Number of questions: 67 Number of questions to pass: 48 Time allowed: 90 mins Status: Live
This intermediate level certification is intended for Application Developers responsible for the development of integration services for business process applications. This certification focuses on application development with IBM Integration Designer V19.0 for deployment on IBM Business Automation Workflow V19.0.
This exam does not include IBM Process Designer or Process and Case Modeling.
This exam consists of eight sections described below. For more detail, please see the study guide on the Exam Preparation tab.
Installation and Configuration 4% Install and update the IBM Integration Designer (IID) Install and configure a Unit Test Environment (UTE)
Service Component Architecture (SCA) programming model and solution design 22% Design and use Service Component Architecture (SCA) Design and use business objects Demonstrate an understanding of Service Component Architecture (SCA) Effectively organize a solution into modules, mediation modules, and libraries taking into consideration component reuse, and application maintainability Determine the appropriate use of macroflows (long-running processes), microflows (short-running processes), and mediations Effectively use quality of service (QoS) qualifiers Demonstrate understanding of and apply performance considerations for business integration solutions, including long-running processes Configure dynamic invocation using Gateway patterns Monitor Business Processing using Dynamic Event Framework (DEF) and audit logging
BPEL Development 15% Design and implement Business Process Execution Language (BPEL) processes using the business process editor Use correlation sets in the BPEL process Demonstrate understanding of transaction behavior Implement custom logic using the visual snippet editor and Java code Implement error handling and compensation within a business process Demonstrate an understanding of working with Human tasks Create new versions for the BPEL process
Mediation Development 15% Describe the Service Message Object (SMO) Implement fault handling in mediation modules Develop mediation flows Use mediation primitives and subflows in mediation flows Transform data using maps (XSLT and Business Object) Use dynamic service routing through a Dynamic Endpoint Selection Design a parallel flow (fan in/fan out)
Workflow Center Repository 11% Working with the Workflow Center Perspective Import Process Application and Toolkits Manage artifacts in the repository (associating, disassociating and merging) Implement advanced integration service (emulating) Understand design considerations when working with Workflow Center Repository integration modules
Connectivity and Integration 13% Use and configure technology adapters, including the Java Database Connectivity (JDBC), FTP, email, Enterprise Content Management (ECM) and flat file adapters Configure import and export bindings (for example, JMS, MQ, Web Services, https:, and SCA) Demonstrate an understanding of different SCA invocation styles between synchronous, asynchronous using one-way operations, asynchronous with callback, and asynchronous with deferred response
Packaging and Deployment 9% Generate unmanaged integration module deployment packages Apply security to SCA application Understand the use of shared library Use Software Configuration Management (SCM) system with Integration Designer
Testing and Troubleshooting 11% Test business integration solutions using component tests Configure and use the integration test client tool to test components Use Business Process Choreographer (BPC) Explorer for testing and troubleshooting long-running processes tasks Use appropriate server logs and cross component trace (XCT) for problem determination Use the integration debugger to debug business integration components Demonstrate an understanding of Failed Event Manager (FEM) and recovering of events
Number of questions: 60 Number of questions to pass: 42 Time allowed: 90 mins Status: Live
An IBM Certified Administrator on IBM Db2 12 for z/OS is the lead database administrator for the Db2 product on the z/OS operating system. This individual has significant experience as a DBA and extensive knowledge of Db2, up to and including Db2 12 for z/OS Function Level 506. This individual is capable of performing intermediate to advanced tasks related to database design and implementation, operation and recovery, security and auditing, distributed connectivity, performance, installation and migration/upgrades specific to the z/OS operating system.
This exam consists of 7 sections described below. For more detail, please see the study guide on the Exam Preparation tab.
Section 1: Database Design and Implementation 22% Design tables and views Explain the different performance implications of identity column, ROWID, and sequence column definitions Design indexes Design universal table spaces Perform partitioning Normalize data (E-R model, process model) and translate data model into physical model Understand and describe Db2 database enforced integrity rules Use the appropriate method to alter Db2 objects Explain the use and impact of different encoding schemes
Section 2: Operation and Recovery 20% Explain and execute commands and subcommands for normal operational conditions Explain and execute commands and utility control statements for use in abnormal conditions Load and unload data into and from Db2 tables Reorganize objects when necessary Monitor objects by collecting statistics Monitor and manage threads and utilities Identify and respond to advisory/restrictive statuses on Db2 objects Identify and perform problem determination Perform object and catalog/directory health checks Identify and perform actions needed to protect databases from planned and unplanned outages Identify and perform actions needed to recover data to a consistent point in time
Section 3: Security and Auditing 10% Explain privileges and authorities Protect access to Db2 and its objects Audit Db2 activity and resources and identify primary audit techniques Identify and respond appropriately to symptoms from trace output or error messages that signify security problems Explain and use roles, trusted context, data masking and encryption
Section 4: Performance 21% Plan for performance monitoring by setting up and running monitoring procedures Analyze performance (manage and tune CPU requirements, memory, I/O, locks, response time, index and table compression) Analyze and respond to RUNSTATS statistics analysis Determine when and how to perform REBIND Describe Db2 interaction with Workload Manager (WLM) Review and tune SQL Monitor dynamic SQL performance Design features for performance Explain how to control and influence access paths
Section 5: Installation and Migration 9% Recommend settings for critical Db2 system parameters Identify and explain Db2 data sharing components and commands Describe use of premigration checklists Describe the function of the catalog and directory Demonstrate understanding of the Db2 12 continuous delivery process Explain the migration process and activation of new function levels
Section 6: Additional Database Functionality 9% Explain and use SQL constructs Explain the use of stored procedures Explain the use of SQL/XML and XQuery Explain the use of user-defined functions Explain and use global variables Describe the use of triggers, merge statement, pagination options and JSON support
Section 7: Distributed Access 9% Demonstrate understanding of distributed data access and the role of the communications database Demonstrate understanding of Distributed Data Facility (DDF) implementation options Recommend values for critical DDF configuration settings Understanding and implementing distributed data access Describe Db2 support for Native REST services and differentiate from RESTful API
Certification Requirements To complete the requirements for this certification you must:
1. Achieve one of the following credentials • Associate – Networking Version 1.0 • Dell Certified Associate – Networking (Valid if already earned, but not achievable anymore) • Dell Certified Professional – Networking (Valid if already earned, but not achievable anymore)
2. Pass the following Implementation Exam • DES-5221 Specialist – Implementation Engineer, Data Center Networking Exam
Note: These details reflect certification requirements as of November 15, 2019. Other Certification Recommendations
Once you have achieved this Certification you may be interested in: • Specialist – Implementation Engineer, Campus Networking The Proven Professional Program periodically updates certification requirements. *Please check the Proven Professional CertTracker website regularly for the latest information and for other options to meet the Associate level requirement.
Overview This exam is a qualifying exam for the Specialist – Implementation Engineer, Data Center Networking track. This exam focuses on concepts related to the Data Center environment and Dell EMC Networking’s S-Series and Z-Series products. Focus is on Dell EMC Networking SmartFabric OS10-based protocols and features. Dell Technologies provides free practice tests to assess your knowledge in preparation for the exam. Practice tests allow you to become familiar with the topics and question types you will find on the proctored exam. Your results on a practice test offer one indication of how prepared you are for the proctored exam and can highlight topics on which you need to study and train further. A passing score on the practice test does not guarantee a passing score on the certification exam.
Products Products likely to be referred to on this exam include but are not limited to: • Dell EMC Networking S-Series Switches • Dell EMC Networking Z-Series Switches
Exam Topics Topics likely to be covered on this exam include:
Networks – The Basics (19.6%) • Identify common data center topologies, protocols, and topologies; describe the Dell EMC data center switch portfolio • Basic switch configuration: Identify the normal boot process of a S and Z-Series switch running OS 10. List the first-time switch setup requirements. Perform the steps for upgrading switch firmware in OS 10. • Access Control Lists: Explain the purpose of access control; apply appropriate commands to deny or permit IP connectivity; complete the required configuration to permit host access control; determine why particular computers are being blocked from accessing a server • AAA Security: Explain the purpose of AAA security; describe AAA process, core components and their function; configure local and RADIUS authentication • Dynamic Host Configuration Protocol: DHCP’s basic operation; Explain the role of the DHCP Relay; configure DHCP in OS10; identify the options to secure DHCP from attacks
Layer-2 Technologies and Protocols (20.1%) • Virtual Lans – Identify the characteristics of a VLAN; explain the differences between tagged and untagged frames; configure VLAN trunking; configure VLAN Port membership; verify trunking and Port Membership; troubleshoot VLANs • Spanning-tree Protocol – Identify the operations and use cases for STP; Configure and validate RSTP/MSTP/RSTP-PV; Manipulate spanning tree root bridge and port cost configurations • Link Aggregation Groups – Identify the operations and use cases for LAGs; configure, verify, and trouble shoot static LAGs; configure, verify, and troubleshoot dynamic LAGs • Discovery Protocols – Describe the characteristics of discovery protocols; describe uses cases for using discovery protocols; explain how to configure and validate. Configure discovery protocols; interpret LLDP outputs
Discovery Protocols – Describe the characteristics of discovery protocols; describe uses cases for using discovery protocols; explain how to configure and validate. Configure discovery protocols; interpret LLDP outputs (30.7%) • Basic Routing – Configure IPv4 on an interface; identify when to utilize a gateway as a last resort; configure and modify static routes; test inter-VLAN routing • Open Shortest Path First – describe OSPF operation, and core components; configure and validate OSPF using; interpret OSPF show commands; describe the operations and use cases for ECMP; test inter-VLAN routing • Border Gateway Protocol – Explain operations of BGP; • identify design best practices when configuring BGP in a leaf/spine environment; configure and validate BGP; Describe the operations and use cases for ECMP; configure and validate ECMP • Policy-Based Routing – Describe the basic operation of PBR; identify PBR use cases; configure and validate PBR
Data Center Technologies and Protocols (29.6%) • Virtual Link Trunking – Describe the components that makeup a VLT configuration; Configure and validate VLTs; troubleshoot basic VLT configuration issues • Virtual Router Redundancy Protocol – describe the basic operation of VRRP; identify the components of VRRP; describe VRRP Priorities; compare Pre-empt and no Pre-empt; configure VRRP on switches configured for VLT • Uplink Failure Detection – describe the components and operation of UFD; identify the differences between Active/Active and Active/Standby; configure and verify UFD • Virtual Routing and Forwarding – describe the operations and use cases for (VRF); configure and validate VRF • Quality of Service – Describe the basic operation of QoS; Describe how QoS identifies and marks traffic; identify the characteristics of QoS; identify QoS protocols and their uses; configure QoS • Multicast – Explain in depth the concepts relating to IP Multicast technology; compare IGMP and PIM use cases; identify the steps required to configure multicasting into an existing multicast environment
The percentages after each topic above reflects the approximate distribution of the total question set across the exam.
QUESTION 1 Which type of protocol is OSPF and what metric does it use to determine best path?
A. Link-state protocol that uses a concept of cost as metric B. Hybrid protocol that uses hop count as a metric C. Path vector protocol that uses the Dijkstra algorithm as a metric D. Distance Vector protocol that uses bandwidth and delay as metric
Correct Answer: A
QUESTION 2 What is the function of the authentication service?
A. Validates the user identity B. Determines switch management commands C. Validates switch order D. Determines which services the user is enabled to access
Correct Answer: A
QUESTION 3 A customer reports they can no longer access their services and a network administrator has been assigned to investigate. A UFD disabled error status appears on all ports. What caused the issue?
A. Spanning tree Loop-guard was implemented on the uplink-state group. B. One of the upstream interfaces is an uplink-state group went down. C. There was no issue; this is normal behavior. D. Both a port channel and its members were assigned to an uplink-state group.
The AWS Certified Developer – Associate examination is intended for individuals who perform a development role and have one or more years of hands-on experience developing and maintaining an AWS-based application. Abilities Validated by the Certification
Demonstrate an understanding of core AWS services, uses, and basic AWS architecture best practices Demonstrate proficiency in developing, deploying, and debugging cloud-based applications using AWS
Recommended Knowledge and Experience In-depth knowledge of at least one high-level programming language Understanding of core AWS services, uses, and basic AWS architecture best practices Proficiency in developing, deploying, and debugging cloud-based applications using AWS Ability to use the AWS service APIs, AWS CLI, and SDKs to write applications Ability to identify key features of AWS services Understanding of the AWS shared responsibility model Understanding of application lifecycle management Ability to use a CI/CD pipeline to deploy applications on AWS Ability to use or interact with AWS services Ability to apply a basic understanding of cloud-native applications to write code Ability to write code using AWS security best practices (e.g., not using secret and access keys in the code, instead using IAM roles) Ability to author, maintain, and debug code modules on AWS Proficiency writing code for serverless applications Understanding of the use of containers in the development process
Prepare for Your Exam There is no better preparation than hands-on experience. There are many relevant AWS Training courses and other resources to assist you with acquiring additional knowledge and skills to prepare for certification. Please review the exam guide for information about the competencies assessed on the certification exam.
Exam Content Response Types There are two types of questions on the examination: Multiple choice: Has one correct response and three incorrect responses (distractors). Multiple response: Has two or more correct responses out of five or more options. Select one or more responses that best complete the statement or answer the question. Distractors, or incorrect answers, are response options that an examinee with incomplete knowledge or skill would likely choose. However, they are generally plausible responses that fit in the content area defined by the test objective.
Unanswered questions are scored as incorrect; there is no penalty for guessing.
Unscored Content Your examination may include non-scored questions that are placed on the test to gather statistical information. These questions are not identified on the form, and do not affect your score.
Exam Results The AWS Certified Developer – Associate (DVA-C01) examination is a pass or fail exam. The examination is scored against a minimum standard established by AWS professionals guided by certification industry best practices and guidelines. Your results for the examination are reported as a score from 100–1,000, with a minimum passing score of 720. Your score shows how you performed on the examination as a whole and whether or not you passed. Scaled scoring models are used to equate scores across multiple exam forms that may have slightly different difficulty levels. Your score report contains a table of classifications of your performance at each section level. This information is designed to provide general feedback concerning your examination performance. The examination uses a compensatory scoring model, which means that you do not need to “pass” the individual sections, only the overall examination. Each section of the examination has a specific weighting, so some sections have more questions than others. The table contains general information, highlighting your strengths and weaknesses. Exercise caution when interpreting section-level feedback.
Content Outline This exam guide includes weightings, test domains, and objectives only. It is not a comprehensive listing of the content on this examination. The table below lists the main content domains and their weightings.
Domain % of Examination
Domain 1: Deployment 22% Domain 2: Security 26% Domain 3: Development with AWS Services 30% Domain 4: Refactoring 10% Domain 5: Monitoring and Troubleshooting 12% TOTAL 100%
Domain 1: Deployment 1.1 Deploy written code in AWS using existing CI/CD pipelines, processes, and patterns 1.2 Deploy applications using Elastic Beanstalk 1.3 Prepare the application deployment package to be deployed to AWS 1.4 Deploy serverless applications Domain 2: Security 2.1 Make authenticated calls to AWS services 2.2 Implement encryption using AWS services 2.3 Implement application authentication, and authorization
Domain 3: Development with AWS Services 3.1 Write code for serverless applications 3.2 Translate functional requirements into application design 3.3 Implement application design into application code 3.4 Write code that interacts with AWS services by using APIs, SDKs, and AWS CLI
Domain 4: Refactoring 4.1 Optimize application to best use AWS services and features 4.2 Migrate existing application code to run on AWS
Domain 5: Monitoring and Troubleshooting 5.1 Write code that can be monitored 5.2 Perform root cause analysis on faults found in testing or production
QUESTION 1 A Developer created a dashboard for an application using Amazon API Gateway, Amazon S3, AWS Lambda, and Amazon RDS. The Developer needs an authentication mechanism allowing a user to sign in and view the dashboard. It must be accessible from mobile applications, desktops, and tablets, and must remember user preferences across platforms. Which AWS service should the Developer use to support this authentication scenario?
A. AWS KMS B. Amazon Cognito C. AWS Directory Service D. Amazon IAM
Correct Answer: B
QUESTION 2 A Developer has created an S3 bucket s3://mycoolapp and has enabled server across logging that points to the folder s3://mycoolapp/logs. The Developer moved 100 KB of Cascading Style Sheets (CSS) documents to the folder s3://mycoolapp/css, and then stopped work. When the developer came back a few days later, the bucket was 50 GB. What is the MOST likely cause of this situation?
A. The CSS files were not compressed and S3 versioning was enabled. B. S3 replication was enabled on the bucket. C. Logging into the same bucket caused exponential log growth. D. An S3 lifecycle policy has moved the entire CSS file to S3 Infrequent Access.
Correct Answer: B
QUESTION 3 A Developer is creating an Auto Scaling group whose instances need to publish a custom metric to Amazon CloudWatch. Which method would be the MOST secure way to authenticate a CloudWatch PUT request?
A. Create an IAM user with PutMetricData permission and put the user credentials in a private repository; have applications pull the credentials as needed. B. Create an IAM user with PutMetricData permission, and modify the Auto Scaling launch configuration to inject the user credentials into the instance user data. C. Modify the CloudWatch metric policies to allow the PutMetricData permission to instances from the Auto Scaling group. D. Create an IAM role with PutMetricData permission and modify the Auto Scaling launching configuration to launch instances using that role.
Correct Answer: D
QUESTION 4 A Developer has written a serverless application using multiple AWS services. The business logic is written as a Lambda function which has dependencies on third-party libraries. The Lambda function endpoints will be exposed using Amazon API Gateway. The Lambda function will write the information to Amazon DynamoDB. The Developer is ready to deploy the application but must have the ability to rollback. How can this deployment be automated, based on these requirements?
A. Deploy using Amazon Lambda API operations to create the Lambda function by providing a deployment package. B. Use an AWS CloudFormation template and use CloudFormation syntax to define the Lambda function resource in the template. C. Use syntax conforming to the Serverless Application Model in the AWS CloudFormation template to define the Lambda function resource. D. Create a bash script which uses AWS CLI to package and deploy the application. | Correct Answer: A
QUESTION 5 What are the steps to using the AWS CLI to launch a templatized serverless application?
A. Use AWS CloudFormation get-template then CloudFormation execute-change-set. B. Use AWS CloudFormation validate-template then CloudFormation create-change-set. C. Use AWS CloudFormation package then CloudFormation deploy. D. Use AWS CloudFormation create-stack then CloudFormation update-stack.
Candidates for this exam are database administrators and data management specialists that manage on-premises and cloud relational databases built on top of Microsoft SQL Server and Microsoft Azure data services.
The Azure Database Administrator implements and manages the operational aspects of cloud-native and hybrid data platform solutions built on Microsoft Azure data services and Microsoft SQL Server. The Azure Database Administrator uses a variety of methods and tools to perform day-to-day operations, including applying knowledge of using T-SQL for administrative management purposes.
This role is responsible for management, availability, security, and performance monitoring and optimization of modern relational database solutions. This role works with the Azure Data Engineer role to manage operational aspects of data platform solutions.
Beta exams are not scored immediately because we are gathering data on the quality of the questions and the exam. Learn more about the value and importance of beta exams.
Part of the requirements for: Microsoft Certified: Azure Database Administrator Associate
Skills measured Plan and implement data platform resources (15-20%) Implement a secure environment (15-20%) Monitor and optimize operational resources (15-20%) Optimize query performance (5-10%) Perform automation of tasks (10-15%) Plan and implement a High Availability and Disaster Recovery (HADR) environment (15-20%) Perform administration by using T-SQL (10-15%)
Audience Profile Candidates for this exam are database administrators and data management specialists that manage on-premises and cloud relational databases built on top of SQL Server and Azure Data Services.
The Azure Database Administrator implements and manages the operational aspects of cloud-native and hybrid data platform solutions built on Azure Data Services and SQL Server. The Azure Database Administrator uses a variety of methods and tools to perform day-to-day operations, including applying knowledge of using T-SQL for administrative management purposes.
This role is responsible for management, availability, security and performance monitoring and optimization of modern relational database solutions. This role works with the Azure Data Engineer role to manage operational aspects of data platform solutions.
Skills Measured NOTE: The bullets that appear below each of the skills measured are intended to illustrate how we are assessing that skill. This list is not definitive or exhaustive.
NOTE: In most cases, exams do NOT cover preview features, and some features will only be added to an exam when they are GA (General Availability).
Plan and Implement Data Platform Resources (15-20%) Deploy resources by using manual methods • deploy database offerings on selected platforms • configure customized deployment templates • apply patches and updates for hybrid and IaaS deployment
Recommend an appropriate database offering based on specific requirements • evaluate requirements for the deployment • evaluate the functional benefits/impact of possible database offerings • evaluate the scalability of the possible database offering • evaluate the HA/DR of the possible database offering • evaluate the security aspects of the possible database offering
Configure resources for scale and performance • configure Azure SQL database/elastic pools for scale and performance • configure Azure SQL managed instances for scale and performance • configure SQL Server in Azure VMs for scale and performance • calculate resource requirements • evaluate database partitioning techniques, such as database sharding
Evaluate a strategy for moving to Azure • evaluate requirements for the migration • evaluate offline or online migration strategies • evaluate requirements for the upgrade • evaluate offline or online upgrade strategies
Implement a migration or upgrade strategy for moving to Azure • implement an online migration strategy • implement an offline migration strategy • implement an online upgrade strategy • implement an offline upgrade strategy
Implement a Secure Environment (15-20%)
Configure database authentication by using platform and database tools • configure Azure AD authentication • create users from Azure AD identities • configure security principals
Configure database authorization by using platform and database tools • configure database and object-level permissions using graphical tools • apply principle of least privilege for all securables
Implement security for data at rest • implement Transparent Data Encryption (TDE) • implement object-level encryption • implement Dynamic Data Masking • implement Azure Key Vault and disk encryption for Azure VMs
Implement security for data in transit • configure SQL DB and database-level firewall rules • implement Always Encrypted • configure Azure Data Gateway
Implement compliance controls for sensitive data • apply a data classification strategy • configure server and database audits • implement data change tracking • perform vulnerability assessment
Monitor and Optimize Operational Resources (15-20%)
Monitor activity and performance • prepare an operational performance baseline • determine sources for performance metrics • interpret performance metrics • assess database performance by using Azure SQL Database Intelligent Performance • configure and monitor activity and performance at the infrastructure, server, service, and database levels
Implement performance-related maintenance tasks • implement index maintenance tasks • implement statistics maintenance tasks • configure database auto-tuning • automate database maintenance tasks o Azure SQL agent jobs, Azure automation, SQL server agent jobs
• manage storage capacity
Identify performance-related issues • configure Query Store to collect performance data • identify sessions that cause blocking • assess growth/fragmentation of databases and logs • assess performance-related database configuration parameters o including AutoClose, AutoShrink, AutoGrowth
Configure resources for optimal performance • configure storage and infrastructure resources o optimize IOPS, throughput, and latency o optimize tempdb performance o optimize data and log files for performance
• configure server and service account settings for performance • configure Resource Governor for performance
Configure a user database for optimal performance • implement database-scoped configuration • configure compute resources for scaling • configure Intelligent Query Processing (IQP)
Optimize Query Performance (5-10%)
Review query plans
• determine the appropriate type of execution plan o live Query Statistics, Actual Execution Plan, Estimated Execution Plan, Showplan
• identify problem areas in execution plans • extract query plans from the Query Store
Evaluate performance improvements
• determine the appropriate Dynamic Management Views (DMVs) to gather query performance information • identify performance issues using DMVs • identify and implement index changes for queries • recommend query construct modifications based on resource usage • assess the use of hints for query performance
Review database table and index design
• identify data quality issues with duplication of data • identify normal form of database • assess index design for performance • validate data types defined for columns • recommend table and index storage including filegroups • evaluate table partitioning strategy • evaluate the use of compression for tables and indexes
Perform Automation of Tasks (10-15%)
Create scheduled tasks
• manage schedules for regular maintenance jobs • configure multi-server automation
• configure notifications for task success/failure/non-completion
Evaluate and implement an alert and notification strategy
• create event notifications based on metrics • create event notifications for Azure resources • create alerts for server configuration changes • create tasks that respond to event notifications
Manage and automate tasks in Azure
• perform automated deployment methods for resources • automate Backups • automate performance tuning and patching • implement policies by using automated evaluation modes
Plan and Implement a High Availability and Disaster Recovery (HADR) Environment (15-20%)
Recommend an HADR strategy for a data platform solution
• recommend HADR strategy based on RPO/RTO requirements • evaluate HADR for hybrid deployments • evaluate Azure-specific HADR solutions • identify resources for HADR solutions
Test an HADR strategy by using platform, OS and database tools
• test HA by using failover • test DR by using failover or restore
Perform backup and restore a database by using database tools
• perform a database backup with options • perform a database restore with options • perform a database restore to a point in time • configure long-term backup retention
Configure DR by using platform and database tools
• configure replication • configure Azure Site Recovery for a database offering
Configure HA using platform, OS and database tools
• create an Availability Group • integrate a database into an Availability Group • configure quorum options for a Windows Server Failover Cluster • configure an Availability Group listener
Perform Administration by Using T-SQL (10-15%)
Examine system health
• evaluate database health using DMVs • evaluate server health using DMVs • perform database consistency checks by using DBCC
Monitor database configuration by using T-SQL
• assess proper database autogrowth configuration • report on database free space • review database configuration options
Perform backup and restore a database by using T-SQL
• prepare databases for AlwaysOn Availability Groups • perform transaction log backup • perform restore of user databases • perform database backups with options
• configure permissions for users to access database objects • configure permissions by using custom roles
QUESTION 1 You have a Microsoft SQL Server 2019 instance in an on-premises datacenter. The instance contains a 4-TB database named DB1. You plan to migrate DB1 to an Azure SQL Database managed instance. What should you use to minimize downtime and data loss during the migration?
A. distributed availability groups B. database mirroring C. log shipping D. Database Migration Assistant
Correct Answer: A
QUESTION 2 You have 20 Azure SQL databases provisioned by using the vCore purchasing model. You plan to create an Azure SQL Database elastic pool and add the 20 databases. Which three metrics should you use to size the elastic pool to meet the demands of your workload? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
A. total size of all the databases B. geo-replication support C. number of concurrently peaking databases * peak CPU utilization per database D. maximum number of concurrent sessions for all the databases E. total number of databases * average CPU utilization per database
Correct Answer: A,C,E
QUESTION 3 You have a new Azure SQL database. The database contains a column that stores confidential information. You need to track each time values from the column are returned in a query. The tracking information must be stored for 365 days from the date the query was executed. Which three actions should you perform? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.
A. Turn on auditing and write audit logs to an Azure Storage account. B. Add extended properties to the column. C. Turn on Advanced Data Security for the Azure SQL server. D. Apply sensitivity labels named Highly Confidential to the column. E. Turn on Azure Advanced Threat Protection (ATP).
CBAP Eligibility To earn the CBAP designation, candidates must: Complete a minimum of 7,500 hours of Business Analysis Work experience in the last 10 years. Within this experience, a minimum of 900 hours completed in 4 of the 6 BABOK® Guide Knowledge Areas, for a total of at least 3,600 of the required 7,500 total. Complete a minimum of 35 hours of Professional Development in the last 4 years. Provide two references. Agree to Code of Conduct. Agree to Terms and Conditions. Pass the exam.
CBAP Competencies Is CBAP right for you? The CBAP certification is for:
Individuals with significant experience in business analysis Individuals with a CCBA™ designation Product Managers Non-BA consultants Trainers Hybrid Business Analysis professionals, including: Project Manager, Testers, Quality Assurance (QA) professionals, Change/Transformation Managers, and Designers
Highlight Your Expertise The Certified Business Analysis Professional™ (CBAP®) offers members of the BA community a variety of benefits, including:
Demonstrated senior knowledge and professional competence Marketability, employability and earning potential Success and path to leadership
CBAP recognizes your expertise in multiple business domains and your ability to tackle more complex projects, work with stakeholders to define and manage their business requirements, drive business processes, lead the BA effort, and identify opportunities to achieve better business results.
The IIBA® Annual Business Analysis Salary Survey reports that the average salary of respondents with CBAP® certification holders is 13% higher on average in earnings in comparison to non-certification holders.
QUESTION 1 What is the term used to describe the cost of the solution after the solution has been implemented in production by a vendor?
A. Total ownership costing B. Lifecycle maintenance fees C. Sustainability fees D. Total cost of ownership
Correct Answer: D
QUESTION 2 Enterprise analysis creates just five outputs. Which one of the following is an output of the enterprise analysis tasks?
A. Assumptions and constraints B. Stakeholder concerns C. Solution performance assessment D. Solution approach
Correct Answer: D
QUESTION 3 All of the following stakeholders participate in the prioritization of requirements except for which one?
A. Implementation subject matter expert B. Project team C. Domain subject matter expert D. Project manager
Correct Answer: B QUESTION 4 You are the business analyst for your organization. Management has asked that you create a model of the requirements so the stakeholders can better understand the requirements and the project as a whole.
Which of the following statements best describes a model? A. Models are slices of the project solution. B. Models simplify the requirements for common stakeholders. C. Models are statistics for the return on investment, time saved, and other mathematics. D. Models abstract and simplify reality.
Correct Answer: D
QUESTION 5 What plan will describe the stakeholder groups, communication needs, and the level of formality that is appropriate for the requirements?
A. Requirements management plan B. Project management plan C. Scope management plan D. Business analysis communication plan
Correct Answer: D
QUESTION 6 You are the business analyst for a smaller project where there are few requirements. Management would still like you to create a method to trace the few requirements for this project. What type of matrix would be best in this instance?
A. Roles and responsibility matrix B. RACI matrix C. Coverage matrix D. Requirements trace matrix
Correct Answer: C
QUESTION 7 You are the business analyst for your organization and have many solutions available to an identified problem. You would like a way to quickly and fairly determine which solution is the best choice for your organization. Which of the following approaches would allow you to determine the top-rated solutions for your organization?
A. Scoring system B. Acceptance and evaluation criteria C. Vendor assessment D. Voting system
Correct Answer: A
QUESTION 8 When an organization is using a change-driven approach to business analysis, how are communications managed?
A. Communications in a change-driven approach to business analysis focus more on the frequency of communication. B. Communications in a change-driven approach typically use face-to-face channels. C. Communications in a change-driven approach focus more on formal communications. D. Communications in a change-driven approach are all ad hoc.
MAGENTO CERTIFIED PROFESSIONAL CLOUD DEVELOPER OVERVIEW This exam is for a Magento 2 developer/architect with 6 to 12 months of experience developing for Magento Commerce Cloud. Ideally the person taking this exam will have worked on at least two Magento Commerce Cloud implementations.
This exam will validate the skills and knowledge needed required to deploy, test, troubleshoot, and operate in the Magento Cloud environment, including how to leverage Cloud platform features to enhance your project operations and performance. The exam will also validate the skills on troubleshooting and integrations.
By passing this exam, the test taker will receive the Magento Certified Professional Cloud Developer certification.
ABOUT THE EXAM 60 multiple choice questions 90 minutes to complete the exam 62% or higher needed to pass
PREREQUISITES AND RESOURCES No prerequisites We recommend taking the Magento Commerce Cloud for Developers course as a first step in preparing for this exam Hands-on experience with customization and implementation of Magento Commerce Cloud No hard-copy or online materials may be referenced during the exam Free (English) Study Guide available HERE
Target Audience Magento 2 developers working on Magento Commerce (Cloud) Technical staff responsible for deploying and testing Magento projects on Magento Commerce (Cloud)
Prerequisites Completion of “Free Intro to Magento Commerce (Cloud)” course Knowledge of Git and Git repositories Knowledge of Composer Recommended: Magento 2 Certified Solution Specialist and Magento 2 Certified Associate Developer certification credential or equal experience Recommended: Attend Magento 2 Development Essentials course or have equivalent experience
Course Overview The main goal of this course is to prepare you for developing with or for supporting your developer team working with the Magento 2 Cloud offering. Magento Commerce (Cloud) development best practices are introduced and examined, with specific focus on troubleshooting and integrations. You will gain the practical knowledge and skills required to deploy, test, troubleshoot, and operate in the Magento 2 Cloud environment, including how to leverage Cloud platform features to enhance your project operations and performance.
This course is based on Magento Commerce 2.2.
Learning Objectives
After this course, the student will be able to: Install all required and recommended tools and services for working with Magento Commerce (Cloud) Deploy Magento Commerce (Cloud) and go live Troubleshoot issues on the Cloud environment Debug and profile on Cloud
Course Outline
1. Introduction 1.1 Cloud overview 1.2 Cloud Admin UI overview 1.3 Installing a blank site from a template 1.4 User management 1.5 Onboarding UI
3. Local Environment 3.1 Setting up local development 3.2 Working with Composer 3.3 Working with Git 3.4 Magento-cloud CLI tool 3.5 Connecting Github / Bitbucket
4. Cloud Project 4.1 Project structure 4.2 Overview of .magento/routes.yaml 4.3 Overview of .magento/services.yaml 4.4 Overview of .magento.app.yaml 4.5 Overview of .magento.env.yaml
5. Service Configuration 5.1 Service Configurations 5.2 Slave Connections
6. Deployment Process 6.1 Understanding all processes during deployment 6.2 Magento Cloud scripts run on every deployment phase 6.3 Magento Cloud scripts configurations
7. Static Content Deployment 7.1 Move SCD to build phase 7.2 Avoid SCD on both phases 7.3 Generate static content on demand
8. Development 8.1 Introduction to Magento deployment features (shared file) 8.2 Changing Configurations 8.3 Changing a locale 8.4 Adding extensions (limitations, read-only FS, etc.) 8.5 Enabling/disabling a module 8.6 Multisite 8.7 Understanding the deployment process (development > staging > production)
12. Go Live 12.1 DNS 12.2 TLS Certificates 12.3 Fastly
13. Maintaining a Magento Cloud project 13.1 Upgrading to a new version 13.2 Upsize
QUESTION 1 You are working with a new developer who needs to be able to deploy code and view logs on MagentoCommerce Cloud. What must you do to give them access?
A. In the .magento.app.yaml file, add their email under Users. They need to enter their SSH public key. B. Add their SSH public key to a file named .ssh/authorized_keys and deploy the change. C. In the Cloud Project Web UI, click Add User to add their email. They need to enter their SSH public key. D. Add a Magento admin user for them and paste the SSH public key into their user’s SSH Key field, which is available only on Magento Commerce Cloud.
Correct Answer: B
QUESTION 2 You have a Starter project. Your code is ready for testing in the Staging environment, but you need the latest data from Production. What do you do to update the Staging environment?
A. Log in to the Project Web UI, choose the Staging environment, and click Sync B. Log in to the Project Web UI, choose the Staging environment, and click Merge C. Checkout the Staging branch and use the git push origin -f command D. Checkout the Production environment and use the magento-cloud sync CLI command
Correct Answer: B
QUESTION 3 You need to specify the admin password using an environment variable. You have created an environment variable env:ADMIN_PASSWORD with a valid password. When attempting to log in to the Magento Admin it is not accepting the new password. How do you correct the environment variable?
A. The Sensitive option is checked by default and must be disabled B. The env:ADMIN_PASSWORD variable can only be used for an initial installation C. The environment variable should not have the env: prefix D. The ADMIN_PASSWORD variable should be configured via .magento.env.yaml
Audience Profile Candidates for this exam should have subject matter expertise implementing, managing, and monitoring an organization’s Microsoft Azure environment. Responsibilities for an Azure Administrator include implementing, managing, and monitoring identity, governance, storage, compute, and virtual networks in a cloud environment, plus provision, size, monitor, and adjust resources, when needed. An Azure Administrator often serves as part of a larger team dedicated to implementing your organization’s cloud infrastructure.
A candidate for this exam should have at least six months of hands-on experience administering Azure, along with a strong understanding of core Azure services, Azure workloads, security, and governance. In addition, this role should have experience using PowerShell, Azure CLI, Azure portal, and Azure Resource Manager templates.
Skills Measured NOTE: The bullets that appear below each of the skills measured are intended to illustrate how we are assessing that skill. This list is not definitive or exhaustive. NOTE: In most cases, exams do NOT cover preview features, and some features will only be added to an exam when they are GA (General Availability).
Manage Azure identities and governance (15-20%) Manage Azure AD objects . create users and groups . manage user and group properties . manage device settings . perform bulk user updates . manage guest accounts . configure Azure AD Join . configure self-service password reset . NOT: Azure AD Connect; PIM
Manage role-based access control (RBAC) . create a custom role . provide access to Azure resources by assigning roles o subscriptions o resource groups o resources (VM, disk, etc.) . interpret access assignments . manage multiple directories
. NOT: Traffic Manager and FrontDoor and PrivateLink
Monitor and troubleshoot virtual networking . monitor on-premises connectivity
. use Network Performance Monitor
. use Network Watcher
. troubleshoot external networking
. troubleshoot virtual network connectivity
Integrate an on-premises network with an Azure virtual network . create and configure Azure VPN Gateway
. create and configure VPNs
. configure ExpressRoute
. configure Azure Virtual WAN
Monitor and back up Azure resources (10-15%) Monitor resources by using Azure Monitor . configure and interpret metrics
o analyze metrics across subscriptions
. configure Log Analytics
o implement a Log Analytics workspace
o configure diagnostic settings
. query and analyze logs
o create a query
o save a query to the dashboard
o interpret graphs
. set up alerts and actions
o create and test alerts
o create action groups
o view alerts in Azure Monitor
o analyze alerts across subscriptions
. configure Application Insights
. NOT: Network monitoring
Implement backup and recovery . configure and review backup reports
. perform backup and restore operations by using Azure Backup Service
. create a Recovery Services Vault
o use soft delete to recover Azure VMs
. create and configure backup policy
. perform site-to-site recovery by using Azure Site Recovery
. NOT: SQL or HANA
AZ-103/104 Comparison Microsoft Azure Administrator
Current Skills Measured as of January 15, 2020 Updated Skills Measured List (ignore the numbering below)
Audience Profile Candidates for this exam are Azure Administrators who manage cloud services that span storage, security, networking, and compute cloud capabilities. Candidates have a deep understanding of each service across the full IT lifecycle, and take requests for infrastructure services, applications, and environments. They make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor, and adjust resources as appropriate. Candidates for this exam should have proficiency in using PowerShell, the Command Line Interface, Azure Portal, ARM templates, operating systems, virtualization, cloud infrastructure, storage structures, and networking.
Audience Profile The Azure Administrator implements, manages, and monitors identity, governance, storage, computevirtual machines, and virtual networks in a cloud environment. This role focuses primarily on enabling Infrastructure as a Service (IaaS). The Azure Administrator will provision, size, monitor, and adjust resources as appropriate. Candidates should have a minimum of six months of hands-on experience administering Azure. Candidates should have a strong understanding of core Azure services, Azure workloads, security, and governance. Candidates for this exam should have experience in using PowerShell, the Command Line Interface, Azure Portal, and ARM templates.
1. Manage Azure subscriptions and resources (15-20%) 1.1 Manage Azure subscriptions Assign administrator permissions; configure cost center quotas and tagging; configure policies at Azure subscription level 1.2 Analyze resource utilization and consumption 6. Manage Azure Identities and Governance (15-20%) 6.1 Manage Azure AD objects . create users and groups
. manage user and group properties
. manage device settings
. perform bulk user updates
. manage guest accounts
. configure Azure AD Join
. configure self-service password reset
Configure diagnostic settings on resources; create baseline for resources; create and test alerts; analyze alerts across subscription; analyze metrics across subscription; create action groups and action rules; monitor for unused resources; monitor spend; report on spend; utilize log queries in Azure Monitor; view alerts in Azure Monitor 1.3 Manage resource groups Use Azure policies for resource groups; configure resource locks; configure resource policies; implement and set tagging on resource groups; move resources across resource groups; remove resource groups 1.4 Managed role based access control (RBAC) May include but is not limited to: Create a custom role, configure access to Azure resources by assigning roles, configure management access to Azure, troubleshoot RBAC, implement RBAC policies, assign RBAC Roles . NOT: Azure AD Connect; PIM
6.2 Manage role-based access control (RBAC) . create a custom role
. provide access to Azure resources by assigning roles
o subscriptions
o resource groups
o resources (VM, disk, etc.)
. interpret access assignments
. manage multiple directories
6.3 Manage subscriptions and governance . configure Azure policies
. configure resource locks
. apply tags
. create and manage resource groups
o move resources
o remove RGs
. manage subscriptions
. configure Cost Management
. configure management groups
2. Implement and manage storage (15-20%) 2.1 Create and configure storage accounts Configure network access to the storage account; create and configure storage account; generate shared access signature; install and use Azure Storage Explorer; manage access keys; monitor activity log by using Monitor Logs; implement Azure storage replication; Implement Azure AD Authentication, manage blob storage lifecycle management 7. Implement and Manage Storage (10-15%) 7.1 Manage storage accounts . configure network access to storage accounts
. create and configure storage accounts
. generate shared access signature
. manage access keys
. implement Azure storage replication
. configure Azure AD Authentication for a storage account
7.2 Manage data in Azure Storage
2.2 Import and export data to Azure Create export from Azure job; create import into Azure job; configure and use Azure blob storage; configure Azure content delivery network (CDN) endpoints 2.3 Configure Azure files Create Azure file share; create Azure File Sync service; create Azure sync group; troubleshoot Azure File Sync 2.4 Implement Azure backup Configure and review backup reports; perform backup operation; create Recovery Services Vault; create and configure backup policy; perform a restore operation . export from Azure job
. import into Azure job
. install and use Azure Storage Explorer
. copy data by using AZCopy
7.3 Configure Azure files and Azure blob storage . create an Azure file share
. create and configure Azure File Sync service
. configure Azure blob storage
. configure storage tiers for Azure blobs
3. Deploy and manage virtual machines (VMs) (15-20%) 3.1 Create and configure a VM for Windows and Linux Configure high availability; configure monitoring, networking, storage, and virtual machine size; deploy and configure scale sets 3.2 Automate deployment of VMs Modify Azure Resource Manager (ARM) template; configure location of new VMs; configure VHD template; deploy from template; save a deployment as an ARM template; deploy Windows and Linux VMs 3.3 Manage Azure VM Add data discs; add network interfaces; automate configuration management by using PowerShell Desired State Configuration (DSC) and VM Agent by using custom script extensions; manage 8. Deploy and Manage Azure Compute Resources (25-30%) 8.1 Configure VMs for high availability and scalability . configure high availability
. deploy and configure scale sets
8.2 Automate deployment and configuration of VMs . modify Azure Resource Manager (ARM) template
. configure VHD template
. deploy from template
. save a deployment as an ARM template
. automate configuration management by using custom script extensions
8.3 Create and configure VMs . configure Azure Disk Encryption
. move VMs from one resource group to another
VM sizes; move VMs from one resource group to another; redeploy VMs 3.4 Manage VM backups Configure VM backup; define backup policies; implement backup policies; perform VM restore; soft delete for Azure VMs; Azure Site Recovery . manage VM sizes
. add data discs
. configure networking
. redeploy VMs
8.4 Create and configure containers . create and configure Azure Kubernetes Service (AKS)
. create and configure Azure Container Instances (ACI)
. NOT: selecting an container solution architecture or product; container registry settings
8.5 Create and configure Web Apps . create and configure App Service
. create and configure App Service Plans
. NOT: Azure Functions; Logic Apps; Event Grid
4. Configure and manage virtual networks (30-35%) 4.1 Create connectivity between virtual networks Create and configure VNET peering; create and configure VNET to VNET connections; verify virtual network connectivity; create virtual network gateway 4.2 Implement and manage virtual networking Configure private and public IP addresses, network routes, network interface, subnets, and virtual network 4.3 Configure name resolution Configure Azure DNS; configure custom DNS settings; configure private and public 9. Configure and Manage Virtual Networking (30-35%) 9.1 Implement and manage virtual networking . create and configure VNET peering
. configure private and public IP addresses, network routes, network interface, subnets, and virtual network
9.2 Configure name resolution . configure Azure DNS
. configure custom DNS settings
. configure a private or public DNS zone
9.3 Secure access to virtual networks . create security rules
. associate an NSG to a subnet or
DNS zones 4.4 Create and configure a Network Security Group (NSG) Create security rules; associate NSG to a subnet or network interface; identify required ports; evaluate effective security rules 4.5 Implement Azure load balancer May include but is not limited to: Configure internal load balancer, configure load balancing rules, configure public load balancer, troubleshoot load balancing 4.6 Monitor and troubleshoot virtual networking May include but is not limited to: Monitor on-premises connectivity, use Network resource monitoring, use Network Watcher, troubleshoot external networking, troubleshoot virtual network connectivity 4.7 Integrate on premises network with Azure virtual network May include but is not limited to: Create and configure Azure VPN Gateway, create and configure site to site VPN, configure Express Route, verify on premises connectivity, troubleshoot on premises connectivity with Azure network interface
. NOT: Traffic Manager and FrontDoor and PrivateLink
9.5 Monitor and troubleshoot virtual networking . monitor on-premises connectivity
. use Network resource monitoring
. use Network Watcher
. troubleshoot external networking
. troubleshoot virtual network connectivity
9.6 Integrate an on-premises network with an Azure virtual network . create and configure Azure VPN Gateway
. create and configure VPNs
. configure ExpressRoute
. configure Azure Virtual WAN
5. Manage identities (15-20%) 5.1 Manage Azure Active Directory (AD) Add custom domains; Azure AD Join; configure self-service password reset;
[NO EQUIVALENT — SEE NEW FG 5 BELOW]
manage multiple directories 5.2 Manage Azure AD objects (users, groups, and devices) Create users and groups; manage user and group properties; manage device settings; perform bulk user updates; manage guest accounts 5.3 Implement and manage hybrid identities Install Azure AD Connect, including password hash and pass-through synchronization; use Azure AD Connect to configure federation with on-premises Active Directory Domain Services (AD DS); manage Azure AD Connect; manage password sync and password writeback 5.4 Implement multi-factor authentication (MFA) May include but is not limited to: Configure user accounts for MFA, enable MFA by using bulk update, configure fraud alerts, configure bypass options, configure Trusted IPs, configure verification methods
10. Monitor and back up Azure resources (10-15%) 10.1 Monitor resources by using Azure Monitor . configure and interpret metrics
o analyze metrics across subscriptions
. configure Log Analytics
o implement a Log Analytics workspace
o configure diagnostic settings
. query and analyze logs
o create a query
o save a query to the dashboard
o interpret graphs
. set up alerts and actions
o create and test alerts
o create action groups
o view alerts in Azure Monitor
o analyze alerts across subscriptions
. configure Application Insights
. NOT: Network monitoring
10.2 Implement backup and recovery . configure and review backup reports
. perform backup and restore operations by using Azure Backup Service
. create a Recovery Services Vault
o use soft delete to recover Azure VMs
. create and configure backup policy
. perform site-to-site recovery by using Azure Site Recovery
. NOT: SQL or HANA
QUESTION 1 You have an Azure subscription that contains an Azure Active Directory (Azure AD) tenant named contoso.com and an Azure Kubernetes Service (AKS) cluster named AKS1. An administrator reports that she is unable to grant access to AKS1 to the users in contoso.com. You need to ensure that access to AKS1 can be granted to the contoso.com users. What should you do first?
A. From contoso.com, modify the Organization relationships settings. B. From contoso.com, create an OAuth 2.0 authorization endpoint. C. Recreate AKS1. D. From AKS1, create a namespace.
Correct Answer: B
QUESTION 2 You have a Microsoft 365 tenant and an Azure Active Directory (Azure AD) tenant named contoso.com. You plan to grant three users named User1, User2, and User3 access to a temporary Microsoft SharePoint document library named Library1. You need to create groups for the users. The solution must ensure that the groups are deleted automatically after 180 days. Which two groups should you create? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A. an Office 365 group that uses the Assigned membership type B. a Security group that uses the Assigned membership type C. an Office 365 group that uses the Dynamic User membership type D. a Security group that uses the Dynamic User membership type E. a Security group that uses the Dynamic Device membership type
Correct Answer: AC
QUESTION 3 You recently created a new Azure subscription that contains a user named Admin1. Admin1 attempts to deploy an Azure Marketplace resource by using an Azure Resource Manager template. Admin1 deploys the template by using Azure PowerShell and receives the following error message: “User failed validation to purchase resources. Error message: “Legal terms have not been accepted for this item on this subscription. To accept legal terms, please go to the Azure portal (https:://go.microsoft.com/fwlink/? LinkId=534873) and configure programmatic deployment for the Marketplace item or create it there for the first time.” You need to ensure that Admin1 can deploy the Marketplace resource successfully.
What should you do? A. From Azure PowerShell, run the Set-AzApiManagementSubscription cmdlet B. From the Azure portal, register the Microsoft.Marketplace resource provider C. From Azure PowerShell, run the Set-AzMarketplaceTerms cmdlet D. From the Azure portal, assign the Billing administrator role to Admin1
Correct Answer: C
QUESTION 4 You have an Azure Active Directory (Azure AD) tenant that contains 5,000 user accounts. You create a new user account named AdminUser1. You need to assign the User administrator administrative role to AdminUser1. What should you do from the user account properties?
A. From the Licenses blade, assign a new license B. From the Directory role blade, modify the directory role C. From the Groups blade, invite the user account to a new group Correct Answer: B
QUESTION 5 You have an Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com that contains 100 user accounts. You purchase 10 Azure AD Premium P2 licenses for the tenant. You need to ensure that 10 users can use all the Azure AD Premium features. What should you do?
A. From the Licenses blade of Azure AD, assign a license B. From the Groups blade of each user, invite the users to a group C. From the Azure AD domain, add an enterprise application D. From the Directory role blade of each user, modify the directory role
The Avaya Converged Platform Integration Exam (75940X) is a requirement to earn the Avaya Solutions Platform (ACIS – 7594) credential.
This exam has 64 questions and the minimum passing score is 64%. The candidate has 90 minutes to complete this exam.
Test Objectives The exam covers the following knowledge areas and learning objectives:
Avaya Solutions Platform (ASP) Architecture Describe the Virtualization System Architecture. Describe the Overall Storage Architecture. Describe the ACP 4200 4.0 architecture clearly defining the differences between an ASP 2400 and ASP 4200. Describe the implementation of an ASP 4200 design. Describe ACP 4200 components including the expansion ASP 4200. Complete the site preparation requirements for the ASP 4200. Explain the requirements for ASP 4200 frame installation. Complete the checklist for power up and network connection of an ASP 4200. Explain the use and maintenance of the Lifecycle Workbook (LCW). Perform an upgrade. Describe the startup steps for the Management Server Console (MSC).
Network Architecture Describe the overall network architecture. Distinguish between ASP 4200 networking topologies (Layer 3 vs Layer 2 ASP 4200). Describe VMware networking as it relates to ASP 4200. Describe the VMware architecture. Interpret VMware performance monitoring data.
Applications and Operations Explain the purpose of the IP Template. Describe Avaya Aura® applications and network interactions. Interpret Avaya Aura® performance monitoring data. Describe common operations and maintenance processes.
Virtual Machine Describe the networking changes required when adding a new VM. Describe Visualization Performance and Fault Management (VPFM) integration of a new VM. Update the LCM workbook with new VM information.
ASP 4200 Security Explain the configuration options of Avaya Session Border Controller with ACP 4200. Describe BYOD support and Identity Engines (IDE).
Management Tools Describe System Manager. Describe the integration of POS applications with SMGR. Third Party Management Tools.
Avaya Orchestrator Using Avaya Orchestrator.
Prerequisite Knowledge Review the credential learning map for any prerequisite information.
QUESTION 1 How would an administrator display the IP addresses of the VSP switches of the ACP 4200 within the Avaya Orchestrator Home Dashboard?
A. By right-clicking on the Dashboard menu item and downloading the network summary report. B. By right-clicking on the Admin menu item and downloading the network summary report. C. By right-clicking on the Report menu item and downloading the network summary report. D. By hovering the mouse pointer over the Up status indicator within the Network dashlet.
Correct Answer: B
QUESTION 2 Avaya Orchestrator monitors the ACP 4200 components by organizing them into which two groups? (Choose two.)
A. Power B. Virtual Machines C. Storage D. Applications
Correct Answer: AC
QUESTION 3 An Avaya Orchestrator administrator has been tasked with getting a copy of the Temperature Values chart for a Server. When doing this in the past, the administrator has navigated to the Compute Group Dashlet-Host Up-Host IP Address-Performance Chart. However, the Temperatures Values chart cannot be found. What is potentially causing this issue?
A. The SNMP credentials for the Server’s thermostats subsystems are incorrect. B. The IP address chosen is of the ESXi host, not the iLO interface. C. The Host is currently unresponsive. D. The Temperatures Values are only available for VSP switches and Storage systems.
Exam Details JNCIA-Junos exam topics are based on the content of the recommended instructor-led training courses, as well as the additional resources.
Exam code: JN0-103 Administered by Pearson VUE Exam length: 90 minutes Exam type: 65 multiple-choice questions Scoring and pass/fail status is available immediately Junos Software Release: 19.4
Exam Objectives This list provides a general view of the skill set required to successfully complete the specified certification exam.
Identify the concepts, benefits or functionality of the core elements of the Junos OS Software architecture Control and forwarding planes Routing Engine and Packet Forwarding Engine Transit traffic processing Exception traffic
Identify the concepts, operation or functionality of the Junos user interface CLI functionality CLI modes CLI navigation CLI Help Filtering output Active versus candidate configuration Reverting to previous configurations Modifying, managing, and saving configuration files Viewing, comparing, and loading configuration files J-Web (core/common functionality only)
Identify the main elements for configuring Junos devices Factory-default state Initial configuration User accounts Login classes User authentication methods Interface types and properties Configuration groups Additional initial configuration elements, such as NTP, SNMP, and syslog Configuration archival Logging and tracing Rescue configuration
Describe how to configure basic components of a Junos device
Identify methods of monitoring or maintaining Junos devices Show commands Monitor commands Interface statistics and errors Network tools, such as ping, traceroute, telnet, SSH, and so on Junos OS installation and upgrades Powering on and shutting down Junos devices Root password recovery
Describe monitoring or maintenance procedures for a Junos device
Identify basic routing concepts or functionality for Junos devices Traffic forwarding concepts Routing tables Routing versus forwarding tables Route preference Routing instances Static routing Advantages of and use cases for dynamic routing protocols
Describe how to configure or monitor basic routing elements for a Junos device
Identify the concepts or functionality of routing policy and firewall filters on Junos devices Default routing policies Import and export policies Routing policy flow Effect of policies on routes and routing tables Policy structure and terms Policy match criteria, match types, and actions Firewall filter concepts Filter structure and terms Filter match criteria and actions Effect of filters on packets Unicast reverse-path-forwarding (RPF)
Describe how to configure or monitor routing policies and firewall filters on a Junos device
Preparation The resources listed on this section are recommended, but do not guarantee passing scores on JNCP exams. Success depends on each candidate’s motivation, experience, and dedication. Candidates may find additional resources not listed on this page helpful as well.
QUESTION 1 Which command verifies configuration syntax without applying the changes?
A. commit confirmed B. commit check C. commit comment D. commit and-quit
Correct Answer: B
QUESTION 2 By default, which character indicates the UNIX shell prompt?
A. # B. % C. $ D. >
Correct Answer: B
QUESTION 3 You are considering an upgrade from 19.1R1 and want to ensure that only bug fixes are included. Which two software versions should you consider in this situation? (Choose two.)
A. 19.3R1-S1 B. 19.3R2 C. 19.1R3 D. 19.1R1-S2
Correct Answer: AC
QUESTION 4 Which two statements are true about static routes in the Junos OS? (Choose two.)
A. Static routes remain in the routing table until you remove them or until they become inactive. B. Static routes must have a next hop defined. C. Static routes are learned by neighboring devices and added to their routing tables. D. Static routes are defined at the [edit routing-instances] hierarchy.
Correct Answer: AB
QUESTION 5 When multiple users are editing the configuration on a Junos device, what is the default behavior when a user issues a commit command?
A. All valid configuration changes made by all users will take effect. B. The user’s configuration changes are committed; other users’ configuration changes are still pending. C. The user will receive an error message disallowing a commit of the configuration. D. The user’s configuration changes are committed; other users will be exited from configuration mode.