Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "70-223" Exam

don't miss out !!

 I cleared my mcse paper easily. 100% indentical questions!!
Can't post file here but email me if you're interested.

luffmark@yahoo.com.sg 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-071 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-071" Exam

Passed with 90%, Some Questions!!!!

 

Question 1.
An electronics retailer was founded in 2001 and has been expanding rapidly. It has 21 existing locations throughout the Mid-Atlantic States. It plans to implement the Cisco unity Messaging solution over the coming months. This Unity System will integrate with Cisco call manager v3.3.

The company uses Cisco routers, switches, and firewalls. They installed a Cisco Call Manager cluster at the hosting center before the first opened. The corporate network uses Microsoft Windows 2000 servers at the central hosting center with Windows XP PC's at the stores

There is a single forest and a single domain. All domain controllers and catalog servers, and DNS servers reside at the hosting center. There are several database servers for inventory management at the hosting center.

Each store has dual T1's terminating at the hosting center via newly installed 3745 routers. The 3745 router were selected because of their scalability. The switched infrastructure at each store is a single 48-or 24 port Cisco 3550 switch.

All store locations use the single Call Manager cluster, two MCS-7835 servers, located at the hosting center. Currently, most calls are to other stores or to the hosting center. Locations are configured to allow three concurrent calls over the WAN from each store.

Management is concerned about the effects of the network outrages on the stores' ability to communicate with one another headquarters, and their Cisco Unity voice mail stored at the hosting center.

What recommendation would you make to ensure access to voice mail and the PSTN during a network outage?

A. use a redundant set of 3745 routers and BRI lines to provide service to Cisco Unity during a
network outage
B. configure a redundant set of 3550 switches and PRI lines to provide service to Cisco Unity
during a network outage
C. use the 3745 routers for SRST and PSTN connections; configure the 3745 to provide DTMF
access to the Unity server via the PSTN
D. configure the 3550 switches for SRST and PSTN connections; configure the 3550 to provide
DTMF access to the Unity server via the PSTN

Answer: C

Question 2.
ITCertKeys.com is one of the world's largest brokerage firms. This corporation was founded in 1956 and is known for providing advanced communication services to its brokers, ensuring the fastest and most reliable communication. ITCertKeys.com currently has over 10 million customers who trust them for the buying, selling, and trading of mutual funds, stocks, and precious metals.

The Company Headquarters (HQ) is located in Manhattan. It has offices in seven cities in the United States and five international cities. HQ has 3500 employees. Other U.S. locations include the Chicago office (1,200 employees); Miami (450 employees); Boston(820 employees); Dallas (350 employees); seattle (350 employees); and Los Angeles(1,100 employees). International locations include Madrid, Spain (300 employees); London.

England (200 employees); Paris, France (300 employees); Tokyo, Japan (450 employees); and Kuala Lumpur, Malaysia(500 employees).
The company uses Cisco routers, switches, firewalls, and intrusion detection and has installed Cisco Call Manager clusters at all locations. The corporate network uses Microsoft Windows 2000 Active Directory.

There are two forests. The first forest has two root domains: coa.com. and coa. internal.
The second forest root has only one domain, coaasia.com.
There are redundant domain controllers and global catalog servers at each location. DNS and DHCP servers are also found at each location. The HQ site has two OC-48 connections using HSRP. All sites have redundant T3's using HSRP to the HQ along with a T1 to every location, providing a fully meshed architecture.

The company uses an Exchange 2000 messaging platform. There are no planned upgrades to Exchange 2003 at this time.

There are two Exchange organizations: Org 1 includes all North American and European servers and Org 2 includes all Asian servers. Both organizations use a single routing group. Org 2 has each city's Exchange servers in a unique administration group, while Org 1 has a single administration group. Each office has local Internet connectivity, and each office maintains its own Exchange servers.

ITCertKeys.com just upgraded to Cisco Call Manager at all locations. Two MCS-7835 servers are located at each site, except HQ, which has three MCS-7835 servers. There are inter-cluster trunks established between all subscribers in all clusters.

ITCertKeys.com likes the ability to route all intra-company calls over their 3DES encrypted network links. The existing voice messaging platform was provided by several different vendors and there is no networking between them.

ITCertKeys.com plans to change voice messaging platforms at all locations to Cisco Unity. The system will initially be voice mail only. but will switch to Unified Messaging during the next fiscal year. Unity servers will be placed in each office.

Which kind of networking should you implement to provide messaging among all the offices?

A. Only digital networking must be implemented on all servers.
B. Only VPIM networking must be implemented on all of the servers.
C. Digital networking must be implemented on all servers. VPIM networking must be implemented
between the North American/European and Asian forests.
D. Only digital networking must be implemented on all servers and Bridge networking must be
implemented between the North American/European and Asian forests.

Answer: C

Question 3.
ITCertKeys.com is a company that sells wireless communications services to customers throughout the eastern United States. In 1999, ITCertKeys.com acquired a smaller wireless communications company, Company B. Company B provides similar services to ITCertKeys.com in the New England area.

ITCertKeys.com has its headquarters in Dulles, VA (3253 employees) and its branch offices are located in Richmond(1131 employees), Baltimore(748 employees), Washington DC(442 employees), Philadelphia(115 employees), and Trenton(26 employees). Company B has its headquarters in New York (414 employees), and its branches are in Boston(212 employees) and Providence(89 employees).

ITCertKeys.com will be implementing a centralized Cisco Unity deployment. When customers call an employee, the company wants to provide quick service on those directory lookups.

Which implementation does the best job of delivering the service?

A. buy a Platform Overlay 5 server with extra memory and processor speed to provide the
quickest service
B. build a directory handler for each office: put each subscriber in a distribution list for that office;
make that list limit the directory handler search; build an introductory call handler from the
opening greeting that provides one key dialing to each of the offices
C. build multiple directory handlers that break the company population into groups arranged
alphabetically by last name; make four groups as equal as possible in size; build an
introductory call handler from the opening greeting that provides one key dialing to each of the
four groups
D. build two directory handlers; one for company A, and one for Company B; add subscribers to
the appropriate subscriber template and use that template to limit the directory search; build
an introductory call handler from the opening greeting that provides one key dialing to each of
the directory handlers

Answer: B

Question 4.
ITCertKeys.com is one of the world's largest brokerage firms. This corporation was founded in 1956 and is known for providing advanced communication services to its brokers, ensuring the fastest and most reliable communication. The company currently has over 10 million customers who trust them for the buying, selling and trading of mutual funds, stocks, and precious metals.

ITCertKeys.com Headquarters (HQ) is located in Manhattan. It has offices in seven cities in the United States and five international cities. HQ has 3500 employees. Other U.S. locations include the Chicago office (1,200 employees); Miami (450 employees); Boston(820 employees); Dallas (350 employees); Seattle(350 employees); and Los Angeles(1,100 employees). International locations include Madrid, Spain (300 employees); London, England (200 employees); Paris, France (300 employees); Tokyo, Japan (450 employees); and Kuala Lumpur, Malaysia(500 employees). ITCertKeys.com uses Cisco routers, switches, firewalls, and intrusion detection and has installed Cisco Call Manager clusters at all locations. The corporate network uses Microsoft Windows 2000 Active Directory.

There are two forests. The first forest has two root domains: coa.com and coa.internal. The second forest root has only one domain, coaasia.com.

There are redundant domain controllers and global catalog servers at each location. DNS and DHCP servers are also found at each location. The HQ site has two OC-48 connections using HSRP. All sites have redundant T3's using HSRP to the HQ along with a T1 to every location, providing a fully meshed architecture.

ITCertKeys.com uses an Exchange 2000 messaging platform. There are no planned upgrades to Exchange 2003 at this time.

There are two Exchange organizations: Org 1 includes all North American and European servers and Org2 includes all Asian servers. Both organizations use a single routing group. Org2 has each city's Exchange servers in a unique administration group, while Org1 has a single administration group. Each office has local Internet connectivity, and each office maintains its own Exchange servers.

ITCertKeys.com just upgraded to Cisco Call Manager at all locations. Two MCS-7835 servers are located at each site, except for the HQ site, which has three MCS-7835 servers. There are inter-cluster trunks established between all subscribers in all clusters.

ITCertKeys.com likes to route all intra-company calls over their 3DES encrypted network links. The existing voice messaging platform was provided by several different vendors and there is no networking between them.

ITCertKeys.com plans to change voice messaging platforms at all locations to Cisco Unity. The system will initially be voice mail only, but will switch to Unified Messaging during the next fiscal year.

Where should Cisco Unity servers be located to provide the best messaging and addressing service?

A. All servers should be located at corporate HQ.
B. A server should be located in all offices with Exchange servers.
C. All servers for North America should be located at corporate HQ and servers should be located
in each office in the international locations.
D. Servers should be located in all North American offices, in London to serve the three European
offices, and in Tokyo to serve the two Asian offices.

Answer: B



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for Server+ Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "Server+" Exam

Helping Hands!!!

 Well, how many of you have appreciated or given the credit of your success to the people who have helped you. You all request for the dumps, questions etc. to them, and when passed forget all of their gratefulness and kindness.

Certifications are indeed a key to the door, but remember no one will carry you once you enter through it.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for HP0-683 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "HP0-683" Exam

need help

 i changed with hp0-055 please send me it 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-236 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-236" Exam

dump from ITCertkeys

 Question 1.
Your company uses both a distribution group and a security group for each department. Both groups contain the same members. All new users are added to both groups in their departments. 

You need to decrease the amount of time that is required to manage groups. You must achieve this goal while minimizing disruption to mail capabilities and to previously assigned access permissions. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Delete the departmental distribution groups.
B. Delete the departmental security groups.
C. Convert the departmental distribution groups to global security groups.
D. Mail-enable the departmental security groups.
E. Mail-enable the converted global security groups.

Answer: A, D

Question 2.
Your Exchange Server 2007 organization contains two Exchange servers named Exch1 and Exch2. Exch1 fails and cannot be restored to service. You need to move all mailboxes from Exch1 to Exch2. 

Which cmdlet should you run?

A. Get-Mailbox -Server Exch1 | Move-Mailbox - IgnorePolicyMatch - TargetDatabase
    "Exch2\First Storage Group\Mailbox Database"
B. Get-Mailbox -Server Exch1 | Move-Mailbox - IgnoreRuleLimitErrors - TargetDatabase
    "Exch2\First Storage Group\Mailbox Database"
C. Get-Mailbox -Server Exch1 | Move-Mailbox - ValidateOnly - TargetDatabase "Exch2\First
    Storage Group\Mailbox Database"
D. Get-Mailbox -Server Exch1 | Move-Mailbox - ConfigurationOnly - TargetDatabase
    "Exch2\First Storage Group\Mailbox Database"

Answer: D

Question 3.
You have an automatically generated CSV file with a list of your companys newly hired employees. The CSV file contains all of the information that is required to create the mailboxes for the new employees. You need to create new user accounts and mailboxes directly from the CSV file. 

What should you do?

A. Redirect the output of the Import-CSV cmdlet to the New-Mailbox cmdlet with the appropriate 
    parameters.
B. Redirect the output of the Export-CSV cmdlet to the New-Mailbox cmdlet with the appropriate 
    parameters.
C. Redirect the output of the Import-Alias cmdlet to the New-Mailbox cmdlet with the appropriate  
    parameters.
D. Redirect the output of the Import-CSV cmdlet to the Enable-Mailbox cmdlet with the 
    appropriate parameters.

Answer: A

Question 4.
Your company has five Active Directory sites that are configured as shown in the exhibit. 

 

Each site has an Exchange Server 2007 Mailbox server and Hub Transport server. Currently all outbound e-mail traffic goes through the New York site.

You need to reconfigure the mail flow so that all outbound e-mail messages that are sent from users in the Seattle office are sent out of your Exchange organization through ExchHub5 in the Chicago office.

Which cmdlet should you run?

A. Set- AdsiteLink -Id DNVR-CHI. ADCost 5
B. Set- AdSite -Identity Chicago - HubSiteEnabled:$true
C. New- SendConnector -Name 'Chicago' - AddressSpaces:'smtp :*;1' -
    DNSRoutingEnabled:$true -SourceTransportServers:'ExchHub5'
D. Set- SendConnector -Identity 'Seattle' - AddressSpaces:'smtp :*; 1' -
    DNSRoutingEnabled:$false -SourceTransportServers:'ExchHub1'

Answer: C

Question 5.
Your Exchange Server 2007 organization contains two load balanced Client Access servers. Outlook Anywhere users on the corporate network have access to availability information. You need to allow access to availability information for users outside the corporate network who connect by using Outlook Anywhere. 

What should you do?

A. Run the Set-CASMailbox cmdlet with the appropriate parameters on each of the Client Access 
     servers.
B. Add a replica of the Exchange organizations Free/Busy public folder to at least one of the  
    Mailbox servers in the same site as the Client Access servers.
C. Add the Full Details read permission to each users calendar properties by using the Microsoft  
    Office Outlook client.
D. Set the external URL by running the Set-WebServicesVirtualDirectory cmdlet on each of the  
    Client Access servers.

Answer: D

Question 6.
Your company has a separate business unit named Northwind Traders. All Northwind Traders employees have mailboxes on your companys Exchange Server 2007 computers. All Northwind Traders employee mailboxes have been assigned northwindtraders.com e-mail addresses. The e-mail address policy is configured as shown in the following exhibit.

 

The Northwind Traders distribution groups have not been assigned northwindtraders.com e-mail addresses.

You need to use an e-mail address policy to assign all of the Northwind Traders distribution groups an e-mail address from the northwindtraders.com domain.

What should you do?

A. Run the Set-EmailAddressPolicy cmdlet with the RecipientFilter parameter to add each of the 
    distribution groups to the existing e-mail address policy. Run the Update-EmailAddressPolicy  
    cmdlet with appropriate parameters.
B. Run the Set-EmailAddressPolicy cmdlet with the IncludedRecipients parameter to add each of  
    the distribution groups to the existing e-mail address policy. Run the Update- 
    EmailAddressPolicy cmdlet with the appropriate parameters.
C. Assign a unique custom attribute value to each Northwind Traders distribution group. Modify  
     the existing policy by adding the assigned custom attribute to the conditions list by using the  
     Exchange Management Console.
D. Assign a unique custom attribute value to each Northwind Traders distribution group. Add an  
     additional e-mail address policy that filters for the assigned custom attribute.

Answer: D

Question 7.
You need to configure a public folder to replicate on only Saturdays and Sundays. You also need to ensure that posts will be denied after the folders size reaches 500 MB. 

Which cmdlet should you run for the public folder?

A.  Set- PublicFolder - StorageQuota 500MB. ReplicationSchedule "Saturday.12:00 AM- 
     Sunday.11:59 PM"
B. Set- PublicFolder - PostStorageQuota 500MB. ReplicationSchedule "Saturday.12:00 AM- 
     Sunday.1 1:59 PM"
C. Set- PublicFolder - MaxltemSize 500MB. ReplicationSchedule "Saturday.12:00AM- 
     Sunday.11:59 PM"
D. Set- PublicFolder - PostStorageQuota 500MB. UseDatabaseRetentionDefaults : $true

Answer: B

Question 8.
You create a new message classification named Customer Data. Messages that have this classification should not be sent outside the company. You need to redirect to the CustData mailbox all outbound e-mail messages that have the Customer Data classification. 

What should you do?

A. Run the Set-MessageClassification -Identity 'Customer Data' -UserDisplayEnabled:$true 
     cmdlet.
B. Add read permissions to the Customer Data message classification by running the Set-  
     MessageClassification cmdlet.
C. Run the Set-MessageClassification -Identity 'Customer Data' 
    RetainClassificationEnabled:$true cmdlet.
D. Create a new transport rule to redirect to the CustData mailbox all messages that are sent  
     from internal users to only users outside the company and that are marked with the Customer  
     Data classification.

Answer: D

Question 9.
You are preparing to configure Outlook Anywhere on your existing Exchange Server 2007 organization. A Mailbox server named ExchMb1 contains all of the mailboxes that will be accessed by users who use Outlook Anywhere. A Client Access server named ExchCas1 is available from the Internet. Users will access Outlook Anywhere with mail .contoso.com as the host (A) name. You need to configure the Exchange organization so that Outlook Anywhere can be used by Microsoft Office Outlook clients from the Internet. 

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

A. Install RPC over HTTP Proxy on ExchCas1.
B. Install a valid SSL certificate for ExchMb1 on the default Web site.
C. Install a valid SSL certificate for ExchCas1 on the default Web site.
D. Install RPC over HTTP Proxy on ExchMb1.
E. Run the Enable-OutlookAnywhere -Server:ExchCas1 -ExternalHostName:mail.contoso.com -
    SSLOffLoading:$false -ExternalAuthenticationMethod:Basic cmdlet.
F. Run the Enable-Outlook4nywhere -Server:ExchMb1 -ExternalHostName:mail.contoso.com -
    SSLOffLoading:$true -ExternalAuthenticationMethod:Basic cmdlet.

Answer: A, C, E

Question 10.
Your native Exchange Server 2007 environment has the following server roles installed:
Three Mailbox servers
One Hub Transport server named ExchHub1
One Edge Transport server named ExchEdge1
The human resources (HR) department uses a Windows SMTP relay with an IP address of
192.168.10.25. E-mail from the HR department to all employees must be sent from this relay.

You need to configure your Exchange environment to accept e-mail messages from the internal HR SMTP relay.

Which cmdlet should you run?

A. New- ReceiveConnector -Name 'HR e-mail' -Server ExchHub1 - RemoteIPRanges
    192.168.10.25 - AuthMechanism BasicAuth -Usage Internal
B. New- ReceiveConnector -Name 'HR e-mail' -Server ExchHub1 - RemoteIPRanges
    192.168.10.25 - AuthMechanism BasicAuth -Usage Partner
C. New- ReceiveConnector -Name 'HR e-mail' -Server ExchEdge1 - RemoteIPRanges
    192.168.10.25 - AuthMechanism BasicAuth -Usage Partner
D. New- ReceiveConnector -Name 'HR e-mail' -Server ExchEdge1 - RemoteIPRanges
    192.168.10.25 - AuthMechanism BasicAuth -Usage External

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 74-133 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "74-133" Exam

Customizing Portal Solutions with Microsoft® Share Point® Products and Technologies

 Question 15.
You implement a portal that uses Microsoft Office Share Point Portal Server 2003. You manage portal user profiles by performing full and incremental imports from Microsoft Active Directory Connections. 

You need to identify the range of directory services that can be used as the sources of user profile information. You need to use the Share Point user profile import utility to achieve this goal. 

When you configure import settings for user profiles, which of the following sources can be selected?

A. Servers running Active Directory for your current domain
B. Servers running Active Directory for your entire forest
C. Microsoft Windows NT Server 4.0 domain controllers
D. Servers running Active Directory on one or multiple custom domains

Answer: A, B, C

Question 16.
You build a portal solution that uses Microsoft Office Share Point Portal Server 2003. Your solution targets content by using audience rules. The rules target users according to their group memberships and custom values, which users can modify in their user profiles. You need to decide where to store these custom user profile values, while minimizing the amount of custom development required. 

What should you do?

A. Extend the Share Point user profile database to include custom properties that the user can  
    edit.
B. Extend the Active Directory schema to include custom properties. Configure these properties 
    to be imported into the user profile database with regularly scheduled import jobs.
C. Store custom values in session variables for each user.
D. Store values in persistent cookies stored within the users client environments.

Answer: A

Question 17.
You implement an intranet portal site that uses Microsoft Office Share Point Portal Server 2003. You configure regular schedules for incremental and complete imports of user profile information from Active Directory. After these processes have run a few times, users report that after modifying their profile property entries, some of the entries revert to the original values. You need to identify the most likely cause of user profile values reverting to their previous values. 

What is the most likely cause of the problem?

A. The access account that is configured on the import job does not have sufficient access rights 
     to the Share Point profile database.
B. You are extensively using ASP.NET page output caching in Web Part development.
C. The users do not have db data writer privileges on the Share Point profile database.
D. The Edit Settings value of a profile property that is mapped to an Active Directory property has 
    been set to Allow users to edit this property.

Answer: D

Question 18.
You develop a portal solution including Microsoft Windows Share Point Services, Microsoft Content Management Server 2002 (MCMS), and the MCMS 2002 Connector for Share Point Technologies. In the implementation, you want to install MCMS and Windows Share Point Services on separate servers. Your need to decide which features of the MCMS 2002 Connector for Share Point Technologies will be disabled in this configuration. Out of the following list, identify the functionality that will be disabled in this configuration.

A. The MCMS Page Listing Web Part
B. The MCMS Pages Waiting for Approval Web Part
C. The Search Input Control Web control
D. The Share Point Library Placeholder

Answer: C

Question 19.
You develop a portal solution including Microsoft Office Share Point Portal Server 2003, Microsoft Content Management Server 2002 (MCMS), and the MCMS 2002 Connector for Share Point Technologies. In the implementation, you want to install MCMS and Share Point Portal Server on separate servers. First you configure the indexing and search features of Share Point Portal Server. Now you want to configure the crawler so that it can successfully index MCMS content. 

What should you do?

A. Add the Application Pool Identity account on the MCMS virtual server to an MCMS Subscriber 
     group.
B. Give the Share Point Portal administrator subscriber access rights to the entire MCMS Web 
     site.
C. Configure the crawler to use the MCMS Service account when indexing MCMS content.
D. Create a domain account that the crawler will use to authenticate against MCMS; define 
     Subscriber rights in MCMS for the crawler domain account; configure the crawler to use this 
     account when indexing.

Answer: D

Question 20.
You develop a public Web site by using Microsoft Content Management Server 2002 (MCMS). You have developed the Web site on an internal development platform. The production server is in a separate location, external to the intranet. Content updates continue to be made on the internal development server. Therefore, you begin to develop a process for exporting content incrementally by using the MCMS Site Deployment Application Programming Interface (SDAPI). Your objective is to understand the methods and properties available to you in the SDAPI. 

Which three methods are available within the SDAPI? (Choose three.)

A. Authenticate As Current User
B. Authenticate As Guest
C. Sign Out
D. Authenticate Using User Handle
E. Resolve Url
F. Export
G. Get By Guide

Answer: A, D, F

Question 21.
You implement a portal solution that includes Microsoft Office Share Point Portal Server 2003, Microsoft Content Management Server 2002 (MCMS) , and the MCMS 2002 Connector for Share Point Technologies. You design MCMS templates to integrate with the portal design. The templates require a set of meta tags that will be used in indexing and in search queries that employ the Connector Search In put Control. You need to add the control that will render these meta tags from MCMS posting properties. 

What should you do?

A. Create a custom server control that will render meta tags in your templates based on the value 
     of the posting properties.
B. Run the SearchPropertiesSetup.exe tool and use the Search Property Collection.xml file as 
     input.
C. Add the Search Meta Tag Generator control to MCMS templates.
D. Add the Search Input Control to MCMS templates.

Answer: C

Question 22.
You implement a portal solution that uses Microsoft Office Share Point Portal Server 2003. Your solution targets content by using audience rules. You use the Links for You Web Part to display the targeted links. You modify one of the audience rules to include an additional group. 

When you test this new audience rule, you realize that users who are members of the newly added group are not being targeted with the appropriate content. You need to identify the most likely reason that the users in the new group do not see the targeted content in Links for You. 

What is the most likely cause of the problem?

A. User information has not been incrementally imported from Microsoft Active Directory?
B. You have not enabled alerts for modified content.
C. You have not enabled custom event handlers for content publication.
D. The audiences that you have modified have not been compiled.

Answer: D

Question 23.
You are implementing a Web site that includes both a custom ASP.NET Web application and Microsoft Content Management Server 2002 (MCMS). Some of the pages in your custom Web application must access content from MCMS. However, the custom application is not part of an MCMS Web project. 

For example, you may need to render MCMS channel and posting navigation links within the custom Web application. You need to understand how certain classes contained within the MCMS namespaces are applied in a non-MCMS Web application project.

Which method or property from the MCMS namespaces would result in an error from a Web page of a custom Web application?

A. icrosoft.ContentManagement.Publishing.Extensions.Placeholders.Office.OfficeHTMLPlacehol 
    der.Html
B. Microsoft.ContentManagement.Web.Security.CmsFormsAuthentication.AuthenticateAsGuest()
C. Microsoft.ContentManagement.Publishing.Posting.CanApprove
D. Microsoft.ContentManagement.Publishing.CmsHttpContext.Current.Posting

Answer: D

Question 24.
You implement a portal by using Microsoft Office Share Point Portal Server 2003, Microsoft Content Management Server 2002 (MCMS), and the MCMS 2002 Connector for Share Point Technologies. The authoring requirements for the Web site dictate that you must develop a collection of custom placeholder controls to provide specialized interfaces to Web site authors. 

While reviewing the existing authoring interfaces, you discover that one of the standard MCMS placeholders always requires a custom-built authoring control. 

Which placeholder type always requires this?

A. HTML placeholder
B. XML placeholder
C. Image placeholder
D. Share Point Document placeholder
E. Attachment placeholder

Answer: B

Question 25.
You have implemented a Web site managed by Microsoft Content Management Server 2002 (MCMS). Most of the Web site can be accessed by using MCMS Guest access. There is a separate .NET console application that requires access to MCMS content that is available to both guest and authenticated users. You need to use MCMS Application context to establish an authenticated context from MCMS to the custom application. 

Which method or methods can you use from the MCMS Application context? (Choose all that apply.)

A. Authenticate as the current Microsoft Windows user.
B. Get the publishing session settings for the current session.
C. Create an MCMS authentication ticket (Cms Authentication Ticket).
D. Get the current publishing mode for the current session.
E. Authenticate as the MCMS guest user.
F. Get the URL of the MCMS login page.

Answer: A, B, D, E

Question 26.
You implement a portal solution by using Microsoft Office Share Point Portal Server 2003. In designing the custom Web Parts that are required for your portal, you use caching to enhance performance. As part of the caching strategy, you want to ensure that both the Shared and Personal caches are limited to 2 MB. You need to implement the 2-MB size restriction for the Shared and Personal caches by modifying the portal site Web.config file. 

Which element should you use?

A. 
B. Unspecified (no  element in Web.config)
C. 
D. 

Answer: D

Question 27.
You implement a portal solution that includes Microsoft Content Management Server 2002 (MCMS). The portal solution uses connected templates. You create a new template file that has the same collection of placeholder controls as the existing templates. You add a new Template Gallery Item to the Template Gallery with the required placeholder definitions. However, when you attempt to create a connected page with the new template, it does not appear in the list of available templates in the Create Connected Page - Select Template dialog box. You need to find out why the template does not appear in the list. 

What is the most likely cause of the problem?

A. You did not check in the new template.
B. The new template does not have a template file associated with it.
C. The new template is currently locked by another developer.
D. In the context menu of the MCMS Template Explorer, you failed to create the new template as 
    a connected template.

Answer: D

Question 28.
You implement a portal solution by using Microsoft Office Share Point Portal Server 2003. The solution requirements include implementing the document library event handlers with custom code to invoke non-Share Point services in response to document library events. You need to ensure that you implement the document library to meet solution requirements. 

Which four actions should you take? 
(Each correct answer represents part of the solution. Choose four.)

A. Create a .NET class that implements the IFile Dialog Post Processor interface. Build the 
     managed assembly.
B. Install the managed assembly in the Global Assembly Cache (GAC).
C. Reference your managed assembly in the Document Library Advanced Settings page for the 
    document library.
D. Add a  element referencing the managed assembly to the  
     element in the Web.config file on the virtual server.
E. Create a .NET class that implements the IList Event Sink interface. Build the managed 
     assembly.
F. In the Virtual Server General Settings page, turn on Event Handlers.

Answer: B, C, E, F

Question 29.
You are implementing a large intranet that uses Microsoft Content Management Server 2002 (MCMS). Because of a wide range of functional and visual design requirements, the intranet has multiple MCMS ASP.NET Web projects. However, the standard MCMS workflow needs to be extended uniformly across the entire intranet. You need to extend the MCMS workflow in this environment while minimizing the required effort to maintain custom workflow logic. 

What should you do?

A. Register for publishing events by creating custom HTTP modules.
B. Modify the Workflow Hooks inc module.
C. Register for publishing events using HTTP modules and modifying Global asax code.
D. Create a custom workflow helper class and register it in the Global Assembly Cache.

Answer: A

Question 30.
You implement a portal solution that includes a Microsoft Content Management Server 2002 (MCMS) in ASP.NET mode. To extend the MCMS workflow, the solution registers for publishing events by using HTTP modules. The extension requires e-mail notifications that are triggered to Moderators when the content of a specific placeholder has been changed, before the content is approved. You need to use an event handler to insert custom code that meets the requirements of the extension. 

Which event handler should you use?

A. Posting Events. Property Changed
B. Posting Events. Changing
C. On After Set Ph Content
D. Posting Events. Changed

Answer: D


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-424 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-424" Exam

Dump Needed please

 Dump Needed please
anybody have to ad it 
thanks


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-298 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-298" Exam

Designing Security for a Microsoft Windows Server 2003 Network

 Question 11.
You are designing a certificate distribution method to meet the requirements of the Chief Security Officer.

What should you do? (Each correct answer presents part of the solution. Choose THREE.)

A. Instruct the users in the Research department to submit a request for user certificates from the 
     CA Web site enrollment page.
B. Create a Group Policy object (GPO) and configure it to allow autoenrollment of user and 
    computer certificates.
C. Link the Group Policy object (GPO) to the Research OU.
D. Instruct the users in the Research department to run the gpupdate command.
E. Link the Group Policy object (GPO) to the testlabs.com domain.
F. Configure certificate templates.

Answer:  B, C, F

Explanation:
The Auto-enrollment features are set by CA administrators in the certificate templates and will automatically issue certificates. Group Policy Object (GPO) is a set or sets of rules for managing client configuration settings that pertain to desktop lockdowns and the launching of applications. GPOs are data structures that are attached in a specific hierarchy to selected Active Directory Objects. It can be applied to sites, domains, or organizational units. This reduces the administrative effort required to apply the same policies on an individual basis. In this scenario we need to apply the GPO to the Research department OU as only members in the Research department must be able to access the wireless network.

Incorrect Answers:
A: Instructing users to submit requests for a user certificate from the CA web site enrollment page would require unnecessary user intervention. The chief security officer wants wireless client computers to receive the required wireless network access security settings automatically, i.e., without user intervention.
D: The gpupdate command forces a GPO update.
E: The GPO must be applied at the Research OU level as only members in the Research department must be able to access the wireless network. Applying the GPO at the domain level will allow all users to access the wireless network.

Reference:
Elias N. Khnaser, Susan Snedak, Chris Peiris and Rob Amini, MCSE Designing Security for a Windows Server 2003 Network Exam 70-298 Study Guide, Chapters 3, 4 & 9, pp. 181, 197, 566-569
James Chellis, Paul Robichaux & Matthew Sheltz, MCSA/MCSE: Windows Server 2003 Network Infrastructure Implementation, Management, and Maintenance Study Guide, p.21 

Question 12.
DRAG DROP
You are planning the configuration of the servers in the Research department to meet the requirements of the Chief Information Officer. You decide to use a Group Policy object to implement the configuration. 

What should you do? (To answer, drag the appropriate steps from the pane on the left and arrange them in the correct order in the pane on the right.)
 

Answer:
 

Explanation: 
GPOs can be applied to sites, domains, or organizational units. We need the GPO to apply to the servers in the Research department; therefore we must apply the GPO to the Server OU in the Research department. Network users perform an interactive logon when they present their network credentials to the operating system of the computer that they are attempting to log on to. Thus an interactive logon is a logon when the user logs on from the computer where the user account is stored on the computer's local database. This is also called a local logon. This will be the way to go about designing a method to configure the servers in the development department since this department is in Denver. 
1. W need a logon message that tells users that access to servers in the development department is restricted to authorized users only.
2. We must improve security on client computers, servers, and domain controllers by implementing a secure password policy.

Incorrect Answers:
This is not the way to log on interactively. You will have to them the Log On Locally user right. Otherwise users will receive an error message that they cannot log on interactively. A screensaver requiring a password is not complying with security policy since the servers would still be available from other workstations through the network. We need the GPO to apply to the servers in the Research department; therefore we must apply the GPO to the Server OU in the Research department.

Question 13.
You need to log user permissions changes on server or on a domain controller. You also need to log changes to the local security account manager objects on all servers.

What should you do?

A. Configure auditing of privilege user and object access on all servers and domain controllers 
    and set it to failure.
B. Configure auditing of policy change and account management on all servers and domain 
    controllers and set it to success.
C. Configure auditing of process tracking and logon events on all servers and domain controllers 
    and set it to success.
D. Configure auditing of system events and directory service access on all servers and domain 
    controllers and set it to failure.

Answer:  B

Explanation: 
Auditing for policy change events allows you to see attempts to alter policy settings, including changes to audit policies. And auditing the account management on all servers and domain controllers allows you to see attempts to alter security account manager objects. If you want to log changes that are made to servers and domain controllers and want to track when local security account manager objects are being modified then you need to success audit for policy change events and account management on all servers and domain controllers.

Incorrect Answers:
A: These options of auditing will not work; you need to enable success audit and not failure audit.
C: Auditing process tracking events monitors processes running on computers. Logon events are generated when a user logs on to or off of a computer. Every time a user logs on or off, whether on a workstation or server, an event is generated. Even enabling success auditing will not provide you with the correct information to do your task.
D: These options of auditing will not work; you need to enable success audit and not failure audit. Furthermore, System events are generated when the computer environment is changed in some significant way, either by a user or by a process; and Directory Service access events record when directory services were accessed. You need to audit for policy change and account management.

Question 14.
You need to ensure that all TestLab, Inc. servers have the latest security and that no unnecessary services are running on the servers. You must ensure that your solution can be implemented by the members of the IT department at headquarters.

What should you do?

A. Run the Resultant Set of Policy (RSoP) wizard in planning mode from a domain controller in 
    the Chicago office.
B. Create a custom security template and run Security Configuration and Analysis to analyze the 
    security settings of each server against the custom security template.
C. Create a startup script that runs the secedit command and apply the script to all servers in the 
    domain.
D. Install the Microsoft Baseline Security Analyzer (MBSA) on a server in the Chicago office and 
    use it to scan for Windows vulnerabilities on all servers in the domain.

Answer:  D

Explanation: 
MBSA can perform local or remote scans of Windows systems. It verifies whether your computer has the latest security updates and whether there are any common security violation configurations that have been applied to your computer. If you run MBSA on a server to scan for Windows vulnerabilities on all servers in the domain then you will comply with requirements for maintaining security patches.

Incorrect Answers:
A: RSoP is a tool that can show the effective policy applied to a user or computer or what the policy would be, for planning purposes. It does not scan for missing security patches. 
B: Security Configuration and Analysis tool is a Windows 2003 utility that is used to analyze and to help configure a computer's local security settings. Security Configuration and Analysis works by comparing the computer's actual security configuration to a security database configured with the desired settings. However this would involve too much administrative effort than is necessary.
C: The command line tool, secedit.exe, is used to analyze, configure, and export system security settings. There are a variety of command-line switches used with secedit. This tool is often used in batch programs or scheduled tasks to apply security settings automatically. It is also the preferred tool for reapplying default security settings. But this does not necessarily mean that missing security patches will be checked for. 

Reference: 
James Chellis, Paul Robichaux & Matthew Sheltz, MCSA/MCSE: Windows Server 2003 Network Infrastructure Implementation, Management, and Maintenance Study Guide, p.159

Question 15.
You need a strategy to log access to data on servers in the Manufacturing department.

What should you do?

A. Install the Microsoft Baseline Security Analyzer (MBSA) on a server in the Chicago office and 
    use it to scan for Windows vulnerabilities on all servers in the Manufacturing department.
B. Create a custom security template and run Security Configuration and Analysis to analyze the 
    security settings of each server in the Manufacturing department against the custom security 
    template.
C. Create a Group Policy Object (GPO) and configure the GPO to audit successful logon 
    attempts. Link the GPO to the Manufacturing department's Servers OU.
D. Create a Group Policy Object (GPO) and configure the GPO to enable auditing for object 
    access. Link the GPO to the Manufacturing department's Servers OU.

Answer:  D

Explanation:
Auditing object access audits user access to objects such as files, folders, registry keys, and so forth. As with the other audit policies, you can either monitor the success or failure of these actions. Further more making use of a GPO will ease the administrative effort. Linking this GPO to the Manufacturing department's Servers OU should be the strategy used to monitor the data on the serves in the Manufacturing department.

Incorrect Answers:
A: MBSA verifies whether your computer has the latest security updates and whether there are any common security violation configurations that have been applied to your computer. This is not the same as monitoring the servers to meet business requirements. Auditing object access if what is required.
B: The Security Configuration and Analysis tool is used to analyze and to help configure a computer's local security settings. Security Configuration and Analysis works by comparing the computer's actual security configuration to a security database configured with the desired settings. This is not the same as tracking all access to data on the servers in the Manufacturing department.
C: You should audit object access to track access to data. Auditing logon attempts will only log attempts to logon to the server it will not log access to data over the network. 

Question 16.
You need to plan for the security of the wireless network and wireless traffic in the Chicago office to meet the requirements of the Chief Security Officer.

What should you do?

A. Configure Media Access Control (MAC) address filtering on the wireless access points in the 
    Chicago office.
B. Configure the wireless access points in the Chicago office to use a Sever Set ID (SSID) and a 
    128-bit Wired Equivalent Privacy (WEP) shared key.
C. Enroll and deploy computer certificates to all wireless client computers in the Chicago office 
    and configure each wireless client computer to use Protected EAP (PEAP).
D. Create a wireless network policy that enables data encryption and dynamic key assignments 
    for the Chicago network. Implement wireless network policy through a GPO that is linked to the 
    Chicago OU.

Answer:  D

Explanation:
The Chief Security Officer requires that data sent between the wireless client computers and the wireless access points be protected; that wireless client computers need to automatically obtain wireless network access security settings; and that the most secure method for authenticating wireless users that access the wireless network is implemented. These requirements can be accomplished by using a wireless network policy and applying that policy through a GPO that is linked to the Chicago OU.

Incorrect Answers:
A: Filtering MAC addresses will ensure that only authorized computers can access the wireless network. However, it does not protect wireless traffic.
B: You could configure the wireless access points in the Chicago office to use a Sever Set ID (SSID) and a 128-bit Wired Equivalent Privacy (WEP) shared key but you would need to configure the wireless client computers with these settings. The Chief Security Officer requires that wireless client computers obtain wireless network access security settings automatically. You should use a GPO to distribute the WEP keys to all wireless client computers in the Chicago OU.
C: Protected Extensible Authentication Protocol (PEAP) can make use of various authentication methods that are based on passwords, public key certificates or other credentials. It ensures the secure transmission of authentication credentials over wired or wireless networks. However, PEAP is not an encryption protocol and does not protect data that is transmitted over a wireless connection.

Question 17.
You need a strategy to log access to the testlabs.com intranet Web site to meet the requirements in the written security policy.

What should you do?

A. Enable logging on the intranet Web site on TL-SR07 and select the NCSA Common Log File  
    Format. Store the log files on TL-DB05.
B. Create a Group Policy Object (GPO) and configure the GPO to audit successful logon  
    attempts and object access. Apply the GPO to TL-SR07.
C. Configure the intranet Web site on TL-SR07 to require Windows authentication. Create a 
    Group Policy Object (GPO) and configure the GPO to audit successful logon attempts and 
    object access. Apply the GPO to TL-SR07.
D. Enable logging on the intranet Web site on TL-SR07 and select the ODBC Logging option.

Answer:  D

Explanation: 
You should enable logging on the company web site and select ODBC logging. Open Database Connectivity (ODBC) logging allows you to log data directly to a SQL database using an ODBC connection. Since the case study mentions that all users of the website and the files that they download, should be tracked and the data stored in a SQL database, you should also configure the logging options through a non-administrative SQL account.

Incorrect Answers:
A: NCSA Common Log File Format logging will not yield the proper information to address the issue of logging all access to the website and the files that users download.
B, C: You should audit object access to track access to files; however, auditing logon attempts will only log attempts to logon to the Web server rather than the Web site. This method also does not store the logs to a Microsoft SQL Server database server named TL-DB05.

References:
Deborah Littlejohn Shinder and Dr. Thomas W. Shinder, MCSA/MCSE Exam 70-290: Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD Training System, p. 731 
Lisa Donald with Suzan Sage London and James Chellis, MCSA/MCSE: Windows Server 2003 Environment Management and Maintenance Study Guide, pp. 321, 374-9, 446-51

Question 18.
You need to plan a membership strategy for the ResearchAdmins group to meet the requirements of the Research Department Manager.

What should you do?

A. Place the members of the ResearchAdmins group in the Research OU.
B. Place the ResearchAdmins group in the Research OU.
C. Place the ResearchAdmins group in the Chicago OU.
D. Place the members of the ResearchAdmins group in the Chicago OU.

Answer:  B

Explanation:
On a Windows Server 2003 member server, you can use only local groups. A local group resides on the Windows Server 2003 member server's local database. Since the members of the ResearchAdmins group comprises of both authorized and unauthorized users, the whole group should be moved to the Research OU so as to restrict membership to only authorized users in the Research department.

Incorrect Answers:
A: Moving the members of the ResearchAdmins group to the Research OU will not work as the ResearchAdmins group will still exist outside the Rsearch OU. You need to move the ResearchAdmins group to the Research OU.
C: Moving the members of the ResearchAdmins group to the Chicago OU will allow all members of the Chicago OU to be members of the ResearchAdmins group. You need to restrict membership to the Research department. You should therefore move the ResearchAdmins group to the Research OU.
D: Moving the members of the ResearchAdmins group to the Research OU or the Chicago OU will not work as the ResearchAdmins group will still exist outside the Rsearch OU. You need to move the ResearchAdmins group to the Research OU.

Reference:
James Chellis, Paul Robichaux & Matthew Sheltz, MCSA/MCSE: Windows Server 2003 Network Infrastructure Implementation, Management, and Maintenance Study Guide, pp. 100-101

Question 19.
You need to design a patch management system to meet requirements of the System Administrator.

What should you do?

A. Install Software Update Services (SUS) on three servers named TL-SR08, TL-SR-09 and TL-
    SR10. Deploy TL-SR08 to a test network in the Chicago office, TL-SR09 to the production 
    network in the Chicago office and TL-SR10 to the Detroit office. Configure TL-SR09 and TL-
    SR10 to download administrator-approved updates from TL-SR08.
B. Install Software Update Services (SUS) on two servers named TL-SR08, TL-SR-09. Deploy 
    TL-SR08 to the Chicago office and TL-SR09 to the Detroit office. Configure TL-SR09 to 
    download administrator-approved updates from TL-SR08.
C. Install MBSA on a server named TL-SR08 and deploy TL-SR08 to a test network in the
    Chicago office. Deploy MBSA as a Windows Installer package to all computers in the Chicago 
    OU and the Detroit OU. Configure MBSA to scan for updates from TL-SR08.
D. Install Software Update Services (SUS) on a server named TL-SR08. Deploy TL-SR08 to a 
    test network. Create a Web site named ApprovedUpdates on TL-SR07 that contains      
    administrator-approved updates. Configure an autoupdate policy in the testlabs.com domain to 
    download and deploy updates from the ApprovedUpdates Web site

Answer:  A

Explanation: 
Software Update Services (SUS) is used to leverage the features of Windows Update within a corporate environment by downloading Windows Update to a corporate server, which in turn provides the updates to the internal corporate clients. This allows administrators to test and have full control over what updates are deployed within the corporate environment. Deploying a Windows Server 2003 computer to run the SUS in the test network and then deploying SUS servers in each office for downloading of approved updates is the solution.

Incorrect Answers:
B: Making use of Autoupdate policies in each child domain as described in this option is not the solution since it does not mention that the downloads will be administrator approved updates from the test network SUS server.
C: MBSA verifies whether your computer has the latest security updates and whether there are any common security violation configurations that have been applied to your computer. This is not what is required in this question.
D: You could create a website on the Web server to distribute approved updates, but this would not reduce the bandwidth required to apply the updates to computers in the Detroit office. It would be better to configure one server in the Detroit office to download the approved updates and distribute it to the reset of the computers in the Detroit office.

Reference:
James Chellis, Paul Robichaux & Matthew Sheltz, MCSA/MCSE: Windows Server 2003 Network Infrastructure Implementation, Management, and Maintenance Study Guide, p.477 Elias N. Khnaser, Susan Snedak, Chris Peiris and Rob Amini, MCSE Designing Security for a Windows Server 2003 Network Exam 70-298 Study Guide, Chapter 2, p. 51 Lisa Donald, Suzan Sage London & James Chellis, MCSA/MCSE: Windows Server 2003 Environment Management and Maintenance Study Guide, p. 55 

Question 20.
You need to design a method to implement an account policy that meets the requirements in the written security policy.

What should you do?

A. Configure required account policy settings in a GPO and link the GPO to the Chicago OU and 
    the Detroit OU.
B. Configure the Local Security Policy with the required account policy settings on all computers 
    in the domain.
C. Configure the required account policy settings in the Default Domain Policy GPO.
D. Configure the required account policy settings in the Default Domain Controllers Policy GPO.

Answer:  C

Explanation: 
To implement account policies that meet these requirements you need to configure the Default Domain Policy GPO with the necessary account policy settings.  Setting policies in the Default Domain Policy sets them for all computers in the domain.

Incorrect Answers:
A: You could configure required account policy settings in a GPO and link the GPO to the Chicago OU and the Detroit OU but configuring the required account policy settings in the Default Domain Policy GPO would require less effort and would be the better option.
B: You could configure the Local Security Policy with the required account policy settings on all computers in the domain but configuring the required account policy settings in the Default Domain Policy GPO would require less effort and would be the better option.
D: You should configure the Default Domain Policy GPO and not the Domain Controllers GPO. The Domain Controllers GPO applies the setting to domain controllers and not all computers in the domain.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-282 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-282" Exam

Designing, Deploying, and Managing a Network Solution for a Small- and Medium-Sized Business

 Question 1.
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains six servers. A server named ITCertKeys-SR01 is configured to run Windows Small Business Server 2003 premium edition and the other servers run Windows Server 2003. These servers, together with its configurations, are named as follows:
* ITCertKeys-SR02 is configured to run Exchange Server 2003.
* ITCertKeys-SR03 is configured to run Microsoft ISA Server 2000.
* ITCertKeys-SR04 is configured to run Windows Server 2003 Active Directory
* ITCertKeys-SR05 is configured to run Microsoft Windows SharePoint Services.
* ITCertKeys-SR06 is configured to run Microsoft SQL Server 2000.
You have received instruction from the CIO to start designing a solution that will result in a reduction of the amount of servers that are currently in use. This reduction of servers will be a result of server consolidation. You successfully complete the server consolidation instruction and now you are required to implement a solution to increase fault tolerance.

What should you do? (Choose all that apply)

A. An uninterruptible power supply should be used
B. The Health Monitor should be used
C. Small Computer Interface (SCSI) adapters should be used
D. Multiple Network cards should be used
E. Redundant Array of Independent Disks (RAID) arrays should be used

Answer:  A, C, D, E

Explanation:
The UPS is also an important factor when increasing fault tolerance saving your system from power surges and failures. Multiple SCSI can also be used effectively to improve fault tolerance. Multiple Network cards are a must to implement when you are looking to increase the fault tolerance of the network. RAID arrays can also be used effectively to improve fault tolerance.

Incorrect Answers:
B: The Health monitor is used to check Windows Small Business Server 2003.

Question 2.
You work as the network administrator at ITCertKeys.com. Everyone of the 20 employees of the company have a computer that runs Windows 95 and make use of floppy disks as well as compact disks to share their information. At present the CEO makes use of the DSL connection. These methods of information sharing amongst the ITCertKeys.com users have become costly. To this end you have received instruction from the CIO that all employees must have access to the Internet by using a single connection and that they must disseminate their information effortlessly and quickly without making use of floppies or compact disks. Thus a dedicated e-mail and the centralized management of user data are required for ITCertKeys.com. You need to ensure that your design solution for the ITCertKeys.com network infrastructure is cost-effective.

What should you do?

A. You must install a Windows Small Business Server 2003, Premium Edition computer. 
    Then upgrade the client computers to Windows XP Professional.
    Use the existing DSL connection to connect to the Internet.
B. You must install a Windows Small Business Server 2003, Standard Edition computer.
    Then upgrade the client computers to Windows XP Professional.
    Use the existing DSL connection to connect to the Internet.
C. You must install a Windows Small Business Server 2003, Standard Edition computer.
    Then upgrade the client computers to Windows XP Professional.
    Purchase a separate DSL connection to connect to the Internet.
D. You must install a Windows Small Business Server 2003, Standard Edition computer.
    Then upgrade the client computers to latest Windows 95 service pack.
    Use the existing DSL connection to connect to the Internet.

Answer:  B

Explanation: 
The Windows Small Business Server 2003, Standard Edition can be used as a file server, an e-mail server and to connect to the Internet. The Windows Small Business Server 2003 computer allows you to connect to the Internet by making use of the existing DSL connection. The client computers must be upgraded to Windows XP Professional to be able to connect to the Windows Small Business Server 2003 network.

Incorrect Answers:
A: The Premium Edition of Windows Small Business Server 2003 offers more products than you need, including SQL Server 2000 and ISA Server 2000. The Premium Edition is more expensive than the Standard Edition therefore it is not the most cost effective solution. All the other parts of the suggested solution would make sense in this scenario.
C: A separate DSL connection is not required. This will only incur more costs than is required.
D: Windows 95 is not able to communicate on a Windows Small Business Server 2003 network therefore it is unnecessary to upgrade the users to the latest Windows 95 service pack.

Question 3.
You work as the network administrator at ITCertKeys.com. At present the ITCertKeys.com network consists of 30 Windows XP Professional computers that have a peer-to -peer network. Due to work pressure some ITCertKeys.com employees also want the ability to connect to their work from their homes after office hours. ITCertKeys.com has a cable connection for Internet access at the office. The employees who requested access to their work after hours all have access to the Internet from their homes via their own ISPs. You have received instruction from the CIO to make sure that communication between the employees work computers and that of the office network over the Internet is protected. You have to accomplish this objective and keep costs as low as possible.

What should you do?

A. You should install Windows Small Business Server 2003, Standard Edition on the employees' 
    home computer.
B. You should install Windows Small Business Server 2003 Premium Edition on the employees' 
    home computer.
C. You should install Windows Small Business Server 2003 Standard Edition on a 
    ITCertKeys.com computer.
D. You should install Windows Small Business Server 2003 Premium Edition on a 
    ITCertKeys.com computer.

Answer:  C

Explanation: 
When you install the Windows Small Business Server 2003, Standard Edition on an office computer you will ensure a secure VPN connection over the Internet. The L2TP protocol or the PPTP protocol can be used to protect the VPN connections.

Incorrect Answers:
A: Preferably user operating systems like Windows XP Professional or Windows 2000 Professional should be installed on the employees' computers at home. This should keep costs down since a Server OS would not be cost effective.
B: This option would be too expensive to implement. The server operating systems such as Windows Small Business Server 2003 and Windows Server 2003 are costly and should only be installed when needed.
D: If you install the Windows Small Business Server 2003, Premium Edition in the office it will meet the connectivity objective but it is more costly than the Windows Small Business Server 2003, Standard Edition.

Question 4.
You are hired as a network consultant at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network has one network server named ITCertKeys-SR02. The ITCertKeys-SR02 is configured to run Microsoft Windows Small Business Server 2003. ITCertKeys.com makes use of a third-party line-of-business (LOB) application. You have received instruction from the CIO to upgrade ITCertKeys-SR02 to the Microsoft Windows Server 2003 Standard Edition. You need to carry out this instruction whilst ensuring that the LOB application is successfully migrated. You must achieve this with the least amount of administrative effort.

What should you do? (Choose all that apply)

A. Upgrade the Windows Server 2003 Standard Edition and install the Application Migration 
    Wizard on the server. Run the Application Migration Wizard to check the compatibility of the 
    LOB application with the Windows Server 2003 Standard Edition operating system.
B. The Application Migration Wizard should be installed on the on the server. Run the Application 
    Migration Wizard to check the compatibility of the LOB application with the Windows Server 
    2003 Standard Edition operating system.
C. Set up a test network that runs Windows Server 2003 Standard Edition. Install a LOB 
    application and test its compatibility with the Windows Server 2003 Standard Edition operating 
    system.
D. Create a full backup of the current network environment. Then upgrade the server to Windows 
    Server 2003 Standard Edition and install the application on the server. Thereafter the server 
    information can be restored from the backup tapes.

Answer:  B, C

Explanation: 
These options represent a complete solution to guarantee the successful migration of the LOB application.

Incorrect Answers:
A, D: It you install the first Windows server without checking the compatibility the application might not run.

Question 5.
You work as a network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The CEO of ITCertKeys.com makes uses a broadband connection to connect to the Internet from the head office. The ITCertKeys.com network contains 15 user workstations that are configured to run Microsoft Windows 95 in a peer-to-peer network. ITCertKeys-WS282 is a workstation on the ITCertKeys.com network. ITCertKeys-WS282 functions as the file server. The users make use of floppy disks to share information. They do not have access to the Internet. You have received instruction from the CIO to modify the network environment to meet the subsequent requirements:
* Users are able to share information without making use of floppy disks,
* Users are able to access the Internet through a single connection,
* Centralized user administration,
* A dedicated e-mail server and
* The ability to encrypt files on user workstations.
You thus need to identify solutions that will meet these requirements while reducing the costs.

What solutions can you recommend? (Choose all that apply)

A. Upgrade the user workstations to Windows XP Professional and to make use the existing 
    broadband connection.
B. Recommend that ITCertKeys.com buy a leased broadband connection to the Internet.
C. On the company network the server that is configured to run Microsoft Windows Small 
    Business Server 2003 Standard Edition should be installed.
D. The user workstations should all be upgraded to the latest Windows 95 service pack.

Answer:  A, D

Explanation: 
The existing broadband connection is enough. Windows XP have the ability to encrypt files on the user workstations. Microsoft Windows Small Business Server 2003 Standard Edition completes the requirements.

Question 6.
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com has its headquarters in London and a branch office in Paris. You have received instruction from the CIO to install a new server at the Paris office. This new server will host the company web site as well as perform user authentication. In your solution you need to make sure that an operating system is installed on the new server.

What should you do?

A. Ensure that Microsoft Windows Small Business Server 2003 Premium Edition is installed on 
    the new server.
B. Ensure that Microsoft Windows Small Business Server 2003 Standard Edition is installed on 
    the new server. Thereafter she can add the server to the domain as the domain controller.
C. Install Microsoft Windows Server 2003 Web Edition on the new server.
D. Ensure that Microsoft Windows Server 2003 Standard Edition is installed on the new server.
    Thereafter the server can be added to the domain as the domain controller.

Answer:  D

Question 7.
You are employed as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com makes use of a Microsoft Windows Small Business Server 4.5 as its network operating system. The ITCertKeys.com network consists of one file server and fifteen computers. These computers use a mixed environment of Microsoft Windows XP Professional and Microsoft Windows 2000 Professional. Management of ITCertKeys.com is considering upgrade the network to a Microsoft Windows Server 2003 product. You have received instruction from the CIO to identify the key characteristics of Microsoft Windows Server products that allows team building and collaboration.
Management wants you to guarantee a moderate investment however, reliability is a high priority. You thus need to formulate a proposal that will benefit the need for ITCertKeys.com to improve team building as well as to provide a cost-effective network solution.

What should you propose? (Choose all that apply)

A. Submit a proposal to upgrade the existing file server as well as upgrading the Microsoft 
    Windows 2000 Professional computers to Microsoft Windows XP Professional.
B. Submit a proposal to replace the current file server with a new file server. Thereafter he should 
    submit a case study that emphasizes the characteristics of Microsoft Windows Server 2003, 
    Enterprise Edition.
C. Submit a proposal that shows Microsoft Windows Small Business Server 2003 offers more 
    team building and collaboration tools than Microsoft Windows Server 2003, Standard Edition.
D. Submit a proposal stating that Microsoft Exchange 2000 Server with Microsoft Outlook 11 
    should be purchased individually.

Answer:  A, C

Explanation:
Windows Small Business Server permits institutions with as little as three or as many as 75 computers to have an affordable, real client/server network with all the security and efficiencies that implies. Microsoft Windows Small Business Server 2003, encompasses Microsoft Windows Server 2003, Windows SharePoint Services, Exchange Server 2003, Routing and Remote Access firewall technology and five client access licenses. That is just for the Standard Edition. In the Premium Edition, includes the above mentioned plus Microsoft SQL Server 2000, Internet Security and Acceleration Server 2000 and Microsoft Office FrontPage 2003. In both the Standard and the Premium editions, the technologies are optimized to work as a package for the small business user.

Incorrect Answers:
B: This option is incorrect. A new file server alone will not be improving on the current situation. Microsoft Windows Enterprise Edition is but a component included in Microsoft Windows Small Business Server 2003.
D: This option is incorrect. Exchange 2000 Server with Microsoft Outlook 11 alone will not improve the current network system for team building purposes.

Reference:
Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Administrator's Companion, Microsoft Press, Redmond, 2004

Question 8.
You work as the technical administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. You are requested by management to do the technical assessment of the business. One of the computers at ITCertKeys.com is configured to run Microsoft Windows XP Professional. This computer is located in the Finance department. The accountant of ITCertKeys.com enters transactions on the computer during business hours. The manager of ITCertKeys.com wants to be able to access the accounting information after working hours from his home. You have received instruction from the CIO to install broadband connections at the office and the manager's home. The broadband connection at the office has a static IP address. The manager does not want to spend more money than is necessary to accomplish his objectives. You thus need to create a solution to meet the owner's objectives.

What should you do?

A. Install a Microsoft Windows XP Professional computer at the manager's residence.
B. Install a Microsoft Windows Server 2003, Standard Edition computer in the Finance 
     department and a Microsoft Windows 98 computer at the manager's residence.
C. Install a Microsoft Windows Server 2003 computer in the Finance department as well as at the 
    manager's residence.
D. A Microsoft Windows Small Business Server 2003 computer needs to be installed in the 
    Finance department. Install a Microsoft Windows XP Professional computer at the manager's 
    residence as well.

Answer:  A

Explanation: 
The manager needs to have a Microsoft Windows XP Professional computer installed at his residence since the Finance department has one computer configured to run Microsoft Windows XP Professional with a static IP address broadband connection. This would permit the manager to enter the information as well as accessing accounting information from his residence onto the store computer.

Incorrect Answers:
B: This option is incorrect. This option involves extra expense with the added inability to be able 
    to access accounting data from the manager's residence if he is to have a Microsoft Windows 
    98 computer at his residence.
C, D: These options are incorrect. There is no need for extra expense as is proposed by these 
    options.

Reference:
Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide, Second Edition, Sybex Inc. Alameda, 2003, p. 408

Question 9.
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com is relatively new and currently the ITCertKeys.com network contains ten client computers that runs Windows98 configured to operate in a work group. You have received instruction from the CIO that the ITCertKeys.com network is increasing by 50 employees. To this end you were instructed to design a solution that will enable the upgrading of the networks existing infrastructure with the least amount of expenses in the most effective manner.

What should you do? (Choose all that apply)

A. You acquire 40 client computers and install Windows XP Professional.
    Then you upgrade the existing computers to Windows XP Professional.
B. You acquire 40 client computers and install Windows XP Home Edition.
    Then you upgrade the existing computers to Windows XP Home Edition.
C. You install Windows Small Business Server 2003 on the newly acquired server computer.
D. You should upgrade to a client/server configuration.
E. You make use on the existing workgroup.
F. You acquire and install Windows Server 2003 Enterprise Edition on the new server computer.

Answer:  A, C, D

Explanation: 
Windows XP Professional is the most effective and extensively used operating system and provides a range of features relating to security and data integrity. The Windows Small Business Server 2003 the most effective Network Operating System and is able to support up to 75 users and is the most cost effective server operating system. The client server computer operates as a hub for users to access and share network resources.

Incorrect Answers:
B: Windows XP Home Edition does not support NOS.
E: The infrastructure of the existing network, also known as peer-to-peer network, is not easy to manage compared to the client/server infrastructure.
F: The Windows Enterprise Server 2003 Enterprise Edition is the most efficient Network Operating System for big institutes that consists of numerous client computers and users.

Question 10.
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network has one network server named ITCertKeys-SR01. The ITCertKeys-SR01 is configured with a Pentium III 450 MHz processor 20 GB hard disk space and 128 MB RAM that runs with Windows Small Business Server 4.5. You have received instruction from the CIO to upgrade the network. This upgrade has become necessary due to company growth and is meant to support the maximum amount of users or devices and to implement SQL Server 2000 which will supply data warehousing and line-of-business (LOB) solutions. One requirement that you need to keep in mind in your solution is that ITCertKeys-SR01 must be able to work in a medium-load network environment after the upgrade. And another requirement is that the upgrade of the ITCertKeys.com network should be performed with the least amount of expenses.

What should you do? (Choose all that apply)

A. ITCertKeys-SR01 needs to be upgraded to Windows Small Business Server 2003, Standard 
    Edition.
B. ITCertKeys-SR01 needs to be upgraded to 1GB of RAM.
C. ITCertKeys-SR01 needs to be upgraded to Windows Small Business Server 2003, Premium 
    Edition
D. ITCertKeys-SR01 needs to be upgraded to 512 MB of RAM.

Answer:  B, C

Explanation: 
1 GB RAM is the least amount of RAM recommended for a server running Windows Small Business Server2003 in a medium-load environment. The SQL Server 2000 component includes the Windows Small Business Server 2003, Premium Edition and provides data warehousing and line-of-business solutions.

Incorrect Answers:
A: The SQL Server 2003 component that offers data warehousing and line-of-business solutions is not supported by the Windows Small Business Server 2003, Standard Edition.
D: The 512 MB RAM is the least amount of memory needed for Windows Small Business Server 2003 for it to operate in a light-load environment. The tasks executed and the number of applications and features that is run on the server is dependant on the load environment.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 1D0-525 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "1D0-525" Exam

CIW E-Commerce Designer

 Question 1.
The goals for effective usability in an e-commerce site are to get customers to:

A. find, compare and revisit.
B. visit, learn and return.
C. find, learn and review.
D. visit, learn and purchase.

Answer: D

Question 2.
Which of the following is the most effective way to build community with your online storefront?

A. Provide a quantity discount.
B. Generate an automatic order confirmation.
C. Create an incentive-based program.
D. Accept several different payment options.

Answer: C

Question 3.
Which of the following is often used in place of photo identification and a signature whenever a credit card is used in an e-commerce transaction?

A. Billing address verification
B. Cookies deposited by the site's shopping cart
C. The purchaser's public key
D. Information verified by a Public Key Infrastructure (PKI) company

Answer: A

Question 4.
The details of an e-commerce site order can be kept in memory, stored on the visitor's computer or stored on the Web server. This ability to remember the details of an order is known as:

A. persisting an order.
B. profiling an order.
C. tracking an order.
D. filling the shopping cart.

Answer: A

Question 5.
You are transitioning from a traditional "brick-and-mortar storefront that accepts credit cards to a new e-commerce storefront. 

Which payment method would be most appropriate during the transition?

A. Cash on delivery (c.o.d.)
B. Credit card with offline processing
C. Advance payment using check or money order
D. Open Buying on the Internet (OBI)

Answer: B

Question 6.
Which of the following site creation models would be most appropriate for a site needing easy administration and implementation as well as minimal business owner control?

A. Online instant storefront
B. Mid-level offline instant storefront
C. Mid-level online instant storefront
D. High-level offline instant storefront

Answer: A

Question 7.
Before you can conduct usability testing, you should:

A. identify the most-traveled path of your site.
B. publish your site to a production server.
C. identify browser compatibility issues.
D. identify your potential customers.

Answer: D

Question 8.
You are planning to install a database server in a mission-critical environment. 

What is the best way to ensure continuous data availability and reliability?

A. Install a multiprocessor server.
B. Establish a strict security policy.
C. Provide fail-over clustering.
D. Install multiple hot-swappable hard disk drives.

Answer: C

Question 9.
A customer has placed an online order. The order has been written to a database for processing and the customer's credit card has been charged. 

What is the last interaction with the customer during the order process?

A. Redirect the customer to the home page.
B. Send a confirmation e-mail message to the customer.
C. Update the customer profile.
D. Send a shipping notification via e-mail to the customer.

Answer: B

Question 10.
Which of the following is the most effective option for detecting a site attack by someone who wants to modify your customer database?

A. Using antivirus software
B. Implementing a firewall
C. Limiting the open ports on the system
D. Using an intrusion detection system

Answer: D


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.