meeting and Metadata.
You want to store meeting content in the \\Certkingdom-WebConf1\Meeting folder. You want to store the
Metadata in the \\Certkingdom-WebConf1\Metadata folder.
How should you configure the two shared folders?

A. You should modify the permissions on the two folders to grant the Read permission and the
Write permission to the RTC Component Local Group.
B. You should modify the permissions on the two folders to grant the Read permission to the RTC
Component Local Group
C. You should modify the permissions on the two folders to grant the Read permission and the
Write permission to the RTCComponentUniversalServices group.
D. You should modify the permissions on the two folders to grant the Read permission to the
RTCComponentUniversalServices group.

Answer: A

Explanation:


QUESTION 2
You work as a Network Administrator at Certkingdom.com. Your role includes the management of the
company’s unified communication infrastructure which includes multiple servers running Office
Communications Server 2007 Enterprise Edition. The company network consists of an internal
LAN and a perimeter network.
The perimeter network includes the following two Edge servers:
Certkingdom-Edge1 is configured as an A/V Edge server.
Certkingdom-Edge2 is configured as an Access and Web Conferencing Edge server.
The internal LAN includes the following OCS 2007 servers:
Certkingdom-Front1 is configured as a load balanced front end server.
Certkingdom-Front2 is configured as a load balanced front end server.
Certkingdom-SQL1 is configured as a clustered SQL Server.
Certkingdom-Dir1 is configured as a Director.
Certkingdom-Med1 is configured as a Mediation Server.
Remote users will use Microsoft Office Communicator Web Access 2007 for external access to
instant messaging and presence features.
You want to ensure that traffic from Communicator Web Access clients is encrypted using HTTPS.
Where should you install a Secure Sockets Layer (SSL) certificate to provide the HTTPS access?

A. You should install a Secure Sockets Layer (SSL) certificate on Certkingdom-Dir1.
B. You should install a Secure Sockets Layer (SSL) certificate on Certkingdom-Edge1.
C. You should install a Secure Sockets Layer (SSL) certificate on Certkingdom-Edge2.
D. You should install a Secure Sockets Layer (SSL) certificate on Certkingdom-Front1 and Certkingdom-Front2.
E. You should install a Secure Sockets Layer (SSL) certificate on Certkingdom-Med1.

Answer: C

Explanation:


QUESTION 3
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run either Windows Server 2003 R2 or
Windows Server 2008. The client computers run either Windows XP Professional SP2 or
Windows 7 Professional. The office has a T1 data circuit and a T1 voice circuit.
You have been asked to deploy Office Communications Server 2007 as a unified communications
system for the company.
You install Office Communications Server 2007 Standard Edition on a server named Certkingdom-OCS1.
You then install Office Communicator 2007 on the client computers.
How can you enable all employees to call external phone numbers using Office Communicator
2007?

A. By uCertkingdomrading the Windows XP client computers to Service Pack 3 or later.
B. By uCertkingdomrading Certkingdom-OCS1 to Office Communications Server 2007 Enterprise Edition.
C. By installing a Mediation server.
D. By installing a Director server.
E. By installing an Access Edge server.

Answer: C

Explanation:


QUESTION 4
You work as a Network Administrator at Certkingdom.com. The company uses an Office Communications
Server (OCS) 2007 Enterprise infrastructure for it’s unified communications system.
All client computers run Microsoft Office Communicator 2007 and are enabled for Address Book
Lookup.
Several new employees have started work at Certkingdom.com. The new employees all have Active
Directory user accounts and are enabled for OCS.
You have updated the address book in Office Communications Server 2007 by running the
abserver- regenUR and abserver- syncnow utilities.
What else should you do to ensure that the Microsoft Office Communicator 2007 clients download
the latest address book?

A. You should rename the Galcontacts.xml file on each network computer.
B. You should delete the Galcontacts.db file on each client computer.
C. You should delete the Outlook.nk file on each client computer.
D. You should run abserver- syncnow on each client computer.

Answer: B

Explanation:


QUESTION 5
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run either Windows Server 2003 R2 or
Windows Server 2008.
You are in the process of configuring a Microsoft Office Communications Server 2007 Enterprise
infrastructure to provide Enterprise Voice and Instant Messaging for the company.
You want to enable Public IM Connectivity (PIC) to enable employees to use Office Communicator
2007 initiate voice calls and IM conversations with users that run Windows Live Messenger.
Which of the following server roles are required to enable Public IM Connectivity (PIC)?

A. An Audio/Video Conferencing Edge Server.
B. A Web Conferencing Edge Server.
C. An Access Edge Server.
D. A Mediation Server.
E. A Reverse Proxy Server

Answer: C

Explanation:


QUESTION 6
You work as a Network Administrator at Certkingdom.com. You have been tasked with a project to design
a solution that provides Instant Messaging (IM) for the company.
The solution must enable external users or customers to initiate IM conversations with Certkingdom.com
employees working within the office LAN. IM sessions should be automatically reconnected if the
session is disconnected by an interruption in network connectivity.
You decide to implement Office Communications Server (OCS) 2007.
Which two of the following Office Communications Server (OCS) 2007 configurations would meet
the requirements and minimize costs? (Choose two).

A. OCS 2007 Standard Edition configured as a Front-End server.
B. OCS 2007 Enterprise Edition configured as a Front-End server.
C. OCS 2007 Standard Edition configured as a Mediation server.
D. OCS 2007 Enterprise Edition configured as a Mediation server.
E. OCS 2007 Standard Edition configured as an Access Edge server.
F. OCS 2007 Enterprise Edition configured as an Access Edge server.

Answer: A,E

Explanation:


QUESTION 7
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run either Windows Server 2003 R2 or
Windows Server 2008. The company network consists of an internal LAN and a perimeter
network.
You are in the process of configuring a Microsoft Office Communications Server 2007 Enterprise
infrastructure to provide unified communications for the company.
Your deployment includes the following servers in the perimeter network.
Certkingdom-Edge1 is configured as an Access Edge server.
Certkingdom-Edge2 is configured as a Web Conferencing Edge server.
Certkingdom-RP1 is configured as a Reverse Proxy Server.
Your deployment also includes the following servers in the internal network.
Certkingdom-Front1 is configured as a load balanced front end server.
Certkingdom-Front2 is configured as a load balanced front end server.
Certkingdom-SQL1 is configured as a clustered SQL Server.
You need to provide external users with A/V conferencing and Web conferencing capability.
Which server role do you need to add to the infrastructure to provide the required capability?

A. A Director Server.
B. A Certificate Server.
C. An A/V Conferencing Edge Server.
D. A Mediation Server.
E. A Web Conferencing Edge Server.

Answer: C

Explanation:


QUESTION 8
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run either Windows Server 2003 R2 or
Windows Server 2008.
The company has a Microsoft Office Live Communications Server 2005 SP1 Enterprise Edition
infrastructure. You are in the process of migrating to an Office Communications Server 2007
Enterprise Edition infrastructure.
The Marketing department has been migrated to Office Communications Server 2007. The Sales
department still use the Microsoft Office Live Communications Server 2005 SP1 system.
Twenty users are moving from the Marketing department to the Sales department. You need to
move the users from the Office Communications Server 2007 system to the Microsoft Office Live
Communications Server 2005 SP1 system.
You have enabled the users on the Live Communications Server 2005 SP1 system. You now
need to migrate the user data.
Which two of the following steps should you perform to migrate the user data from the from the
Office Communications Server 2007 system to the Microsoft Office Live Communications Server
2005 SP1 system? (Choose two).

A. You should export the user data from Office Communications Server 2007 using the Office
Communications Server 2007 administrative tools.
B. You should export the user data from Office Communications Server 2007 using Dbimpexp.exe.
C. You should import the user data into Live Communications Server 2003 SP1 using Live
Communications Server 2007 SP1 administrative tools.
D. You should import the user data into Live Communications Server 2005 SP1 using Dbimpexp.exe.

Answer: B,D

Explanation:


QUESTION 9
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run either Windows Server 2003 R2 or
Windows Server 2008.
You are in the process of configuring an Office Communications Server 2007 Enterprise
infrastructure to provide unified communications for the company.
Your deployment includes the following servers.
Certkingdom-Edge1 is configured as an Access Edge and Web Conferencing Edge server.
Certkingdom-Front1 is configured as a front end server.
Certkingdom-SQL1 is configured as a SQL Server.
You need to configure the corporate firewall to provide external users with Web conferencing
capability.
How should you configure the firewall to provide the Web conferencing capability? (Choose two).

A. You should open TCP port 80 inbound to Certkingdom-Front1.
B. You should open TCP port 80 inbound to Certkingdom-Edge1.
C. You should open TCP port 443 inbound to Certkingdom-Front1.
D. You should open TCP port 443 inbound to Certkingdom-Edge1.
E. You should open TCP port 5061 inbound to Certkingdom-Front1.
F. You should open TCP port 5061 inbound to Certkingdom-Edge1.

Answer: D,F

Explanation:


QUESTION 10
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain.
The company uses an Office Communications Server 2007 Enterprise infrastructure that includes
the following servers.
Certkingdom-Front1 is configured as a front end server.
Certkingdom-SQL1 is configured as a SQL Server.
To increase capacity, you plan to expand the Office Communications Server 2007 infrastructure.
You will add another server running Office Communications Server 2007 Enterprise edition and
move from the current consolidated configuration to an expanded configuration.
Which server role do you need to add the current infrastructure to create an expanded
configuration?

A. You need to add a Director Server.
B. You need to add a Mediation Server.
C. You need to add an Access Edge Server.
D. You need to add a Front-End Server.
E. You need to add a Back-End Server.

Answer: D

Explanation:

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

Extended IT Support For Windows Servers And Windows PCs

In these difficult economic times many companies understandably want to extend Business IT Support and hardware maintenance on their Microsoft Servers and PCs for as long as they can.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com

But at some point the hardware will run out of warranty and it will become so old that your IT Support Company will be unable to provide adequate IT Support.

How Long Can You Extend IT Support On Old Computers?

Generally Servers and PCs will last for between 3 and 5 years.

There are 3 main reasons for this:

1. After 5 years it’s almost impossible to get a warranty. That means if it breaks it’s difficult to fix. Even if you could get a warranty it would be expensive compared to the cost of a new computer.
2. The version of software on the computer will be quite old. This may make it difficult to exchange information with people who have a more current version of the software despite the best efforts of your Business IT Support Company
3. Old computers are slow. Your users are likely to be frustrated. As far as they are concerned their PC or the network server will be getting in the way of them doing their work.

So by this stage it will be slow, won’t interact well with more modern systems in the outside world and can’t be repaired.

Limits On Managed IT Support Services

It will probably be too expensive for your IT Support Company to maintain your old computers. If you have a fixed price Managed IT Support Service there is likely to be a clause in the IT Support Contract that limits IT Support on old computers. After 5 years it’s probably more expensive to keep an old computer than replace it.

Replacing your Server

Your servers are pretty fundamental, so it’s important that you have an IT Support Contract for them. However Business IT Support isn’t the whole picture – hardware maintenance is important too.

The performance and reliability of your servers will affect all of your staff, not just 1 or 2. After 5 years it’s almost impossible to get a warranty, so if it breaks your IT Support Company probably won’t be able to get it fixed for you.

Most businesses are so dependent on their servers that they cannot afford for that to happen. So, at the very latest it will need to be replaced when you can no longer get a warranty, or an IT Support Contract.

However you may need to replace it before then if it will not run the most recent version of an application that you must upgrade to. Or if the growth of your business means that it is no longer powerful enough for your requirements. Your IT Support Company should advise you of this.

Hardware Maintenance From Your IT Support Company

Believe it or not the hardware manufacturers are the best and the cheapest people for hardware maintenance. IT Support Companies are not particularly well geared up for hardware maintenance.

We would advise you to buy Dell servers and PC’s. It’s good quality kit and Dell will come to your site within 4 hours and repair the hardware. And because they manufactured the hardware, unlike the IT Support Company, they have the parts to fix it quickly.

All the others – Toshiba, Sony, Apple etc. – make you send the broken hardware to them. They will return it to you 2 weeks later usually with the hard drive wiped, so it will require a complete rebuild by your IT Support Company. Your IT Support Company should liaise with the hardware manufacturer when you do have a problem – after all that’s why you’re paying for an IT Support Contract!

Microsoft 70-630 Q & A / Study Guide

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 


QUESTION 1
You work as a SharePoint Server administrator at Certkingdom.com. You have just the completed the
insertion of new content in the root site. However, later that day the users complained that the new
content is not added in the search results when they run searches on the root site. You need to
make sure that the relevant content is included in query results.
What actions should you take to perform this task?

A. The best option is to set the Complete Through constraint.
B. The best option is to reset the crawled content and start a full crawl.
C. The best option is to set the Resource Center view.
D. The best option is to edit the CSS style sheet to include the new content.

Answer: B

Explanation:


QUESTION 2
You work as a SharePoint Server administrator at Certkingdom.com. One of Certkingdom.com branch offices
consists of a Windows Server 2003 Active Directory domain. You have received instructions from
the CIO to extend SharePoint user profiles to include the userID property from the users’ domain accounts.
What actions should you take to perform this task?

A. The best option is to add a Microsoft Operations Manager (MOM) server.
B. The best option is to create a custom Microsoft Management Console that can access the branch office.
C. The best option is to create a new user profile property that is configured with import mapping.
D. The best option is to run the SharePoint Products and Technologies Configuration.

Answer: C

Explanation:


QUESTION 3
You work as a SharePoint Server administrator at Certkingdom.com. The Certkingdom.com network contains a
SharePoint Portal Server 2003 server named ABC-SR44. ABC-SR44 hosts a SharePoint portal
that is accessed through a hyperlink on the users’ client computers.
The hyperlink points to https:://www.Certkingdom.com/ms/certifications.
You want to migrate ABC-SR44 to Microsoft Office SharePoint Server (MOSS) 2007. You need to
ensure that the SharePoint portal will be accessible after the migration.
What actions should you take to perform this task?

A. By running the stsadm command with the osearch operator.
B. By editing the hyperlink so it will point to the new URL of the migrated content.
C. By running the stsadm command with the enumsites operator.
D. By enabling the Shared Services Provider Synchronizing job.

Answer: B

Explanation:


QUESTION 4
You work as a SharePoint Server administrator at Certkingdom.com. Certkingdom.com contains a Microsoft
Content Management Server 2002 computer named ABC-SR11. You have received instructions
from the CIO to uABCrade ABC-SR11 to Microsoft Office SharePoint Server (MOSS) 2007.
What actions should you take to perform this task?

A. The best option is to run the stsadm command with the addwppack operator.
B. The best option is to run the stsadm command with the installfeature operator.
C. The best option is to run the CMS Assessment utility on ABC-SR11.
D. The best option is to run the Optimize HTML command in SharePoint Designer.

Answer: C

Explanation:


QUESTION 5
You work as a SharePoint Server administrator at Certkingdom.com. Certkingdom.com has a Development
department with a database server named ABC-DB02. ABC-DB02 hosts a database named CkdProducts.
Certkingdom.com has implemented a Web application in the SharePoint site that must access data in CkdProducts.
What actions should you take?

A. The best option is to obtain and install an application definition file from the Development department.
B. The best option is to enable the Save for Sharing option, then save CkdProducts in the Development department.
C. The best option is to save CkdProducts as a Microsoft Excel 2007 worksheet.
D. The best option is to create a custom group in the Site Settings page to the trusted file locations list.

Answer: A

Explanation:


QUESTION 6
You work as a SharePoint Server administrator at Certkingdom.com. Certkingdom.com has a Web site named
testdocs that is hosted by an Internet service provider (ISP). Anonymous authentication is
configured on testdocs.
Certkingdom.com adds a Microsoft Excel 2007 spread sheet to testdocs. However, you have received
complaints from Certkingdom.com users that they get access denied errors when trying to use Excel
Services to access the spreadsheets.
What step should you perform to resolve this problem?

A. You should consider configuring a new Excel Services trusted file location.
B. You should consider selecting the Enable logging option.
C. You should consider configuring the Event Throttling feature.
D. You should consider editing the application.master file.

Answer: A

Explanation:


QUESTION 7
You work as a SharePoint Server administrator at Certkingdom.com. Certkingdom.com has a Sales department
that stores documents in a SharePoint site. The site has a list view Web part named
ABCCustomers that is populated with the names of customers.
You have received instructions from the CIO to add another Web part that will allow the Sales department
members to filter the names displayed on the ABCCustomers Web part.
How would you accomplish this?

A. By adding a Text Filter Web part.
B. By adding a DropDown List on the Web part.
C. By replacing the ABCCustomers Web part with a GridView.
D. By using the view in the team builder.

Answer: A

Explanation:


QUESTION 8
You work as a SharePoint Server administrator at Certkingdom.com. You have received instructions from
the CIO to create a new SharePoint site based on the Report Center template. The site must have
a new page with the Key Performance Indicator (KPI) and the Key Performance Indicator (KPI)
Details Access Web parts.
What actions should you take?

A. The best option is to add a new dashboard page.
B. The best option is to add a pivot table on the Article page layout.
C. The best option is to add a State field on the News Home page layout.
D. The best option is to edit the default.master file on the Document Center template.

Answer: A

Explanation:


QUESTION 9
You work as a SharePoint Server administrator at Certkingdom.com. The Certkingdom.com network has a
database server named ABC-DB30 that is running Microsoft SQL Server 2005. Certkingdom.com has
acquired a Marketing Data Catalog (MDC) application that will access a database hosted on ABCDB30.
To ensure productivity throughout the company you need to make sure that the information
exposed via the Marketing Data Catalog (MDC) application is available in the search results.
What actions should you take to perform this task?

A. By having the information displayed in the Resources Earned Value view.
B. By having Project selected from the View Type list in order to display the resource data.
C. By having the application.master file edited using an ASCII editor.
D. By having the default access account implemented for the Marketing Data Catalog (MDC)
application.

Answer: D

Explanation:


QUESTION 10
You work as a SharePoint Server administrator at Certkingdom.com. You have received instructions from
the CIO to implement a new SharePoint site. The CIO wants the site to have a key performance
indicator (KPI) list, a data connections library and a reference library.
How would you accomplish this?

A. The best option is to add a new pivot chart.
B. The best option is to add a new dashboard page.
C. The best option is to add a new State field.
D. The best option is to add a new Project Center page.

Answer: B

Explanation:


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Microsoft 70-526 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS001 as developing collateral. You have
received instructions to make sure that the PictureBox control’s properties cannot
be changed with a logo that you have added to the PictureBox in the designer of the
form base. Before the time you have added a form to the Microsoft Windows Forms
Control Library project and add a PictureBox control to the form. The form is
presenting Certkingdom.com’s logo.
What action should you take?

A. You should set the Locked property to False.
B. You should set the Locked property to True.
C. You should set the Modifiers property to Private.
D. You should set the Modifiers property to Protected.

Answer: C

Explanation:
When you set the Modifiers property to Private, the value will show
that only the base form can modify the control.
Incorrect Answers:
A: You should not set it to False, because the control can be moved and resized.
B: If you set the property to True the control cannot be removed of resized. .
D: If you set the Modifiers property to Protected, the value will show that the base form
and any of the form yet to come can modify the control.


QUESTION 2
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS005 as developing collateral. You have just
included a DateTimePicker control to a form. You then set the format property to
Time. During the cause of the day, you check how the DateTimePicker control is
working, and learnt that it does not allow the Certkingdom.com users to change the
selected time.
What should you do to change the control so that it will allow the Certkingdom.com uses
to change the selected time?

A. You should set the ShowUpDown property to True.
B. You should set the ShowSelectBox property to True.
C. You should set the Visible property to False.
D. You should set the Checked property to False.

Answer: A

Explanation:
The ShowUpDown property is by default set on False. You should set
it on True. On False it will show the DateTimePicker must simulate a drop-down
control. This setting will allow the users to set the MonthCalender. If it is set to True
the users can select the time.
Incorrect Answers:
B: The ShowSelectBox will not resolve the problem. This will show if a CheckBox
should be displayed on the DateTimePicker.
C: If you set the Visible property to False, it will hide the DateTimePicker. .
D: You should not set the Checked property to False. If this is set on True, a CheckBox
control will be displayed on the DateTimePicker.


QUESTION 3
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS001 as developing collateral. The manager of
Certkingdom.com wants to have a borderless form with the background shown in the
exhibit.

When the form is view, the manager named Rory Allen does not want the maroon
area to be visible. He only wants the blue to be visible when the form is displayed.
Which of the following code segments should be used?

A. this.TransparencyKey = Color.Maroon;
B. this.BackColor = Color.Maroon;
C. this.TransparencyKey = Color.CornflowerBlue
D. this.BackColor = Color.Transparent;

Answer: A

Explanation:
The TransparencyKey = Color.Maroon specify the color that the
transparent represents the area on the form. With this setting the blue will respond
to the mouse.
Incorrect Answers:
B: You should not use the BackColor = Color.Maroon. This will determine the
background color of the form.
C: You should not use this code segment. The manager does not wan the blue area to be
transparent.
D: You should not use the BackColor = Color.Transparent. The manager does not want
the background to be transparent.


QUESTION 4
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS020 as developing collateral.
You have configured three columns to a form and add a TableLayoutPanel to the
form. You want the two side columns to have a fix width of 200 pixels each and
anchor the four edges of the form to the control. A Certkingdom.com manager wants
the center column to fill the remaining space, when ever the form is resized. You
need to change the ColumnStyle instance that represents the center column?
How should you set the ColumnStyle instance’s Size Type property?

A. Set it to AutoSize and the Width property to 100F.
B. Set it to Absolute and the Width property to 100F.
C. Set it to Percent and the Width property to 100F.
D. Set it to AutoSize and the Width property to 0F.

Answer: C

Explanation:
This setting will show that the column should fill the remaining space.
Incorrect Answers:
A: This setting will allow the column to be sized enough so that not any of its child
controls are clipped. In this setting the middle will not occupy the remaining free space.
B: If you set it to Absolute, the value of the Width property will show the number of
pixels for the column.
D: You need to set the ColumnStyle instance’s Size Type property to AutoSize and the
Width property to 100F.


QUESTION 5
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS020 as developing collateral. You have added
a SplitContainer control named CertkingdomSplitContainer to a form. You then left the
control to the default properties. To the right-most container of the SplitContainer
control, you need to add a PropertyGrid.
Which of the following code segments should you use?

A. PropertyGrid propertyGrid = new PropertyGrid[];
Panel rightPanel = [Panel] CertkingdomSplitContainer.GetContainerControl[];
rightPanel.ControlAdd[porpertyGrid];
B. PropertyGrid propertyGrid = new PropertyGrid[];
Panel rightPanel = [Panel] CertkingdomSplitContainer.GetNextControl[propertyGrid, true];
rightPanel.ControlAdd[porpertyGrid];
C. PropertyGrid propertyGrid = new PropertyGrid[];
CertkingdomSplitContainer.Container.Add[propertyGrid, “RightPanel”];
D. PropertyGrid propertyGrid = new PropertyGrid[];
CertkingdomSplitContainer.Panel2.Control.Add[propertyGrid];

Answer: D

Explanation:
An area can be divided into two containers, which is separated by a
movable bar, if you use the SplitContainer control. When the two Panels are
created, the left one is the Panel1 and the right is Panel2. You are adding a panel so
it will be on the right. You then need to specify Panel2.
Incorrect Answers:
A, B, C: You should not use the Add method of the SplitContainer.Container to add the
PropertyGrid. You also should not pass a PropertyGrid instance to the GetNextControl
method to return a Panel instance. This will actually retrieve the next tab-ordered control
given the current control. You also should not call the GetContainerControl method to
return a Panel instance. This will return the logical container of the SplitContainer
control.


QUESTION 6
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS020 as developing collateral. You are busy to
develop a Microsoft Windows Forms exam delivery application. This is going to be
used to access the content of the exam via the Internet. A WebBrowser named
testbrowser is added to the control to a form named CertkingdomForm, which is define
as follows:
[PermissionSet[SecurityAction.Demand, Name=”FullTrust”]]
[System.Runtime.InteropServices.ComVisible[true]]
public CertkingdomForm : Form
{
public CertkingdomForm[]
{
InitializeComponent[];
}
public void Expire[]
{
}
}
The JavaScript-based timer that is used by the Web site for the exam has a function
to inform the exam delivery application when the time has expired for the exam,
which is the following:
window.external.Expire[];
What should you do to make sure that the Expire method of CertkingdomForm is called
when the JavaScrip function is carry out?

A. You should set the Document.DomDocument property of the browser instance to the
current instance of the CertkingdomForm class.
B. You should set the ObjectForScripting property of the browser instance to the current
instance of the CertkingdomForm class.
C. You should call the AttachEventHandler of the Document property of the browser
instance.
D. You should call the ExecCommand method of the Document property of the browser
instance.

Answer: B

Explanation:
You must set the ObjectForScripting for the browser instance to the
current instance of the CertkingdomForm class.
Incorrect Answers:
A: The property of the Document.DomDocument represents the true DOM object of an
HTML document.
C: The AttachEventHandler allows you to attach a HTML Document Object Model
event to an event handler.
D: The ExecCommand method allows you to execute commands against DOM
documents.


QUESTION 7
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS003 as developing collateral. You have
received instructions to make sure that the PictureBox will display dynamically
loaded images.
Which property will display a static image if any dynamic image fails to load?

A. BackgroundImage
B. Image
C. ErrorImage
D. InitailImage

Answer: C

Explanation:
The ErrorImage property specifies the image that should be
displayed. This will happened only if the image that you are trying to load
dynamically fails.
Incorrect Answers:
A: The BackgroundImage property specifies a background image which is used by the
control.
B: The Image property specifies the image you want the PictureBox control to display.
D: The InitailImage specifies the image you want the PictureBox control to display while
the other one is loading.


QUESTION 8
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS020 as developing collateral. You are
developing a Web service for new updates to query automatically, by use of a
Microsoft Windows Forms application. You then add a NotifyIcon component
named Certkingdomnotify to the application’s main form. Whenever a new update is
available you want the following balloon tip to display as seen in the exhibit for 5
seconds.

Which segment should you use to write a code to download the updates if the users
click the balloon tip?

A. Certkingdomnotify.BallonTipClick +=delegate
{
// Download the updates
}
Certkingdomnotify.ShowBallonTip[5000, “New Update Available”; “Click here to download”
, ToolTipIcon.Info];
B. Certkingdomnotify.ShowBallonTip[5];
Certkingdomnotify.BalloonTipIcon = ToolTipIcon.Info;
Certkingdom.Balloon TipTitle = “New Update Available”;
Certkingdom.BalloonTipText = “Click here to download”;
Certkingdom.Click += delegate
{
// Download the updates
}
C. Certkingdomnotify.BalloonTipIcon = ToolTipIcon.Info;
Certkingdom.Balloon TipTitle = “New Update Available”;
Certkingdom.BalloonTipText = “Click here to download”;
Certkingdom.Click += delegate
{
// Download the updates
}
Certkingdomnotify.ShowBallonTip[5000];
D. Certkingdomnotify.ShowBallonTip[5, New Update Available”, “Click here to download”,
ToolTipIcon.Info];
Certkingdom.BalloonTipClick += delegate
{
// Download the updates
}

Answer: A

Explanation:
You should use an event handler, attach the BalloonTipClicked to the
event and call the ShowBalloon Tip method of the NotifyIcon class. When a user
clicks a balloon tip, a BalloonTipClicked event is raised.
Incorrect Answers:
B, C, D: You should not attach the BalloonTipClicked even to an event handler after you
have called the ShowBalloonTip method. Also note that the event is raised when the icon
is clicked and not the balloon tip.


QUESTION 9
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS020 as developing collateral. You are busy
adding a MenuStrip control, which has an instance of a ToolStripMenu item named
testjobItem, to a form in a Microsoft Windows Forms application. This item’s
display text is Job. You have received instructions to add two menu items to the Job
menu item. The first item’s display text should be Create New Job, and the second
one is Run Job.
Which code segment should you use to programmatically add the two menu items?

A. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem[“Create New
Job”];
ToolStripMenuItem runJobItem = new ToolStripMenuItem[“Run Job”];
jobItem.Container.Add[createNewJobItem];
jobItem.Container.Add[runJobItem];
B. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem[“Create New
Job”];
ToolStripMenuItem runJobItem = new ToolStripMenuItem[“Run Job”];
jobItem.Owner.Items.Add[createNewJobItem];
jobItem.Owner.Items.Add[runJobItem];
C. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem[“Create New
Job”];
ToolStripMenuItem runJobItem = new ToolStripMenuItem[“Run Job”];
ToolStripMenuItem[] items = new ToolStripMenuItem[]{create NewJobItem,
runJobItem}
jobItem.DropDownItems.AddRange[items];
D. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem[“Create New
Job”];
ToolStripMenuItem runJobItem = new ToolStripMenuItem[“Run Job”];
ToolStripMenuItem[] items = new ToolStripMenuItem[]{create NewJobItem,
runJobItem}
jobItem.Owner.Items.AddRange[items];

Answer: C

Explanation:
For the jobItem instance you should call the AddRange. The property
of the DropDownItems represents a collection of child items of the jobItem instance,
which allows you to add the two items to the job menu item.
Incorrect Answers:
A: This property returns an instance of IContainer, which represents a logical container
for other components.
B: The Owner property returns the Menu script instance that owns the
ToolStripMenuItem instance.
D: This action will add the two new menu at the same level as the Job menu item.


QUESTION 10
You are working as an application developer at Certkingdom.com. The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com.
Certkingdom.com uses Visual Studio 2005 as an application platform. Certkingdom.com
consists of a Development department. You as the developer of Certkingdom.com use a
client computer named Certkingdom-WS050 as developing collateral. You were busy
with a task to add a ContextMenuStrip control to a form.
What should you do to display a custom control as a menu item of the
ContextMenuStrip control?

A. Add a ToolstripContainer control to the form and add the custom control to the
Controls collection residing on the toolStripContainer control. You should then add the
ContextMeniStrip control to the controls of the ToolStripContainer control.
B. Of ToolStripControlHost, create an instance and specify your custom control instance
as a parameter to the conductor. You should then the ToolStripControlHost instance to
the Items collection of the ContextMeniStrip control.
C. Add a ToolstripContainer control to the form and add the custom control to the
Controls collection residing on the toolStripContainer control. You should then add the
ToolstripContainer control to the controls of the ContextMeniStrip controls.
D. Of ToolStripControlHost, create an instance and specify your custom control instance
as a parameter to the conductor. You should then the ContextMeniStrip controls to the
collection of the ToolStripControlHost instance.

Answer: B

Explanation:
The ToolStripControlHost class to host a custom control as a menu
item in the ContextMeniStrip. You should also the custom control instance as the
parameter to the constructor.
Incorrect Answers:
A, B, C: The ToolstripContainer should not be used to reach your goal. Furthermore, you
cannot host a ToolstripContainer control as the menu item in a ContextMeniStrip controls.

 

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

Ice Fishing Tackle and Tools

The hype around cloud computing is hard to ignore and as each vendor is trying to put the word “cloud” in front of all its products, enterprises are finding it extremely difficult to sift through the noise and really find which products work best specifically for their data center.

MCTS Certification, MCITP Certification

Microsoft Avaya Exam Training , Avaya Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

While the ability to utilize the public cloud is extremely appealing due to the reduced infrastructure management needed in a public rather than private environment, CIOs and data center managers are hesitant to place important data and applications in the public cloud. With this cautious viewpoint, enterprises are turning to private and/or hybrid cloud solutions that will enable them to receive the benefits of a public cloud while keeping their infrastructure under their control and experience improved agility and infrastructure utilization—leading to dramatic cost and time savings.

Therefore, the popularity in turnkey, ready to go, cloud solutions has skyrocketed over the past year as enterprises are on an active search for the simplest and quickest way to get their private cloud infrastructure up and running. A turnkey cloud promises some appealing benefits like simplicity, quick roll-out, and cost savings, but many organizations are still perplexed by how to evaluate a turnkey solution—or even what capabilities one should include—and how to integrate it with their existing network, compute and storage infrastructure.

To help enterprises evaluate here are the three essential elements that should constitute any turnkey private and/or hybrid cloud solution:

1. Intelligent and reliable automation features:

A turnkey cloud solution must be able to automatically provision configurations when needed and decommission devices when not needed. Additionally, it should be able to combine all known devices, discover new devices and compile them into a resource pool. With the introduction of hybrid cloud computing the importance for intelligent automation features significantly increases. Enterprises need to be able to reliably and securely burst into a public cloud when resources are not available in the private cloud.

One of the most important elements of ensuring the selection of the correct turnkey solution for an environment is selecting a solution that not only provisions virtualized resources but physical and public cloud resources as well. Today, when organizations think of cloud solutions they seem to jump right to technology that only handles virtualization. However, this is only a partial solution as enterprises on average have only 50 percent of their applications virtualized. Therefore, when building a private cloud using a tool that provisions hardware is a necessity to gain the full benefits of a private cloud. The ability to provision and decommission entire hardware and virtualized topologies that include compute, network and storage is a crucial element of a turnkey solution. This feature is crucial to controlling resource sprawl and maximizing the utilization of existing resources.

2. Out-of-the-box adaptors for existing infrastructure:

Seamless integration of a cloud management tool into an enterprise’s existing infrastructure is extremely important as CIOs and data center managers are trying to get the most out of their existing infrastructure. All environments these days are heterogeneous with equipment from multiple systems, network and storage vendors. So, when enterprises bring in a private cloud solution it needs to be able to work across these multi-vendor devices.

If additional resources need to be added to a workload IT should not have to hesitate because they have a Dell system but would like an HP system. Similar to the frustration that arises if someone gets a flat tire and has a Goodyear right around the corner but all they can use is Michelin, a turnkey solution that is not able to provision a wide variety of devices can cause a lot of headaches for IT.

There are thousands of hardware devices and several virtualization vendors that exist today and writing an adaptor for each of these resources is extremely time consuming which is why enterprises need to look for tools that have pre-built adaptors for most of the popular hardware devices and virtual resources from vendors including Dell, IBM, HP, NetApp, EMC, Cisco, Juniper, VMware, Citrix, Microsoft, Red Hat, etc. By creating a private cloud out of existing hardware it not only saves on time, but also creates significant CAPEX savings by re-utilizing existing resources and spare capacity for new workloads instead of purchasing new equipment.

3. Predefined templates for commonly used compute, network and storage configurations:

It is important to first mention that without predefined templates a cloud solution cannot be turnkey. The initial starting point to ensure this requirement is met is looking for the library of predefined templates. The greatest expense for building a private cloud is in the designing and crafting of the templates for the topologies that will frequently be used. Additionally, with most cloud solutions one can build custom templates that need to take the existing environment in the data center into consideration.

When the turnkey cloud solution offered a pre-built library of templates for commonly used topologies then enterprises are able to significantly speed up the time it takes to get a private cloud up and running, thus accelerating their time to value. These predefined templates can deliver 50 to 90 percent of the design for an environment and all they require is IT making easy customizations to make the template fit their specific environment perfectly.

The purpose for a turnkey solution is to be able to quickly and reliably convert an existing static environment into a self-service dynamic environment. And in order for this environment to be successful the turnkey solution must contain the three elements discussed. These capabilities will be crucial for enterprises looking to deploy a turnkey private or hybrid cloud.

By Garima Thockchom, VP of Marketing at Gale Technologies, a leading provider of infrastructure automation software solutions that power IT as a Service for labs, enterprises, and service providers.

Magic Photo Recovery 3.0 Makes Photo Recovery Faster and Easier

East Imperial Soft updates Magic Photo Recovery, the company’s product for recovering deleted digital pictures, making it faster, safer, and easier to use. Version 3 offers a much improved recovery algorithm, significantly increasing the speed and quality of recovery. The new disk imaging feature makes the recovery safer by allowing working with a virtual disk image instead of the physical drive.

Cisco CCNA Training, Cisco CCNA Certification

Best HP Certification Training and HP Exams Training  and more Cisco exams log in to Certkingdom.com

In addition, Magic Photo Recovery can store recovered pictures onto a remote FTP location, burn them onto a CD/DVD, or create a burnable ISO image.

About Magic Photo Recovery

Magic Photo Recovery makes undeleting lost and deleted pictures easy, bringing a sophisticated pictures recovery tool to experienced computer users as well as complete novices. Combining comprehensive recovery algorithms with quick and easy user interface based on step-by-step wizards and instant pre-recovery preview, Magic Photo Recovery is used by pros and novices alike.

Recognizing common file systems and popular kinds of storage media, the product can discover and successfully recover digital pictures stored on formatted, damaged, and even inaccessible disks and memory cards. Even if the disk is formatted and then re-formatted with another type of file system, Magic Photo Recovery can still locate and recover most of the pictures it held.

The new image recovery algorithm greatly improves the speed of recovery, reducing the time spent on scanning the disk and saving recoverable information. The new algorithm can now locate more lost pictures than ever, significantly improving the quality of recovery compared to earlier versions.

The new disk imaging feature can capture a bit-precise snapshot of a disk, memory card, or USB drive, then doing the recovery safely off-line. The disk snapshot feature makes picture recovery from smaller-size storage media such as memory cards, flash drives, SSD and laptop hard drives much safer than recovering from a live, in-use storage media. The feature can also capture a snapshot of the contents of built-in memory of many makes and models of digital cameras and MP3 players.

Pricing and Availability

Magic Photo Recovery 3.0 is available in Home, Office and Commercial editions. A free evaluation version is available at the company’s Web site.

Compatibility

Magic Photo Recovery works in all 32-bit and 64-bit versions of Windows starting from Windows 95 to the latest Windows 7 and 2008 Server. FAT12/16/32, NTFS (NT4) and NTFS5 (2000, XP, Vista, 7) file systems are supported. The product supports all types of storage media, and was tested on desktop and laptop hard drives, external drives, USB drives and all popular types of memory cards. Through-the-wire recovery is supported for most types of MP3 players and digital compact cameras. Digital pictures and RAW files produced by all types of cameras including those manufactured by Nikon, Canon, Olympus, Casio, Kodak, Sony, Pentax, Panasonic, etc. can be recovered.

About East Imperial Soft

Since its foundation in 2002, East Imperial Soft has developed a range of comprehensive data recovery tools, helping users of Microsoft Windows PC’s to get deleted data back. The range includes tools that make it easy to recover all types of data. By delivering quality products and professional customer service, East Imperial Soft provides its customers with supreme experience.

Microsoft 70-447 – Q & A / Study Guide

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

 

 

QUESTION 1
You work as DBA at Certkingdom.com. You administer two Windows Server 2003
computers named Certkingdom A and Certkingdom B. You install SQL Server 2005 on both
Certkingdom A and Certkingdom B to host a new company database. Certkingdom A hosts a
read-write copy of the company database in which all changes are made. Certkingdom B
subscribes to a publication on Certkingdom A and is only used for reporting. A Windows
domain administrator provides you with a domain user account named SQLSRV to use as
the security context for the SQL Server services. A password policy of 42 days exists in
the Default Domain Group Policy object (GPO). You install the database on Certkingdom A
and Certkingdom B and configure replication. Everything works fine for six weeks, but then
all SQL Server services fail. You need to correct the problem. What should you do?

A. Ask the Windows domain administrator to grant the Log on as service right to the
SQLSRV domain user account.
B. Configure the SQLSRV domain user account with a new strong password. Configure
the new password in the properties of each SQL Server service that failed.
C. Create a local user account on Certkingdom A named Certkingdom A and a local user account
on Certkingdom B named Certkingdom B. Configure Certkingdom A and Certkingdom B to run under the
context of the appropriate local user account.
D. Ask the Windows domain administrator to grant the SQLSRV domain user account
membership in the Domain Admins group.

Answer: B

Explanation:
The Default Domain Group Policy object requires that passwords are
changed every 42 days. In order to correct this problem you have to change the
password in the Active Directory AND configure the new password on both you
SQL Servers to the newly changed password.


QUESTION 2
You are a database administrator of two SQL Server 2005 computers named Certkingdom A
and Certkingdom B. You have a Microsoft .NET application that has been modified so that it
now accesses a database on Certkingdom B in addition to Certkingdom A. You do not want the
user application to connect directly to Certkingdom B. You need to enable the data retrieval
from Certkingdom B while maintaining the ability to assign different permissions to different
users who use the .NET application. What should you do?

A. Change the .NET application to define a new server connection to Certkingdom B.
B. Configure a linked server on Certkingdom A to point to Certkingdom B.
C. Change the stored procedures called by the .NET application to include the
OPENXML command.
D. Configure a linked server on Certkingdom B to point to Certkingdom A.

Answer: B

Explanation:
SQL Server lets you access external data sources from your local
Transact-SQL code. You need to define a linked server for each external data
source you want to access and then configure the security context under which your
distributed queries will run. After you create a linked server, you can use the
Transact-SQL OPENQUERY function to execute your distributed queries.


QUESTION 3
You are a database administrator for Certkingdom.com. Your company uses a different
company’s application that is based on SQL Server 2005 Standard Edition. The
application executes a query that uses an index query hint. The index query hint is not
suitable for your environment, but you cannot modify the query. You need to force the
application to use a different query execution plan. What should you do?

A. Create a plan guide for the query.
B. Clear the procedure cache.
C. Create a new covering index on the columns that the query uses.
D. Update the statistics for all of the indexes that the query uses.

Answer: A
Over the past few years, Microsoft SQL Server has increased its
presence in the industry and has reduced its TCO. This reduced TCO is a direct
result, primarily, of the numerous self-tuning mechanisms built into Microsoft(r)
SQL Server. These mechanisms automatically perform tasks that would otherwise
have to be performed by experienced database administrators. One such
mechanism is the cost-based optimizer (CBO) that is used to dynamically generate
query execution plans. The CBO probes several system-wide resource states and
employs many complex, heuristical algorithms to generate the best possible plan for
a given query and the underlying table and index structures. This mechanism works
well for the vast majority of user queries, but there are times when experienced
users need to force a particular query plan, based on some prior knowledge or
insights into future uses.


QUESTION 4
You are a database administrator for Certkingdom.com. Your SQL Server 2005 computer
contains one user database that holds sales transaction information. Users report that the
queries and stored procedures that they use every day are taking progressively longer to
execute. You also notice that the amount of free disk space on the SQL Server computer
is decreasing. You need to create a maintenance plan to correct the performance and
storage problems. What are two possible ways to achieve this goal? (Each correct answer
presents a complete solution. Choose two.)

A. In the SQL Server Maintenance Plan Wizard, use the Check Database Integrity option.
B. In the SQL Server Maintenance Plan Wizard, use the Reorganize Index option.
C. In the SQL Server Maintenance Plan Wizard, use the Shrink Database option.
D. In the SQL Server Maintenance Plan Wizard, use the Clean Up History option.
E. In the SQL Server Maintenance Plan Wizard, use the Execute SQL Server Agent Job
option.

Answer: B,C

Explanation:
When you indexes are not heavily fragmented you can reorganize
indexes, which uses few system resources and runs automatically online. In SQL
Server 2005, certain operations such as large delete operations or -one-time data
loads might leave database files larger than they need to be. SQL Server 2005
enables a DBA to shrink each file within a database to remove unused pages and
regain disk space.


QUESTION 5
You are a database administrator for Certkingdom.com. You are responsible for a SQL
Server 2005 database that has several indexes. You need to write a stored procedure that
checks the indexes for fragmentation. Which Transact-SQL statement should you use?

A. DBCC INDEXDEFRAG
B. SELECT * FROM sys.dm_db_index_physical_stats
C. SELECT * FROM sys.indexes
D. DBCC DBREINDEX

Answer: B

Explanation:
The index_physical_stats function takes five parameters: database_id,
object_id, index_id, partition_id, and mode. This function returns row size and
fragmentation information.


QUESTION 6
You work as DBA at Certkingdom.com. You administer two SQL Server 2005 computers
named Certkingdom A and Certkingdom B. Certkingdom A and Certkingdom B contain a copy of a
database named Sales. The database is replicated between Certkingdom A and Certkingdom B by
using transactional replication. A full backup of each database is performed every night.
Transaction log backups are performed every hour. Replication latency is typically less
than two minutes. One afternoon, the Sales database on Certkingdom A becomes corrupted.
You are unable to repair the database. The Sales database on Certkingdom B is unaffected.
You need to return the Sales database on Certkingdom A to normal operation as quickly as
possible. You must ensure a minimum loss of data and minimal impact to users of either
server. What should you do?

A. Perform a full database backup on Certkingdom B. Restore the backup to Certkingdom A.
B. Restore the most recent full database backup and all transaction logs made since the
full backup was made.
C. Restore only the most recent transaction log backup.
D. Detach the Sales database on Certkingdom B. Copy the database file to Certkingdom A, and
attach the database on both servers.

Answer: A

Explanation:
Detaching the database will not apply to the minimal impact on users
as it will be offline during copy. Restoring only the latest transaction log will not
give you a working database and restoring last full backup and all transaction logs
after that will not apply to the restore normal operations as quickly as possible part
of the requirements.


QUESTION 7
You are a database administrator for Certkingdom.com. The company runs a popular
database-driven Web site against a SQL Server 2005 computer named Certkingdom B. You
need to ensure a quick response time and appropriate audit trail in the event that
Certkingdom B experiences excessive traffic due to denial-of-service (DoS) attacks. Which
two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A. Configure the new performance alert to start a SQL Server Profiler trace.
B. Create a new performance alert to monitor the Current Bandwidth counter.
C. Configure the new performance alert to start a Network Monitor capture.
D. Create a new performance alert to monitor the Bytes Total/sec counter.

Answer: C,D

Explanation:
Using alerts, System Monitor tracks specific events and notifies you of
these events as requested. An alert log can monitor the current performance of
selected counters and instances for objects in SQL Server. When a counter exceeds
a given value, the log records the date and time of the event. An event can also
generate a network alert. Characteristic for a typical DoS attack is a large number
of Bytes/sec. Characteristic for a DDoS attack is also a large number of Bytes/sec
but also a large number of connections made from a large number of hosts.


QUESTION 8
You are a database administrator for Certkingdom.com. One of the databases on a SQL
Server 2005 computer contains a stored procedure. Users run this stored procedure to
import data into a table. The stored procedure needs to use the TRUNCATE TABLE
command before importing new data into the table. However, the users who run the
stored procedure do not have permission to truncate the table. You need to provide a way
for the stored procedure to truncate the table before it imports new data. What should you
do?

A. Configure the stored procedure to use the EXECUTE AS command.
B. Configure the stored procedure to be owned by the same database user as the table.
C. Assign the users DELETE permission in the table.
D. Add the users to the db_datawriter fixed database role.

Answer: A

Explanation:
In SQL Server 2005 you can implicitly define the execution context of
the following user-defined modules: functions (except inline table-valued functions),
procedures, queues, and triggers. By specifying the context in which the module is
executed, you can control which user account the SQL Server 2005 Database Engine
uses to validate permissions on objects that are referenced by the module. This
provides additional flexibility and control in managing permissions across the object
chain that exists between user-defined modules and the objects referenced by those
modules. Permissions must be granted to users only on the module itself, without
having to grant them explicit permissions on the referenced objects. Only the user
that the module is running as must have permissions on the objects accessed by the
module.
Syntax:
Functions (except inline table-valued functions), Stored Procedures, and DML Triggers
{ EXEC | EXECUTE } AS { CALLER | SELF | OWNER | ‘user_name’ }


QUESTION 9
You are a database administrator for Certkingdom.com. You have separate SQL Server 2005
development and production environments. You use the Business Intelligence
Development Studio to create a SQL Server Integration Services (SSIS) package in your
development environment. Then, you use the SSIS package to import data into your
development environment from one of your company’s trading partners. You need to
deploy the SSIS package to your production environment. Your production environment
uses different table names than your development environment. What should you do?

A. Save the SQL Server Integration Services (SSIS) package to a file. Copy the file to the
production server. Configure the SSIS package on the production server to use the new
file.
B. Back up the master database and restore it to the production server. Rename the
appropriate tables inside the master database.
C. Create a SQL Server Integration Services (SSIS) package configuration. Build a
deployment utility. Copy the deployment folder for your SSIS project to your production
server. Execute the manifest file.
D. Back up the msdb database and restore it to the production server. Rename the
appropriate tables inside the msdb database.

Answer: C

Explanation:
You have to use a SSIS package to accomplish this but you can not use
the package built for your development environment as the table names differ.


QUESTION 10
You are a database administrator for Certkingdom.com. You notice that one of the data files
on a SQL Server 2005 computer is corrupted. You need to restore the database from the
most recent set of backups. You want to perform this task as quickly as possible, with a
minimum loss of data. What should you do first?

A. Restore the most recent transaction log backup.
B. Restore the most recent full database backup.
C. Perform a full database backup.
D. Perform a transaction log backup.

Answer: D

Explanation:
In order to restore from the most recent set of backups, you have to
first ensure that you can restore all transactions that have occurred between the
time of the backup and the time when the database went corrupt. In order to
accomplish this you should backup the transaction log.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

Microsoft 70-445 Q & A / Study Tools


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com




QUESTION
1
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package.
The package has the following features:
Two Data Flow tasks and two Control Flow tasks
A success constraint between each Data Flow task and the subsequent Control Flow task
The package uses one transaction for all the tasks.
You need to configure the package so that the two Data Flow tasks use their own transactions.
You also need to ensure that each Control Flow task is enlisted in the same transaction as its
preceding Data Flow task.
Which three actions should you perform? (Each correct answer presents part of the solution.
Choose three.)

A. Change the TransactionOption property to Supported for the package.
B. Change the TransactionOption property to Required for the package.
C. Change the TransactionOption property to Supported for each Data Flow task.
D. Change the TransactionOption property to Required for each Data Flow task.
E. Change the TransactionOption property to Supported for each Control Flow task.
F. Change the TransactionOption property to Required for each Control Flow task.

Answer: A, D, E



QUESTION
2
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package. The
package contains 30 Data Flow tasks and 30 Control Flow tasks. The package runs slower than
expected. You need to capture the start time the finish time and the elapsed time for the
validation and execution of the package. What should you do?

A. Enable the OnProgress event handler and use the Control Flow tasks to write the information
to a log.
B. Monitor the Progress tab during the execution of the package, and then monitor the
Execution Results tab.
C. Use the Performance Monitor tool to capture the counters from the SQL Server SSIS Service
object. Analyze the output for the required information.
D. Use the Performance Monitor tool to capture the counters from the SQL Server: SSIS
Pipeline object. Analyze the output for the required information.

Answer: B



QUESTION
3
Microsoft SQL Server Management Studio (SSMS) is installed on your workstation. Microsoft
Business Intelligence Development Studio (BIDS) is not installed on your workstation.
You need to create a package that must meet the following requirements:
It must be transactional.
It must be optimized for 20 tables.
It must be stored securely in the msdb database of a remote server.
What should you do?

A. Create the package by using DTS Designer.
B. Create the package by using the Package Migration Wizard.
C. Create the package by using the Microsoft SQL Server Import and Export Wizard.
D. On the Microsoft SQL Server 2005 Integration Services (SSIS) menu, click the Create
Package submenu.

Answer: C



QUESTION
4
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package.
While testing, a Transact-SQL user-defined function causes duplicate key values that stop the
transformation.
To permit the transformation to continue, the package must perform the following tasks:
1. Ascertain which rows are affected.
2. Insert the rows that fail into a table.
3. Continue with the process.
You need to change certain properties in the package to meet the requirements.
Which three tasks should you perform? (Each correct answer presents part of the solution.
Choose three.)

A. Choose the Redirect Row option for the Error property on the key column.
B. Choose the Ignore Failure option for the Error property on the key column.
C. Choose the Fail Component option for the Error property on the key column.
D. Add a DataReader source to use a new Data Flow destination when the Failure constraint is fired.
E. Add a DataReader source to use a new Data Flow destination when the Completion
constraint is fired.
F. Edit the Error Output properties for each DataReader source and configure each data source for error handling.

Answer: A, D, F



QUESTION
5
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package.
The package uses at least one sequence container in one transaction. Each transaction controls
a Data Flow task and a Control Flow task. Each Data Flow task has a Success constraint.
The Control Flow task follows the Success constraint. The package must include the following
requirements:
Each Data Flow task must use its own transaction.
The Control Flow task and the Data Flow task that precedes it must succeed or fail as an atomic unit.
A restart point must restart each Data Flow task and the Control Flow task that follows it as an
atomic unit.
You need to make changes in the control flow designer to meet the outlined requirements.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A. Add all the Data Flow tasks and the Control Flow tasks to one sequence container.
B. Add a sequence container for each Control Flow task and the Data Flow task that precedes it.
C. Change the FailPackageonFailure property to true for each new sequence container that is
added to the package.
D. Change the FailPackageonFailure property to false for each new sequence container that is
added to the package.

Answer: B, C



QUESTION
6
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package. An
Analysis Services Processing task in the package requires data from a file. The file is exported to
a file share.
If the file is not available on the file share, the Analysis Services Processing task must import data
from a remote Microsoft SQL Server 2005.
You need to add steps to the package to import the data.
What should you do?



Answer:



QUESTION
7
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package.
The OLE DB data source for the package is a database that is updated frequently.
You need to create a package that accomplishes the following tasks:
Implement the IRowsetFastLoad interface.
Support various data flow destinations.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A. Use an OLE DR data flow destination.
B. Use a Recordset data flow destination.
C. Use a DataReader data flow destination.
D. Create separate data flow destinations within the same Data Flow task.

Answer: A, D



QUESTION
8
Your company’s business intelligence (BI) model uses Microsoft SQL Server 2005 Integration
Services (SSIS). There are 20 packages that use the same configuration. The package
configuration is stored in an XML file as a variable.
You need to track the changes that affect a package that uses one variable. You also need to
modify the package to provide automatic notification by e-mail whenever there are changes to the
variable.
What should you do?

Answer:



QUESTION
9
You are designing a Microsoft SQL Server Integration Services (SSIS) package.
The package contains a single OLE DB data source. The package must be deployed on 10
servers. The package uses the XML configuration file to connect to a pre-assigned server.
You need to ensure that the package uses the correct server at runtime
What should you do?



Answer:



QUESTION
10
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package. The
package is named UpdateTable.dtsx and contains a variable named runlD. The package must
run by using the dtexec utility. The runlD variable must be set at runtime to a value of 5. You need
to meet the outlined requirements. What should you do?

A. Execute dtexec /F “c:\ssisPackages\UpdateTable.dtsx” /SET
\packages.variables[runlD].Value;5.
B. Execute dtexec /F “c:\ssisPackages\UpdateTable.dtsx” /SET \packages.variables.runlD=5.
C. Create a text file that specifies the variable name and value in the format
package.variables[runlD].Value = 5. Execute dtexec /F “c:\ssisPackages\UpdateTable.dtsx”
/COM <filename> where <filename> is the name of the file you just created.
D. Create a text file that specifies the variable name and value in the format runlD=5. Execute
dtexec /F “c:\ssisPackages\UpdateTable.dtsx” /COM <filename> where <filename> is the
name of the text file you just created.

Answer: A

 

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

The right website marketing can give you the results you desire.

When you have a business website or are an online business, website marketing is essential this is because it will help you ensure that your website is seen by many potential clients and customers. Thousands of people use the internet daily and there are many different websites available and so it is essential that your website has the right marketing in place as you want your website to be ahead of your competitors’ websites in the search engine rankings.

MCTS Certification, MCITP Certification

Best Avaya Certification Training and Avaya Exams Training  and more Cisco exams log in to examkingdom.com

We have many tried and tested techniques which we will put into place on your website, we also keep up to date with all the latest techniques, we want to be able to offer you the very best service and by doing this we know that we can.

When it comes to choosing a company for your website marketing you should ensure that they are a company who will deliver what they promise. You can do this by seeing where their own website ranks, if they are not a high ranking website then how can you expect them to get your website where you want it. You should then find out who their clients are and find out where their clients rank, a company’s own website may rank highly but they may not put the same effort into their clients’ websites. If a company’s own website ranks highly and their clients’ websites rank highly then you know that you can entrust your website marketing to that company. You will find that our website ranks highly and that our clients’ websites rank highly which allows you to know that we will deliver what we have promised.

When it comes to giving your website that all important boost in rankings, there are two techniques you can put into place which when working side by side can give you the result that you desire. Those two techniques are search engine optimisation (SEO) and cost per click (CPC) advertising. SEO will give your website a gradual increase in rankings, this is because individual techniques need to be put into place and then they need to take hold on your website before it can begin to gradually rise in the rankings, SEO will not give you an instant boost however one you have that increase in rankings it will gradually rise and the techniques will help you maintain your increased ranking. CPC will help give your website an instant boost in traffic; this is because the advertisements can be placed on the first page of search results due to it being a paid listing. You will choose the keywords you wish to target and then your advertisement will appear when those keywords are searched for. This form of advertising is very beneficial because you only pay for your advertisement when it is clicked on rather than each time it is shown on the search engine pages; this means that it can be shown an unlimited amount of times until you either have no money in your account or until you cancel your CPC campaign.

If you have SEO and CPC working alongside each other you may wish to cancel your CPC campaign once your website is ranking highly, however you may still find it beneficial to keep it in place. SEO allows you to focus on a wide array of different keywords and you may find that you receive a high ranking for your less common keywords before your common keywords start ranking highly. A CPC campaign is more effective if you focus on your more common keywords this is because it will appear more regularly on the search engines, however those keywords will cost you more.

IBM 000-050 Q & A / Study Guide


Cisco CCNA Training, Cisco CCNA Certification

Best IBM Certification Training and IBM Exams Training  and more Cisco exams log in to Certkingdom.com

 


QUESTION 1

The list of test environments can be used for what purpose?

A. to automatically locate resources containing the specified environments
B. to automatically generate the actual test environments needed to run specific tests
C. to automatically select available machines during test execution
D. to automatically create unique test logs for each environment

Answer: B


QUESTION 2
In the Requirements section of the test plan, what happens when you click on the green plus sign icon?

A. A new requirement is added to the test plan.
B. An existing requirement is added to the test plan.
C. A requirement is imported into the test plan.
D. test case is created from the requirement.

Answer: B


QUESTION 3
When generating a new test execution record from the Test Execution Record section of an open
test case, which tabs does the Advanced Properties link show?

A. One-way, Pair-wise, and Four-way Interaction
B. Test Plan, Test Suite, and Test Environment
C. Lab resources, Reservations, and Milestones
D. Inclusions, Exclusions, and Weightings

Answer: D


QUESTION 4
Quality Objectives defined in the System Properties can be used in which sections of the test
plan?

A. Business Objectives, Test Objectives, and Quality Objectives
B. Business Objectives, Test Environments, and Quality Objectives
C. Entry Criteria, Exit Criteria, and Quality Objectives
D. Entry Criteria, Exit Criteria, and Business Objectives

Answer: C


QUESTION 5
You can copy content from an external document and paste it into which sections of the test plan?

A. Summary, Entry Criteria, Exit Criteria
B. Summary, Pre-Condition, and Post-Condition
C. Summary, Quality Objectives, and Resources
D. Summary, Business Objectives, and Test Objectives

Answer: D


QUESTION 6
Which Custom Reporting component stores the reports, data source connections, and server and
user preferences?

A. Data Warehouse
B. WebSphere Application Server
C. Framework Manager
D. Content Store

Answer: D


QUESTION 7
Which statement is true about review processes?

A. Authorization is off by default; new Task-Review work items are listed as Pending.
B. Authorization is on by default; new Task-Review work items are listed as Pending.
C. Authorization is off by default; new Task-Review work items are listed as New.
D. Authorization is on by default; new Task-Review work items are listed as New.

Answer: A


QUESTION 8
Who typically creates the test plan initially with Rational Quality Manager?

A. Test Lab Manager
B. Test Engineer
C. Test Manager
D. Project Manager

Answer: C


QUESTION 9
What does the Platform Coverage tab of the Test Environments section show?

A. a list of platforms that will be supported for all test cases
B. a list of test execution records that will be generated for the test plan
C. a non-binding list of platforms the user plans to cover
D. a binding list of platforms that must be covered in the test plan

Answer: C


QUESTION 10
Which three platforms are supported by the data warehouse server of IBM Rational Insight?
(Choose three.)

A. Microsoft Windows Server 2003
B. Microsoft Windows Server 2008
C. SUSE Linux
D. Red Hat Linux

Answer: A,B,D

 

Cisco CCNA Training, Cisco CCNA Certification

Best IBM Certification Training and IBM Exams Training  and more Cisco exams log in to Certkingdom.com