Tag Archives: Microsoft MCITP Training

The future according to Big Blue

IBM unveils its annual list of five emerging technologies that will supposedly change our lives in the next five years.

As so many look back at where we’ve been in 2011, IBM is looking forward at where we’ll likely be in the not-so-distant future.

 

Cisco CCNA Training, Cisco CCNA Certification

Best IBM Certification Training and IBM Exams Training  and more Cisco exams log in to Certkingdom.com

Today, the company releases the sixth annual “IBM 5 in 5” list of the five innovations “that have the potential to change the way people work, live, and interact during the next five years.”

According to IBM’s own research, “people power will come to life” as kinetic energy created by everything from human activity to heat from your computer is harnessed as renewable energy for homes, businesses, and even entire cities.

12345 may soon be out as the most popular password of all time because “you will never need a password again” but will instead rely on biometrics, or unique biological features such as eyes and fingerprints, to unlock doors, access computers, and even withdraw money.

Jokes about mainlining information or computer mind-melds may also become a thing of the past as IBM scientists in the field of bioinformatics look for new ways to link your brain to your devices so that “mind reading is no longer science fiction.”

Also, advances in mobile technology will lead to much more than an increase photo and status updates as better, faster, and cheaper mobile technologies lead to a brighter future where “the digital divide will cease to exist” for the planet’s 7 billion people.

And finally, turns out that “junk mail will become priority mail” when advertisements become so personalized and spam filters so effective that every offer is relevant to the individual user and no offer will ever really be unwanted.

True life will soon be at least as interesting as science fiction according to IBM which claims that some parts of each of these innovations already exist in its labs in some form of reality or another.

IBM buys Emptoris for contract managment, supply software

IBM has signed a deal to buy supply and contract management software vendor Emptoris in another bid to fill out its growing catalog of business-to-business and business-to-consumer commerce technologies, the company announced Thursday. Terms of the deal, which is scheduled to close in the first quarter of next year, were not provided.

MCTS Certification, MCITP Certification

Best IBM Certification Training and IBM Exams Training  and more Cisco exams log in to examkingdom.com

The move closely follows IBM’s US$440 million purchase last week of DemandTec, maker of analytics software that retailers use to fine-tune their product offerings and pricing strategies.

Emptoris has about 725 employees and 350 customers, including ADP, Kraft and American Express. In recent years, the company suffered a US$7 million judgment against it in connection with a patent case filed by its competitor, Ariba.

IBM’s move to buy Emptoris comes shortly after the launch of a new version of the smaller company’s product suite, which it dubbed a “strategic supply management platform for the future.”

Features include an overhauled user experience, including support for many browsers, the iPad and integration with Microsoft Office; a program management module; a global repository for data regarding suppliers; and BI (business intelligence) functionality based on SAP’s Business Objects software. It’s not clear whether IBM will look to swap out the last feature with its own Cognos BI platform.

During the early and mid-2000s, Emptoris set out to be the top suite vendor for strategic sourcing, and largely succeeded, said Jason Busch managing director of advisory firm Azul Partners and editor of the Spend Matters blog.

“It was one of the best, if not the best, at that time,” said Busch. “They did a great job of convincing the market they had a better mousetrap.” Busch also competed against Emptoris years ago while working for FreeMarkets, a company acquired by Ariba in 2004.

Ariba’s patent case came at a “horrible” juncture for Emptoris, he added. “They were unable to raise the high-valuation funding rounds they were able to before,” due to the uncertainty, he said. Marlin Equity Partners took a majority stake in Emptoris in 2009.

Emptoris has since gotten back on track, Busch said. “It’s one of the stronger products in the sourcing market today.”

IBM’s announcement drew a cool reception from Tim Minahan, chief marketing officer for Ariba.

“It validates the strategy we’ve been pursuing,” he said in an interview. “We continue to compete against and have beat Emptoris quite handily in the past. This is a change in business cards for them, not much else. There’s still a lot of runway for IBM to travel. Acquiring a sourcing company isn’t going to do it. We have the world’s largest web-based trading network.”

However, IBM may really be intent on using Emptoris to compete more effectively in the procurement BPO (business process outsourcing) market, Busch said. “This certainly puts pressure on Accenture in this market, and the other significant BPOs as well, who may or may not own significant software assets.”

Meanwhile, sourcing software providers, both pure-play companies and ERP (enterprise resource planning) vendors such as Oracle and SAP, may have less to worry about. “This presents a huge opportunity for the best-of-breed as well as the ERPs,” he said. “Typically when IBM acquires software the rate of innovation is not what it was before.”

LG Infinia 3D LED HDTV with Smart Tv Set Analyze

The LG 47LW6500 is a brand name-new passive three or more-D flat panel tv set offering; this television set supports the company’s “LG Cinema” characteristic. The LG Cinema function is primarily based upon the inclusion of your film type patterned retarder overlaid in excess of this established’s LED exhibit. With this distinct characteristic the user is ensured prime quality photographs currently being despatched on the still left and right eye to ensure that a few-D photographs may be viewed with supreme clarity. Pictures are viewed with lgt fat, beautiful, durable, polarized three or more-D glasses that call for no batteries for operation. Of course, the LG Cinema characteristic is only a single of your quite a few highlights that may be located on this particular substantial-definition television set arranged.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

The LG 47LW6500 has an austere framework; the exterior of this tv established is jet black having a large gloss end. Around the edge with the television set is really a silver framework embellishment. The system from the television arranged has rectangular smooth corners. All connection selections are color-coded and placed within the again of the system. A few minor controls are positioned on the entrance of the device, but for the most component this tv is operated with the magic wand-like remote control. This television set can relaxation on an incorporated rectangular foundation which has a clear, square neck shaped like a cube. The bottommost portion of your base is black to match the tv system. The exhibit panel on this gadget actions 47 inches throughout.

The LG 47LW6500 features a framework that is only an inch thick. This high-definition television set offers up a panel product of seamless glass. This television set fixed has flicker no cost certification, a few-D light boost technologies, a 1080p complete large-definition several-D resolution, two-D to three-D conversion instruments, white balance controls, a number of calibration presets, Net connectivity, and it offers the individual accessibility to Intelligent TV as well as Sensible Share. Customers can access The web together with the included browser on this television fixed and this device could be connected to your personal computer. This excessive-definition tv set delivers 3-D passive technologies permitting the individual to enjoy all tv set programming in a few-D structure even though wearing passive, lgt excess weight 3-D glasses.

End users of your Panasonic tc-l32c3 review will easily appear to enjoy the motion delicate remote handle that’s bought while using unit. The fixed’s quick refresh price of 240 Hz also ensures higher-quality images whenever the set is utilized. The inclusion of your Wi-Fi dongle helps make Web connectivity uncomplicated. Access to NetCast, Intelligent TELEVISION, The web, as well as a variety of in-house functions also diversify the functions of this large-definition, flat-panel providing. This set is supplied with four pairs of passive three or more-D glasses so everyone from the spouse and children can love television set programming in three or more-D structure along.

The LG 47LW6500’s LG Cinema function is only the icing on the cake when it comes to this certain flat-panel offering. This television set established’s ease-of-use, attractiveness, and array of sophisticated technologies will undoubtedly make it a coveted HD television set for a few-D enabled television set seekers. The collection provides ease of connectivity, a generous screen measurement, a 1920 x 1080p optimum, native resolution, an impressive facet ratio of 16 to 9, and LED edgelit spine lighting technologies. You obtain all of your over-mentioned features and specifications for a single all time reduced selling price far too.

What do other folks ought to say about their activities with the LG 47LW6500?

Wise TELLY’s provide the capabilities of the computer, from a tv set arranged. It offers a multitude of companies that unusual TVs can’t. These TVs, also termed related TELEVISION SET or hybrid TV, may be the brand given to any technology that connects the characteristics of your internet with a television set arranged. It offers accessibility to apps, online games, web browsing and World-Wide-Web Protocol Tv, or iPTV.

iPTV permits consumers to view streaming video recording from the world wide web; possibly picture clips or continuous channels. Smart TELEVISION SET provides the skill to access identical content material that’s within the world-wide-web through the comfort of the residing area.

Report: Google, Intel among Chinese hacker targets

Bloomberg report says Chinese cyberspies have hit hundreds of companies, government agencies

Cyberspies from China have hit 760 companies, research institutions, ISPs and government agencies over the past decade, according to a Bloomberg article published Tuesday.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

YEAR IN REVIEW: 2011’s biggest security snafus

The Bloomberg story names a range of possible industrial espionage victims of China-based computer hacking, including technology companies such as Intel, HP, Yahoo and Salt Lake City-based iBahn, whose network services international travelers. Also on the list: Xerox division Associated Computer Systems, Volkswagen, Innovative Solutions & Support, MIT, the Italian Academic and Research Network, the California State University Network and Boston Scientific. The Bloomberg article also mentions Google, which in 2010 itself publicly disclosed an attack it indicated was likely tied to China.

The Bloomberg article doesn’t detail the exact source of its information, other than to allude to “a senior U.S. intelligence officer.” One named source for the article, Dmitri Alperovitch, head of his own firm Asymmetric Cyber Operations, says hackers launching a cyberattack from China broke into South Korean steel company POSCO in July 2006 at the time of a large business transaction related to a steel mill in China.

Additional allegedly hacked companies listed by Bloomberg but not attributed to named sources other than “intelligence data” include Danish technology company Thrane & Thrane, Abbott Laboratories, Wyeth (now part of Pfizer), Parkland Computer Center in Rockville, Md., Cypress Semiconductor, Research in Motion, Aerospace Corp. and Environmental Systems Research Institute.

Read more about security in Network World’s Security section.

SAP Business One Small ERP Package with Worldwide Availability

We often hear the question from small business owners: ‘We cannot afford expensive high-end corporate ERP solution and at the same time we are active participant in international business. Which accounting solution should we consider for implementation?’ This question is very good as it allows us to come through accounting packages and try to categorize them. First of all there are small and mid-market ERP products that are available in United States only and plus probably in English speaking countries. If you begin your research with one of the consulting firms selling product available on the USA market exclusively then they probably suggest you to pick one of the local accounting packages available in the targeted country with the option to consolidate financial statements. Good examples are Microsiga in Brazil or 1S Accounting in Russian Federation. This tandem solution theoretically should work but here you have to pay twice for software licenses, implementation consulting and probably expect some overhead in communication between your USA based consulting firm and foreign consultants who are implementing accounting for your overseas location. We would like to suggest different approach by looking at SAP B1. If you remember the history of late 1990th when such ERP vendors as Great Plains Software, Oracle and SAP were trying to introduce scaled down version of their high-end Corporate ERP packages, good example would be Small Business Financials (initially Small Business Manager) from Great Plains Software. Later on big players realized that scaling down is not an ideal solution and the development of the story was acquisition of future Business One by SAP and similar steps from other vendors:

MCTS Certification, MCITP Certification

Best HP Certification Training and HP Exams Training  and more Cisco exams log in to examkingdom.com

1. Corporate ERP Localization concept overview. If you have one of the accounting packages implemented in the United States this doesn’t automatically mean that you can deploy the same application in the overseas located office. There are hurdles associated with local country language support and compliance to business code in such areas as taxation, state and federal reporting. Here in the USA we have requirements to file 1099 to report about payments to your contractors as well as W2 to report on employee wages and taxes. United States are pretty liberal and encouraging healthy business climate. Foreign country might be more restrictive and exercise higher control including money repatriation to the States. The XXI century seems to be the century of rising China and South East Asia. Initially in earlier 1980th and through 1990th accounting packages were concentrating on North American and European markets and paying only minimal attention to China and India. Good example in Microsoft Dynamics GP or formerly known as Great Plains where Dexterity IDE doesn’t support Unicode characters (two bytes long and covering all languages including Chinese hieroglyphs)

2. SAP B1 and its position on the international Small Business ERP market. SAP policy seems to be pursuing ERP market worldwide including such countries and regions as China, Brazil, Latin America and Russian Federation. It doesn’t have issues with Unicode and supports all kind of hieroglyphs as well as its recommended managerial reporting tool Crystal Reports (SAP acquired Business Objects few years ago)

3. Version 8.8X. Here we see the merge of A and B flavors (compare to 2005A/B and 2007A/B). This might be considered as small progress however think about the way to install SB1 on central server located in the headquarters and exposed to international users via Citrix, VPN or Microsoft Terminal Server

4. Simple Discrete Manufacturing. What are you doing in the foreign countries? Typically you are manufacturing your finished goods with the destination to the European and American consumer market or you sell your products to the local consumer or in B2B environment. Business One has simple bill of materials, MRP as well as powerful Sales set of modules

5. Please call us 1-866-304-3265, 1-269-605-4904 (for international customers, where our representatives pick up the phone in Naperville and St. Joseph, MI call centers). help@efaru.com. We have local presence in Atlanta, Chicago, Southern California, South West Michigan, Houston and Dallas areas of Texas. We serve customers USA, Canada, Mexico and Brazil nationwide and internationally via web sessions and phone conferences (Skype is welcomed). Our consultants speak English, Spanish, Portuguese, Russian and Chinese. One of our experiences is international Corporate ERP and Consolidated Financial reporting

Andrew Karasev is SAP Business One consultant and Great Plains Certified Master, MVP, MCSE and MSDBA, help@efaru.com 1-866-304-3265, 1-269-605-4904. He is also the initiator of eFaru project https:://www.efaru.com and founder of Alba Spectrum information space. Please note that we implement and support Dynamics GP directly through Alba Spectrum

MSL Product Planner Shares Perspective

A few months back, Microsoft Learning Product Planner, Eamonn Kelly shared perspective on the lab experience from course 10215A: Implementing and Managing Microsoft Server Virtualization. If you have not signed up for Virtualization training, Learning Partners are offering special offers on four popular Virtualization courses this quarter. Take a look at current offers to the right.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

Eamonn’s post:

10215A released in October 2010 and in that short period time it has become one of our most popular courses in terms of positive feedback submitted via MTM. This five day server virtualization course covers a lot of technologies and functionality. At a high level it covers Hyper-V, SCVMM 2008 R2, Integration with SCOM 2008 R2, DPM 2007 Sp1 as well as RDS. So it’s a broad set of technologies and students should come away from it with a good understanding of what the options and pitfalls are when considering virtualizing a server infrastructure. As well as this, it also prepares students for the 70-659: TS: Windows Server 2008 R2, Server Virtualization exam.

The lab experience for students was one of the key drivers when designing the course and as such the requirements for the labs are above the standard spec, namely a single host running Windows server 2008 RTM. In this course the Instructor and each student require two host machines running Windows Server 2008 R2. Labs covering High Availability, in Module 9 for example, will not be able to be completed unless this is available, but this “above standard” spec does provide an excellent and real world lab experience. Definitely to be recommended to students!

I will return to post additional bogs on the actual content covered in the course both this week and next and will dig a bit deeper into the labs to try explain why decisions were made and why some items were covered as they are.

If there are any specific questions around the labs or the course feel free to post them here and I’ll try my best to answer!

Thanks,

Extended IT Support For Windows Servers And Windows PCs

In these difficult economic times many companies understandably want to extend Business IT Support and hardware maintenance on their Microsoft Servers and PCs for as long as they can.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com

But at some point the hardware will run out of warranty and it will become so old that your IT Support Company will be unable to provide adequate IT Support.

How Long Can You Extend IT Support On Old Computers?

Generally Servers and PCs will last for between 3 and 5 years.

There are 3 main reasons for this:

1. After 5 years it’s almost impossible to get a warranty. That means if it breaks it’s difficult to fix. Even if you could get a warranty it would be expensive compared to the cost of a new computer.
2. The version of software on the computer will be quite old. This may make it difficult to exchange information with people who have a more current version of the software despite the best efforts of your Business IT Support Company
3. Old computers are slow. Your users are likely to be frustrated. As far as they are concerned their PC or the network server will be getting in the way of them doing their work.

So by this stage it will be slow, won’t interact well with more modern systems in the outside world and can’t be repaired.

Limits On Managed IT Support Services

It will probably be too expensive for your IT Support Company to maintain your old computers. If you have a fixed price Managed IT Support Service there is likely to be a clause in the IT Support Contract that limits IT Support on old computers. After 5 years it’s probably more expensive to keep an old computer than replace it.

Replacing your Server

Your servers are pretty fundamental, so it’s important that you have an IT Support Contract for them. However Business IT Support isn’t the whole picture – hardware maintenance is important too.

The performance and reliability of your servers will affect all of your staff, not just 1 or 2. After 5 years it’s almost impossible to get a warranty, so if it breaks your IT Support Company probably won’t be able to get it fixed for you.

Most businesses are so dependent on their servers that they cannot afford for that to happen. So, at the very latest it will need to be replaced when you can no longer get a warranty, or an IT Support Contract.

However you may need to replace it before then if it will not run the most recent version of an application that you must upgrade to. Or if the growth of your business means that it is no longer powerful enough for your requirements. Your IT Support Company should advise you of this.

Hardware Maintenance From Your IT Support Company

Believe it or not the hardware manufacturers are the best and the cheapest people for hardware maintenance. IT Support Companies are not particularly well geared up for hardware maintenance.

We would advise you to buy Dell servers and PC’s. It’s good quality kit and Dell will come to your site within 4 hours and repair the hardware. And because they manufactured the hardware, unlike the IT Support Company, they have the parts to fix it quickly.

All the others – Toshiba, Sony, Apple etc. – make you send the broken hardware to them. They will return it to you 2 weeks later usually with the hard drive wiped, so it will require a complete rebuild by your IT Support Company. Your IT Support Company should liaise with the hardware manufacturer when you do have a problem – after all that’s why you’re paying for an IT Support Contract!

Magic Photo Recovery 3.0 Makes Photo Recovery Faster and Easier

East Imperial Soft updates Magic Photo Recovery, the company’s product for recovering deleted digital pictures, making it faster, safer, and easier to use. Version 3 offers a much improved recovery algorithm, significantly increasing the speed and quality of recovery. The new disk imaging feature makes the recovery safer by allowing working with a virtual disk image instead of the physical drive.

Cisco CCNA Training, Cisco CCNA Certification

Best HP Certification Training and HP Exams Training  and more Cisco exams log in to Certkingdom.com

In addition, Magic Photo Recovery can store recovered pictures onto a remote FTP location, burn them onto a CD/DVD, or create a burnable ISO image.

About Magic Photo Recovery

Magic Photo Recovery makes undeleting lost and deleted pictures easy, bringing a sophisticated pictures recovery tool to experienced computer users as well as complete novices. Combining comprehensive recovery algorithms with quick and easy user interface based on step-by-step wizards and instant pre-recovery preview, Magic Photo Recovery is used by pros and novices alike.

Recognizing common file systems and popular kinds of storage media, the product can discover and successfully recover digital pictures stored on formatted, damaged, and even inaccessible disks and memory cards. Even if the disk is formatted and then re-formatted with another type of file system, Magic Photo Recovery can still locate and recover most of the pictures it held.

The new image recovery algorithm greatly improves the speed of recovery, reducing the time spent on scanning the disk and saving recoverable information. The new algorithm can now locate more lost pictures than ever, significantly improving the quality of recovery compared to earlier versions.

The new disk imaging feature can capture a bit-precise snapshot of a disk, memory card, or USB drive, then doing the recovery safely off-line. The disk snapshot feature makes picture recovery from smaller-size storage media such as memory cards, flash drives, SSD and laptop hard drives much safer than recovering from a live, in-use storage media. The feature can also capture a snapshot of the contents of built-in memory of many makes and models of digital cameras and MP3 players.

Pricing and Availability

Magic Photo Recovery 3.0 is available in Home, Office and Commercial editions. A free evaluation version is available at the company’s Web site.

Compatibility

Magic Photo Recovery works in all 32-bit and 64-bit versions of Windows starting from Windows 95 to the latest Windows 7 and 2008 Server. FAT12/16/32, NTFS (NT4) and NTFS5 (2000, XP, Vista, 7) file systems are supported. The product supports all types of storage media, and was tested on desktop and laptop hard drives, external drives, USB drives and all popular types of memory cards. Through-the-wire recovery is supported for most types of MP3 players and digital compact cameras. Digital pictures and RAW files produced by all types of cameras including those manufactured by Nikon, Canon, Olympus, Casio, Kodak, Sony, Pentax, Panasonic, etc. can be recovered.

About East Imperial Soft

Since its foundation in 2002, East Imperial Soft has developed a range of comprehensive data recovery tools, helping users of Microsoft Windows PC’s to get deleted data back. The range includes tools that make it easy to recover all types of data. By delivering quality products and professional customer service, East Imperial Soft provides its customers with supreme experience.

The right website marketing can give you the results you desire.

When you have a business website or are an online business, website marketing is essential this is because it will help you ensure that your website is seen by many potential clients and customers. Thousands of people use the internet daily and there are many different websites available and so it is essential that your website has the right marketing in place as you want your website to be ahead of your competitors’ websites in the search engine rankings.

MCTS Certification, MCITP Certification

Best Avaya Certification Training and Avaya Exams Training  and more Cisco exams log in to examkingdom.com

We have many tried and tested techniques which we will put into place on your website, we also keep up to date with all the latest techniques, we want to be able to offer you the very best service and by doing this we know that we can.

When it comes to choosing a company for your website marketing you should ensure that they are a company who will deliver what they promise. You can do this by seeing where their own website ranks, if they are not a high ranking website then how can you expect them to get your website where you want it. You should then find out who their clients are and find out where their clients rank, a company’s own website may rank highly but they may not put the same effort into their clients’ websites. If a company’s own website ranks highly and their clients’ websites rank highly then you know that you can entrust your website marketing to that company. You will find that our website ranks highly and that our clients’ websites rank highly which allows you to know that we will deliver what we have promised.

When it comes to giving your website that all important boost in rankings, there are two techniques you can put into place which when working side by side can give you the result that you desire. Those two techniques are search engine optimisation (SEO) and cost per click (CPC) advertising. SEO will give your website a gradual increase in rankings, this is because individual techniques need to be put into place and then they need to take hold on your website before it can begin to gradually rise in the rankings, SEO will not give you an instant boost however one you have that increase in rankings it will gradually rise and the techniques will help you maintain your increased ranking. CPC will help give your website an instant boost in traffic; this is because the advertisements can be placed on the first page of search results due to it being a paid listing. You will choose the keywords you wish to target and then your advertisement will appear when those keywords are searched for. This form of advertising is very beneficial because you only pay for your advertisement when it is clicked on rather than each time it is shown on the search engine pages; this means that it can be shown an unlimited amount of times until you either have no money in your account or until you cancel your CPC campaign.

If you have SEO and CPC working alongside each other you may wish to cancel your CPC campaign once your website is ranking highly, however you may still find it beneficial to keep it in place. SEO allows you to focus on a wide array of different keywords and you may find that you receive a high ranking for your less common keywords before your common keywords start ranking highly. A CPC campaign is more effective if you focus on your more common keywords this is because it will appear more regularly on the search engines, however those keywords will cost you more.

Free Microsoft 70-291 Q & A / Study Guide – part III

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

 

QUESTION 704:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com consists of a file server named Certkingdom -SR40 that runs Windows
Server 2003. Certkingdom.com also contains crucial third-party applications, which
must be accessed by all the finance users of the main office and the branch offices.
You have received instruction to create a procedures document for Certkingdom.com
administrators. You need to define the recommended settings for each system
service that can be enables on a Windows Server2003 system. In a case of
emergency the service should be automatically restarted, if it fails more than three
times. You also setup the service to send a message to your computer if the service
failed. In the Property dialog box of a service has a number of Services consoles.
What could the services be?

A. The number of hours after which the fail account should be reset to zero.
B. Whether or not the Recovery attempt should be recorded in the System event log.
C. The number of minutes to wait before the service is restarted.
D. Whether or not the complete memory dump should be saved when the computer is
restarted.

Answer: C

Explaination: The Recovery tab of the Properties dialog box has the option to the
number of minutes to wait before the service is restarted.
Incorrect Answers:
A, B, D: You cannot configure the number of hours after which the fail account should
be reset to zero; or the whether or not the complete memory dump should be saved when
the computer is restarted, or whether or not the Recovery attempt should be recorded in
the System event log.


QUESTION 705:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com consists of a Marketing department. This department handles all the
financing and sales deeds. A Certkingdom.com user named Mia Hammis a member of
the Marketing department. Mia Hamm works on a client computer named
Certkingdom -SR30. One morning Mia Hamm complains that her hard disk has
failed. During the maintenance you then replace the hard disk and perform an
Automatic System Recovery (ASR) from a backup of her client computer.
Mia Hamm informs you that she still cannot connect to the domain. However, she is
able to connect to the domain from a coworker’s client computer. You receive an
instruction from the CIO to make sure that Mia Hammis able to connect to the
domain with Certkingdom -SR30 in order for her to do her duties.
What should you do?

A. Your first step should be to remove Certkingdom -SR30 from the domain.
Thereafter Certkingdom -SR30 can be rejoined to the domain.
B. To ensure that the user can log on to the domain the user account needs to be added to
the Administrators group on Certkingdom -SR30.
C. You should reset the computer account of Mia Hamm in Active Directory and
Computers to ensure that she will be able to log on to the domain.
D. Your best option would be to add the user account of Mia Hamm to the Power Users
group on Certkingdom -SR30.

Answer: A

Explaination: It is most probably the case that her password has expired. You need
to join the domain with Certkingdom -SR30. Doing this will allow the domain to
authenticate the computer. The password on the domain is regenerated
automatically when the computer rejoins the domain.
Incorrect Answers:
B, D: Mia Hamm does not belong either to the Administrators group or the Power Users
group. You cannot even access the computer with your user account as the administrator.
C: This method will not work properly. You should not reset computer accounts in the
Active Directory and Computers.


QUESTION 706:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com consists of two departments, named Research and Development. Half
of the client computers are in the Research department and the other half are in the
Development department. The Research department is a priority for Certkingdom.com
The client computers in the Research department run critical third-party
applications.
Certkingdom.com contains a server named Certkingdom -SR12 which hosts shared
folders named TestResDev for the Research department and Development
department. The users in the Research department and Development department
save their projects in Certkingdom -SR12 in TestResDev. The users are also allowed
to change the files or to undo the changes. To safeguard the files you implement
Shadow Copies support. Some of the users in both department complains that they
cannot access pervious version of there files. You need to ensure that the previous
versions are available to the users.
What should you do?

A. On all the client computers, enable Shadow Copies.
B. On all the client computers, install the Previous Versions client software.
C. On Certkingdom -SR12 configure disk quotas for all users.
D. On all the client computers, enable disk quotas.

Answer: B

Explaination: Shadow Copies provides periodic snapshots of shared folders on
specific volumes on hard disks.
Incorrect Answers:
A: You cannot do this, because the server side of this feature is not supported by the
client computers.
C, D: Disk quotas are used to limit the amount of disk space. This this not needed in this
scenario.


QUESTION 707:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com contains a Finance department. This department handles all the
marketing and sales deeds. It was requested of you to periodically perform
Automatic System Recovery (ASR) backups of all the servers in Certkingdom.com A
Certkingdom.com user named Andy Reid is a member of the Finance department.
Andy Reid works on a client computer named Certkingdom -SR10 which is
configured as a Certification Authority (CA). Certkingdom -SR10 contains two hard
drives, one hard drive named drive C consists of the operating system, and the other
hard drive named D consist of the CA database. The drive D of Certkingdom -SR10
failed and the CA database was lost.
During the maintenance you replaced the hard drive. You now need to replace the
lost data with the minimum of administrative effort. You receive an instruction
from the CIO to make sure that Certkingdom -SR10 continues to operate as a CA.
What should you do on Certkingdom -SR10?

A. To ensure that Certkingdom -SR10 continues to operate you need to boot from the
Windows Server 2003 installation CD.
Thereafter you can restore the ASR restore.
B. Your best option is to restart Certkingdom -SR10 in Directory Services Restore Mode.
Thereafter you can execute a non-authoritative restore of the CA database.
C. Your first step should be to restart Certkingdom -SR10 in Directory Services Restore
Mode.
Then you can execute an authoritative restore of the CA database.
D. Your best option would be to restore System State from the most recent ASR backup.

Answer: D

Explaination: This is a collection of files (System State) that contains the information
that is needed to rebuild an identical copy of the computer.
Incorrect Answers:
A: It is no need to ASR because the drive C which contains the operating system is not
damage.
B, C: You cannot start Certkingdom -SR10 in Directory Services Restore Mode, because it is
not a domain controller.


QUESTION 708:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all user
workstations run Windows XP Professional.
Certkingdom.com contains a Research department. The Research department is a
priority for Certkingdom.com The user workstations in the Research department run
critical third-party applications. The Research department is planning to open a
new technical line. The manager will use this line to alter any changes of the
complete product of the Research department. This will lead to frequent changes of
the related documents. The manager also needs the previous versions of the
products if it was changed.
Certkingdom.com contains a server named Certkingdom -SR21. Certkingdom -SR21
consists of three disks which host lots of shared folders. You are planning to host the
documentation of the technical lines share folder on this server. You receive an
instruction from the CIO to ensure that your answer does not entail the
maintenance the earlier versions of any other data only the documentation of the
new technical line.
What should you do?

A. To comply with the requirements of the CIO you need to allow shadow copies on the
user workstations.
B. Periodical backups need to be executed in order to comply with the requirements.
C. Your best option would be to create a share folder on a new volume on
Certkingdom -SR21 as well as enabling shadow copies.
D. The Previous Versions software needs to be deployed on Certkingdom -SR21 in order
to comply with the instruction of the CIO.

Answer: C

Explaination: Shadow Copies provides periodic snapshots of shared folders on
specific volumes on hard disks.
Incorrect Answers:
A: The user workstations run Windows XP Professional, shadow copies is new and
resides in Windows Server 2003.
B: You should perform periodic backups of all documentation. However these backup
would not be available immediately.
D: The Previous Versions software should be deployed on the user workstations not the
server.


QUESTION 709:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com contains a server named Certkingdom -SR44 which runs Exchange
2003. Certkingdom -SR44 also consists of proprietary financing applications. All the
Certkingdom.com users access their mail from this server. Certkingdom -SR44 is
configured with a 2.6 MHz CPU, 512 MB of RAM and two 74.5 GB hard disks.
Certkingdom -SR44 is connected to a LAN at 100 Mbps with a network adapter.
Certkingdom -SR44 supports 4,000 user mailboxes. Certkingdom -SR44 is continuously
used as users access their mail. A Certkingdom.com manager named Andy Booth
complains that his users struggle to open large e-mail messages, due to the slow
response of the server. You make use of System Monitor to view the results.


You receive an instruction from the CIO to identify the reason for the new response.
Which component should you identify?

A. A possible reason for the slow response time is the Network Adapter
B. The Processor is the possible cause for the slow response time.
C. The component causing the slow response is the Hard disk
D. The slow response time of the server is caused by the Memory.

Answer: D

Explaination: The memory reports an average of only 20 MB available. The value
should remain 5 % of the total system memory.
Incorrect Answers:
A, B: These counters do not indicate a cause of a bottleneck.
C: The hard disks are very busy. It should remain below 50 %. You should first check the
memory before you identify the hard disk as the source of the bottleneck.


QUESTION 710:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com has its headquarters in Chicago and a branch office in Miami.
Certkingdom.com contains a server named Certkingdom -SR33 which is configured as a
router. A new Certkingdom.com security policy restricts the use of streaming audio to
some of the users. Certkingdom.com consists of a Sales department in the branch office.
The managers in the branch office complain about the slow network response.
During an investigation you find that some users are controlling the available
bandwidth. You need to find out if the users are violating the Certkingdom.com security
policy. You also need to find out which users did receive those packets.
Which utility should you use?

A. You should make use of the Network Monitor utility to identify the users who violates
the security policy.
B. The IP Security Monitor should be used to identify the users who violaste the security
policy.
C. In order for you to determine which users violates the policy you need to make use of
the Replication Monitor utility.
D. You should consider making use of the System Monitor utility to determine which
users are at default.

Answer: A

Explaination: To capture network traffic, the System Monitor is used. You can filter
it so that it can meet the criteria that you are looking for.
Incorrect Answers:
B: The IP Security Monitor is used to monitor IPSec information. You cannot use it to
monitor network traffic.
C: This is used to monitor Active Directory replication.
D: The System Monitor is used to gather information about the CPU, Memory etc.


QUESTION 711:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com The
Certkingdom.com network contains ten Windows Server 2003 computers and 1,100
Windows 2000 Professional computers. Three of the Windows Server 2003
computers in configured as domain controllers.
Certkingdom.com has a Finance department in Chicago and a Marketing department in
Dallas. These departments are connected to the Internet. The users in these
departments use the network often to send and download important files and
Internet e-mail. The Certkingdom.com users also access the Internet to get the latest
information on the product. A new Certkingdom.com security policy requires that
network administrators should use their domain user account to log on. Whenever
the administrators need an administrative privilege, they should use the runas
command. The runas command will launch an application that will allow
permission to execute the required task.
One morning an administrator named Rory Allen complains that the name
resolution has failed on the network. During an investigation you try to run Rory
Allen administrative user account, RMAdmin1 and issue the following command:
runas/user:rmadmin1 replmon. When you use this command the following error
message was displayed:
RUNAS ERROR: Unable to run – replmon
1058: The service cannot be started, either because it is disabled or there are no
enabled devices associated with it. You receive an instruction from the CIO to
identify the service that stops the Replication Monitor from starting.
Which of the following services could it be?

A. Due to DNS Client failure you are unable to start Replication Monitor.
B. The Secondary Logon is the likely cause of you being unable to start Replication
Monitor.
C. The DNS Server is the cause of Replication Monitor not starting.
D. Net Logon is a possible cause of the Replication Monitor not starting.

Answer: B

Explaination: The Secondary Logon permits a user to make use of the runas
command.
Incorrect Answers:
A: The DNS Client allows you to locate Active Directory domain controllers. It also
resolves DNS names locally.
C: The DNS Server service is responsible name resolution queries from DNS clients.
D: This service is responsible for authentication remote users and services.


QUESTION 712:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com
Certkingdom.com consists of a few servers that run Windows Server 2003 and Windows
2000 Server. Some the client computers run Windows 2000 Professional, and the
others run Windows XP Professional.
Certkingdom.com contains 15 Domain controllers, 25 Windows Server 2003 servers, 15
Windows 2000 Server computers, 150 Windows XP Professional client computers
and 300 Windows 2000 Professional client computers. The Certkingdom.com domain
also contains 600 user accounts and 15 administrative accounts. The user and
computer accounts reside in an OU which is linked to a GPO as shown in the
following table:


Certkingdom.com’s user accounts resides in an OU named Certkingdom OU. This OU needs
an application named TKD_Tools which is in a Windows package named
TKD_Tools.msi. The hard disk space for TKD_Tools is 50MB. A Certkingdom.com policy
states that the TKD_Tools.msi should not be installed on a client computer that runs
Windows XP Professional or a server that runs Windows Server 2003 which has less
than 500 MB of hard disk space. Only users that are non administrative are allow to
install this TKD_Tools application. You have received an instruction from the CIO to
configure the domain to effectively install the application. You need to accomplish
this without the unnecessary installation of this application.
What should you do?

A. Your first step should be to add TKD_Tools.msi to the Computer
Configuration\Software Settings node of the MemberServers GPO.
Thereafter you will be able to create a WMI filter that will restrict the application of the
MemberServers GPO to computers with 500 MB and more hard disk space.
B. You can accomplish this by adding TKD_Tools.msi to the Computer
Configuration\Software Settings node of the WinClients GPO.
The subsequent step would be to create a WMI filter that will restrict the application of
the WinClients GPO to computers with 500 MB and more hard disk space.
C. This can bew accomplished by adding TKD_Tools.msi to the Computer
Configuration\Software Settings node of the AdminPolicy GPO.
Thereafter you can create a WMI filter that restricts the application of the
DomainControllers GPO to computers with 500 MB and more hard disk space.
D. Your best option would be to add TKD_Tools.msi to the Computer
Configuration\Software Settings node of the UserPolicy GPO.
Thereafter you can create a WMI filter that restricts the application of the UserPolicy
GPO to computers with 500 MB and more hard disk space.

Answer: D

Explaination: This is the more likely answer, because only the non-administrative
users can have this application installed. That’s way you should add the
TKD_Tools.msi to the UserPolicy GPO.
Incorrect Answers:
A: The MemberServers GPO will only apply to the Windows Server 2003 and Windows
2000 Server computers.
B: The WinClients GPO will only apply to the Windows 2000 Professional and the
Windows XP Professional client computers.
C: The AdminPolicy is users who are administrators. The scenario does not want the
administrator to have this application.


QUESTION 713:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
A Certkingdom.com client named Rory Allen installs a high-speed color printer named
Certkingdom -PR01 on a print server named Certkingdom -SR24 by using a built-in
Windows XP Professional driver. Rory Allen works in the Graphics department. He
shares the printer so that the other users can print to the new printer.
During the day the users of the Graphics department complain that they cannot
print from Certkingdom -PR01. You then make sure that Certkingdom -SR24 is
working properly and the printer is switched on. During the investigation you access
the shared folders on Certkingdom -SR24. However, it seems that Certkingdom -PR01
is unable to connect. You have to make sure that the users in the graphics
department can access Certkingdom -PR01 for there printing jobs.
What should you do?

A. Your best choice would be to configure Certkingdom -PR01 to be available.
B. You should consider restarting the Print Spooler on Certkingdom -SR24 to ensure that
the users can print.
C. To ensure that the users can print to Certkingdom -PR01 you have to update the driver.
D. This can be accomplished by uincreasing the priority of Certkingdom -PR01.

Answer: B

Explaination: The function of the Print Spooler is to manage the print queues on a
server. In this case it seems that the Print Spooler has stalled. That’s way you have
to restart the Print Spooler service.
Incorrect Answers:
A: Even if this were available, you cannot access it because you cannot connect to the
Print Spooler.
C: There is no need to update the driver, because the printer was working before.
D: To increase the priority of Certkingdom -PR01, you need to access the Property sheet.
At the moment it seems impossible, because the Print Spooler is not working.


QUESTION 714:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows 2000 Server and all client
computers run Windows XP Professional.
Certkingdom.com contains two departments, named Research and Marketing. Half of
the client computers are in the Research department and the other half are in the
Marketing department. The client computers in the Research department run
critical third-party applications.
Andy Reid is the manager of the Research department. He complains about the
poor performance of certain critical third-party applications on his client computer
named Certkingdom -WS211. You have been instructed to collect the performance
information that can be used to determine and analyze the technical problems on
the network.
Which tool can you use?

A. You should make use of Network Monitor in order to determine and analyze the
technical errors.
B. The technical errors can be determined and analysed by making use of System
Monitor.
C. You will be able to make use of Task Manager to collect the performance information.
D. You should consider making use of a counter log to determine and analyse the
technical errors.

Answer: D

Explaination: You should create a performance baseline and monitor the values of
the counters. The performance data should be recorded in a counter log.
Incorrect Answers:
A: This tool is used to parse network traffic.
B: The System Monitor can work, however it only presents current performance ion real time.
C: This is used to view information about the processors that are running on the system.


QUESTION 715:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows 2000 Server and all client
computers run Windows XP Professional.
Certkingdom.com contains two departments, named Research and Marketing. Half of
the client computers are in the Research department and the other half are in the
Marketing department. Due to the success of the two departments, Certkingdom.com
has decided to implement an e-commerce Web site, which will be used as a public
Web site for customers and a private Web site for the users.
Certkingdom.com then opens a new office for this new Web site. This office contains a
Windows Server 2003 server named Certkingdom -SR42. You intend to run a
third-party Web management application. You receive an instruction to make sure
that the suitable services are allowed on this server.
What should you do? (Select two)

A. You should consider enabling the World Wide Web Publishing Service.
B. Your best option would be to allow the DNS Server service.
C. To support the Web site you need enable the IIS Admin Service.
D. To make sure that the suitable services are allowed you need to permit the https: SSL
service.

Answer: A, D

Explaination: The https: SSL will provide the private part of the Web site and the
World Wide Web Publishing Service will provide for the public portion.
Incorrect Answers:
B: This option will offer name resolution. This will not ensure that the Web site is
available.
C: This is only needed if you use an IIS to manage the Web site. However you have a
third-party Web management application.


QUESTION 716:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com
Certkingdom.com contains 15 Windows Server 2003, 5 domain controllers and 2000
client computers which runs Windows XP Professional.
Certkingdom.com contains a Marketing department and a Finance department. A
Certkingdom.com server runs mission critical in-house applications which is used by the
users. The client computers and the domain controllers’ clock are incorrect. You
need the time to be correct other wise the Kerberos fails and you will find Kerberos
errors in the event log. You reset the clock of the client computer, but after a while
you find that the clock is again wrong. You receive an instruction from management
to make sure that the clock of the client computers displays the correct time.
What should you do?

A. To ensure that the clock displays the correct time you need to adjust the clock on the
infrastructure master.
B. To ensure that the correct time is displayed you need to select Automatically
synchronize with Internet time server on the Internet Time tab.
C. You can ensure the correct time by installing an exact time resource tool on the
network.
D. Your best option should be to adjust the clock on the PDC emulator.

Answer: D

Explaination: You should adjust the PDC emulator, because all the computers will
synchronize there clock.
Incorrect Answers:
A, B, C: In this scenario you should adjust the clock with the PDC emulator, for
authentication in an Active Directory environment.


QUESTION 717:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
Certkingdom.com contains two departments named Research and Development. Half of
the client computers are in the Research department and the other half are in the
Development department. The client computers in the Research department run
critical third-party applications.
Certkingdom.com contains a file server named Certkingdom -SR14. Shadow copies area
enabled on the volume named BillVol. During routine monitoring you discover
that BillVol has almost reached its capacity. You take action and add another disk
to the server and create a volume named TestVol. You now need to configure
shadow copies for BillVol to use the space in TestVol.
What should you do?

A. Your best choice would be to specify TestVol as the additional location on the
BillVol properties.
B. This can be accomplished by moving the shadow copies from BillVol to TestVol on
the Certkingdom -SR14.
C. You should consider sharing TestVol.
Thereafter you will be allowed to enable shadow copies on TestVol.
D. You should consider deleting the shadow copies of BillVol and specifying TestVol
as the location of shadow copies.

Answer: D

Explaination: This is the correct answer. You are unable to change the location of
the shadow copies unless you delete Vol1 of the exiting shadow copies.
Incorrect Answers:
A: You cannot share the shadow copies between BillVol and TestVol. You also cannot
move or copy files on BillVol.
B: You have to delete the shadow copies on BillVol. You cannot move the shadow
copies from BillVol to TestVol.
C: This will result in previous copies on BillVol to be periodically created. The exiting
copies on BillVol would not be affected.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com