C1000-080 IBM Business Automation Workflow v19 Application Development using Integration Designer

Number of questions: 67
Number of questions to pass: 48
Time allowed: 90 mins
Status: Live

This intermediate level certification is intended for Application Developers responsible for the development of integration services for business process applications. This certification focuses on application development with IBM Integration Designer V19.0 for deployment on IBM Business Automation Workflow V19.0.

This exam does not include IBM Process Designer or Process and Case Modeling.

This exam consists of eight sections described below. For more detail, please see the study guide on the Exam Preparation tab.

Installation and Configuration 4%
Install and update the IBM Integration Designer (IID)
Install and configure a Unit Test Environment (UTE)

Service Component Architecture (SCA) programming model and solution design 22%
Design and use Service Component Architecture (SCA)
Design and use business objects
Demonstrate an understanding of Service Component Architecture (SCA)
Effectively organize a solution into modules, mediation modules, and libraries taking into consideration component reuse, and application maintainability
Determine the appropriate use of macroflows (long-running processes), microflows (short-running processes), and mediations
Effectively use quality of service (QoS) qualifiers
Demonstrate understanding of and apply performance considerations for business integration solutions, including long-running processes
Configure dynamic invocation using Gateway patterns
Monitor Business Processing using Dynamic Event Framework (DEF) and audit logging

BPEL Development 15%
Design and implement Business Process Execution Language (BPEL) processes using the business process editor
Use correlation sets in the BPEL process
Demonstrate understanding of transaction behavior
Implement custom logic using the visual snippet editor and Java code
Implement error handling and compensation within a business process
Demonstrate an understanding of working with Human tasks
Create new versions for the BPEL process

Mediation Development 15%
Describe the Service Message Object (SMO)
Implement fault handling in mediation modules
Develop mediation flows
Use mediation primitives and subflows in mediation flows
Transform data using maps (XSLT and Business Object)
Use dynamic service routing through a Dynamic Endpoint Selection
Design a parallel flow (fan in/fan out)

Workflow Center Repository 11%
Working with the Workflow Center Perspective
Import Process Application and Toolkits
Manage artifacts in the repository (associating, disassociating and merging)
Implement advanced integration service (emulating)
Understand design considerations when working with Workflow Center Repository integration modules

Connectivity and Integration 13%
Use and configure technology adapters, including the Java Database Connectivity (JDBC), FTP, email, Enterprise Content Management (ECM) and flat file adapters
Configure import and export bindings (for example, JMS, MQ, Web Services, https:, and SCA)
Demonstrate an understanding of different SCA invocation styles between synchronous, asynchronous using one-way operations, asynchronous with callback, and asynchronous with deferred response

Packaging and Deployment 9%
Generate unmanaged integration module deployment packages
Apply security to SCA application
Understand the use of shared library
Use Software Configuration Management (SCM) system with Integration Designer

Testing and Troubleshooting 11%
Test business integration solutions using component tests
Configure and use the integration test client tool to test components
Use Business Process Choreographer (BPC) Explorer for testing and troubleshooting long-running processes tasks
Use appropriate server logs and cross component trace (XCT) for problem determination
Use the integration debugger to debug business integration components
Demonstrate an understanding of Failed Event Manager (FEM) and recovering of events

Actualkey IBM C1000-080 exam pdf, Certkingdom IBM C1000-080 PDF

MCTS Training, MCITP Trainnig

Best IBM C1000-080 Certification, IBM C1000-080 Training at certkingdom.com

C1000-078 IBM Db2 12 for z/OS Administrator Exam

Number of questions: 60
Number of questions to pass: 42
Time allowed: 90 mins
Status: Live

An IBM Certified Administrator on IBM Db2 12 for z/OS is the lead database administrator for the Db2 product on the z/OS operating system. This individual has significant experience as a DBA and extensive knowledge of Db2, up to and including Db2 12 for z/OS Function Level 506. This individual is capable of performing intermediate to advanced tasks related to database design and implementation, operation and recovery, security and auditing, distributed connectivity, performance, installation and migration/upgrades specific to the z/OS operating system.

This exam consists of 7 sections described below. For more detail, please see the study guide on the Exam Preparation tab.

Section 1: Database Design and Implementation 22%
Design tables and views
Explain the different performance implications of identity column, ROWID, and sequence column definitions
Design indexes
Design universal table spaces
Perform partitioning
Normalize data (E-R model, process model) and translate data model into physical model
Understand and describe Db2 database enforced integrity rules
Use the appropriate method to alter Db2 objects
Explain the use and impact of different encoding schemes

Section 2: Operation and Recovery 20%
Explain and execute commands and subcommands for normal operational conditions
Explain and execute commands and utility control statements for use in abnormal conditions
Load and unload data into and from Db2 tables
Reorganize objects when necessary
Monitor objects by collecting statistics
Monitor and manage threads and utilities
Identify and respond to advisory/restrictive statuses on Db2 objects
Identify and perform problem determination
Perform object and catalog/directory health checks
Identify and perform actions needed to protect databases from planned and unplanned outages
Identify and perform actions needed to recover data to a consistent point in time

Section 3: Security and Auditing 10%
Explain privileges and authorities
Protect access to Db2 and its objects
Audit Db2 activity and resources and identify primary audit techniques
Identify and respond appropriately to symptoms from trace output or error messages that signify security problems
Explain and use roles, trusted context, data masking and encryption

Section 4: Performance 21%
Plan for performance monitoring by setting up and running monitoring procedures
Analyze performance (manage and tune CPU requirements, memory, I/O, locks, response time, index and table compression)
Analyze and respond to RUNSTATS statistics analysis
Determine when and how to perform REBIND
Describe Db2 interaction with Workload Manager (WLM)
Review and tune SQL
Monitor dynamic SQL performance
Design features for performance
Explain how to control and influence access paths

Section 5: Installation and Migration 9%
Recommend settings for critical Db2 system parameters
Identify and explain Db2 data sharing components and commands
Describe use of premigration checklists
Describe the function of the catalog and directory
Demonstrate understanding of the Db2 12 continuous delivery process
Explain the migration process and activation of new function levels

Section 6: Additional Database Functionality 9%
Explain and use SQL constructs
Explain the use of stored procedures
Explain the use of SQL/XML and XQuery
Explain the use of user-defined functions
Explain and use global variables
Describe the use of triggers, merge statement, pagination options and JSON support

Section 7: Distributed Access 9%
Demonstrate understanding of distributed data access and the role of the communications database
Demonstrate understanding of Distributed Data Facility (DDF) implementation options
Recommend values for critical DDF configuration settings
Understanding and implementing distributed data access
Describe Db2 support for Native REST services and differentiate from RESTful API

Actualkey IBM C1000-078 exam pdf, Certkingdom IBM C1000-078 PDF

MCTS Training, MCITP Trainnig

Best IBM C1000-078 Certification, IBM C1000-078 Training at certkingdom.com

DES-5221 Specialist – Implementation Engineer, Data Center Networking Version 1.0 Exam

Certification Requirements
To complete the requirements for this certification you must:

1. Achieve one of the following credentials
• Associate – Networking Version 1.0
• Dell Certified Associate – Networking (Valid if already earned, but not achievable anymore)
• Dell Certified Professional – Networking (Valid if already earned, but not achievable anymore)

2. Pass the following Implementation Exam
• DES-5221 Specialist – Implementation Engineer, Data Center Networking Exam

Note: These details reflect certification requirements as of November 15, 2019.
Other Certification Recommendations

Once you have achieved this Certification you may be interested in:
• Specialist – Implementation Engineer, Campus Networking
The Proven Professional Program periodically updates certification requirements. *Please check the Proven Professional CertTracker website regularly for the latest information and for other options to meet the Associate level requirement.

Overview
This exam is a qualifying exam for the Specialist – Implementation Engineer, Data Center Networking track.
This exam focuses on concepts related to the Data Center environment and Dell EMC Networking’s S-Series and Z-Series products. Focus is on Dell EMC Networking SmartFabric OS10-based protocols and features.
Dell Technologies provides free practice tests to assess your knowledge in preparation for the exam. Practice tests allow you to become familiar with the topics and question types you will find on the proctored exam. Your results on a practice test offer one indication of how prepared you are for the proctored exam and can highlight topics on which you need to study and train further. A passing score on the practice test does not guarantee a passing score on the certification exam.

Products
Products likely to be referred to on this exam include but are not limited to:
• Dell EMC Networking S-Series Switches
• Dell EMC Networking Z-Series Switches

Exam Topics
Topics likely to be covered on this exam include:

Networks – The Basics (19.6%)
• Identify common data center topologies, protocols, and topologies; describe the Dell EMC data center switch portfolio
• Basic switch configuration: Identify the normal boot process of a S and Z-Series switch running OS 10. List the first-time switch setup requirements. Perform the steps for upgrading switch firmware in OS 10.
• Access Control Lists: Explain the purpose of access control; apply appropriate commands to deny or permit IP connectivity; complete the required configuration to permit host access control; determine why particular computers are being blocked from accessing a server
• AAA Security: Explain the purpose of AAA security; describe AAA process, core components and their function; configure local and RADIUS authentication
• Dynamic Host Configuration Protocol: DHCP’s basic operation; Explain the role of the DHCP Relay; configure DHCP in OS10; identify the options to secure DHCP from attacks

Layer-2 Technologies and Protocols (20.1%)
• Virtual Lans – Identify the characteristics of a VLAN; explain the differences between tagged and untagged frames; configure VLAN trunking; configure VLAN Port membership; verify trunking and Port Membership; troubleshoot VLANs
• Spanning-tree Protocol – Identify the operations and use cases for STP; Configure and validate RSTP/MSTP/RSTP-PV; Manipulate spanning tree root bridge and port cost configurations
• Link Aggregation Groups – Identify the operations and use cases for LAGs; configure, verify, and trouble shoot static LAGs; configure, verify, and troubleshoot dynamic LAGs
• Discovery Protocols – Describe the characteristics of discovery protocols; describe uses cases for using discovery protocols; explain how to configure and validate. Configure discovery protocols; interpret LLDP outputs

Discovery Protocols – Describe the characteristics of discovery protocols; describe uses cases for using discovery protocols; explain how to configure and validate. Configure discovery protocols; interpret LLDP outputs (30.7%)
• Basic Routing – Configure IPv4 on an interface; identify when to utilize a gateway as a last resort; configure and modify static routes; test inter-VLAN routing
• Open Shortest Path First – describe OSPF operation, and core components; configure and validate OSPF using; interpret OSPF show commands; describe the operations and use cases for ECMP; test inter-VLAN routing
• Border Gateway Protocol – Explain operations of BGP;
• identify design best practices when configuring BGP in a leaf/spine environment; configure and validate BGP; Describe the operations and use cases for ECMP; configure and validate ECMP
• Policy-Based Routing – Describe the basic operation of PBR; identify PBR use cases; configure and validate PBR

Data Center Technologies and Protocols (29.6%)
• Virtual Link Trunking – Describe the components that makeup a VLT configuration; Configure and validate VLTs; troubleshoot basic VLT configuration issues
• Virtual Router Redundancy Protocol – describe the basic operation of VRRP; identify the components of VRRP; describe VRRP Priorities; compare Pre-empt and no Pre-empt; configure VRRP on switches configured for VLT
• Uplink Failure Detection – describe the components and operation of UFD; identify the differences between Active/Active and Active/Standby; configure and verify UFD
• Virtual Routing and Forwarding – describe the operations and use cases for (VRF); configure and validate VRF
• Quality of Service – Describe the basic operation of QoS; Describe how QoS identifies and marks traffic; identify the characteristics of QoS; identify QoS protocols and their uses; configure QoS
• Multicast – Explain in depth the concepts relating to IP Multicast technology; compare IGMP and PIM use cases; identify the steps required to configure multicasting into an existing multicast environment

The percentages after each topic above reflects the approximate distribution of the total question set across the exam.

QUESTION 1
Which type of protocol is OSPF and what metric does it use to determine best path?

A. Link-state protocol that uses a concept of cost as metric
B. Hybrid protocol that uses hop count as a metric
C. Path vector protocol that uses the Dijkstra algorithm as a metric
D. Distance Vector protocol that uses bandwidth and delay as metric

Correct Answer: A

QUESTION 2
What is the function of the authentication service?

A. Validates the user identity
B. Determines switch management commands
C. Validates switch order
D. Determines which services the user is enabled to access

Correct Answer: A

QUESTION 3
A customer reports they can no longer access their services and a network administrator has been assigned to investigate. A UFD disabled error status appears on all ports. What caused the issue?

A. Spanning tree Loop-guard was implemented on the uplink-state group.
B. One of the upstream interfaces is an uplink-state group went down.
C. There was no issue; this is normal behavior.
D. Both a port channel and its members were assigned to an uplink-state group.

Correct Answer: A

Actualkey Dell EMC DCS-IE DES-5221 exam pdf, Certkingdom Dell EMC DCS-IE DES-5221 PDF

MCTS Training, MCITP Trainnig

Best Dell EMC DCS-IE ES-5221 Certification, Dell EMC DCS-IE DES-5221 Training at certkingdom.com

Amazon AWS Certified Developer Associate DVA-C01 Exam

The AWS Certified Developer – Associate examination is intended for individuals who perform a development role and have one or more years of hands-on experience developing and maintaining an AWS-based application.
Abilities Validated by the Certification

Demonstrate an understanding of core AWS services, uses, and basic AWS architecture best practices
Demonstrate proficiency in developing, deploying, and debugging cloud-based applications using AWS

Recommended Knowledge and Experience
In-depth knowledge of at least one high-level programming language
Understanding of core AWS services, uses, and basic AWS architecture best practices
Proficiency in developing, deploying, and debugging cloud-based applications using AWS
Ability to use the AWS service APIs, AWS CLI, and SDKs to write applications
Ability to identify key features of AWS services
Understanding of the AWS shared responsibility model
Understanding of application lifecycle management
Ability to use a CI/CD pipeline to deploy applications on AWS
Ability to use or interact with AWS services
Ability to apply a basic understanding of cloud-native applications to write code
Ability to write code using AWS security best practices (e.g., not using secret and access keys in the code, instead using IAM roles)
Ability to author, maintain, and debug code modules on AWS
Proficiency writing code for serverless applications
Understanding of the use of containers in the development process

Prepare for Your Exam
There is no better preparation than hands-on experience. There are many relevant AWS Training courses and other resources to assist you with acquiring additional knowledge and skills to prepare for certification. Please review the exam guide for information about the competencies assessed on the certification exam.

Exam Content
Response Types
There are two types of questions on the examination:
 Multiple choice: Has one correct response and three incorrect responses (distractors).
 Multiple response: Has two or more correct responses out of five or more options.
Select one or more responses that best complete the statement or answer the question. Distractors, or incorrect answers, are response options that an examinee with incomplete knowledge or skill would likely choose. However, they are generally plausible responses that fit in the content area defined by the test objective.

Unanswered questions are scored as incorrect; there is no penalty for guessing.

Unscored Content
Your examination may include non-scored questions that are placed on the test to gather statistical information. These questions are not identified on the form, and do not affect your score.

Exam Results
The AWS Certified Developer – Associate (DVA-C01) examination is a pass or fail exam. The examination is scored against a minimum standard established by AWS professionals guided by certification industry best practices and guidelines.
Your results for the examination are reported as a score from 100–1,000, with a minimum passing score of 720. Your score shows how you performed on the examination as a whole and whether or not you passed. Scaled scoring models are used to equate scores across multiple exam forms that may have slightly different difficulty levels.
Your score report contains a table of classifications of your performance at each section level. This information is designed to provide general feedback concerning your examination performance. The examination uses a compensatory scoring model, which means that you do not need to “pass” the individual sections, only the overall examination. Each section of the examination has a specific weighting, so some sections have more questions than others. The table contains general information, highlighting your strengths and weaknesses. Exercise caution when interpreting section-level feedback.

Content Outline
This exam guide includes weightings, test domains, and objectives only. It is not a comprehensive listing of the content on this examination. The table below lists the main content domains and their weightings.

Domain % of Examination

Domain 1: Deployment 22%
Domain 2: Security 26%
Domain 3: Development with AWS Services 30%
Domain 4: Refactoring 10%
Domain 5: Monitoring and Troubleshooting 12%
TOTAL 100%

Domain 1: Deployment
1.1 Deploy written code in AWS using existing CI/CD pipelines, processes, and patterns
1.2 Deploy applications using Elastic Beanstalk
1.3 Prepare the application deployment package to be deployed to AWS
1.4 Deploy serverless applications

Domain 2: Security

2.1 Make authenticated calls to AWS services
2.2 Implement encryption using AWS services
2.3 Implement application authentication, and authorization

Domain 3: Development with AWS Services
3.1 Write code for serverless applications
3.2 Translate functional requirements into application design
3.3 Implement application design into application code
3.4 Write code that interacts with AWS services by using APIs, SDKs, and AWS CLI

Domain 4: Refactoring
4.1 Optimize application to best use AWS services and features
4.2 Migrate existing application code to run on AWS

Domain 5: Monitoring and Troubleshooting
5.1 Write code that can be monitored
5.2 Perform root cause analysis on faults found in testing or production

QUESTION 1
A Developer created a dashboard for an application using Amazon API Gateway, Amazon S3, AWS Lambda,
and Amazon RDS. The Developer needs an authentication mechanism allowing a user to sign in and view the
dashboard. It must be accessible from mobile applications, desktops, and tablets, and must remember user preferences across platforms.
Which AWS service should the Developer use to support this authentication scenario?

A. AWS KMS
B. Amazon Cognito
C. AWS Directory Service
D. Amazon IAM

Correct Answer: B

QUESTION 2
A Developer has created an S3 bucket s3://mycoolapp and has enabled server across logging that points
to the folder s3://mycoolapp/logs. The Developer moved 100 KB of Cascading Style Sheets (CSS)
documents to the folder s3://mycoolapp/css, and then stopped work. When the developer came back a
few days later, the bucket was 50 GB.
What is the MOST likely cause of this situation?

A. The CSS files were not compressed and S3 versioning was enabled.
B. S3 replication was enabled on the bucket.
C. Logging into the same bucket caused exponential log growth.
D. An S3 lifecycle policy has moved the entire CSS file to S3 Infrequent Access.

Correct Answer: B

QUESTION 3
A Developer is creating an Auto Scaling group whose instances need to publish a custom metric to Amazon CloudWatch.
Which method would be the MOST secure way to authenticate a CloudWatch PUT request?

A. Create an IAM user with PutMetricData permission and put the user credentials in a private repository; have applications pull the credentials as needed.
B. Create an IAM user with PutMetricData permission, and modify the Auto Scaling launch configuration to inject the user credentials into the instance user data.
C. Modify the CloudWatch metric policies to allow the PutMetricData permission to instances from the Auto Scaling group.
D. Create an IAM role with PutMetricData permission and modify the Auto Scaling launching configuration to launch instances using that role.

Correct Answer: D

QUESTION 4
A Developer has written a serverless application using multiple AWS services. The business logic is written as
a Lambda function which has dependencies on third-party libraries. The Lambda function endpoints will be
exposed using Amazon API Gateway. The Lambda function will write the information to Amazon DynamoDB.
The Developer is ready to deploy the application but must have the ability to rollback. How can this
deployment be automated, based on these requirements?

A. Deploy using Amazon Lambda API operations to create the Lambda function by providing a deployment package.
B. Use an AWS CloudFormation template and use CloudFormation syntax to define the Lambda function resource in the template.
C. Use syntax conforming to the Serverless Application Model in the AWS CloudFormation template to define the Lambda function resource.
D. Create a bash script which uses AWS CLI to package and deploy the application.
|
Correct Answer: A

QUESTION 5
What are the steps to using the AWS CLI to launch a templatized serverless application?

A. Use AWS CloudFormation get-template then CloudFormation execute-change-set.
B. Use AWS CloudFormation validate-template then CloudFormation create-change-set.
C. Use AWS CloudFormation package then CloudFormation deploy.
D. Use AWS CloudFormation create-stack then CloudFormation update-stack.

Correct Answer: C

Actualkey Amazon AWS Certified Developer Associate DVA-C01 exam pdf, Certkingdom Amazon AWS Certified Developer Associate DVA-C01 PDF

MCTS Training, MCITP Trainnig

Best Amazon AWS Certified Developer Associate DVA-C01 Certification, Amazon AWS Certified Developer Associate DVA-C01 Training at certkingdom.com

DP-300 Administering Relational Databases on Microsoft Azure (beta) Exam


Candidates for this exam are database administrators and data management specialists that manage on-premises and cloud relational databases built on top of Microsoft SQL Server and Microsoft Azure data services.

The Azure Database Administrator implements and manages the operational aspects of cloud-native and hybrid data platform solutions built on Microsoft Azure data services and Microsoft SQL Server. The Azure Database Administrator uses a variety of methods and tools to perform day-to-day operations, including applying knowledge of using T-SQL for administrative management purposes.

This role is responsible for management, availability, security, and performance monitoring and optimization of modern relational database solutions. This role works with the Azure Data Engineer role to manage operational aspects of data platform solutions.

Beta exams are not scored immediately because we are gathering data on the quality of the questions and the exam. Learn more about the value and importance of beta exams.

Part of the requirements for: Microsoft Certified: Azure Database Administrator Associate

Skills measured
Plan and implement data platform resources (15-20%)
Implement a secure environment (15-20%)
Monitor and optimize operational resources (15-20%)
Optimize query performance (5-10%)
Perform automation of tasks (10-15%)
Plan and implement a High Availability and Disaster Recovery (HADR) environment (15-20%)
Perform administration by using T-SQL (10-15%)

Audience Profile
Candidates for this exam are database administrators and data management specialists that  manage on-premises and cloud relational databases built on top of SQL Server and Azure Data  Services.

The Azure Database Administrator implements and manages the operational aspects of cloud-native and hybrid data platform solutions built on Azure Data Services and SQL Server. The Azure Database Administrator uses a variety of methods and tools to perform day-to-day operations, including applying knowledge of using T-SQL for administrative management purposes.

This role is responsible for management, availability, security and performance monitoring and optimization of modern relational database solutions. This role works with the Azure Data Engineer role to manage operational aspects of data platform solutions.

Skills Measured
NOTE: The bullets that appear below each of the skills measured are intended to illustrate how  we are assessing that skill. This list is not definitive or exhaustive.

NOTE: In most cases, exams do NOT cover preview features, and some features will only be added to an exam when they are GA (General Availability).

Plan and Implement Data Platform Resources (15-20%)
Deploy resources by using manual methods
• deploy database offerings on selected platforms
• configure customized deployment templates
• apply patches and updates for hybrid and IaaS deployment


Recommend an appropriate database offering based on specific requirements
• evaluate requirements for the deployment
• evaluate the functional benefits/impact of possible database offerings
• evaluate the scalability of the possible database offering
• evaluate the HA/DR of the possible database offering
• evaluate the security aspects of the possible database offering

Configure resources for scale and performance
• configure Azure SQL database/elastic pools for scale and performance
• configure Azure SQL managed instances for scale and performance
• configure SQL Server in Azure VMs for scale and performance
• calculate resource requirements
• evaluate database partitioning techniques, such as database sharding

Evaluate a strategy for moving to Azure
• evaluate requirements for the migration
• evaluate offline or online migration strategies
• evaluate requirements for the upgrade
• evaluate offline or online upgrade strategies

Implement a migration or upgrade strategy for moving to Azure
• implement an online migration strategy
• implement an offline migration strategy
• implement an online upgrade strategy
• implement an offline upgrade strategy

Implement a Secure Environment (15-20%)

Configure database authentication by using platform and database tools
• configure Azure AD authentication
• create users from Azure AD identities
• configure security principals

Configure database authorization by using platform and database tools
• configure database and object-level permissions using graphical tools
• apply principle of least privilege for all securables

Implement security for data at rest
• implement Transparent Data Encryption (TDE)
• implement object-level encryption
• implement Dynamic Data Masking
• implement Azure Key Vault and disk encryption for Azure VMs

Implement security for data in transit
• configure SQL DB and database-level firewall rules
• implement Always Encrypted
• configure Azure Data Gateway

Implement compliance controls for sensitive data
• apply a data classification strategy
• configure server and database audits
• implement data change tracking
• perform vulnerability assessment

Monitor and Optimize Operational Resources (15-20%)

Monitor activity and performance
• prepare an operational performance baseline
• determine sources for performance metrics
• interpret performance metrics
• assess database performance by using Azure SQL Database Intelligent Performance
• configure and monitor activity and performance at the infrastructure, server, service, and
database levels

Implement performance-related maintenance tasks
• implement index maintenance tasks
• implement statistics maintenance tasks
• configure database auto-tuning
• automate database maintenance tasks
o Azure SQL agent jobs, Azure automation, SQL server agent jobs

• manage storage capacity

Identify performance-related issues
• configure Query Store to collect performance data
• identify sessions that cause blocking
• assess growth/fragmentation of databases and logs
• assess performance-related database configuration parameters
o including AutoClose, AutoShrink, AutoGrowth

Configure resources for optimal performance
• configure storage and infrastructure resources
o optimize IOPS, throughput, and latency
o optimize tempdb performance
o optimize data and log files for performance

• configure server and service account settings for performance
• configure Resource Governor for performance

Configure a user database for optimal performance
• implement database-scoped configuration
• configure compute resources for scaling
• configure Intelligent Query Processing (IQP)


Optimize Query Performance (5-10%)

Review query plans

• determine the appropriate type of execution plan
o live Query Statistics, Actual Execution Plan, Estimated Execution Plan, Showplan



• identify problem areas in execution plans
• extract query plans from the Query Store


Evaluate performance improvements

• determine the appropriate Dynamic Management Views (DMVs) to gather query
performance information
• identify performance issues using DMVs
• identify and implement index changes for queries
• recommend query construct modifications based on resource usage
• assess the use of hints for query performance


Review database table and index design

• identify data quality issues with duplication of data
• identify normal form of database
• assess index design for performance
• validate data types defined for columns
• recommend table and index storage including filegroups
• evaluate table partitioning strategy
• evaluate the use of compression for tables and indexes


Perform Automation of Tasks (10-15%)

Create scheduled tasks

• manage schedules for regular maintenance jobs
• configure multi-server automation



• configure notifications for task success/failure/non-completion


Evaluate and implement an alert and notification strategy

• create event notifications based on metrics
• create event notifications for Azure resources
• create alerts for server configuration changes
• create tasks that respond to event notifications


Manage and automate tasks in Azure

• perform automated deployment methods for resources
• automate Backups
• automate performance tuning and patching
• implement policies by using automated evaluation modes


Plan and Implement a High Availability and Disaster Recovery (HADR)
Environment (15-20%)

Recommend an HADR strategy for a data platform solution

• recommend HADR strategy based on RPO/RTO requirements
• evaluate HADR for hybrid deployments
• evaluate Azure-specific HADR solutions
• identify resources for HADR solutions


Test an HADR strategy by using platform, OS and database tools

• test HA by using failover
• test DR by using failover or restore


Perform backup and restore a database by using database tools

• perform a database backup with options
• perform a database restore with options
• perform a database restore to a point in time
• configure long-term backup retention


Configure DR by using platform and database tools

• configure replication
• configure Azure Site Recovery for a database offering


Configure HA using platform, OS and database tools


• create an Availability Group
• integrate a database into an Availability Group
• configure quorum options for a Windows Server Failover Cluster
• configure an Availability Group listener


Perform Administration by Using T-SQL (10-15%)

Examine system health

• evaluate database health using DMVs
• evaluate server health using DMVs
• perform database consistency checks by using DBCC


Monitor database configuration by using T-SQL

• assess proper database autogrowth configuration
• report on database free space
• review database configuration options


Perform backup and restore a database by using T-SQL

• prepare databases for AlwaysOn Availability Groups
• perform transaction log backup
• perform restore of user databases
• perform database backups with options


Manage authentication by using T-SQL

• manage certificates
• manage security principals


Manage authorization by using T-SQL

• configure permissions for users to access database objects
• configure permissions by using custom roles


QUESTION 1
You have a Microsoft SQL Server 2019 instance in an on-premises datacenter. The instance contains a 4-TB database named DB1.
You plan to migrate DB1 to an Azure SQL Database managed instance.
What should you use to minimize downtime and data loss during the migration?

A. distributed availability groups
B. database mirroring
C. log shipping
D. Database Migration Assistant

Correct Answer: A

QUESTION 2
You have 20 Azure SQL databases provisioned by using the vCore purchasing model.
You plan to create an Azure SQL Database elastic pool and add the 20 databases.
Which three metrics should you use to size the elastic pool to meet the demands of your workload? Each
correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. total size of all the databases
B. geo-replication support
C. number of concurrently peaking databases * peak CPU utilization per database
D. maximum number of concurrent sessions for all the databases
E. total number of databases * average CPU utilization per database

Correct Answer: A,C,E

QUESTION 3
You have a new Azure SQL database. The database contains a column that stores confidential information.
You need to track each time values from the column are returned in a query. The tracking information must be
stored for 365 days from the date the query was executed.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Turn on auditing and write audit logs to an Azure Storage account.
B. Add extended properties to the column.
C. Turn on Advanced Data Security for the Azure SQL server.
D. Apply sensitivity labels named Highly Confidential to the column.
E. Turn on Azure Advanced Threat Protection (ATP).

Correct Answer: A,C,D

 

Actualkey Microsoft Azure  DP-300 exam pdf, Certkingdom Microsoft Azure DP-300 PDF

MCTS Training, MCITP Trainnig

Best Microsoft Azure DP-300 Certification, Microsoft Azure DP-300 Training at certkingdom.com

CBAP Certified Business Analysis Professional (CBAP)

HTML clipboard

CBAP Eligibility
To earn the CBAP designation, candidates must:
Complete a minimum of 7,500 hours of Business Analysis Work experience in the last 10 years.
Within this experience, a minimum of 900 hours completed in 4 of the 6 BABOK® Guide Knowledge Areas, for a total of at least 3,600 of the required 7,500 total.
Complete a minimum of 35 hours of Professional Development in the last 4 years.
Provide two references.
Agree to Code of Conduct.
Agree to Terms and Conditions.
Pass the exam.

CBAP Competencies
Is CBAP right for you? The CBAP certification is for:

Individuals with significant experience in business analysis
Individuals with a CCBA™ designation
Product Managers
Non-BA consultants
Trainers
Hybrid Business Analysis professionals, including: Project Manager, Testers, Quality Assurance (QA) professionals, Change/Transformation Managers, and Designers

Highlight Your Expertise
The Certified Business Analysis Professional™ (CBAP®) offers members of the BA community a variety of benefits, including:

Demonstrated senior knowledge and professional competence
Marketability, employability and earning potential
Success and path to leadership

CBAP recognizes your expertise in multiple business domains and your ability to tackle more complex projects, work with stakeholders to define and manage their business requirements, drive business processes, lead the BA effort, and identify opportunities to achieve better business results.

The IIBA® Annual Business Analysis Salary Survey reports that the average salary of respondents with CBAP® certification holders is 13% higher on average in earnings in comparison to non-certification holders.


QUESTION 1
What is the term used to describe the cost of the solution after the solution has been implemented in production by a vendor?

A. Total ownership costing
B. Lifecycle maintenance fees
C. Sustainability fees
D. Total cost of ownership

Correct Answer: D

QUESTION 2
Enterprise analysis creates just five outputs.
Which one of the following is an output of the enterprise analysis tasks?

A. Assumptions and constraints
B. Stakeholder concerns
C. Solution performance assessment
D. Solution approach

Correct Answer: D

QUESTION 3
All of the following stakeholders participate in the prioritization of requirements except for which one?

A. Implementation subject matter expert
B. Project team
C. Domain subject matter expert
D. Project manager

Correct Answer: B

QUESTION 4
You are the business analyst for your organization. Management has asked that you create a model of the
requirements so the stakeholders can better understand the requirements and the project as a whole.

Which of the following statements best describes a model?
A. Models are slices of the project solution.
B. Models simplify the requirements for common stakeholders.
C. Models are statistics for the return on investment, time saved, and other mathematics.
D. Models abstract and simplify reality.

Correct Answer: D

QUESTION 5
What plan will describe the stakeholder groups, communication needs, and the level of formality that is appropriate for the requirements?

A. Requirements management plan
B. Project management plan
C. Scope management plan
D. Business analysis communication plan

Correct Answer: D

QUESTION 6
You are the business analyst for a smaller project where there are few requirements. Management would still like you to create a method to trace the few requirements for this project.
What type of matrix would be best in this instance?

A. Roles and responsibility matrix
B. RACI matrix
C. Coverage matrix
D. Requirements trace matrix

Correct Answer: C

QUESTION 7
You are the business analyst for your organization and have many solutions available to an identified problem.
You would like a way to quickly and fairly determine which solution is the best choice for your organization.
Which of the following approaches would allow you to determine the top-rated solutions for your organization?

A. Scoring system
B. Acceptance and evaluation criteria
C. Vendor assessment
D. Voting system

Correct Answer: A

QUESTION 8
When an organization is using a change-driven approach to business analysis, how are communications managed?

A. Communications in a change-driven approach to business analysis focus more on the frequency of communication.
B. Communications in a change-driven approach typically use face-to-face channels.
C. Communications in a change-driven approach focus more on formal communications.
D. Communications in a change-driven approach are all ad hoc.

Correct Answer: A
 

Actualkey IIBA CBAP exam pdf, Certkingdom IIBA CBAP PDF

MCTS Training, MCITP Trainnig

Best IIBA CBAP Certification, IIBA CBAP Training at certkingdom.com

Magento Certified Professional Cloud Developer Exam

MAGENTO CERTIFIED PROFESSIONAL CLOUD DEVELOPER OVERVIEW
This exam is for a Magento 2 developer/architect with 6 to 12 months of experience developing for Magento Commerce Cloud. Ideally the person taking this exam will have worked on at least two Magento Commerce Cloud implementations.

This exam will validate the skills and knowledge needed required to deploy, test, troubleshoot, and operate in the Magento Cloud environment, including how to leverage Cloud platform features to enhance your project operations and performance. The exam will also validate the skills on troubleshooting and integrations.

By passing this exam, the test taker will receive the Magento Certified Professional Cloud Developer certification.

ABOUT THE EXAM
60 multiple choice questions
90 minutes to complete the exam
62% or higher needed to pass

PREREQUISITES AND RESOURCES
No prerequisites
We recommend taking the Magento Commerce Cloud for Developers course as a first step in preparing for this exam
Hands-on experience with customization and implementation of Magento Commerce Cloud
No hard-copy or online materials may be referenced during the exam
Free (English) Study Guide available HERE

Target Audience
Magento 2 developers working on Magento Commerce (Cloud)
Technical staff responsible for deploying and testing Magento projects on Magento Commerce (Cloud)

Prerequisites
Completion of “Free Intro to Magento Commerce (Cloud)” course
Knowledge of Git and Git repositories
Knowledge of Composer
Recommended: Magento 2 Certified Solution Specialist and Magento 2 Certified Associate Developer certification credential or equal experience
Recommended: Attend Magento 2 Development Essentials course or have equivalent experience

Course Overview
The main goal of this course is to prepare you for developing with or for supporting your developer team working with the Magento 2 Cloud offering. Magento Commerce (Cloud) development best practices are introduced and examined, with specific focus on troubleshooting and integrations. You will gain the practical knowledge and skills required to deploy, test, troubleshoot, and operate in the Magento 2 Cloud environment, including how to leverage Cloud platform features to enhance your project operations and performance.

This course is based on Magento Commerce 2.2.

Learning Objectives

After this course, the student will be able to:
Install all required and recommended tools and services for working with Magento Commerce (Cloud)
Deploy Magento Commerce (Cloud) and go live
Troubleshoot issues on the Cloud environment
Debug and profile on Cloud

Course Outline

1. Introduction
1.1 Cloud overview
1.2 Cloud Admin UI overview
1.3 Installing a blank site from a template
1.4 User management
1.5 Onboarding UI

2. Plans and Environments
2.1 Magento Commerce (Cloud) plans
2.2 Environment types

3. Local Environment
3.1 Setting up local development
3.2 Working with Composer
3.3 Working with Git
3.4 Magento-cloud CLI tool
3.5 Connecting Github / Bitbucket

4. Cloud Project
4.1 Project structure
4.2 Overview of .magento/routes.yaml
4.3 Overview of .magento/services.yaml
4.4 Overview of .magento.app.yaml
4.5 Overview of .magento.env.yaml

5. Service Configuration
5.1 Service Configurations
5.2 Slave Connections

6. Deployment Process
6.1 Understanding all processes during deployment
6.2 Magento Cloud scripts run on every deployment phase
6.3 Magento Cloud scripts configurations

7. Static Content Deployment
7.1 Move SCD to build phase
7.2 Avoid SCD on both phases
7.3 Generate static content on demand

8. Development
8.1 Introduction to Magento deployment features (shared file)
8.2 Changing Configurations
8.3 Changing a locale
8.4 Adding extensions (limitations, read-only FS, etc.)
8.5 Enabling/disabling a module
8.6 Multisite
8.7 Understanding the deployment process (development > staging > production)

9. Integrations
9.1 Fastly
9.2 New Relic
9.3 Blackfire
9.4 Sendgrid

10. Troubleshooting
10.1 Troubleshooting overview
10.2 Snapshots and backups
10.3 Debugging (xdebug)
10.4 Fixes in patches
10.5 Branch synchronization
10.6 SSH tunnels
10.7 Support portal

11. Migration to Cloud
11.1 Magento On-Premises installation migration
11.2 Magento 1 Migration

12. Go Live
12.1 DNS
12.2 TLS Certificates
12.3 Fastly

13. Maintaining a Magento Cloud project
13.1 Upgrading to a new version
13.2 Upsize

QUESTION 1
 
You are working with a new developer who needs to be able to deploy code and view logs on MagentoCommerce Cloud.
What must you do to give them access?

A. In the .magento.app.yaml file, add their email under Users. They need to enter their SSH public key.
B. Add their SSH public key to a file named .ssh/authorized_keys and deploy the change.
C. In the Cloud Project Web UI, click Add User to add their email. They need to enter their SSH public key.
D. Add a Magento admin user for them and paste the SSH public key into their user’s SSH Key field, which is available only on Magento Commerce Cloud.

Correct Answer: B

QUESTION 2
You have a Starter project. Your code is ready for testing in the Staging environment, but you need the latest data from Production.
What do you do to update the Staging environment?

A. Log in to the Project Web UI, choose the Staging environment, and click Sync
B. Log in to the Project Web UI, choose the Staging environment, and click Merge
C. Checkout the Staging branch and use the git push origin -f command
D. Checkout the Production environment and use the magento-cloud sync CLI command

Correct Answer: B

QUESTION 3
You need to specify the admin password using an environment variable. You have created an environment
variable env:ADMIN_PASSWORD with a valid password. When attempting to log in to the Magento Admin it is not accepting the new password.
How do you correct the environment variable?

A. The Sensitive option is checked by default and must be disabled
B. The env:ADMIN_PASSWORD variable can only be used for an initial installation
C. The environment variable should not have the env: prefix
D. The ADMIN_PASSWORD variable should be configured via .magento.env.yaml

Correct Answer: C

Actualkey Magento Certified Professional Cloud Developer exam pdf, Certkingdom Magento Certified Professional Cloud Developer PDF

MCTS Training, MCITP Trainnig

Best Magento Certified Professional Cloud Developer Certification, Magento Certified Professional Cloud Developer Training at certkingdom.com

AZ-104 Microsoft Azure Administrator (beta) Exam

Audience Profile
Candidates for this exam should have subject matter expertise implementing, managing, and monitoring an organization’s Microsoft Azure environment.
Responsibilities for an Azure Administrator include implementing, managing, and monitoring identity, governance, storage, compute, and virtual networks in a cloud environment, plus provision, size, monitor, and adjust resources, when needed.
An Azure Administrator often serves as part of a larger team dedicated to implementing your organization’s cloud infrastructure.

A candidate for this exam should have at least six months of hands-on experience administering Azure, along with a strong understanding of core Azure services, Azure workloads, security, and governance. In addition, this role should have experience using PowerShell, Azure CLI, Azure portal, and Azure Resource Manager templates.

Skills Measured
NOTE: The bullets that appear below each of the skills measured are intended to illustrate how we are assessing that skill. This list is not definitive or exhaustive.
NOTE: In most cases, exams do NOT cover preview features, and some features will only be added to an exam when they are GA (General Availability).

Manage Azure identities and governance (15-20%)
Manage Azure AD objects
. create users and groups
. manage user and group properties
. manage device settings
. perform bulk user updates
. manage guest accounts
. configure Azure AD Join
. configure self-service password reset
. NOT: Azure AD Connect; PIM

Manage role-based access control (RBAC)
. create a custom role
. provide access to Azure resources by assigning roles
o subscriptions
o resource groups
o resources (VM, disk, etc.)
. interpret access assignments
. manage multiple directories

Manage subscriptions and governance
. configure Azure policies
. configure resource locks

. apply tags

. create and manage resource groups

o move resources

o remove RGs


. manage subscriptions

. configure Cost Management

. configure management groups


Implement and manage storage (10-15%)
Manage storage accounts
. configure network access to storage accounts

. create and configure storage accounts

. generate shared access signature

. manage access keys

. implement Azure storage replication

. configure Azure AD Authentication for a storage account


Manage data in Azure Storage
. export from Azure job

. import into Azure job

. install and use Azure Storage Explorer

. copy data by using AZCopy


Configure Azure files and Azure blob storage
. create an Azure file share

. create and configure Azure File Sync service

. configure Azure blob storage


. configure storage tiers for Azure blobs


Deploy and manage Azure compute resources (25-30%)
Configure VMs for high availability and scalability
. configure high availability

. deploy and configure scale sets


Automate deployment and configuration of VMs
. modify Azure Resource Manager (ARM) template

. configure VHD template

. deploy from template

. save a deployment as an ARM template

. automate configuration management by using custom script extensions


Create and configure VMs
. configure Azure Disk Encryption

. move VMs from one resource group to another

. manage VM sizes

. add data discs

. configure networking

. redeploy VMs


Create and configure containers
. create and configure Azure Kubernetes Service (AKS)

. create and configure Azure Container Instances (ACI)

. NOT: selecting an container solution architecture or product; container registry settings


Create and configure Web Apps
. create and configure App Service

. create and configure App Service Plans

. NOT: Azure Functions; Logic Apps; Event Grid


Configure and manage virtual networking (30-35%)
Implement and manage virtual networking
. create and configure VNET peering


. configure private and public IP addresses, network routes, network interface, subnets, and virtual network


Configure name resolution
. configure Azure DNS

. configure custom DNS settings

. configure a private or public DNS zone


Secure access to virtual networks
. create security rules

. associate an NSG to a subnet or network interface

. evaluate effective security rules

. deploy and configure Azure Firewall

. deploy and configure Azure Bastion Service

. NOT: Implement Application Security Groups; DDoS


Configure load balancing
. configure Application Gateway

. configure an internal load balancer

. configure load balancing rules

. configure a public load balancer

. troubleshoot load balancing

. NOT: Traffic Manager and FrontDoor and PrivateLink


Monitor and troubleshoot virtual networking
. monitor on-premises connectivity

. use Network Performance Monitor

. use Network Watcher

. troubleshoot external networking

. troubleshoot virtual network connectivity


Integrate an on-premises network with an Azure virtual network
. create and configure Azure VPN Gateway

. create and configure VPNs

. configure ExpressRoute

. configure Azure Virtual WAN


Monitor and back up Azure resources (10-15%)
Monitor resources by using Azure Monitor
. configure and interpret metrics

o analyze metrics across subscriptions


. configure Log Analytics

o implement a Log Analytics workspace

o configure diagnostic settings


. query and analyze logs

o create a query

o save a query to the dashboard

o interpret graphs


. set up alerts and actions

o create and test alerts

o create action groups

o view alerts in Azure Monitor

o analyze alerts across subscriptions


. configure Application Insights

. NOT: Network monitoring


Implement backup and recovery
. configure and review backup reports

. perform backup and restore operations by using Azure Backup Service

. create a Recovery Services Vault

o use soft delete to recover Azure VMs


. create and configure backup policy

. perform site-to-site recovery by using Azure Site Recovery

. NOT: SQL or HANA

AZ-103/104 Comparison
Microsoft Azure Administrator

Current Skills Measured as of January 15, 2020
Updated Skills Measured List (ignore the numbering below)

Audience Profile
Candidates for this exam are Azure Administrators who manage cloud services that span storage, security, networking, and compute cloud capabilities. Candidates have a deep understanding of each service across the full IT lifecycle, and take requests for infrastructure services, applications, and environments. They make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor, and adjust resources as appropriate.
Candidates for this exam should have proficiency in using PowerShell, the Command Line Interface, Azure Portal, ARM templates, operating systems, virtualization, cloud infrastructure, storage structures, and networking.

Audience Profile
The Azure Administrator implements, manages, and monitors identity, governance, storage, computevirtual machines, and virtual networks in a cloud environment. This role focuses primarily on enabling Infrastructure as a Service (IaaS). The Azure Administrator will provision, size, monitor, and adjust resources as appropriate.
Candidates should have a minimum of six months of hands-on experience administering Azure. Candidates should have a strong understanding of core Azure services, Azure workloads, security, and governance. Candidates for this exam should have experience in using PowerShell, the Command Line Interface, Azure Portal, and ARM templates.


1. Manage Azure subscriptions and resources (15-20%)
1.1 Manage Azure subscriptions
Assign administrator permissions; configure cost center quotas and tagging; configure policies at Azure subscription level
1.2 Analyze resource utilization and consumption
6. Manage Azure Identities and Governance (15-20%)
6.1 Manage Azure AD objects
. create users and groups

. manage user and group properties

. manage device settings

. perform bulk user updates

. manage guest accounts

. configure Azure AD Join

. configure self-service password reset




Configure diagnostic settings on resources; create baseline for resources; create and test alerts; analyze alerts across subscription; analyze metrics across subscription; create action groups and action rules; monitor for unused resources; monitor spend; report on spend; utilize log queries in Azure Monitor; view alerts in Azure Monitor
1.3 Manage resource groups
Use Azure policies for resource groups; configure resource locks; configure resource policies; implement and set tagging on resource groups; move resources across resource groups; remove resource groups
1.4 Managed role based access control (RBAC)
May include but is not limited to: Create a custom role, configure access to Azure resources by assigning roles, configure management access to Azure, troubleshoot RBAC, implement RBAC policies, assign RBAC Roles
. NOT: Azure AD Connect; PIM


6.2 Manage role-based access control (RBAC)
. create a custom role

. provide access to Azure resources by assigning roles

o subscriptions

o resource groups

o resources (VM, disk, etc.)


. interpret access assignments

. manage multiple directories


6.3 Manage subscriptions and governance
. configure Azure policies

. configure resource locks

. apply tags

. create and manage resource groups

o move resources

o remove RGs


. manage subscriptions

. configure Cost Management

. configure management groups



2. Implement and manage storage (15-20%)
2.1 Create and configure storage accounts
Configure network access to the storage account; create and configure storage account; generate shared access signature; install and use Azure Storage Explorer; manage access keys; monitor activity log by using Monitor Logs; implement Azure storage replication; Implement Azure AD Authentication, manage blob storage lifecycle management
7. Implement and Manage Storage (10-15%)
7.1 Manage storage accounts
. configure network access to storage accounts

. create and configure storage accounts

. generate shared access signature

. manage access keys

. implement Azure storage replication

. configure Azure AD Authentication for a storage account


7.2 Manage data in Azure Storage


2.2 Import and export data to Azure
Create export from Azure job; create import into Azure job; configure and use Azure blob storage; configure Azure content delivery network (CDN) endpoints
2.3 Configure Azure files
Create Azure file share; create Azure File Sync service; create Azure sync group; troubleshoot Azure File Sync
2.4 Implement Azure backup
Configure and review backup reports; perform backup operation; create Recovery Services Vault; create and configure backup policy; perform a restore operation
. export from Azure job

. import into Azure job

. install and use Azure Storage Explorer

. copy data by using AZCopy


7.3 Configure Azure files and Azure blob storage
. create an Azure file share

. create and configure Azure File Sync service

. configure Azure blob storage

. configure storage tiers for Azure blobs



3. Deploy and manage virtual machines (VMs) (15-20%)
3.1 Create and configure a VM for Windows and Linux
Configure high availability; configure monitoring, networking, storage, and virtual machine size; deploy and configure scale sets
3.2 Automate deployment of VMs
Modify Azure Resource Manager (ARM) template; configure location of new VMs; configure VHD template; deploy from template; save a deployment as an ARM template; deploy Windows and Linux VMs
3.3 Manage Azure VM
Add data discs; add network interfaces; automate configuration management by using PowerShell Desired State Configuration (DSC) and VM Agent by using custom script extensions; manage
8. Deploy and Manage Azure Compute Resources (25-30%)
8.1 Configure VMs for high availability and scalability
. configure high availability

. deploy and configure scale sets


8.2 Automate deployment and configuration of VMs
. modify Azure Resource Manager (ARM) template

. configure VHD template

. deploy from template

. save a deployment as an ARM template

. automate configuration management by using custom script extensions


8.3 Create and configure VMs
. configure Azure Disk Encryption

. move VMs from one resource group to another




VM sizes; move VMs from one resource group to another; redeploy VMs
3.4 Manage VM backups
Configure VM backup; define backup policies; implement backup policies; perform VM restore; soft delete for Azure VMs; Azure Site Recovery
. manage VM sizes

. add data discs

. configure networking

. redeploy VMs


8.4 Create and configure containers
. create and configure Azure Kubernetes Service (AKS)

. create and configure Azure Container Instances (ACI)

. NOT: selecting an container solution architecture or product; container registry settings


8.5 Create and configure Web Apps
. create and configure App Service

. create and configure App Service Plans

. NOT: Azure Functions; Logic Apps; Event Grid



4. Configure and manage virtual networks (30-35%)
4.1 Create connectivity between virtual networks
Create and configure VNET peering; create and configure VNET to VNET connections; verify virtual network connectivity; create virtual network gateway
4.2 Implement and manage virtual networking
Configure private and public IP addresses, network routes, network interface, subnets, and virtual network
4.3 Configure name resolution
Configure Azure DNS; configure custom DNS settings; configure private and public
9. Configure and Manage Virtual Networking (30-35%)
9.1 Implement and manage virtual networking
. create and configure VNET peering

. configure private and public IP addresses, network routes, network interface, subnets, and virtual network


9.2 Configure name resolution
. configure Azure DNS

. configure custom DNS settings

. configure a private or public DNS zone


9.3 Secure access to virtual networks
. create security rules

. associate an NSG to a subnet or




DNS zones
4.4 Create and configure a Network Security Group (NSG)
Create security rules; associate NSG to a subnet or network interface; identify required ports; evaluate effective security rules
4.5 Implement Azure load balancer
May include but is not limited to: Configure internal load balancer, configure load balancing rules, configure public load balancer, troubleshoot load balancing
4.6 Monitor and troubleshoot virtual networking
May include but is not limited to: Monitor on-premises connectivity, use Network resource monitoring, use Network Watcher, troubleshoot external networking, troubleshoot virtual network connectivity
4.7 Integrate on premises network with Azure virtual network
May include but is not limited to: Create and configure Azure VPN Gateway, create and configure site to site VPN, configure Express Route, verify on premises connectivity, troubleshoot on premises connectivity with Azure
network interface

. evaluate effective security rules

. deploy and configure Azure Firewall

. deploy and configure Azure Bastion Service

. NOT: Implement Application Security Groups; DDoS


9.4 Configure load balancing
. configure Application Gateway

. configure an internal load balancer

. configure load balancing rules

. configure a public load balancer

. troubleshoot load balancing

. NOT: Traffic Manager and FrontDoor and PrivateLink


9.5 Monitor and troubleshoot virtual networking
. monitor on-premises connectivity

. use Network resource monitoring

. use Network Watcher

. troubleshoot external networking

. troubleshoot virtual network connectivity


9.6 Integrate an on-premises network with an Azure virtual network
. create and configure Azure VPN Gateway

. create and configure VPNs

. configure ExpressRoute

. configure Azure Virtual WAN



5. Manage identities (15-20%)
5.1 Manage Azure Active Directory (AD)
Add custom domains; Azure AD Join; configure self-service password reset;


[NO EQUIVALENT — SEE NEW FG 5 BELOW]


manage multiple directories
5.2 Manage Azure AD objects (users, groups, and devices)
Create users and groups; manage user and group properties; manage device settings; perform bulk user updates; manage guest accounts
5.3 Implement and manage hybrid identities
Install Azure AD Connect, including password hash and pass-through synchronization; use Azure AD Connect to configure federation with on-premises Active Directory Domain Services (AD DS); manage Azure AD Connect; manage password sync and password writeback
5.4 Implement multi-factor authentication (MFA)
May include but is not limited to: Configure user accounts for MFA, enable MFA by using bulk update, configure fraud alerts, configure bypass options, configure Trusted IPs, configure verification methods



10. Monitor and back up Azure resources (10-15%)
10.1 Monitor resources by using Azure Monitor
. configure and interpret metrics

o analyze metrics across subscriptions


. configure Log Analytics

o implement a Log Analytics workspace

o configure diagnostic settings


. query and analyze logs

o create a query





o save a query to the dashboard

o interpret graphs


. set up alerts and actions

o create and test alerts

o create action groups

o view alerts in Azure Monitor

o analyze alerts across subscriptions


. configure Application Insights

. NOT: Network monitoring


10.2 Implement backup and recovery
. configure and review backup reports

. perform backup and restore operations by using Azure Backup Service

. create a Recovery Services Vault

o use soft delete to recover Azure VMs


. create and configure backup policy

. perform site-to-site recovery by using Azure Site Recovery

. NOT: SQL or HANA

QUESTION 1
You have an Azure subscription that contains an Azure Active Directory (Azure AD) tenant named
contoso.com and an Azure Kubernetes Service (AKS) cluster named AKS1.
An administrator reports that she is unable to grant access to AKS1 to the users in contoso.com.
You need to ensure that access to AKS1 can be granted to the contoso.com users.
What should you do first?

A. From contoso.com, modify the Organization relationships settings.
B. From contoso.com, create an OAuth 2.0 authorization endpoint.
C. Recreate AKS1.
D. From AKS1, create a namespace.

Correct Answer: B

QUESTION 2
You have a Microsoft 365 tenant and an Azure Active Directory (Azure AD) tenant named contoso.com.
You plan to grant three users named User1, User2, and User3 access to a temporary Microsoft SharePoint
document library named Library1.
You need to create groups for the users. The solution must ensure that the groups are deleted automatically after 180 days.
Which two groups should you create? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. an Office 365 group that uses the Assigned membership type
B. a Security group that uses the Assigned membership type
C. an Office 365 group that uses the Dynamic User membership type
D. a Security group that uses the Dynamic User membership type
E. a Security group that uses the Dynamic Device membership type

Correct Answer: AC

QUESTION 3
You recently created a new Azure subscription that contains a user named Admin1.
Admin1 attempts to deploy an Azure Marketplace resource by using an Azure Resource Manager template.
Admin1 deploys the template by using Azure PowerShell and receives the following error message: “User
failed validation to purchase resources. Error message: “Legal terms have not been accepted for this item on
this subscription. To accept legal terms, please go to the Azure portal (https:://go.microsoft.com/fwlink/?
LinkId=534873) and configure programmatic deployment for the Marketplace item or create it there for the first time.”
You need to ensure that Admin1 can deploy the Marketplace resource successfully.

What should you do?
A. From Azure PowerShell, run the Set-AzApiManagementSubscription cmdlet
B. From the Azure portal, register the Microsoft.Marketplace resource provider
C. From Azure PowerShell, run the Set-AzMarketplaceTerms cmdlet
D. From the Azure portal, assign the Billing administrator role to Admin1

Correct Answer: C

QUESTION 4
You have an Azure Active Directory (Azure AD) tenant that contains 5,000 user accounts.
You create a new user account named AdminUser1.
You need to assign the User administrator administrative role to AdminUser1.
What should you do from the user account properties?

A. From the Licenses blade, assign a new license
B. From the Directory role blade, modify the directory role
C. From the Groups blade, invite the user account to a new group
Correct Answer: B

QUESTION 5
You have an Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com that contains 100 user accounts.
You purchase 10 Azure AD Premium P2 licenses for the tenant.
You need to ensure that 10 users can use all the Azure AD Premium features.
What should you do?

A. From the Licenses blade of Azure AD, assign a license
B. From the Groups blade of each user, invite the users to a group
C. From the Azure AD domain, add an enterprise application
D. From the Directory role blade of each user, modify the directory role

Correct Answer: A

Actualkey Microsoft Azure Administrator AZ-104 exam pdf, Certkingdom Microsoft Azure Administrator AZ-104 PDF

MCTS Training, MCITP Trainnig

Best Microsoft Azure Administrator AZ-104 Certification, Microsoft Azure Administrator AZ-104 Training at certkingdom.com

75940X Avaya Converged Platform Integration Exam

The Avaya Converged Platform Integration Exam (75940X) is a requirement to earn the Avaya Solutions Platform (ACIS – 7594) credential.

This exam has 64 questions and the minimum passing score is 64%.
The candidate has 90 minutes to complete this exam.

Test Objectives
The exam covers the following knowledge areas and learning objectives:

Avaya Solutions Platform (ASP) Architecture
Describe the Virtualization System Architecture.
Describe the Overall Storage Architecture.
Describe the ACP 4200 4.0 architecture clearly defining the differences between an ASP 2400 and ASP 4200.
Describe the implementation of an ASP 4200 design.
Describe ACP 4200 components including the expansion ASP 4200.
Complete the site preparation requirements for the ASP 4200.
Explain the requirements for ASP 4200 frame installation.
Complete the checklist for power up and network connection of an ASP 4200.
Explain the use and maintenance of the Lifecycle Workbook (LCW).
Perform an upgrade.
Describe the startup steps for the Management Server Console (MSC).

Network Architecture
Describe the overall network architecture.
Distinguish between ASP 4200 networking topologies (Layer 3 vs Layer 2 ASP 4200).
Describe VMware networking as it relates to ASP 4200.
Describe the VMware architecture.
Interpret VMware performance monitoring data.

Applications and Operations
Explain the purpose of the IP Template.
Describe Avaya Aura® applications and network interactions.
Interpret Avaya Aura® performance monitoring data.
Describe common operations and maintenance processes.

Virtual Machine
Describe the networking changes required when adding a new VM.
Describe Visualization Performance and Fault Management (VPFM) integration of a new VM.
Update the LCM workbook with new VM information.

ASP 4200 Security
Explain the configuration options of Avaya Session Border Controller with ACP 4200.
Describe BYOD support and Identity Engines (IDE).

Management Tools
Describe System Manager.
Describe the integration of POS applications with SMGR.
Third Party Management Tools.

Avaya Orchestrator
Using Avaya Orchestrator.

Prerequisite Knowledge
Review the credential learning map for any prerequisite information.

QUESTION 1
How would an administrator display the IP addresses of the VSP switches of the ACP 4200 within the Avaya Orchestrator Home Dashboard?

A. By right-clicking on the Dashboard menu item and downloading the network summary report.
B. By right-clicking on the Admin menu item and downloading the network summary report.
C. By right-clicking on the Report menu item and downloading the network summary report.
D. By hovering the mouse pointer over the Up status indicator within the Network dashlet.

Correct Answer: B

QUESTION 2
Avaya Orchestrator monitors the ACP 4200 components by organizing them into which two groups? (Choose two.)

A. Power
B. Virtual Machines
C. Storage
D. Applications

Correct Answer: AC

QUESTION 3
An Avaya Orchestrator administrator has been tasked with getting a copy of the Temperature Values chart for
a Server. When doing this in the past, the administrator has navigated to the Compute Group Dashlet-Host
Up-Host IP Address-Performance Chart. However, the Temperatures Values chart cannot be found.
What is potentially causing this issue?

A. The SNMP credentials for the Server’s thermostats subsystems are incorrect.
B. The IP address chosen is of the ESXi host, not the iLO interface.
C. The Host is currently unresponsive.
D. The Temperatures Values are only available for VSP switches and Storage systems.

Correct Answer: C

 

Actualkey Avaya ACIS-7594 75940X exam pdf, Certkingdom Avaya ACIS-7594 75940X PDF

MCTS Training, MCITP Trainnig

Best Avaya ACIS-7594 75940X Certification, Avaya ACIS-7594 75940X Training at certkingdom.com

JN0-103 Junos – Associate – Juniper Networks Certified Associate Exam

Exam Details
JNCIA-Junos exam topics are based on the content of the recommended instructor-led training courses, as well as the additional resources.

Exam code: JN0-103
Administered by Pearson VUE
Exam length: 90 minutes
Exam type: 65 multiple-choice questions
Scoring and pass/fail status is available immediately
Junos Software Release: 19.4

Exam Objectives
This list provides a general view of the skill set required to successfully complete the specified certification exam.

Identify the concepts, benefits or functionality of the core elements of the Junos OS
Software architecture
Control and forwarding planes
Routing Engine and Packet Forwarding Engine
Transit traffic processing
Exception traffic

Identify the concepts, operation or functionality of the Junos user interface
CLI functionality
CLI modes
CLI navigation
CLI Help
Filtering output
Active versus candidate configuration
Reverting to previous configurations
Modifying, managing, and saving configuration files
Viewing, comparing, and loading configuration files
J-Web (core/common functionality only)

Identify the main elements for configuring Junos devices
Factory-default state
Initial configuration
User accounts
Login classes
User authentication methods
Interface types and properties
Configuration groups
Additional initial configuration elements, such as NTP, SNMP, and syslog
Configuration archival
Logging and tracing
Rescue configuration

Describe how to configure basic components of a Junos device

Identify methods of monitoring or maintaining Junos devices
Show commands
Monitor commands
Interface statistics and errors
Network tools, such as ping, traceroute, telnet, SSH, and so on
Junos OS installation and upgrades
Powering on and shutting down Junos devices
Root password recovery

Describe monitoring or maintenance procedures for a Junos device


Identify basic routing concepts or functionality for Junos devices
Traffic forwarding concepts
Routing tables
Routing versus forwarding tables
Route preference
Routing instances
Static routing
Advantages of and use cases for dynamic routing protocols

Describe how to configure or monitor basic routing elements for a Junos device

Identify the concepts or functionality of routing policy and firewall filters on Junos devices
Default routing policies
Import and export policies
Routing policy flow
Effect of policies on routes and routing tables
Policy structure and terms
Policy match criteria, match types, and actions
Firewall filter concepts
Filter structure and terms
Filter match criteria and actions
Effect of filters on packets
Unicast reverse-path-forwarding (RPF)

Describe how to configure or monitor routing policies and firewall filters on a Junos device

Preparation
The resources listed on this section are recommended, but do not guarantee passing scores on JNCP exams. Success depends on each candidate’s motivation, experience, and dedication. Candidates may find additional resources not listed on this page helpful as well.

QUESTION 1
Which command verifies configuration syntax without applying the changes?

A. commit confirmed
B. commit check
C. commit comment
D. commit and-quit

Correct Answer: B

QUESTION 2
By default, which character indicates the UNIX shell prompt?

A. #
B. %
C. $
D. >

Correct Answer: B

QUESTION 3
You are considering an upgrade from 19.1R1 and want to ensure that only bug fixes are included.
Which two software versions should you consider in this situation? (Choose two.)

A. 19.3R1-S1
B. 19.3R2
C. 19.1R3
D. 19.1R1-S2

Correct Answer: AC

QUESTION 4
Which two statements are true about static routes in the Junos OS? (Choose two.)

A. Static routes remain in the routing table until you remove them or until they become inactive.
B. Static routes must have a next hop defined.
C. Static routes are learned by neighboring devices and added to their routing tables.
D. Static routes are defined at the [edit routing-instances] hierarchy.

Correct Answer: AB

QUESTION 5
When multiple users are editing the configuration on a Junos device, what is the default behavior when a user issues a commit command?

A. All valid configuration changes made by all users will take effect.
B. The user’s configuration changes are committed; other users’ configuration changes are still pending.
C. The user will receive an error message disallowing a commit of the configuration.
D. The user’s configuration changes are committed; other users will be exited from configuration mode.

Correct Answer: A
 

Actualkey Juniper JNCIA JN0-103 exam pdf, Certkingdom Juniper JNCIA JN0-103 PDF

MCTS Training, MCITP Trainnig

Best Juniper JNCIA JN0-103 Certification, Juniper JNCIA JN0-103 Training at certkingdom.com