Exam AZ-140 Configuring and Operating Windows Virtual Desktop on Microsoft Azure (beta)

Candidates for this exam are Azure administrators with subject matter expertise in planning, delivering, and managing virtual desktop experiences and remote apps, for any device, on Azure.

Candidates for this exam should have experience in Azure technologies, including virtualization, networking, identity, storage, backups, resilience, and disaster recovery. They should understand on-premises virtual desktop infrastructure technologies as they relate to migrating to Windows Virtual Desktop. These professionals use the Azure portal and Azure Resource Manager (ARM) templates to accomplish many of their tasks. They might use PowerShell and Azure Command-Line Interface (CLI) for more efficient automation.

Candidates for this exam must have expert Azure administration skills.

Beta exams are not scored immediately because we are gathering data on the quality of the questions and the exam. Learn more about the value and importance of beta exams.

Part of the requirements for: Microsoft Certified: Windows Virtual Desktop Specialty
Related exams: none
Important: See details
Exam AZ-140: Configuring and Operating Windows Virtual Desktop on Microsoft Azure (beta)
Languages: English
Retirement date: none

This exam measures your ability to accomplish the following technical tasks: plan a Windows Virtual Desktop architecture; implement a Windows Virtual Desktop infrastructure; manage access and security; manage user environments and apps; and monitor and maintain a Windows Virtual Desktop infrastructure.

Skills measured
Plan a Windows Virtual Desktop architecture (10-15%)
Implement a Windows Virtual Desktop infrastructure (25-30%)
Manage access and security (10-15%)
Manage user environments and apps (20-25%)
Monitor and maintain a Windows Virtual Desktop infrastructure (20-25%)

Audience Profile
Candidates for this exam are Microsoft Azure administrators with subject matter expertise in planning, delivering, and managing virtual desktop experiences and remote apps, for any device, on Azure.
Responsibilities for this role include deploying virtual desktop experiences and apps to Azure.

Professionals in this role deliver applications on Windows Virtual Desktop and optimize them to run in multi-session virtual environments. To deliver these experiences, they work closely with the Azure administrators and architects, along with Microsoft 365 Administrators.

Candidates for this exam should have experience in Azure technologies, including virtualization, networking, identity, storage, backups, resilience, and disaster recovery. They should understand on-premises virtual desktop infrastructure technologies as they relate to migrating to Windows Virtual Desktop. These professionals use the Azure portal and Azure Resource Manager templates to accomplish many tasks. This role may use PowerShell and Azure Command-Line
Interface (CLI) for more efficient automation.

Candidates for this exam must have expert Azure administration skills.

Skills Measured
NOTE: The bullets that follow each of the skills measured are intended to illustrate how we assess that skill. This list is not definitive or exhaustive.
NOTE: Most questions cover features that are General Availability (GA). The exam may contain questions on Preview features if those features are commonly used.

Plan a Windows Virtual Desktop Architecture (10-15%)
Design the Windows Virtual Desktop architecture
 assess existing physical and virtual desktop environments
 assess network capacity and speed requirements for Windows Virtual Desktop
 recommend an operating system for a Windows Virtual Desktop implementation
 plan and configure name resolution for Active Directory (AD) and Azure Active Directory

Domain Services (Azure AD DS)
 plan a host pools architecture
 recommend resource groups, subscriptions, and management groups
 configure a location for the Windows Virtual Desktop metadata
 calculate and recommend a configuration for performance requirements
 calculate and recommend a configuration for Azure Virtual Machine capacity requirements

Design for user identities and profiles
 select an appropriate licensing model for Windows Virtual Desktop based on requirements
 recommend an appropriate storage solution (including Azure NetApp Files versus Azure Files)
 plan for Windows Virtual Desktop client deployment
 plan for user profiles
 recommend a solution for network connectivity
 plan for Azure AD Connect for user identities

Implement a Windows Virtual Desktop Infrastructure (25-30%)
Implement and manage networking for Windows Virtual Desktop
 implement Azure virtual network connectivity
 manage connectivity to the internet and on-premises networks
 implement and manage network security
 manage Windows Virtual Desktop session hosts by using Azure Bastion
 monitor and troubleshoot network connectivity

Implement and manage storage for Windows Virtual Desktop
 configure storage for FSLogix components
 configure storage accounts
 configure disks
 create file shares

Create and configure host pools and session hosts

 create a host pool by using the Azure portal
 automate creation of Windows Virtual Desktop host and host pools by using PowerShell,

Command-Line Interface (CLI), and Azure Resource Manager templates
 create a host pool based on Windows client or Windows Server session hosts
 configure host pool settings
 manage licensing for session hosts that run Windows client or Windows Server
 assign users to host pools
 apply OS and application updates to a running Windows Virtual Desktop host
 apply security and compliance settings to session hosts

Create and manage session host images
 create a gold image
 modify a session host image
 install language packs in Windows Virtual Desktop
 deploy a session host by using a custom image
 plan for image update and management
 create and use a Shared Image Gallery
 troubleshoot OS issues related to Windows Virtual Desktop

Manage Access and Security (10-15%)

Manage access
 plan and implement Azure roles and role-based access control (RBAC) for Windows Virtual Desktop
 manage local roles, groups and rights assignment on Windows Virtual Desktop session hosts
 configure user restrictions by using Azure AD group policies and AD policies Manage security
 plan and implement Conditional Access policies for connections to Windows Virtual Desktop
 plan and implement multifactor authentication in Windows Virtual Desktop
 manage security by using Azure Security Center
 configure Microsoft Defender Antivirus for session hosts

Manage User Environments and Apps (20-25%)
Implement and manage FSLogix
 plan for FSLogix
 install and configure FSLogix
 configure Profile Containers
 configure Cloud Cache
 migrate user profiles to FSLogix

Configure user experience settings

 configure Universal Print
 configure user settings through group policies and Endpoint Manager policies
 configure persistent and non-persistent desktop environments
 configure Remote Desktop Protocol (RDP) properties on a host pool
 configure session timeout properties
 troubleshoot user profile issues
 troubleshoot Windows Virtual Desktop clients

Install and configure apps on a session host
 configure dynamic application delivery by using MSIX App Attach
 implement application masking
 deploy an application as a RemoteApp
 implement and manage OneDrive for Business for a multi-session environment
 implement and manage Microsoft Teams AV Redirect
 implement and manage browsers and internet access for Windows Virtual Desktop sessions
 create and configure an application group
 troubleshoot application issues related to Windows Virtual Desktop

Monitor and Maintain a Windows Virtual Desktop Infrastructure (20- 25%)
Plan and implement business continuity and disaster recovery
 plan and implement a disaster recovery plan for Windows Virtual Desktop
 design a backup strategy for Windows Virtual Desktop
 configure backup and restore for FSLogix user profiles, personal virtual desktop infrastructures (VDIs), and golden images

Automate Windows Virtual Desktop management tasks

 configure automation for Windows Virtual Desktop
 automate management of host pools, session hosts, and user sessions by using

PowerShell and Azure Command-Line Interface (CLI)
 implement autoscaling in host pools

Monitor and manage performance and health
 monitor Windows Virtual Desktop by using Azure Monitor
 monitor Windows Virtual Desktop by using Azure Advisor
 customize Azure Monitor workbooks for Windows Virtual Desktop monitoring
 optimize session host capacity and performance
 manage active sessions and application groups
 monitor and optimize autoscaling results

QUESTION 1
You have an Azure Active Directory (Azure AD) tenant named contoso.com and an Azure virtual network named VNET1.
To VNET1, you deploy an Azure Active Directory Domain Services (Azure AD DS) managed domain named litwareinc.com.
To VNET1, you plan to deploy a Windows Virtual Desktop host pool named Pool1.
You need to ensure that you can deploy Windows 10 Enterprise host pools to Pool1.
What should you do first?

A. Modify the settings of the litwareinc.com DNS zone.
B. Modify the DNS settings of VNET1.
C. Add a custom domain name to contoso.com.
D. Implement Azure AD Connect cloud sync.

Correct Answer: B

QUESTION 2
You plan to deploy Windows Virtual Desktop session host virtual machines based on a preconfigured master image. The master image will be stored in a shared image.
You create a virtual machine named Image1 to use as the master image. You install applications and apply configuration changes to Image1.
You need to ensure that the new session host virtual machines created based on Image1 have unique names and security identifiers.
What should you do on Image1 before you add the image to the shared image gallery?

A. At a command prompt, run the set computername command.
B. At a command prompt, run the sysprep command.
C. From PowerShell, run the rename-computer cmdlet.
D. From the lock screen of the Windows device, perform a Windows Autopilot Reset.

Correct Answer: B

QUESTION 3
You have a Windows Virtual Desktop host pool named Pool1 and an Azure Storage account named Storage1.
Storage1 stores FSLogix profile containers in a share folder named share1.
You create a new group named Group1. You provide Group1 with permission to sign in to Pool1.
You need to ensure that the members of Group1 can store the FSLogix profile containers in share1. The
solution must use the principle of least privilege.
Which two privileges should you assign to Group1? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. the Storage Blob Data Contributor role for storage1
B. the List folder / read data NTFS permissions for share1
C. the Modify NTFS permissions for share1
D. the Storage File Data SMB Share Reader role for storage1
E. the Storage File Data SMB Share Elevated Contributor role for storage1
F. the Storage File Data SMB Share Contributor role for storage1

Correct Answer: CF

Actualkey Microsoft AZ-140 Exam pdf, Certkingdom Microsoft AZ-140 PDF

MCTS Training, MCITP Trainnig

Best Microsoft AZ-140 Certification, Microsoft AZ-140 Training at certkingdom.com

DP-203 Data Engineering on Microsoft Azure Exam

Azure Data Engineers integrate, transform, and consolidate data from various structured and unstructured data systems into structures that are suitable for building analytics solutions.

Candidates for Exam DP-203: Data Engineering on Microsoft Azure must have solid knowledge of data processing languages, such as SQL, Python, or Scala, and they need to understand parallel processing and data architecture patterns.

Beta exams are not scored immediately because we are gathering data on the quality of the questions and the exam. Learn more about the value and importance of beta exams.

Part of the requirements for: Microsoft Certified: Azure Data Engineer Associate

Related exams: none

Important: See details

Languages: English

Retirement date: none

This exam measures your ability to accomplish the following technical tasks: design and implement data storage; design and develop data processing; design and implement data security; and monitor and optimize data storage and data processing.

Skills measured
Design and implement data storage (40-45%)
Design and develop data processing (25-30%)
Design and implement data security (10-15%)
Monitor and optimize data storage and data processing (10-15%)


Audience Profile
Candidates for this exam should have subject matter expertise integrating, transforming, and consolidating data from various structured and unstructured data systems into a structure that is suitable for building analytics solutions.
Azure Data Engineers help stakeholders understand the data through exploration, and they build and maintain secure and compliant data processing pipelines by using different tools and techniques. These professionals use various Azure data services and languages to store and produce cleansed and enhanced datasets for analysis.

Azure Data Engineers also help ensure that data pipelines and data stores are high-performing, efficient, organized, and reliable, given a set of business requirements and constraints. They deal with unanticipated issues swiftly, and they minimize data loss. They also design, implement, monitor, and optimize data platforms to meet the data pipelines needs.

A candidate for this exam must have strong knowledge of data processing languages such as SQL, Python, or Scala, and they need to understand parallel processing and data architecture patterns.

Skills Measured
NOTE: The bullets that follow each of the skills measured are intended to illustrate how we
assess that skill. This list is not definitive or exhaustive.

NOTE: Most questions cover features that are General Availability (GA). The exam may contain questions on Preview features, if those features are commonly used.

Design and Implement Data Storage (40-45%)
Design a data storage structure
 design an Azure Data Lake solution
 recommend file types for storage
 recommend file types for analytical queries
 design for efficient querying
 design for data pruning
 design a folder structure that represents the levels of data transformation
 design a distribution strategy
 design a data archiving solution

Design a partition strategy
 design a partition strategy for files
 design a partition strategy for analytical workloads
 design a partition strategy for efficiency/performance
 design a partition strategy for Azure Synapse Analytics
 identify when partitioning is needed in Azure Data Lake Storage Gen2

Design the serving layer
 design star schemas
 design slowly changing dimensions
 design a dimensional hierarchy
 design a solution for temporal data
 design for incremental loading
 design analytical stores
 design metastores in Azure Synapse Analytics and Azure Databricks

Implement physical data storage structures

 implement compression
 implement partitioning
 implement sharding
 implement different table geometries with Azure Synapse Analytics pools
 implement data redundancy
 implement distributions
 implement data archiving

Implement logical data structures
 build a temporal data solution
 build a slowly changing dimension
 build a logical folder structure
 build external tables
 implement file and folder structures for efficient querying and data pruning

Implement the serving layer
 deliver data in a relational star schema
 deliver data in Parquet files
 maintain metadata
 implement a dimensional hierarchy

Design and Develop Data Processing (25-30%)
Ingest and transform data

 transform data by using Apache Spark
 transform data by using Transact-SQL
 transform data by using Data Factory
 transform data by using Azure Synapse Pipelines
 transform data by using Stream Analytics
 cleanse data
 split data
 shred JSON
 encode and decode data
 configure error handling for the transformation
 normalize and denormalize values
 transform data by using Scala
 perform data exploratory analysis

Design and develop a batch processing solution

 develop batch processing solutions by using Data Factory, Data Lake, Spark, Azure

Synapse Pipelines, PolyBase, and Azure Databricks
 create data pipelines
 design and implement incremental data loads
 design and develop slowly changing dimensions
 handle security and compliance requirements
 scale resources
 configure the batch size
 design and create tests for data pipelines
 integrate Jupyter/IPython notebooks into a data pipeline
 handle duplicate data
 handle missing data
 handle late-arriving data
 upsert data
 regress to a previous state
 design and configure exception handling
 configure batch retention
 design a batch processing solution
 debug Spark jobs by using the Spark UI

Design and develop a stream processing solution

 develop a stream processing solution by using Stream Analytics, Azure Databricks, and Azure Event Hubs
 process data by using Spark structured streaming
 monitor for performance and functional regressions
 design and create windowed aggregates
 handle schema drift
 process time series data
 process across partitions
 process within one partition
 configure checkpoints/watermarking during processing
 scale resources
 design and create tests for data pipelines
 optimize pipelines for analytical or transactional purposes
 handle interruptions
 design and configure exception handling
 upsert data
 replay archived stream data
 design a stream processing solution

Manage batches and pipelines

 trigger batches
 handle failed batch loads
 validate batch loads
 manage data pipelines in Data Factory/Synapse Pipelines
 schedule data pipelines in Data Factory/Synapse Pipelines
 implement version control for pipeline artifacts
 manage Spark jobs in a pipeline

Design and Implement Data Security (10-15%)
Design security for data policies and standards
 design data encryption for data at rest and in transit
 design a data auditing strategy
 design a data masking strategy
 design for data privacy
 design a data retention policy
 design to purge data based on business requirements
 design Azure role-based access control (Azure RBAC) and POSIX-like Access Control List (ACL) for Data Lake Storage Gen2
 design row-level and column-level security

Implement data security
 implement data masking
 encrypt data at rest and in motion
 implement row-level and column-level security
 implement Azure RBAC
 implement POSIX-like ACLs for Data Lake Storage Gen2
 implement a data retention policy
 implement a data auditing strategy
 manage identities, keys, and secrets across different data platform technologies
 implement secure endpoints (private and public)
 implement resource tokens in Azure Databricks
 load a DataFrame with sensitive information
 write encrypted data to tables or Parquet files
 manage sensitive information

Monitor and Optimize Data Storage and Data Processing (10-15%)
Monitor data storage and data processing

 implement logging used by Azure Monitor
 configure monitoring services
 measure performance of data movement
 monitor and update statistics about data across a system
 monitor data pipeline performance
 measure query performance
 monitor cluster performance
 understand custom logging options
 schedule and monitor pipeline tests
 interpret Azure Monitor metrics and logs
 interpret a Spark directed acyclic graph (DAG)

Optimize and troubleshoot data storage and data processing

 compact small files
 rewrite user-defined functions (UDFs)
 handle skew in data
 handle data spill
 tune shuffle partitions
 find shuffling in a pipeline
 optimize resource management
 tune queries by using indexers
 tune queries by using cache
 optimize pipelines for analytical or transactional purposes
 optimize pipeline for descriptive versus analytical workloads
 troubleshoot a failed spark job
 troubleshoot a failed pipeline run

QUESTION 1
You need to implement the surrogate key for the retail store table. The solution must meet the sales transaction dataset requirements.
What should you create?

A. a table that has an IDENTITY property
B. a system-versioned temporal table
C. a user-defined SEQUENCE object
D. a table that has a FOREIGN KEY constraint

Correct Answer: A

QUESTION 2
You need to design an Azure Synapse Analytics dedicated SQL pool that meets the following requirements:
Can return an employee record from a given point in time.
Maintains the latest employee information.
Minimizes query complexity.
How should you model the employee data?

A. as a temporal table
B. as a SQL graph table
C. as a degenerate dimension table
D. as a Type 2 slowly changing dimension (SCD) table

Correct Answer: D

QUESTION 3
You have an enterprise-wide Azure Data Lake Storage Gen2 account. The data lake is accessible only
through an Azure virtual network named VNET1.
You are building a SQL pool in Azure Synapse that will use data from the data lake.
Your company has a sales team. All the members of the sales team are in an Azure Active Directory group
named Sales. POSIX controls are used to assign the Sales group access to the files in the data lake.
You plan to load data to the SQL pool every hour.
You need to ensure that the SQL pool can load the sales data from the data lake.
Which three actions should you perform? Each correct answer presents part of the solution.
NOTE: Each area selection is worth one point.

A. Add the managed identity to the Sales group.
B. Use the managed identity as the credentials for the data load process.
C. Create a shared access signature (SAS).
D. Add your Azure Active Directory (Azure AD) account to the Sales group.
E. Use the snared access signature (SAS) as the credentials for the data load process.
F. Create a managed identity.

Correct Answer: ADF

Actualkey Microsoft Azure DP-203 Exam pdf, Certkingdom Microsoft Azure DP-203 PDF

MCTS Training, MCITP Trainnig

Best Microsoft Azure DP-203 Certification, Microsoft Azure DP-203 Training at certkingdom.com

NSE7_SDW-6.4 Fortinet NSE 7 – SD-WAN 6.4 Exam

Exam series: NSE7_SDW-6.4
Number of questions: 35
Exam time: 60 minutes
Language: English
Product version: FortiOS 6.4
Status: Available
Exam details: exam description

NSE 7 Certification
The Fortinet Network Security Architect designation identifies your advanced skills in deploying, administering, and troubleshooting Fortinet security solutions. We recommend this certification for network and security professionals
who are involved in the advanced administration and support of security infrastructures using Fortinet solutions. Visit the Fortinet NSE Certification Program page for information about certification requirements.

Fortinet NSE 7—SD-WAN 6.4
The Fortinet NSE 7—SD-WAN 6.4 exam is part of the NSE 7 Network Security Architect program, and recognizes the successfu() candidate’s knowledge and expertise with the Fortinet SD-WAN solution.
The exam tests applied knowledge of the integration, administration, troubleshooting, and centra() management of a secure SD-WAN solution composed of FortiOS 6.4.0 and FortiManager 6.4.0. Audience
The Fortinet NSE 7—SD-WAN 6.4 exam is intended for network and security professionals who are responsible for
the design, administration, and support of a secure SD-WAN infrastructure composed of many FortiGate devices.

Exam Details
Exam name Fortinet NSE 7—SD-WAN 6.4
Exam series NSE7_SDW-6.4
Time allowed 60 minutes
Exam questions 35 multiple-choice questions
Scoring Pass or fail, a score report is available from your Pearson VUE account
Language English
Product version FortiOS 6.4.0, FortiManager 6.4.0, FortiAnalyzer 6.4.0

Exam Topics
Successful candidates have applied knowledge and skills in the following areas and tasks:

() SD-WAN configuration
() Configure basic SD-WAN setup
() Configure SD-WAN rules
() Configure SD-WAN SLAs
() Configure SD-WAN routing
() Centra() management
() Centrally manage an SD-WAN infrastructure from FortiManager
() Troubleshoot centra() management problems
() VPN
() Implement a ful() or partially meshed redundant VPN infrastructure
() Troubleshoot VPN and ADVPN
() SD-WAN troubleshooting
() Troubleshoot SD-WAN

Training Resources

The following resources are recommended for attaining the knowledge and skills that are covered on the exam. The recommended training is available as a foundation for exam preparation. In addition to training, candidates are strongly encouraged to have hands-on experience with the exam topics and objectives.

NSE Training Institute Courses
() NSE 7 SD-WAN 6.4
() NSE 4 FortiGate Security 6.4
() NSE 4 FortiGate Infrastructure 6.4
() NSE 5 FortiManager 6.4
Other Resources
() FortiOS Administration Guide 6.4.0
() FortiOS New Feature Guide 6.4.0
() FortiOS CLI Reference 6.4.0
() FortiManager Administration Guide 6.4.0

Experience
() Minimum of two to three years of hands-on experience with FortiGate and FortiManager devices.

QUESTION 1
Which statement defines how a per-IP traffic shaper of 10 Mbps is applied to the entire network?

A. The 10 Mbps bandwidth is shared equally among the IP addresses.
B. Each IP is guaranteed a minimum 10 Mbps of bandwidth.
C. FortiGate allocates each IP address a maximum 10 Mbps of bandwidth.
D. A single user uses the allocated bandwidth divided by total number of users.

Correct Answer: C

QUESTION 2
Which three parameters are available to configure SD-WAN rules? (Choose three.)

A. Application signatures
B. Incoming interface
C. Internet service database (ISDB) address object
D. Source and destination IP address
E. Type of physical link connection

Correct Answer: CDE

QUESTION 3
Which diagnostic command you can use to show interface-specific SLA logs for the last 10 minutes?

A. diagnose sys virtual-wan-link health-check
B. diagnose sys virtual-wan-link log
C. diagnose sys virtual-wan-link sla-log
D. diagnose sys virtual-wan-link intf-sla-log

Correct Answer: C

Actualkey Fortinet NSE7_SDW-6.4 Exam pdf, Certkingdom Fortinet NSE7_SDW-6.4 PDF

MCTS Training, MCITP Trainnig

Best Fortinet NSE7_SDW-6.4 Certification, Fortinet NSE7_SDW-6.4 Training at certkingdom.com

DEA-41T1 Dell EMC PowerEdge Associate Exam

Use this quick start guide to collect all the information about Dell EMC PowerEdge Associate (DEA-41T1) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the DEA-41T1 Dell EMC PowerEdge Associate exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual Dell EMC DCA-PowerEdge certification exam.

The Dell EMC PowerEdge Associate certification is mainly targeted to those candidates who want to build their career in PowerEdge domain. The Dell EMC Certified Associate – PowerEdge exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of Dell EMC DCA-PowerEdge.

Dell EMC PowerEdge Associate Exam Summary:
Exam Name Dell EMC Certified Associate – PowerEdge
Exam Code DEA-41T1
Exam Price $230 (USD)
Duration 90 mins
Number of Questions 60
Passing Score 63%
Books / Training Dell EMC PowerEdge Server Concepts (SV_SYS_1122)
Schedule Exam Pearson VUE
Sample Questions Dell EMC PowerEdge Associate Sample Questions
Practice Exam Dell EMC DEA-41T1 Certification Practice Exam

Dell EMC DEA-41T1 Exam Syllabus Topics:

Introduction to Severs – Define the Server, identify the types of servers and their form factors
– Explain how various storage technologies are used in servers
– Explain in RAID concepts
– Explain the steps to set up a server
– Identify the types of Server Operating Systems and explain the installation procedure

Server Networking – Identify networking hardware and cables
– Explain the concept of IP Addressing
– Define various network services

Server Applications – Define several common server roles
– Identify and explain common Dell Technologies and Microsoft Windows tools for monitoring server hardware
– Explain the concept and benefits of server virtualization

Server Maintenance – Identify server components and their roles
– Identify and describe server management tasks and management tools
– Define Power supply of a server and configure it
– Explain the environment needed for servers and define server maintenance
– Explain common troubleshooting methods and tools for Dell EMC servers
– Explain server configuration management

Server Security – Describe best practices and methods of securing and performing backups
– Identify and describe best practices for performing data backups

To ensure success in Dell EMC DCA-PowerEdge certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Dell EMC PowerEdge Associate (DEA-41T1) exam.

QUESTION 1
An administrator is implementing LTO-5 drives in their backup solution.
They plan to disable hardware data compression through their backup appliance.
What is the maximum data rate that can be achieved?

A. 80 MB/s
B. 120 MB/s
C. 140 MB/s
D. 160 MB/s

Correct Answer: C

QUESTION 2
A server is experiencing issues with completing POST. The environment does not have a KVM or “Crash cart” available to view where the system is halting.
Which method can an administrator use to determine the first place to start troubleshooting?

A. Run OpenManage Essentials
B. Check rear lights on the server chassis
C. Run Repository manager
D. Check iDRAC Post Code

Correct Answer: B

QUESTION 3
What advantage do NVDIMMs have over other server-based memory technologies?

A. Operate at lower voltages to save on power costs.
B. Lower cost per GB of capacity
C. Require less cooling than traditional memory DIMMs
D. Can retain contents even after a power loss

Correct Answer: D

QUESTION 4
What is an accurate statement in reference to software RAID?

A. Software RAID does not have any data integrity issues
B. Software RAID requires a hardware license
C. Software RAID is an additional cost
D. Software RAID uses CPU resources

Correct Answer: D

Actualkey Dell DEA-41T1 Exam pdf, Certkingdom Dell DEA-41T1 PDF

MCTS Training, MCITP Trainnig

Best Dell DEA-41T1 Certification, Dell DEA-41T1 Training at certkingdom.com

CIPP-US Certified Information Privacy Professional/United States (CIPP/US) Exam

CIPP/US
The IAPP offers computer-based certification exams at over 6,000 testing centers worldwide.

Simply log in to the IAPP website, purchase your exam and then schedule it at the test center most convenient for you. You’ll get an email with step-by-step instructions telling you how. Testing is available year round and may be scheduled up to 90 days in advance.

The IAPP CIPP-US exam is a 90 question, multiple choice, 2.5 hour test. It tests your understanding of the material in the U.S. Private-Sector Privacy textbook. You don’t need the accompanying California-specific textbook. … The exam also uses case studies (short hypos that are used for several questions.

Putting privacy law and policy to work
The IAPP offers the most encompassing, up-to-date and sought-after global training and certification program for privacy and data protection. The Certified Information Privacy Professional (CIPP) helps organizations around the world bolster compliance and risk mitigation practices, and arms practitioners with the insight needed to add more value to their businesses.

There are four CIPP concentrations, each focused on a specific region. Learn more about them and see for yourself why the CIPP is the privacy industry’s leading credential.
Asia (CIPP/A)
Canada (CIPP/C)
Europe (CIPP/E)
U.S. private-sector (CIPP/US)
U.S. Government (CIPP/G) – INACTIVE

How do we maintain the premier status of the CIPP credential?
Because we have access to the sharpest, most successful privacy lawyers and practitioners in the world, each of whom help shape and direct our curriculum to ensure it’s relevant and up to date. We’re pleased to count among our partners such prestigious firms as Fieldfisher, Bird & Bird, Wilson Sonsini, Covington and Burling, among others.

What can the CIPP do for you?
It will show the world that you know privacy laws and regulations and how to apply them, and that you know how to secure your place in the information economy. When you earn a CIPP credential, it means you’ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more.

As the global gold standard for privacy professionals, the CIPP/US certification is a key industry benchmark among top employers.

Backed by ANSI/ISO accreditation, a CIPP/US credential delivers higher earning potential and increased promotion opportunities because it shows you have a strong understanding of U.S. privacy laws and regulations.

We regularly update our programs to stay current with major privacy topics. So you know you’re ahead of the competition when it comes to the latest developments in the field.

Certified Information Privacy Professional/United States

WHAT YOU’LL LEARN
Introduction to the U.S. Privacy Environment
Limits on Private-sector Collection and Use of Data
Government and Court Access to Private-sector Information
Workplace Privacy
State Privacy Laws

GET STARTED
The CIPP/US body of knowledge outlines all the concepts and topics you need to know to become certified. We also provide an exam blueprint that gives the approximate number of questions from each topic area on the exam. These documents, as well as additional certification resources and helpful links, can be found here.

We strongly encourage all potential test takers to read our Certification Candidate Handbook before testing for details on our testing policies and procedures.

Get started today! Sign up for IAPP training right away and when it’s time, register to take your exam. To help you get ready for the test itself, check out our tips on how to prepare for your exam. These documents, as well as additional certification resources and helpful links, can be found here.

Here are our top five reasons why IAPP certification and training are sure to advance your organization.

The CIPP is the global industry standard for professionals entering and working in the field of privacy.

Achieving a CIPP/US credential demonstrates understanding of a principles-based framework and knowledge base in information privacy within the U.S. context.

You’ll be recognized as part of an elite group of knowledgeable, capable and dedicated privacy and data protection practitioners.

Holding a CIPP/US designation elevates your leadership profile among your colleagues.

The CIPP/US is a key benchmark among top employers for hiring and promoting privacy professionals.

QUESTION 1
Which jurisdiction must courts have in order to hear a particular case?

A. Subject matter jurisdiction and regulatory jurisdiction
B. Subject matter jurisdiction and professional jurisdiction
C. Personal jurisdiction and subject matter jurisdiction
D. Personal jurisdiction and professional jurisdiction

Correct Answer: C

QUESTION 2
Which authority supervises and enforces laws regarding advertising to children via the Internet?

A. The Office for Civil Rights
B. The Federal Trade Commission
C. The Federal Communications Commission
D. The Department of Homeland Security

Correct Answer: B

QUESTION 3
According to Section 5 of the FTC Act, self-regulation primarily involves a company’s right to do what?

A. Determine which bodies will be involved in adjudication
B. Decide if any enforcement actions are justified
C. Adhere to its industry’s code of conduct
D. Appeal decisions made against it

Correct Answer: A

QUESTION 4
Which was NOT one of the five priority areas listed by the Federal Trade Commission in its 2012 report,
“Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers”?

A. International data transfers
B. Large platform providers
C. Promoting enforceable self-regulatory codes
D. Do Not Track

Correct Answer: A

Actualkey IAPP CIPP-US Exam pdf, Certkingdom IAPP CIPP-US PDF

MCTS Training, MCITP Trainnig

Best IAPP CIPP-US Certification, IAPP CIPP-US Training at certkingdom.com

SC-300 Microsoft Identity and Access Administrator Exam

Languages: English

Retirement date: none
This exam measures your ability to accomplish the following technical tasks: implement an identity management solution; implement an authentication and access management solution; implement access management for apps; and plan and implement an identity governance strategy.

Skills measured
Implement an identity management solution (25-30%)
Implement an authentication and access management solution (25-30%)
Implement access management for apps (10-15%)
Plan and implement an identity governance strategy (25-30%)

Audience Profile
The Microsoft Identity and Access Administrator designs, implements, and operates an organization’s identity and access management systems by using Azure AD. They manage tasks such as providing secure authentication and authorization access to enterprise applications. The administrator provides seamless experiences and self-service management capabilities for all users. Adaptive access and governance are core elements to the role. This role is also responsible for troubleshooting, monitoring, and reporting for the identity and access environment.

The Identity and Access Administrator may be a single individual or a member of a larger team.
This role collaborates with many other roles in the organization to drive strategic identity projects to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance.

Skills Measured
NOTE: The bullets that appear below each of the skills measured are intended to illustrate how we are assessing that skill. This list is not definitive or exhaustive.

NOTE: Most questions cover features that are General Availability (GA). The exam may contain questions on Preview features if those features are commonly used.

Implement an identity management solution (25-30%)
Implement initial configuration of Azure Active Directory
 configure and manage Azure AD directory roles
 configure and manage custom domains
 configure and manage device registration options
 configure delegation by using administrative units
 configure tenant-wide settings

Create, configure, and manage identities
 create, configure, and manage users
 create, configure, and manage groups
 manage licenses

Implement and manage external identities

 manage external collaboration settings in Azure Active Directory
 invite external users (individually or in bulk)
 manage external user accounts in Azure Active Directory
 configure identity providers (social and SAML/WS-fed)

Implement and manage hybrid identity
 implement and manage Azure Active Directory Connect (AADC)
 implement and manage Password Hash Synchronization (PHS)
 implement and manage Pass-Through Authentication (PTA)
 implement and manage seamless Single Sign-On (SSO)
 implement and manage Federation excluding manual ADFS deployments
 implement and manage Azure Active Directory Connect Health
 troubleshoot synchronization errors

Implement an authentication and access management solution (25- 30%)
Plan and implement Azure Multifactor Authentication (MFA)
 plan Azure MFA deployment (excluding MFA Server)
 implement and manage Azure MFA settings
 manage MFA settings for users

Manage user authentication

 administer authentication methods (FIDO2 / Passwordless)
 implement an authentication solution based on Windows Hello for Business
 configure and deploy self-service password reset
 deploy and manage password protection
 implement and manage tenant restrictions

Plan, implement, and administer conditional access
 plan and implement security defaults
 plan conditional access policies
 implement conditional access policy controls and assignments (targeting, applications, and conditions)
 testing and troubleshooting conditional access policies
 implement application controls
 implement session management
 configure smart lockout thresholds

Manage Azure AD Identity Protection
 implement and manage a user risk policy
 implement and manage sign-in risk policies
 implement and manage MFA registration policy
 monitor, investigate and remediate elevated risky users

Implement Access Management for Apps (10-15%)
Plan, implement, and monitor the integration of Enterprise Apps for Single Sign-On (SSO)

 implement and configure consent settings
 discover apps by using MCAS or ADFS app report
 design and implement access management for apps
 design and implement app management roles
 monitor and audit access / Sign-Ons to Azure Active Directory integrated enterprise applications
 implement token customizations
 integrate on-premises apps by using Azure AD application proxy
 integrate custom SaaS apps for SSO
 configure pre-integrated (gallery) SaaS apps
 implement application user provisioning Implement app registrations
 plan your line of business application registration strategy
 implement application registrations
 configure application permissions
 implement application authorization
 plan and configure multi-tier application permissions

Plan and implement an Identity Governance Strategy (25-30%)
Plan and implement entitlement management
 define catalogs
 define access packages
 plan, implement and manage entitlements
 implement and manage terms of use
 manage the lifecycle of external users in Azure AD Identity Governance settings

Plan, implement, and manage access reviews
 plan for access reviews
 create access reviews for groups and apps
 monitor access review findings
 manage licenses for access reviews
 automate access review management tasks
 configure recurring access reviews

Plan and implement privileged access

 define a privileged access strategy for administrative users (resources, roles, approvals, thresholds)
 configure Privileged Identity Management for Azure AD roles
 configure Privileged Identity Management for Azure resources
 assign roles
 manage PIM requests
 analyze PIM audit history and reports
 create and manage break-glass accounts

Monitor and maintain Azure Active Directory
 analyze and investigate sign-in logs to troubleshoot access issues
 review and monitor Azure AD audit logs
 enable and integrate Azure AD diagnostic logs with Log Analytics / Azure Sentinel
 export sign-in and audit logs to a third-party SIEM
 review Azure AD activity by using Log Analytics / Azure Sentinel, excluding KQL use
 analyze Azure Active Directory workbooks / reporting
 configure notifications

QUESTION 1
You need to sync the ADatum users. The solution must meet the technical requirements.
What should you do?

A. From the Microsoft Azure Active Directory Connect wizard, select Customize synchronization options.
B. From PowerShell, run Set-ADSyncScheduler.
C. From PowerShell, run Start-ADSyncSyncCycle.
D. From the Microsoft Azure Active Directory Connect wizard, select Change user sign-in.

Correct Answer: A

QUESTION 2
You need to meet the authentication requirements for leaked credentials.
What should you do?

A. Enable password hash synchronization in Azure AD Connect.
B. Configure Azure AD Password Protection.
C. Configure an authentication method policy in Azure AD.
D. Enable federation with PingFederate in Azure AD Connect.

Correct Answer: A

QUESTION 3
Your network contains an on-premises Active Directory domain that syncs to an Azure Active Directory (Azure AD) tenant.
Users sign in to computers that run Windows 10 and are joined to the domain.
You plan to implement Azure AD Seamless Single Sign-On (Azure AD Seamless SSO).
You need to configure the computers for Azure AD Seamless SSO.
What should you do?

A. Configure Sign-in options.
B. Enable Enterprise State Roaming.
C. Modify the Intranet Zone settings.
D. Install the Azure AD Connect Authentication Agent.

Correct Answer: C

QUESTION 4
You have a Microsoft Exchange organization that uses an SMTP address space of contoso.com.
Several users use their contoso.com email address for self-service sign-up to Azure Active Directory (Azure AD).
You gain global administrator privileges to the Azure AD tenant that contains the self-signed users.
You need to prevent the users from creating user accounts in the contoso.com Azure AD tenant for selfservice sign-up to Microsoft 365 services.
Which PowerShell cmdlet should you run?

A. Set-MsolCompanySettings
B. Set-MsolDomainFederationSettings
C. Update-MsolfederatedDomain
D. Set-MsolDomain

Correct Answer: A

Actualkey Microsoft SC-300 Exam pdf, Certkingdom Microsoft SC-300 PDF

MCTS Training, MCITP Trainnig

Best Microsoft SC-300 Certification, Microsoft SC-300 Training at certkingdom.com

300-825 Implementing Cisco Collaboration Conferencing (CLCNF) Exam

Exam overview
This exam tests a candidate’s knowledge of conferencing architecture, installation and configuration, integration, and troubleshooting.
Duration: 90 minutes
Available languages: English

Exam Description:
The Implementing Cisco Collaboration Conferencing v1.0 (CLCNF 300-825) is a 90- minute exam associated the CCNP Collaboration Certification . This exam tests a candidate’s knowledge of conferencing architecture, installation and configuration, integration, and troubleshooting. The course, Implementing Cisco Collaboration Conferencing, helps candidates to prepare for this exam.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents
of the exam and for clarity purposes, the guidelines below may change at any time without notice.

20% 1.0 Conferencing Architecture
1.1 Describe the features and benefits of cloud, hybrid, and on-premises conferencing solutions
1.2 Describe the collaboration architecture topology and call flow required for on-premises internal conferencing solution using Cisco Unified Communications Manager as a call control device
1.3 Describe the collaboration architecture topology and call flow required for on-premises internal only conferencing solution using Cisco Expressway as a call control device
1.4 Describe on-premises conferencing solutions for external participants (B2B and WebRTC)
1.4.a Collaboration architecture topology
1.4.b Call flow
1.5 Describe the integration of OnPrem Microsoft Skype for Business with Cisco Collaboration via Expressway and Cisco Meeting Server (audio/video and IM&P Service)
1.5.a Additional collaboration architecture
1.5.b Call flow
1.6 Describe Cisco Meeting Server recording and streaming of conferences
1.6.a Additional collaboration architecture
1.6.b Call flow
1.7 Describe the features and functions of Cisco Meeting Management

30% 2.0 Installation and Configuration

2.1 Install the Cisco Meeting Server
2.2 Describe TLS certificate requirements within Cisco Meeting Server
2.3 Determine the Cisco Meeting Server deployment most suitable, given a scenario
2.3.a Single split meeting deployment
2.3.b Single combined meeting server
2.3.c Scalable and resilient meeting server
2.3.d Cisco Expressway Web Proxy
2.4 Configure a single combined Cisco Meeting Server deployment
2.5 Configure a scalable and resilient Cisco Meeting Server deployment
2.6 Configure the Cisco Meeting Server and Cisco Expressway for external WebRTC access
2.7 Deploy and configure Cisco Meeting Management (including integrating with Cisco TelePresence Management Suite for phonebooks and scheduling)
2.8 Configure Cisco Meeting Server for recording
2.9 Describe the configuration of Cisco Meeting Server for streaming

25% 3.0 Integration
3.1 Integrate Cisco Meeting Server with Cisco Unified Communication Manager using SIP trunks
3.2 Integrate Cisco Meeting Server with Cisco Unified Communication Manager as a conference bridge
3.3 Integrate Cisco Meeting Server with Expressway Core as a neighbor zone
3.4 Describe the integration of Microsoft Skype for Business 2019 with Cisco Meeting Server and Cisco Expressway (audio/video and IM&P Service)
3.5 Deploy, configure, and maintain Cisco TelePresence Management Suite
3.6 Integrate Cisco TelePresence Management Suite with other conferencing and endpoints and schedule conferences
3.7 Deploy, configure, and maintain Cisco TelePresence Management SuiteXE

25% 4.0 Troubleshoot
4.1 Describe the implement of back up and system upgrades on Cisco Meeting Server and Cisco Meeting Management
4.2 Troubleshoot Cisco Meeting Server configurations using tools (WebAdmin Logs, SFTP Files, and API access on the web interface)
4.3 Diagnose SIP signaling and audio/video quality issues using call statistics, codec information, and packet captures
4.4 Interpret WebRTC audio/video quality related to Cisco Meeting Server call flows using call statistics, codec information, and packet captures
4.5 Interpret notifications pane and retrieve log files for Cisco Meeting Management

QUESTION 1
Which Expressway-E service or protocol is required for external web app participants to join a Cisco Meeting Server version 3.0 conference as guests?

A. XMPP
B. TURN
C. SIP
D. H.323

Correct Answer: B

QUESTION 2
An administrator wants to automatically schedule conferences with a cluster of Cisco Meeting Server devices that are managed with Cisco TMS.
How should Cisco TMS be configured to accomplish this goal?

A. After the Cisco Meeting Server cluster is added, the Cisco TMS should failover an active conference to a different Cisco Meeting Server.
B. After the first Cisco Meeting Server is added, all servers in the cluster should automatically be detected.
C. When the first Cisco Meeting Server is added, the system name should automatically be detected.
D. After the Cisco Meeting Server cluster is added, the primary Cisco Meeting Server should automatically failover to another cluster member.

Correct Answer: D

QUESTION 3
An engineer must configure Cisco Meeting Server integration to Cisco UCM. Which DNS A record must be configured to accomplish this goal?

A. Call Bridge
B. SRV
C. Conference Name
D. Cisco UCM Subscriber

Correct Answer: A

QUESTION 4
In the Cisco TMS GUI, a Cisco UCM registered system shows these error details:
Provisioning mode is set to Cisco UCM for this system.
The system cannot be refreshed or scheduled.
To manage this system as a Cisco TMS system, the provisioning mode needs to be changed to Cisco TMS.
To add the system as Cisco UCM managed system, it must be added through the Cisco UCM that is provisioning the system.
What should be done to resolve this error?

A. Purge the system in Cisco TMS and add the system back directly to Cisco TMS using “Add by IP Address”.
B. Restart Microsoft IIS on the Windows server that hosts Cisco TMS and perform a “Force Refresh” on the system.
C. Delete the system and add the system back with the “Add from Cisco UCM or Cisco TMS” option.
D. Update the credentials for the system in Cisco TMS.

Correct Answer: C

Actualkey Cisco 300-825 Exam pdf, Certkingdom Cisco 300-825 PDF

MCTS Training, MCITP Trainnig

Best Cisco 300-825 Certification, Cisco 300-825 Training at certkingdom.com

H13-811_V2.2 HCIA-Cloud Service V2.2 Exam

Achieving HCIA-Cloud Service V2.2 certification needs to pass Huawei H13-811_V2.2 exam. To help candidates prepare for the HCIA-Cloud Service V2.2 H13-811_V2.2 exam well, we have released new H13-811_V2.2 exam questions online as the good preparation materials.

Totally there are 60 practice exam questions in Hcdatest H13-811_V2.2 exam preparation. You will be encouraged to read all of them thoroughly, we ensure that you can pass the HCIA-Cloud Service V2.2 certification exam in the first try. We also have H13-811_V2.2 free demo questions online, you can test Huawei H13-811_V2.2 free online test before getting H13-811_V2.2 exam questions. Any other questions, you can contact us freely:

Exam Outline and Mock Exam of HCIA-Cloud Service V2.2
Huawei HCIA-Cloud Service V2.2 certification course and exam covers the concepts and values of cloud services, architecture and ecosystem of Huawei cloud services, management and application of Huawei cloud computing services, storage services, network services, security services, management and monitoring, relational databases, CDN&cloud video services, and

Target Trainees
People who are interested in cloud technologies and want to become cloud service engineers

Course Objectives
Have a good command of cloud service concepts and values, Huawei cloud service architecture and ecosystem, and management and application of Huawei cloud computing services, storage services, network services, security services, management and monitoring services, relational databases, CDN&cloud video services, and innovative application services.

Course Outline
1. HCIA-Cloud Service V2.2 Exam Outline
2. HCIA-Cloud Service V2.2 Mock Exam

QUESTION 1
Traditional IT infrastructure architecture is already unable to support efficient enterprise operations. Which of the following is not a key cause?

A. High TCO
B. Slow network rates
C. Slow service rollout and complex lifecycle management
D. I/O bottlenecks restricting application performance

Correct Answer: C

QUESTION 2
Which of the following statements about public clouds is false?

A. A public cloud can have a large number of users
B. Public clouds can optimize resources at scale
C. An enterprise uses their in-house infrastructure to build up a public cloud, which provides internal IT services for the enterprise
D. Public clouds are accessible over the Internet

Correct Answer: C

QUESTION 3
The Identify and Access Management (IAM) service is enabled by default and is free of charge.

A. True
B. False

Correct Answer: A

Actualkey Huawei H13-811_V2.2 Exam pdf, Certkingdom Huawei H13-811_V2.2 PDF

MCTS Training, MCITP Trainnig

Best Huawei H13-811_V2.2 Certification, Huawei H13-811_V2.2 Training at certkingdom.com

CAU302 CyberArk Defender + Sentry Exam

Exam Objectives
The CyberArk Defender Certification tests for the practical knowledge and technical skills to maintain day-to-day operations and to support the on-going maintenance of the CyberArk Privileged Account Security Solution. It is intended to certify an examinee’s competence to fill one of the following roles within a Privileged Account Security Program.

Application Support
The Application Support Engineer provides first level support of the CyberArk applications within the customer organization.

Vault Administrator
The Vault Administrator is responsible for application administration and maintaining an operable PAS environment.

Data Administrator
The Data Administrator is responsible for provisioning safes and platforms, and for onboarding accounts.

Exam Content
The CyberArk Defender Certification tests examanees ability to form the following tasks in seven knowledge domains. Only functions of the Core PAS Solution are included.

Account Onboarding
• Perform a bulk upload of accounts using Password Upload Utility or REST
• Create an Onboarding Rule
• Onboard an account from the pending accounts list
• Setup a Unix Discovery
• Setup a Windows Discovery
• Manually onboard an account
• Onboard SSH Keys with Account Uploader

Application Management
• Describe tools that could be used to monitor CyberArk Application Health
• Use PrivateArk with Proficiency
• Describe how each component communicates with others or devices on network at a high level
• Maintain an appropriate chain of custody for Encryption Keys

Ongoing Maintenance
• Restore DR to normal operation after a failover
• Backup Vault Data with PAReplicate
• Resync a credential file by running createcredfile manually on the command line

CYBERARK STUDY GUIDE
• Identify the log files for each component
• Identify and locate component configuration files
• Assemble necessary log files for submission to a case (X-RAY)
• Ensure each component is operational
• Open a support case with appropriate description and severity
• Create or Upvote an ER
• Restore an object to the vault from a PAReplicate Backup

Password Management Configuration
• Configure a request/approval process
• Configure workflow processes to ensure non-repudiation
• Setup automatic verification, management, and reconciliation of passwords or SSH Keys
• Explain the differences between a logon versus a reconcile account
• Configure a logon account
• Configure a reconcile account
• Properly configure the “SearchForUsages” Platform parameter
• Configure workflow processes to reduce the risk of credential theft
• Configure workflow processes to comply with audit/regulatory policies
• Import a Custom Platform from the Marketplace
• Duplicate a Platform
• Manage the password of a supported usage
• Provision a Safe
• Follow a safe naming convention
• Configure Safe Retention
• Configure Management of Workstation Passwords using Loosely Connected Devices
• Add a User/Group to a safe in accordance with access control policies
• Use an OOB Platform to manage a device

Security and Audit

• Configure a Response to Unmanaged Credentials
• Describe the various PTA detections
• Configure Automatic Session Termination
• Configure a Response to Credential Theft
• Search for a recording
• Utilize safe permissions to limit the scope of reports for specific users
• Understand the purpose of EVD
• Grant appropriate permission to allow users to run reports
• Describe all reports and what information they give a user
• Review a recording
• Configure email alerts in PTA

Session Management Configuration

• Configure the Master Policy to enable the PSM
• Grant Access to view recordings
• Configure a recording safe
• Make a PSM for SSH Connection using an SSH Client
• Make a PSM Connection using the Connect Button
• Make a PSM Connection using an RDP Client
• Setup text based or video based recordings on PSM
• Configure the PSM to utilize the HTML5 Gateway
• Configure the Master Policy to enable the connect button
• Configure the Master Policy to create PSM recordings
• Configure a split workflow
• Describe connection components and what they do

User Management Configuration

• Be able to describe the difference between safe and vault level permissions without the GUI (web or PA client)
• Add an LDAP User/Group to a Local Group
• Configure additional LDAP hosts
• Validate Proper Function of Pre-Configured Directory Mappings
• Verify an LDAP Configuration is using SSL
• Add a User to a Vault Group
• Configure Safe Level Permissions on a User or Group
• Configure Vault Level Permissions on a User
• Describe the purpose of each Built-In Vault User
• Login as the Master user
• Provision an internally authenticated user in the vault
• Set/Reset a Vault User’s Password

QUESTION 1
The vault does not support Role Based Access Control

A. TRUE
B. FALSE

Correct Answer: B

QUESTION 2
The Remote Desktop Services role must be properly licensed by Microsoft.

A. TRUE
B. FALSE

Correct Answer: A

QUESTION 3
One can create exceptions to the Master Policy based on ____________.

A. Safes
B. Platforms
C. Policies
D. Accounts

Correct Answer: D

Actualkey CyberArk CAU302 Exam pdf, Certkingdom CyberArk CAU302 PDF

MCTS Training, MCITP Trainnig

Best CyberArk CAU302 Certification, CyberArk CAU302 Training at certkingdom.com

MB-920 Microsoft Dynamics 365 Fundamentals Finance and Operations Apps (ERP) Exam

This exam covers the features and capabilities of Microsoft Dynamics 365 finance and operations apps.

Candidates for this exam should have general knowledge of or relevant working experience in an Information Technology (IT) environment. They should also have a fundamental understanding of financial principles and business operations.

Beta exams are not scored immediately because we are gathering data on the quality of the questions and the exam. Learn more about the value and importance of beta exams.

Part of the requirements for: Microsoft Certified: Dynamics 365 Fundamentals Finance and Operations Apps (ERP)

Related exams: none
Exam MB-920: Microsoft Dynamics 365 Fundamentals Finance and Operations Apps (ERP) (beta)
Languages: English
Retirement date: none

This exam measures your ability to describe the following: Dynamics 365 Supply Chain Management; Dynamics Finance; Dynamics 365 Commerce; Dynamics 365 Human Resources; Project Operations; and shared features.

Skills measured
Describe Dynamics 365 Supply Chain Management (25-30%)
Describe Dynamics Finance (20-25%)
Describe Dynamics 365 Commerce (10-15%)
Describe Dynamics 365 Human Resources (5-10%)
Describe Project Operations (10-15%)
Describe shared features (10-15%)

Audience Profile
This exam covers the features and capabilities of Microsoft Dynamics 365 finance and operations apps.
Candidates of this exam should have general knowledge of or relevant working experience in an Information Technology (IT) environment. They should also have a fundamental understanding of financial principles and business operations.

Skills Measured
NOTE: The bullets that appear below each of the skills measured are intended to illustrate how we are assessing that skill. This list is NOT definitive or exhaustive.
NOTE: Most questions cover features that are General Availability (GA). The exam may contain questions on Preview features if those features are commonly used.

Describe Dynamics 365 Supply Chain Management (25-30%)
Identify general capabilities
 describe manufacturing types including Discrete, Lean, and Process manufacturing
 describe production control elements including bills of materials (BOMs), formulas,

Kanban’s, resources, and routing
 describe product master records and product variants
Describe warehouse and inventory management capabilities
 describe costing methods including standard costing, weighted averages, last-in-first-out (LIFO), and first-in-first-out (FIFO)
 describe use cases for Warehouse Management System (WMS)
 describe purchase orders, item arrival journals, and cross-docking
 describe inventory reservations, picking and packing, replenishment, and shipments
 describe inventory counting and inventory on-hand concepts
 describe quality management capabilities
 describe warehouse configuration options including layout, stocking limits, and location profiles

Describe manufacturing strategies
 describe manufacturing strategies including make to order (MTO), make to stock (MTS), and configure to order (CTO)
 describe item tracking and tracing processes
 describe tools that can be used to manage shop floors

Describe enterprise asset management capabilities
 describe enterprise asset management concepts
 describe the work order lifecycle including work order scheduling, preventative work orders, corrective work orders, and inspections
 describe vendor warranty agreements including full and partial agreements

Describe Dynamics Finance (20-25%)
Describe the Dynamics 365 Finance features
 describe use cases for legal entities
 describe how Dynamics 365 Finance handles regional tax reporting requirements
 describe cost accounting concepts

Describe general ledgers
 describe charts of accounts including main accounts, balance sheets, and income statements
 describe financial dimensions and dimension set concepts
 describe periodic financial processes

Describe accounts payables and accounts receivables
 describe core accounts payable components including vendors, purchase orders, and vendor invoices
 describe vendor payments and settlements including three-way matching concepts
 describe core accounts receivable components including customers, customer invoices, and free text invoices
 describe credit and collection processes

Describe related finance components
 describe cash and bank management concepts
 describe expense management including cash advances and mobile workspaces
 describe fixed asset management, and fixed asset creation, acquisition, and depreciation
 describe budgeting capabilities

Describe Dynamics 365 Commerce (10-15%)
Describe Dynamics 365 Commerce capabilities
 describe retail channels including call centers, Cloud Point-Of-Sale (CPOS), and Modern Point-Of-Sale (MPOS)
 describe channel management concepts
 describe Distributed Order Management (DOM)
 describe product assortments
 describe customer loyalty concepts
 describe how Dynamics 365 Commerce uses Dynamics 365 Customer Insights to create personalized customer experiences and provide product recommendations
 describe how Dynamics 365 Commerce uses Retail Analytics to provide centralized retail data management

Describe Dynamics 365 Fraud Protection
 describe how Dynamics 365 Fraud Protection evaluates purchase transaction to reduce fraud losses and increase bank acceptance rates
 describe how Dynamics 365 Fraud Protection prevents unauthorized account creation, account takeovers, and fraudulent account access
 describe how Dynamics 365 Fraud Protection prevents loss related to fraudulent returns and discounts, identifying the risk of loss to a business, and identifying anomalies in merchandise discounting and returns

Describe Dynamics 365 Human Resources (5-10%)
Describe core capabilities
 describe compensation and benefits capabilities
 describe compliance features
 describe performance management capabilities

Describe personnel management capabilities
 describe self-service capabilities
 describe leave and absence capabilities
 describe employee training and certification features
 identify integration options between Dynamics 365 Human Resources and LinkedIn

Describe Project Operations (10-15%)
Identify Project Operations capabilities
 describe project-based services
 describe project sales capabilities
 describe project contract capabilities
 describe project pricing capabilities
 describe the project lifecycle including project invoicing and revenue recognition

Describe project planning and execution capabilities
 identify project features including contracts, stages, team assignments, and fixed price versus time and material estimates versus retainer contracts
 describe project team management capabilities including allocation methods, resource scheduling, and skills
 describe project schedule management capabilities including tasks, subtasks, assignments, and project plan management
 describe project cost tracking capabilities including time and expense costs

Describe shared features (10-15%)
Describe reporting capabilities
 describe built-in reporting capabilities including workspaces
 describe options for exporting data to Microsoft Excel
 describe options for analyzing data by using Power BI

Describe integration options
 describe Microsoft Teams integration capabilities
 describe use cases for integrating with Microsoft Excel and Microsoft Word
 describe options for managing documents by using SharePoint Online
 describe email integration capabilities

QUESTION 1
A company plans to implement Dynamics 365 Supply Chain Management.
The company wants shop floor workers to register their daily work by using the production floor execution interface.
Which two activities can employees perform by using the tool? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. Schedule a production order.
B. Register scrap quantity during production.
C. Register raw material consumption.
D. Clock in and clock out.

Correct Answer: BD

QUESTION 2
A candle manufacturing company plans to use Dynamics 365 Supply Chain Management. The proportions of ingredients differ for each finished product.
You need to recommend a manufacturing type for the company.
Which type of manufacturing should the company implement?

A. Process
B. Lean
C. Discrete

Correct Answer: A

QUESTION 3
An organization has two legal entities. Items may be sold by one company only or by both companies.
You need to recommend a solution to standardize the items across the legal entities.
What should you recommend?

A. Lifecycle Services
B. Item templates
C. Products and product masters
D. Product Insights

Correct Answer: C

QUESTION 4
A company implements Dynamics 365 Finance.
Which two components can you use to create a financial dimension set?
Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A. Derived dimension
B. Financial dimension
C. Main account
D. Account structure

Correct Answer: BC

Actualkey Microsoft MB-920 Exam pdf, Certkingdom Microsoft MB-920 PDF

MCTS Training, MCITP Trainnig

Best Microsoft MB-920 Certification, Microsoft MB-920 Training at certkingdom.com