Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "1D0-410" Exam

Important questions

 

Question 1.
IPSEC is a standard that provides packet-level encryption. IPSEC is associated with which technology?

A. SSL
B. PPTP
C. L2TP
D. VPN

Answer: D

Explanation:
This is a problem that can cause a lot of discussion. From a software perspective, in Windows 2000, IPSEC is only supported on L2TP (Layer 2 Tunneling Protocol). The first inclination would be to answer L2TP. But IPSEC is not a Windows standard, it is an Internet standard and was first available from router to router. When used from router to router, it is router software and not operating system software that applied here. So, IPSEC can be used for almost any type of transmission, but is used for tunneling and to create tunnel circuits between two points. For this reason, we select VPN (Virtual Tunneling Protocol), which includes both PPTP (Point to Point Tunneling Protocol) and L2TP. If you wanted to answer this question exclusively under the premise of Windows 2000, then you would select L2TP. But we need to answer the question on a general basis when the question does NOT indicate a particular operating system.

Incorrect Answers:
A: SSL (Secured Sockets Layer) is a security protocol used for protecting data, and is also an encryption method. (IPSec is an encryption method too)
B: PPTP can use an IPSec tunnel if the tunnel is established between two routers. PPTP does not natively support IPSec.
C: L2TP may use IPSec (it is optional and has to be enabled for the transmission) and under Windows 2000 can use IPSec with L2TP natively. The choice between C & D for this question can be a toss-up and will bring on a lot of discussion.

Question 2.
Which choice best describes half-duplex data transmission?

A. Data travels in only one direction.
B. Data travels in two directions, but only one direction at a time
C. Data travels in two directions simultaneously, but only at half speed
D. Data travels in two directions simultaneously

Answer: B

Explanation:
That is the definition, it is a two way street, but one direction at a time.

Incorrect Answers:
A: This is simplex.
C: There is no definition for this.
D: This is full-duplex.

Question 3.
Which common network component is a low-level device that amplifies the electronic signal traveling on a cable segment to ensure that these signals do not degrade?

A. Bridge
B. Repeater
C. Hub
D. Router

Answer: B

Explanation:
This is the definition of a repeater.

Incorrect Answers:
A, D: These are segmentation devices that separate a network into segments. These can be viewed as a method to allow signals to travel farther, but these are high level devices and is a complex approach to extending a segment.
C: Hubs may or may not amplify signals. Switches usually do. But these devices are more complex than repeaters, and although they provide repeating functions, the correct answer here is an individual repeater inserted where signals might otherwise degrade.

Question 4.
Which connection medium operates at a maximum speed of 44.736 Mbps?

A. ISDN
B. DSL
C. T3 line
D. T1 line

Answer: C

Explanation:
This is the T3 transmission speed, which is usually duplex and gives you a max of 44.736 in EACH direction.

Incorrect Answers:
A: ISDN provides up to 144Kbps (2x64Kbps plus 16Kbps) channels.
B: DSL currently provides transmission speeds up to T1 speeds (1.544Mbps)
D: A T1 line transmits at a maximum of 1.544Mbps.

Question 5.
Your manager attended a half-day seminar and learned about polymorphic viruses. She asks you to explain them further. What feature of polymorphic viruses make them the most difficult viruses to detect?

A. They avoid detection by redirecting hard-drive requests from the virus scanning software
B. They attach themselves to executable programs, making them undetectable when you list the
directory
C. These viruses are written as macros in Microsoft Word documents, so they go undetected
because virus scanning generally scans only executable files.
D. These viruses are able to appear as a different process each time they are run, thus they
elude detection.

Answer: D

Explanation:
Virus detection is based on examining a signature (the code segment) of the virus within a module. A polymorphic virus eludes detection by dynamically altering the signature as it infects other modules.

Incorrect Answers:
A: This is a form of stealth viruses, that hide themselves.
B: This is the method of almost every executable virus.
C: These are Macro Viruses, and current virus detection programs are now capable of scanning for this type of virus.

Question 6.
Derek is creating an image map named "cityscape." in his HTML code. What must he use as the corresponding USEMAP name?

A. "cityscape""
B. cityscape.gif"
C. "#cityscape"
D. "!cityscape"

Answer: C

The USEMAP= "#cityscape" attribute with specifies that an image map with the name of cityscape should be used. The FaceMap image map must be defined at another location within the same HTML document. The USEMAP= "#cityscape" attribute and value specifies a local reference within the same HTML document.

Incorrect answers:
A, B, C: These are all incorrect USEMAP syntax.

Note:
An example of the use of an image map. First we define a map name. We insert the same name for the map as was specified in the USEMAP attribute above. Then we define the map with area elements. The code is included in the same HTML file as the code from the question above.

<map name="#cityscape">
<area shape="rect" coords="left-x, top-y, right-x, bottom-y">
<area shape="circle" coords="center-x, center-y, radius-x">
<area shape="poly" coords="x1,y1, x2,y2 x3,y3, ...">
</map>

Question 7.
What port does the Domain Name System (DNS) use?

A. 21
B. 80
C. 53
D. 25

Answer: C

Explanation:
DNS uses TCP port 53.

Incorrect answers:
A: FTP, file transfer protocol, uses TCP port 21.
B: HTTP, hyper text transfer protocol, uses TCP port 80.
D: SMTP, simple mail transfer protocol, uses TCP port 25.

Question 8.
Several tags must appear in an HTML file. Which of the following choices list required tags in the current sequence of the appearance?

A. <body, head, HTML>
B. < head, HTML, body>
C. <head, body, HTML>
D. <HTML, head, body>

Answer: D

Explanation:
An HTML file has the following structure:
<HTML>
<HEAD>
</HEAD>
<BODY>
</BODY>
</HTML>

The order of the tags is HTML, HEAD, BODY.

Question 9.
Which of the following best describes a cookie?

A. A small text file created by a web server that resides on the users computer.
B. An external application launched by a web browser or internet client program to view non-native file formats and other data types.
C. A file format used for importing and exporting graphics.
D. A small program created in the Java language especially designed to reside in HTML pages.

Answer: A

Explanation:
web servers and web browsers do not have access to store data on your computer. Sometimes a website wants to leave an indicator that you have been there before. One common use is to save the userid of the person who last did a logon to the site, and maybe even the password. Then when you visit the site again, it knows you, and can even log you on. These files that are created are text files, and reside on the client’s computer. It is not an application, so B is wrong. It could be considered a file format, in a loose way, but it is not involved with the import or export of graphics, so C is wrong. It is also not a program, so D is wrong.

Question 10.
Which IP class uses 16 bits for the network portion and 16 bits for the host portion of the address?

A. Class A.
B. Class B.
C. Class C.
D. Class D.

Answer: B

Explanation:
a Class B IP address is 16 Network, 16 Host. A class A address is 8 Network and 24 Host, and a Class C is the opposite, 24 network and 8 host, so A & C are wrong. The Class D is the multicast range, and does not use a network/host format, so D is wrong.

Question 11.
Which mail protocol is used to retrieve the e-mail to the client machine?

E. Internet Message Access Protocol (IMAP)
F. Hypertext Transfer Protocol (HTTP)
G. Simple Mail Transfer Protocol (SMTP)
H. Post office Protocol (POP)

Answer: D

Explanation:
POP (Post Office Protocol) is used to receive (download) e- mail messages from the mail server to the client computer whereas IMAP is a mail protocol that is use to view the e-mails interactively on the mail server.

HTTP is the protocol used for WEB Pages, and is not a mail protocol.

SMTP allows the sending of mail messages.



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for DC0-261 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "DC0-261" Exam

Dell Storage Networking Professional Exam - version 2

 Question 1.
Navisphere CLI is typically installed with what other software package?

A. Navisphere Manager
B. Host Agent
C. AccessLogix
D. PowerPath

Answer: B

Question 2.
Which two statements about Storage Area Networks (SANs) are true? (Choose two.)

A. SANs enable the sharing of storage resources via IP / Ethernet networking.
B. SANs enable the sharing of storage resources across a high speed, low latency, Fibre
    Channel network.
C. SANs provide block level I/O access to storage resources.
D. SANs provide file level I/O access to storage resources.

Answer: B, C

Question 3.
Which three statements are correct about zoning with Brocade switches? (Choose three.)

A. Zoning configuration information is stored on the hosts.
B. Zone aliases are not required to define a zone.
C. A zone can be included in more than one zone configuration.
D. Each zone must be given a unique name.
E. Each device can be included in only one zone.

Answer: B, C, D

Question 4.
Which term is another name for hard zoning in Fibre Channel switches?

A. soft zoning
B. WWN zoning
C. port zoning
D. switch zoning

Answer: C

Question 5.
Where is the Host Agent privileged user list stored?

A. on the Storage Area Network (SAN) for central access
B. in an administrative share on the host server for host-to-host replication
C. both locally and remotely on the SAN
D. each Host Agent maintains its own local copy

Answer: D

Question 6.
Which utility should you use to add LUN management functionality to a server when using SAN Copy?

A. admhost
B. naviadm
C. admcopy
D. admsnap

Answer: A

Question 7.
Which three statements about a GigaBit Interface Converter (GBIC) are true? (Choose three.)

A. Single-mode optical can be used for long wavelength transmissions.
B. A GBIC can convert the SCSI protocol intoFibre Channel.
C. Multi-mode optical can be used for short wavelength transmissions.
D. Small form pluggable LC transceivers build upon the GBIC standard.
E. A GBIC terminates aFibre loop.

Answer: A, C, D

Question 8.
Which two components of a CX700 array do the standby power supplies connect to? (Choose two.)

A. The left and right power distribution units (PDUs)
B. Storage Processor Enclosure (SPE)
C. the first Disk Array Enclosure (DAE2-OS)
D. Disk Processor Enclosure (DPE)

Answer: B, C

Question 9.
Which three statements are correct about using SnapView? (Choose three.)

A. SnapView can take snapshots, or point-in-time copies of LUNs.
B. SnapView can make clones, or 100% duplicate copies of a LUN.
C. Snapshots can take mere seconds to create.
D. Snapshots are volume-level and thus able to restore specific files.
E. Snapshots may be created using theadmhost CLI utility.

Answer: A, B, C

Question 10.
What are four characteristics of World Wide Names (WWNs)? (Choose four.)

A. WWNs consist of a 128-bit value comprising a 64-bit node name and a 64-bit port name.
B. WWNs can be used in an IP NIC.
C. WWNs are used to route SAN data and provide zoning and failover functionality.
D. Each device has a pre-defined, unique address.
E. More than one WWN can exist in a single host if the host contains multiple Host Bus Adapters 
    (HBAs).

Answer: A, C, D, E


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-237 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-237" Exam

Designing Messaging Solutions with MS Exchange Server 2007

 Question 1.
You are the messaging engineer for your company. The company has 10,000 users worldwide. All users connect to their mailboxes by using Outlook Web Access. The company is transitioning from Microsoft Exchange Server 2003 to Exchange Server 2007. You plan to deploy five Client Access servers. You need to provide recommendations to improve the performance of Outlook Web Access. 

What should you do?

A. On all Client Access servers, edit the TMP variable and specify a dedicated physical disk.
B. On all Exchange Server 2003 servers, edit the TMP variable and specify a dedicated physical 
    disk.
C. Install an Edge Transport server on a new server.
D. Install a Hub Transport server on a new server.

Answer: A

Question 2.
You are the messaging engineer for your company. Your network contains a single Microsoft Exchange Server 2003 server with Service Pack 2 installed.

The Intelligent Message Filter has been enabled on the Exchange Server 2003 server. You plan to transition your messaging environment from Exchange Server 2003 to Exchange Server 2007. You do not plan to deploy an Edge Transport server. You need to ensure that anti-spam filtering is enabled for your organization after the transition to Exchange Server 2007. 

What should you do?

A. Configure sender reputation.
B. Run the AntispamCommon.ps1 Exchange Management Shell script.
C. Run the lnstall-AntispamAgents.ps1 Exchange Management Shell script.
D. Configure a transport rule that drops all messages with a spam confidence level of five or  
     higher.

Answer: C

Question 3.
You are the messaging engineer for your company. Your company has a main office and 30 branch offices. Your company has a Microsoft Exchange Server 2003 messaging system. A routing group is configured for each office. As part of your transition to Exchange Server 2007, you recently deployed Client Access servers. You plan to deploy Hub Transport servers. You need to prepare the Exchange organization for the deployment of the Hub Transport servers. 

What should you do?

A. Create new routing groups. Place the Exchange Server 2007 server objects into the new 
     routing groups.
B. Configure multiple IP addresses on all Exchange Server 2007 servers. Disable Windows 
     Firewall for all network connections.
C. Create new Active Directory sites. Place the Exchange Server 2003 servers and the Exchange 
    Server 2007 servers into separate sites.
D. Suppress propagation of link state information on all Exchange Server 2003 servers.

Answer: D

Question 4.
You are the messaging engineer for your company. The company has a main office and two branch offices. The network contains two Exchange servers named Server1 and Server2.

Server1 is a Microsoft Exchange Server 2003 server. Server1 hosts the SMTP connector that delivers outbound Internet e-mail. Server2 is an Exchange Server 2007 server. Server2 hosts the Mailbox server role, the Client Access server role, and the Hub Transport server role. You plan to configure your company's firewall to allow outbound SMTP connections only from Server2. You need to recommend a solution that ensures that Server2 delivers all outbound Internet e-mail.

What should you recommend?

A. Configure the SMTP connector on Server1 to use Server2 as a smart host. Delete the Receive 
     connector on Server2.
B. Create a Send connector that uses Server2 as a source server. From Server 1, delete the 
     SMTP connector.
C. Configure the SMTP virtual server on Server1 to use Server2 as a smart host. From Server 1, 
     delete the SMTP connector.
D. Create a Receive connector on Server2 and specify the Remote IP range to the local subnet. 
    Create a Send connector that uses Server1 as a smart host.

Answer: B

Question 5.
You are the messaging engineer for your company. The network contains a single Exchange organization that consists of Microsoft Exchange Server 2003 servers and Exchange Server 2007 servers. You need to recommend a solution that allows all Exchange administrators to track messages sent to any mailbox on any server in the organization. 

What should you recommend?

A. Use the Exchange Server 2007 Queue Viewer to track e-mail messages.
B. Use the Exchange Server 2007 Mail Flow Troubleshooter tool to track all messages.
C. Use the Exchange Server 2007 Exchange Management Shell to run the Get-Message cmdlet to track a message by specifying the messages unique message ID.
D. Use the Exchange Troubleshooting Assistant to track messages sent by Exchange Server 
     2007. Use the Message Tracking Center to track messages that are transferred to Exchange 
     Server 2003.

Answer: D

Question 6.
You are the messaging engineer for your company. The company network contains an Active Directory forest that contains three domains. Each domain contains at least one Microsoft Exchange Server 2003 server. All mail-enabled groups are configured as global distribution groups. You plan to transition from Exchange Server 2003 to Exchange Server 2007. You need to recommend a solution that ensures that all mail-enabled groups can be expanded from any Exchange Server 2003 server or any Exchange Server 2007 server. 

What should you recommend?

A. Convert all global distribution groups to global security groups.
B. Convert all global distribution groups to universal distribution groups.
C. Configure all global distribution groups to require that senders are authenticated.
D. Configure all global distribution groups to send delivery reports to the message originator.

Answer: B

Question 7.
You are the messaging engineer for your company. The company has one main office and 100 branch offices. An Active Directory site exists for each office.

The company has a Microsoft Exchange Server 2003 messaging system. Each office contains one Exchange server. A routing group is configured for each office. You plan to transition the company's messaging system to Exchange Server 2007. You need to design a transition plan that allows both versions of Exchange to coexist. Your plan must also minimize the number of servers deployed in your Exchange organization. 

What should you recommend?

A. Install an Exchange Server 2007 Mailbox server in all offices. Move all mailboxes and replicate 
    all public folders from the Exchange Server 2003 server to the new Mailbox server.
    Decommission all Exchange Server 2003 servers.
B. Install an Exchange Server 2007 Mailbox server in the main office. Move all mailboxes and  
    replicate all public folders from the Exchange Server 2003 servers to the new Mailbox server.
    Decommission all Exchange Server 2003 servers.
C. Install an Exchange Server 2007 Mailbox server, a Client Access server, and a Hub Transport  
    server in all offices. Move all mailboxes and replicate all public folders from the Exchange  
    Server 2003 server to the new Mailbox server. Decommission all Exchange Server 2003  
     servers.
D. Install an Exchange Server 2007 Mailbox server, a Client Access server, and a Hub Transport  
     server in the main office. Move all mailboxes and replicate all public folders from the Exchange  
     Server 2003 server to the new Mailbox server. Decommission all Exchange Server 2003  
     servers.

Answer: D

Question 8.
You are the messaging engineer for your company. Your company has migrated from Microsoft Exchange 5.5 Server to Microsoft Exchange Server 2003. One Exchange 5.5 Server remains on the network. Your company plans to transition to Exchange Server 2007 and expects a period of coexistence with previous versions of Exchange Server. You need to prepare the Exchange organization for the installation of Exchange Server 2007. 

What should you do? (Each correct answer presents part of the solution. Choose two.)

A. On a domain controller, run setup.exe /PrepareLegacyExchangePermissions and setup.exe  
     /PrepareAD from the Exchange Server 2007 source files.
B. On an Exchange Server 2003 server, run setup.exe /roles: Mailbox /LegacyRoutingServer 
     from the Exchange Server 2007 source files.
C. Decommission the Exchange 5.5 server from the network and remove all Active Directory  
     connectors. Upgrade the Exchange organization to native mode.
D. On the Exchange 5.5 server1 run the installation program for Exchange Server 2007.
E. Modify the Recipient Update Service for the Exchange organization to point to a server that will 
    be installed with Exchange Server 2007 server.

Answer: A, C

Question 9.
You are the messaging engineer for your company. The company has a main office and two branch offices. The network contains a single Active Directory domain. An Active Directory site exists for each office. Each site has a Microsoft Exchange Server 2003 server. Each Exchange server hosts the mailboxes and public folders for users in that office. You plan to deploy one Exchange Server 2007 server in each site. Each Exchange Server 2007 server will host the Mailbox server role, the Client Access server role, the Hub Transport server role, and one mailbox database and a public folder database. All users will use Microsoft Office Outlook 2003. You need to recommend a solution that allows Outlook 2003 users to download the offline address book from an Exchange server in their local site. 

What should you recommend?

A. For each Exchange Server 2007 server, create replicas of the offline address book public 
     folders.
B. For each Exchange Server 2007 server, schedule the Update-OfflineAddressBook cmdlet to  
     run once a day.
C. On each Exchange Server 2007 server, create an offline address book distribution point and  
     configure Web-based distribution.
D.  For each Exchange Server 2007 server, copy the OAB files to a local share. Redirect all client 
     computers to that share.

Answer: A

Question 10.
You are the messaging engineer for your company. Your company has a Microsoft Exchange Server 2003 messaging system. Your company has an application server named Server1. 

Server1 sends SMTP administrative alerts through an unauthenticated relay on an Exchange SMTP virtual server. You plan to deploy Exchange Server 2007 Hub Transport servers. You plan to remove all Exchange Server 2003 servers. You need to ensure that Server1 can send SMTP alerts by using an unauthenticated relay on an Exchange Server 2007 Hub Transport server. 

Which two actions should you perform on the Hub Transport servers? 
(Each correct answer presents part of the solution. Choose two.)

A. Create a new Receive connector. Configure the Receive connector to use a remote IP address 
     range that includes the IP address of Server1.
B. Create a new Send connector. Configure an address space that includes only the local SMTP  
    domain.
C. Create a new Send connector. Configure an * address space.
D. Add the Exchange Users permission group and the Exchange Server authentication  
    mechanism.
E. Add the Exchange Servers permission group and the Externally Secured authentication  
    mechanism.

Answer: A, E



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-238 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-238" Exam

Deploying Messaging Solutions w/MS Exchange Server 2007

 Question 1.
You are a messaging professional. Your company has six offices.
The company has deployed Microsoft Exchange Server 2003 computers in each office.

Users in the company use Microsoft Office Outlook 2003 as RPC over HTTPS client to connect to their Exchange Server 2003 mailboxes on the Internet. Users connect directly to the Exchange Server 2003 computers from the Internet.

You deploy a Microsoft Exchange Server 2007 Client Access Server.
You need to ensure that all client connections on the Internet use the new Client Access Server.
Your want to achieve this goal with minimum impact on internal and external users.

Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A. Add the Hub Transport server role to the Exchange Server 2007 server.
B. Configure the Exchange Server 2003 computers to operate as front-end servers.
C. Configure the Exchange Server 2003 computers to operate as back-end servers.
D. Remove the RPC over HTTPS component from the Exchange Server 2003 computers.
    Configure the client computers to access the Client Access Server.
E. Install the RPC over HTTPS component on the Client Access Server. Configure Microsoft 
    Office Outlook Anywhere. Configure the client computers to access the Client Access Server.

Answer: C, E

Question 2.
You are a messaging professional. You manage the Microsoft Exchange Server 2007 messaging system for your company, A. Datum Corporation. The company uses the SMTP domain name adatum.com.

The company has recently acquired Contoso, Ltd. Contoso uses the SMTP domain name contoso.com in a separate Exchange Server 2007 messaging system.

You enable messaging connectivity and directory synchronization between the two messaging systems.

Each Exchange messaging system has an Edge Transport server that receives all Internet e-mail messages.

All outbound Internet e-mail messages are sent through A. Datums Edge Transport server. For internal e-mail messages, all users at Contoso must use a contoso.com e-mail address.

However, all users in both the companies must use an adatum.com e-mail address for Internet email messages.

You need to ensure that all e-mail messages sent from A. Datum and Contoso have an adatum.com reply address.

Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A. Define a transport rule to redirect all e-mail messages to contoso.com to adatum.com on the 
    Edge Transport server for contoso.com.
B. Create an only outbound address rewrite entry to rewrite contoso.com addresses to 
     adatum.com on the Edge Transport server at A. Datum.
C. Create an accepted domain entry for contoso.com on the Edge Transport server at 
      A. Datum. Configure this domain as an internal relay domain.
D. Create an accepted domain entry for adatum.com on the Edge Transport server for 
      contoso.com. Configure this domain as an internal relay domain.
E. Create an address rewrite entry to rewrite the address for inbound mail for each Contoso user 
     individually with the corresponding contoso.com address on the Edge Transport server at A. 
     Datum.

Answer: B, E

Question 3.
You are a messaging professional. Your company has a Microsoft Exchange Server 2007 messaging system.

The company has a main office and two branch offices. A Client Access Server is deployed in each office. Only the Client Access Server at the main office is accessible on the Internet.

Users in the company work in remote sites as well as from home on computers that do not belong to the corporate domain. The mailboxes for the remote users are located in all the three offices.
All remote users use Microsoft Office Outlook 2007.

You need to ensure that client computers are automatically configured by using the Auto discover service. You also need to ensure that the users are able to view availability information for other users in the company.

Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A. Activate NTLM authentication for Microsoft Office Outlook Anywhere on the Client Access 
     Server at the main office.
B. Modify the network configuration so that a Client Access Server is accessible on the Internet in 
     each office.
C. Configure valid Domain Name System (DNS) records for the Client Access Server at the main 
    office.
D. Configure the URL values for the Availability service, Exchange Web services, and the offline  
    address book to include the external Domain Name System (DNS) name for the Client Access 
    Server at the main office.
E. Configure the URL values for the Availability service, the Exchange Web services, and the 
     offline address book to include only the internal Domain Name System (DNS) name for the 
     Client Access Server at the main office.

Answer: C, D

Question 4.
You are a messaging professional. Your company uses a Microsoft Exchange Server 2007 messaging system.

The company has five offices. The offices are connected by 128-KBps WAN links. A Microsoft Active Directory site is configured for each office. The messaging system is centralized in the main office. Mailbox servers, Hub Transport servers, and Client Access Servers are deployed on the internal network in the main office. Edge Transport servers are deployed on a perimeter network in the main office.

The company plans to deploy Unified Messaging for users in all five offices. The company has the following requirements:

• The Play on Phone feature
• The optimal performance of the Unified Messaging system

Each site has an IP-PBX system that is compatible with Unified Messaging.
You need to deploy the appropriate Exchange Server 2007 computers to fulfill the requirements.

Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A. Deploy a Unified Messaging server in each site.
B. Deploy a Unified Messaging Server role on servers in the central site that run the Client 
    Access Server role.
C. Deploy group policies that specify the use of IPSec to encrypt traffic from IP-PBX systems in  
    each site to the Unified Messaging server.
D. Deploy the Mailbox server role, the Hub Transport server role and the Client Access Server  
     role on a server in each site. Place the corresponding mailbox accounts of users in that site on 
     the local Mailbox server.

Answer: A, D

Question 5.
You are a messaging professional. Your company uses a Microsoft Exchange Server 2007 messaging system. The company policy has the following requirements:
• All members of the sales team must have a folder named Customers in their mailboxes to store e-mail messages received from customers.
• All e-mail messages placed in the Customers folder of individual mailboxes must be accessible to all other members of the sales team.
• Members of the sales team must be able to access the messages by using Microsoft Office Outlook 2003.

You need to meet the outlined requirements.

Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A. Create a distribution group that includes all members of the sales team.
B. Create a managed folder mailbox policy that includes the Customers folder. Assign the policy  
     to the sales team.
C. Create a managed custom folder named Customers. Configure a managed content setting for  
     the folder to journal e-mail messages to a mail-enabled public folder.
D. Create a managed custom folder named Customers. Configure a managed content setting for  
     the folder to journal e-mail messages to the SMTP address that is assigned to a Microsoft  
     Windows SharePoint Services document library.
E. Configure a journal rule that is applied to external e-mail messages sent to the distribution  
     group. Configure the journal rule to send messages to the SMTP address that is assigned to a  
     Microsoft Windows SharePoint Services document library.

Answer: B, C

Question 6.
You are a messaging professional. Your company uses a Microsoft Exchange Server 2007 messaging system.

The company has a main office and five branch offices. The company has deployed Exchange Server 2007 computers in each office.

The legal department personnel in each office send e-mail messages with an A/C Privileged classification. A mailbox named Attorney Communications Is located on a Mailbox server at the main office.

The legal department requires that a copy of all e-mail messages with the message classification of A/C Privileged be sent to the Attorney Communications mailbox.

You need to meet the outlined requirement. You also need to ensure that the rule deployment minimizes the network bandwidth usage between the offices.

What should you do?

A. Configure a transport rule that will send a copy of all messages with a classification of A/C 
     Privileged to the Attorney Communications mailbox. Disable the transport rules agent on all  
     Hub Transport servers at the branch offices.
B. Configure a journal rule that will send a copy of all messages sent to or from the legal  
     department to the Attorney Communications mailbox. Disable the journal rules agent on all 
     Hub Transport servers at the branch offices.
C. Configure a transport rule that will send a copy of all messages with a classification of A/C 
     Privileged to the Attorney Communications mailbox. Disable the journal rules agent on all Hub  
     Transport servers.
D. Configure a journal rule that will send a copy of all messages sent to or from the legal 
     department to the Attorney Communications mailbox. Disable the transport rules agent on all 
     Hub Transport servers.

Answer: C

Question 7.
You are a messaging professional.

Your company has deployed Microsoft Exchange Server 2007 computers. The company plans to implement Edge Transport servers. The Edge Transport servers will be deployed on a perimeter network. The Edge Transport servers must be configured to use external servers for name resolution.

You need to configure the ports that the external firewall will require for inbound and outbound access. Your solution must also reduce the effort required to configure the Edge Transport servers.

What should you do?

A. Configure the firewall to allow inbound access on TCP port 25 and outbound access on UDP  
     ports 50389 and 50636.
B. Configure the firewall to allow both inbound and outbound access on TCP port 25 and 
     outbound access on TCP and UDP port 53.
C. Configure the firewall to allow inbound and outbound access on TCP port 25 and outbound  
     access on TCP ports 50389 and 50636.
D. Configure the firewall to allow inbound and outbound access on TCP port 25 and outbound  
    access on all dynamic TCP ports greater than 1023.

Answer: B

Question 8.
You are a messaging professional. Your company implements a Microsoft Exchange Server 2007 messaging system for a large banking organization.

The company deploys an Edge Transport server. All messages sent to and from the Internet are sent through the Edge Transport server.
All bank account numbers use the following format ABC-12345.
You need to prevent e-mail messages that contain bank account numbers from leaving the internal network. You also need to ensure that the security department is informed when users send these e-mail messages.

Which action or actions should you perform? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

 

Answer:

 

Question 9.
You are a messaging professional. Your company uses a Microsoft Exchange Server 2007 messaging system. The company has the following messaging security requirements:

• All e-mail messages sent by the users must be permanently retained.
• All e-mail messages sent by the users must be removed from the user mailboxes after 60 days.

You need to meet the outlined requirements.

Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

A. Create a policy that requires all users to enable journaling for all contacts in their contact list.
B. Create a policy that requires all users to use the Auto Archive feature in their Sent Items folder 
     for all the e-mail messages older than 60 days.
C. Create a managed content setting for the entire Mailbox folder. Configure the setting to  
     remove all the e-mail messages from the user mailboxes after 60 days.
D. Create a managed content setting for the Sent Items folder. Configure the setting to journal all  
     e-mail messages that are delivered to the Sent Items folder in the user mailbox.
E. Create a distribution group that includes all the mailbox users. Configure a Journal rule that  
     journals messages for this distribution group and forwards all the e-mail messages to a  
     dedicated mailbox.

Answer: C, E

Question 10.
You are a messaging professional. Your company uses a Microsoft Exchange Server 2007 messaging system.

The company has two offices. Each office is configured as a Microsoft Active Directory site.
Exchange Server 2007 computers are deployed on each site.

The company deploys an Edge Transport server in each office. All Internet e-mail messages are sent through the Edge Transport servers. Custom SMTP connectors are configured on each Edge Transport server.

The company's security policy states that no messages that contain client account numbers can be sent through the Internet. Users must be able to send these messages to other users inside the organization.

You implement an Edge Transport rule on one of the Edge Transport servers that prevent users from sending messages that contain client account numbers through the Internet.

A routine audit identifies that messages that contain client account numbers are still being sent through the Internet.

You need to prevent users from sending e-mail messages that contain client account numbers through the Internet. You also need to ensure that all other message delivery systems remain unaffected.

What should you do?

A. Export the Edge Transport server configuration on the server where you configured the Edge  
     Transport rule. Import the configuration on the server that does not have the rule configured.
B. Configure an Edge Transport rule that prevents users from sending messages that contain 
     client account numbers through the Internet on the Edge Transport server that does not have  
     the rule configured.
C. Delete the Edge Transport rule on the Edge Transport server. Create a Transport rule on a  
     Hub Transport server. Configure the rule to drop all messages that contain client account  
     numbers.
D. Delete the Edge Transport rule on the Edge Transport server. Create a Transport rule on a  
     Hub Transport server that assigns a Confidential message classification to all messages that 
     contain client account numbers.

Answer: B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-445 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-445" Exam

Microsoft SQL Server 2005 Business Intelligence – Implementation and Maintenance

 Question 1.
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package. 
The package has the following features:
Two Data Flow tasks and two Control Flow tasks
A success constraint between each Data Flow task and the subsequent Control Flow task
The package uses one transaction for all the tasks.
You need to configure the package so that the two Data Flow tasks use their own transactions.
You also need to ensure that each Control Flow task is enlisted in the same transaction as its preceding Data Flow task.

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

A. Change the TransactionOption property to Supported for the package.
B. Change the TransactionOption property to Required for the package.
C. Change the TransactionOption property to Supported for each Data Flow task.
D. Change the TransactionOption property to Required for each Data Flow task.
E. Change the TransactionOption property to Supported for each Control Flow task.
F. Change the TransactionOption property to Required for each Control Flow task.

Answer: A, D, E

Question 2.
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package. The package contains 30 Data Flow tasks and 30 Control Flow tasks. The package runs slower than expected. You need to capture the start time the finish time and the elapsed time for the validation and execution of the package. 

What should you do?

A. Enable the OnProgress event handler and use the Control Flow tasks to write the information 
    to a log.
B. Monitor the Progress tab during the execution of the package, and then monitor the Execution 
    Results tab.
C. Use the Performance Monitor tool to capture the counters from the SQL Server SSIS Service 
    object. Analyze the output for the required information.
D. Use the Performance Monitor tool to capture the counters from the SQL Server: SSIS Pipeline 
    object. Analyze the output for the required information.

Answer: B

Question 3.
Microsoft SQL Server Management Studio (SSMS) is installed on your workstation. Microsoft Business Intelligence Development Studio (BIDS) is not installed on your workstation. 

You need to create a package that must meet the following requirements:
It must be transactional.
It must be optimized for 20 tables.
It must be stored securely in the msdb database of a remote server.

What should you do?

A. Create the package by using DTS Designer.
B. Create the package by using the Package Migration Wizard.
C. Create the package by using the Microsoft SQL Server Import and Export Wizard.
D. On the Microsoft SQL Server 2005 Integration Services (SSIS) menu, click the Create 
    Package submenu.

Answer: C

Question 4.
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package. While testing, a Transact-SQL user-defined function causes duplicate key values that stop the transformation.

To permit the transformation to continue, the package must perform the following tasks:
1. Ascertain which rows are affected.
2. Insert the rows that fail into a table.
3. Continue with the process.
You need to change certain properties in the package to meet the requirements.

Which three tasks should you perform? (Each correct answer presents part of the solution. Choose three.)

A. Choose the Redirect Row option for the Error property on the key column.
B. Choose the Ignore Failure option for the Error property on the key column.
C. Choose the Fail Component option for the Error property on the key column.
D. Add a DataReader source to use a new Data Flow destination when the Failure constraint is 
    fired.
E. Add a DataReader source to use a new Data Flow destination when the Completion constraint 
    is fired.
F. Edit the Error Output properties for each DataReader source and configure each data source 
    for error handling.

Answer: A, D, F

Question 5.
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package. The package uses at least one sequence container in one transaction. Each transaction controls a Data Flow task and a Control Flow task. Each Data Flow task has a Success constraint. 

The Control Flow task follows the Success constraint. The package must include the following requirements:
Each Data Flow task must use its own transaction.
The Control Flow task and the Data Flow task that precedes it must succeed or fail as an atomic unit.
A restart point must restart each Data Flow task and the Control Flow task that follows it as an atomic unit.
You need to make changes in the control flow designer to meet the outlined requirements.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Add all the Data Flow tasks and the Control Flow tasks to one sequence container.
B. Add a sequence container for each Control Flow task and the Data Flow task that precedes it.
C. Change the FailPackageonFailure property to true for each new sequence container that is 
    added to the package.
D. Change the FailPackageonFailure property to false for each new sequence container that is 
    added to the package.

Answer: B, C

Question 6.
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package. An Analysis Services Processing task in the package requires data from a file. The file is exported to a file share.
If the file is not available on the file share, the Analysis Services Processing task must import data from a remote Microsoft SQL Server 2005. You need to add steps to the package to import the data. 

What should you do?
 
Answer:
 

Question 7.
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package. The OLE DB data source for the package is a database that is updated frequently. 

You need to create a package that accomplishes the following tasks:
Implement the IRowsetFastLoad interface.
Support various data flow destinations.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Use an OLE DR data flow destination.
B. Use a Recordset data flow destination.
C. Use a DataReader data flow destination.
D. Create separate data flow destinations within the same Data Flow task.

Answer: A, D

Question 8.
Your company's business intelligence (BI) model uses Microsoft SQL Server 2005 Integration Services (SSIS). There are 20 packages that use the same configuration. The package configuration is stored in an XML file as a variable. You need to track the changes that affect a package that uses one variable. You also need to modify the package to provide automatic notification by e-mail whenever there are changes to the variable.

What should you do?
 
Answer:
 

Question 9.
You are designing a Microsoft SQL Server Integration Services (SSIS) package. The package contains a single OLE DB data source. The package must be deployed on 10 servers. The package uses the XML configuration file to connect to a pre-assigned server. You need to ensure that the package uses the correct server at runtime

What should you do?
 
Answer:
 

Question 10.
You are designing a Microsoft SQL Server 2005 Integration Services (SSIS) package. The package is named UpdateTable.dtsx and contains a variable named runlD. The package must run by using the dtexec utility. The runlD variable must be set at runtime to a value of 5. You need to meet the outlined requirements. 

What should you do?

A. Execute dtexec /F "c:\ssisPackages\UpdateTable.dtsx" /SET 
    \packages.variables[runlD].Value;5.
B. Execute dtexec /F "c:\ssisPackages\UpdateTable.dtsx" /SET \packages.variables.runlD=5.
C. Create a text file that specifies the variable name and value in the format 
    package.variables[runlD].Value = 5. Execute dtexec /F "c:\ssisPackages\UpdateTable.dtsx" 
    /COM  where  is the name of the file you just created.
D. Create a text file that specifies the variable name and value in the format runlD=5. Execute 
    dtexec /F "c:\ssisPackages\UpdateTable.dtsx" /COM  where  is the 
    name of the text file you just created.

Answer: A



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-446 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-446" Exam

Designing a Business Intelligence Infrastructure by Using Microsoft SQL Server 2005

 Question 1.
You need to ensure the Client dimension is able to support new orders and new client records. 

Which setting should you configure?

A. ROLAP storage
B. Lazy aggregations
C. Write Enabled property
D. Unknown Member functionality

Answer: A

Question 2.
You need to meet the requirements of the accounts team. 

What should you do?

A. Set the Dimension type to Currency.
B. Set the Currency member name as a unique attribute.
C. Hide non-leaf data within the Currency dimension key attribute.
D. Disable the All member of the Currency dimension key attribute.

Answer: D

Question 3.
You need to make structural changes to the cube. You also need to ensure that appropriate aggregations are created after the changes are made.

What should you do?

A. Record a weeks user activity by using SQL Profiler. Apply structural changes. Replay the 
    activity and then run the Usage Based Optimization Wizard.
B. Apply structural changes. Run the Database Engine Tuning Advisor.
C. Apply structural changes. Run the Usage Based Optimization Wizard.
D. Record a weeks user activity by using SQL Profiler. Apply structural changes. Run the 
    Database Engine Tuning Advisor.

Answer: A

Question 4.
You need to select appropriate processing methods for the EmployeeAssignment measure group and the Employee dimension. 

Which method should you choose?

A. Run a Process Update against the Employee dimension. Run a Process Full against the 
    EmployeeAssignment measure group.
B. Run a Process Full against the EmployeeAssignment measure group. Run a Process Update 
    against the Employee dimension.
C. Run a Process Full against the Employee dimension. Run a Process Incremental against the 
    EmployeeAssignment measure group.
D. Run a Process Incremental against the EmployeeAssignment measure group. Run a Process 
    Full against the Employee dimension.

Answer: A

Question 5.
You need to ensure that the new sales manager is able to view clients within only the North and South regions.

What should you do?

A. Add a Denied member set for the West clients to NorthRole.
B. Add an Allowed member set for the South clients to NorthRole.
C. Create a new role for the sales manager and add a Denied member set for the South clients.
D. Create a new role for the sales manager and add an Allowed member set for the South clients. 
    Remove the sales manager from SouthAndWestRole.

Answer: D

Question 6. 
You need to meet the business requirements of the packaging department. 

What should you do?

A. Add the ProductSize data table and the ProductSizeDescriptor column to the Product 
    dimension. Set the order of the ProductSKU attribute to the ProductSizeDescriptor column.
B. Add the ProductSize data table as a dimension and then add this dimension to the cube as a 
    Referenced dimension. Set the order of the key attribute of the ProductSize dimension to the 
    ProductSizeDescriptor column.
C. Add the ProductSize data table and the ProductSizeDescriptor column to the Product 
   dimension. Create a user-defined hierarchy that has ProductSKU as the top-level attribute and 
   ProductSizeDescriptor as the bottom-level attribute.
D. Add the ProductSize data table as a dimension and then add this dimension to the cube as a 
   Referenced dimension. Create a user-defined hierarchy within the ProductSize dimension. Set 
   the ProductSizeDescriptor attribute as the top-level attribute.

Answer: A

Question 7.
You need to ensure the Order Control team is able to track the number of orders that reach the production department. 

What should you do?

A. Create a new Time dimension based on the Holiday table. Use derived columns for the month 
    and the year.
B. Create a Server Time dimension. Within this dimension, enable the time periods year, month, 
    and date. Select the Additional Manufacturing calendar option.
C. Create a new Time dimension based on the date values within the ProductOrderStatus table. 
    Flag those days on which no orders were received as Holiday.
D. Create a new Time dimension based on a data source view named query. Derive the data for 
    this data source view from unique dates within the ProductOrderStatus table. Use a subquery 
    to identify the holidays and derived columns for the month and the year.

Answer: D

Question 8.
You need to design a storage mode for the ProductOrderStatus measure group. 

What should you do?

A. Use ROLAP for the Historical partition and MOLAP for the CurrentDay partition.
B. Use MOLAP for the Historical partition and ROLAP for the CurrentDay partition.
C. Use ROLAP for the Historical partition and Automatic MOLAP for the CurrentDay partition.
D. Use HOLAP for the Historical partition and Low-latency MOLAP for the CurrentDay partition.

Answer: B

Question 9.
You need to maintain the partitions on the ProductOrderStatus measure group.

What should you do?

A. Create a Microsoft SQL Server 2005 Integration Services (SSIS) package that alters the 
    partition queries and processes aggregated partitions every evening.
B. Enable proactive caching on the partitions. Set the cache to update periodically with a latency 
    of 24 hours.
C. Set the rebuild interval of the partitions to 36 hours. Create a Microsoft SQL Server 2005 
    Integration Services (SSIS) package that processes aggregated partitions every evening.
D. Enable proactive caching on the ProductOrderStatus measure group. Set scheduled polling 
    that re-processes the measure group whenever the system dates change.

Answer: A

Question 10.
You need to reduce the duration of the daily full database backup process. 

What should you do?

A. Perform transaction log backups every 30 minutes throughout the day.
B. Partition the Transaction table by a range based on the TransactionID. Daily, back up only the 
    file groups that have changed.
C. Place the Transaction table in its own file group. Back up the Transaction table and the 
    remaining file groups each evening.
D. Partition the Transaction table by a range based on the MortgageID. Daily, back up only the 
    file groups that have changed.

Answer: B



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-500 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-500" Exam

MS Windows Mobile Designing, Implementing and Managing

 Question 1.
You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. The messaging infrastructure is configured to support the remote wipe feature. When an administrator attempts to perform a remote wipe of a Windows Mobile based device, the administrator receives a 401 error message.
You need to ensure that the administrator is authorized to perform remote wipes only.

What should you do?

A. Grant the administrator membership in the Domain Administrators group.
B. Grant the administrator membership in the Exchange Administrators group.
C. Add the new administrator account to the Discretionary Access Control List (DACL) of the 
    Microsoft Exchange ActiveSync Administration folder.
D. Select the Directory Security tab of the Exchange Server administration Web site, and then 
    configure Read, Write, and Directory Browsing permissions.

Answer: C

Question 2.
You deploy a mobile messaging solution with the Microsoft Exchange Server 2003 server. The IIS logs on the Exchange Server 2003 server show an excessive number of 401 errors. You need to reduce the number of 401 errors identified in the logs.

What should you do?

A. Instruct all the users to perform a desktop synchronization at least once every 42 days.
B. Instruct all the users to change the Microsoft ActiveSync configuration password when they 
    change their domain user account password.
C. Instruct all the users to reset their Microsoft Windows Mobile based device password when 
    they change their domain user account password.
D. Enable the This server requires an encrypted SSL connection option in the Microsoft 
    ActiveSync settings of each Microsoft Windows Mobile based device.

Answer: B

Question 3.
You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2. All remote users use mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack (MSFP). A remote user reports the loss of a Windows Mobile based device You need to ensure that the information from the Microsoft Exchange ActiveSync (EAS) server is no longer available on the Windows Mobile based device.

What should you do?

A. Recreate the Active Directory remote user account.
B. Perform a remote wipe on the Windows Mobile based device of the remote user.
C. On the Properties tab of the remote user account, disable the user-initiated synchronization 
    option.
D. On the Device Security Settings tab, configure the Wipe device after failed attempts option to 
    a value of zero.

Answer: B

Question 4.
A Microsoft Exchange mobile messaging solution uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. You deploy the solution by using front-end and back-end servers. Microsoft Exchange Server 2003 Service Pack 2 is installed on the front-end server. You need to use the remote wipe feature.

What should you do?

A. Install Microsoft Windows Server 2003 Service Pack 2 on all domain controllers.
B. Install Microsoft Exchange Server 2003 Service Pack 2 on the back-end server.
C. Install Microsoft Exchange Server ActiveSync Web Administration Tool on the front-end 
    server.
D. Install Microsoft Exchange Server ActiveSync Web Administration Tool on the back-end 
    Server. Reset Instructions Calculator.

Answer: C

Question 5.
You deploy a mobile messaging infrastructure with front-end and back-end Microsoft Exchange Server 2003 servers. Both servers have Service Pack 2 installed. Company security policy requires that all information from the Exchange Server 2003 servers must be encrypted. You need to audit the mobile messaging infrastructure to verify that it complies with company security policy.

What should you do?

A. Review the Internet Information Services (IIS) logs on the front-end Microsoft Exchange Server 
    2003 server by looking for Microsoft Server ActiveSync log entries and verifying that these 
    entries use the SSL port for access.
B. Review the Internet Information Services (IIS) logs on the back-end Microsoft Exchange 
    Server 2003 server by looking for Microsoft Server ActiveSync log entries and verifying that 
    these entries use the SSL port for access.
C. Install Network Monitor on the back-end Microsoft Exchange Server 2003 server. Execute and 
    review a packet capture session by tracing the packets that originate from the Windows Mobile 
    devices of the users.
D. Install Network Monitor on the front-end Microsoft Exchange Server 2003 server. Execute and 
    review a packet capture session by tracing the packets that originate from the Window Mobile 
    based devices of the users.

Answer: A

Question 6.
You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2. The company security policy requires complex passwords on all the Microsoft Windows Mobile based devices. You provide a Microsoft Windows Mobile 5.0 smart phone based device to a new user. The first time the user uses the device, the user is not prompted for a password. You need to ensure that the user is prompted for a password.

What should you do?

A. Instruct the user to set a PIN on the mobile device.
B. Instruct the user to perform Microsoft Exchange ActiveSync synchronization Over-The-Air 
    (OTA)
C. On the Device Security Settings tab, select the Require both numbers and letters option.
D. Add the user account of the user to the Exceptions list on the Device Security Settings tab.

Answer: B

Question 7.
A user uses both a Microsoft Windows Mobile 5.0 Smart phone based device and a Microsoft Windows Mobile 5.0 Pocket PC Phone Edition device for Over-The-Air (OTA) e-mail. Both devices have Microsoft Messaging and Security Feature Pack installed. A remote wipe command is issued against the Pocket PC device. The user reconfigures the ActiveSync settings on the Pocket PC device. When the user attempts synchronization, the device hard-resets again. You need to ensure that the user can synchronize the Pocket PC device. 

What should you do?

A. Cancel the remote wipe issued against the Pocket PC device.
B. Instruct the user to configure only one device for ActiveSync.
C. Instruct the user to perform a soft-reset of the Pocket PC device.
D. Instruct the user to perform a manual hard-reset of the Pocket PC device.

Answer: A

Question 8.
You deploy mobile devices that run Microsoft Windows Mobile 5.0. A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible. You need to connect the Windows Mobile based devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two)

A. Select L2TP/lPSec on each Windows Mobile based device.
B. Obtain and install a certificate on each Windows Mobile based device.
C. Configure the appropriate pre-shared key on each Windows Mobile based device.
D. Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobile based device.

Answer: A, B

Question 9.
You deploy mobile devices that run Microsoft Windows Mobile 5.0. Company security policy requires an authentication process that is stronger than a user name and password combination. You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy.

What should you do?

A. Deploy a two-factor authentication process.
B. Deploy a single-factor authentication process.
C. Deploy a simple PIN policy for the Windows Mobile based devices.
D. Deploy a complex PIN policy for the Windows Mobile based devices.

Answer: A

Question 10.
You deploy a mobile messaging solution by using front-end and back-end servers that run Microsoft Exchange Server 2003 Service Pack 2. Certificates are installed on all Microsoft Windows Mobile based devices. You need to allow devices that run Microsoft Windows Mobile 5.0 to perform certificate-based authentication for Microsoft Exchange ActiveSync.

What should you do?

A. Configure the front-end server for Kerberos Constrained Delegation (KCD).
B. Configure a Routing Group Connector between the front-end and back-end servers.
C. Configure the Windows Mobile based devices with a Point-to-Point Protocol (PPTP) 
    connection.
D. Configure the Windows Mobile based devices to use Extensible Authentication Protocol (EAP) 
    and either a smart card or a certificate.

Answer: A



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-501 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-501" Exam

Planning.Deploying,and Managing a Hosting Environment

 Question 1.
Your company is planning to host 5000 Microsoft Windows SharePoint Services Web sites on a single Web server. You need to ensure that your server can support 5000 Web sites. You must accomplish this goal while achieving the highest possible Web server performance. You may not add additional hardware.

What should you do?

A. Configure your Web server to require SSL for all Web connections.
B. Configure your Web server to use Basic authentication.
C. Run the STSADM.EXE command with the hh parameter.
D. Run the STSADM.EXE command with the GlobalInstall parameter.

Answer: C

Question 2.
Your company hosts Web sites. Each Web site is stored in a dedicated folder. You need to allow a customer to use Web Folders to access her Web site. You must ensure that she cannot access other customers Web sites. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Configure ACLs on each customers folder.
B. Grant the application pool identity the modify permission on the customers folder.
C. Enable Digest authentication on the Web server.
D. Enable the WebDAV server extension on the Web server.

Answer: A, D

Question 3. 
Your company hosts an FTP server that is configured to allow incoming connections only on port 21. Some users report that they can connect to the server but that they cannot transfer files between their client computers and the server. You need to ensure that all users can connect to the FTP server. You must accomplish this task without changing the configuration of the server.

What should you do?

A. Instruct the users to enable PORT FTP on their client computers.
B. Instruct the users to use a command linebased FTP application.
C. Instruct the users to enable PASV FTP on their client computers.
D. Instruct the users to enable automatically detect LAN settings in their Web browsers.

Answer: C

Question 4.
Your network provides hosting services. Your network is configured as shown in the exhibit. 
 
All your Web sites are configured to use Anonymous authentication. You enable Microsoft Windows Integrated authentication on one of your Web sites. Users report that they are unable to log on to the Web site. You verify that the user accounts are configured correctly. You need to ensure that users are able to log on to the Web site.

What should you do?

A. Configure the Web site to use Digest authentication.
B. Grant the application pool identity the read permission on the content folders on Server3 and 
    Server4.
C. Enable constrained delegation on the Server1 and Server2 computer accounts.
D. Add the Anonymous user to the IIS_WPG group on Server1 and Server2.

Answer: C

Question 5.
Your company hosts Web applications on a single shared Web server that runs Microsoft Windows Server 2003 R2. The Web server also runs Microsoft SQL Server 2005. The Web applications write data to databases on the SQL Server 2005 instance. You discover that one of your customers database files are consuming all available disk space. You increase the amount of disk space on the Web server. You need to ensure that no one customers database files can consume all available disk space.

What should you do?

A. Implement volume level quotas on the volume that contains the SQL Server database.
B. Implement directory level quotas on the Web server.
C. Implement bandwidth throttling on the Web server.
D. Configure a maximum file size on each SQL Server database.

Answer: D

Question 6.
Your company hosts Microsoft Windows SharePoint Services Web sites. Each of your customers is assigned a Web site collection on a single Windows SharePoint Services virtual server. Your Web server is configured to use Active Directory account creation mode. All user accounts for customers are stored in a single Active Directory domain. You need to ensure that each customer cannot create more than 10 user accounts. You must accomplish this task with the least administrative effort.

What should you do?

A. Create a user quota template for each site collection. Set the user quota to 10.
B. Disable Active Directory account creation mode. Create a custom application to create user 
    accounts for customers.
C. Set the connection limit on the customers Web sites to 10.
D. Create a user quota template for the virtual server. Set the user quota to 10.

Answer: A

Question 7.
Your company hosts Web applications. One of your customers creates a Microsoft ASP.NET 2.0 Web application that uses a Microsoft Office Access 2003 database. The Web application is configured to use the Medium Trust trust level. The customer reports that when he attempts to access the Access 2003 database by using the Web application, he receives an ASP.NET SecurityPermission error. You need to ensure that the customers Web application functions correctly.

What should you do?

A. Grant the application pool identity the read and execute permissions on the Access 2003 
    database file.
B. Add the OLEDB permission entry to the Web_MediumTrust.Config file on the Web site.
C. In the root level Web.Config file, set the customErrors element mode attribute to off.
D. Grant the anonymous user account the modify permission on the Access 2003 database file.

Answer: D

Question 8.
Your company hosts a Microsoft ASP.NET 2.0 Web application. The Web application consists of a single Web server and a back-end content server. You add an additional Web server and configure Network Load Balancing (NLB), as shown in the exhibit. 
 
Your customer reports that her application does not retain session state. You need to ensure that the customer application retains session state. 

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A. Configure NLB to use single affinity.
B. Configure NLB to use Class C affinity.
C. Configure the Web servers to use failover clustering.
D. Enable constrained delegation on the Web servers computer accounts.

Answer: A, B

Question 9.
You are planning a hosting solution that must meet the following technical and operational requirements. You must support 10,000 customers in a shared hosting environment. You must be able to host databases, Web sites, and Microsoft Windows SharePoint Server Web sites. You must provide single sign-on for all available services. You must provide the highest possible reliability for hosted databases. You must provide the highest possible performance for hosted Web sites. Which three components should you include in your plan? (Each correct answer presents part of the solution. Choose three.)

A. Active Directory in Application Mode
B. Network Load Balancing (NLB)
C. Microsoft Cluster Services
D. Active Directory
E. Round Robin DNS

Answer: B, C, D

Question 10.
Your company hosts 1000 servers. You need to develop a software update plan that meets the following requirements. You must minimize WAN traffic. Only approved updates can be deployed to servers. Available updates must be applied daily. Your plan must use the least administrative effort.

What should you do?

A. Create scripts to install updates. Use Group Policy to assign scripts.
B. Configure all servers to use Microsoft Update. Deploy ISA Server 2006.
C. Deploy Windows Server Update Services.
D. Deploy Microsoft Operations Manager.

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-542 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-542" Exam

MS Office SharePoint Server 2007-Appliaction

 Question 1.
You implement a custom function as a user-defined function (UDF) in Excel Services in Microsoft Office SharePoint Server 2007. A Microsoft Office Excel 2007 workbook uses the custom function to generate a random number between 100 and 500. You need to generate a new random number each time you load the workbook. 

Which code segment should you use?

A. public class MyUdfs
{
Random rand = new Random();
[Udf Method]
public mt GetRandomNumber()
{
return (rand.Next(100, 500));
}
B. [UdfClass]
public class MyUdfs
{
Random rand = new Random();
[UdfMethod(lsVolatile=true)]
public int GetRandomNumber()
{
return (rand.Next(100, 500));
}
}
C. [UdfClass]
public class MyUdfs
{
Random rand = new Random();
public mt GetRandomNumber()
{
return (rand.Next(100, 500));
}
}
D. public class MyUdfs
{
Random rand = new Random();
public mt GetRandomNumber()
{
return (rand.Next(100, 500));
}
}

Answer: B

Question 2.
You create a Microsoft Office SharePoint Server 2007 site. A document library named Company Workbooks on the site contains Microsoft Office Excel workbooks. You need to ensure that users can access the workbooks in the Company Workbooks document library by using Excel Services in Microsoft Office SharePoint Server 2007. 

What should you do?

A. Define the site as a managed path within SharePoint.
B. Add the Company Workbooks URL to the trusted location list.
C. Edit the permissions of the Company Workbooks document library to grant full control to the 
    SharePoint application pool identity account.
D. Create a custom security policy file for the Company Workbooks document library. Add the 
    file to the security Policy section of the Web .config file for the site.

Answer: B

Question 3.
You are designing a Microsoft Office SharePoint Server 2007 solution. A Microsoft SQL Server 2005 Analysis Services cube stores key performance indicators (KPls). You need to display details of a KPI in a Web Part. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Create a KPI List.
B. Add a List Item Web Part.
C. Create a .odc file for the data connection.
D. Create a .udl file for the data connection.
E. Create a Business Data Catalog (BDC) definition.

Answer: A, C

Question 4.
You create an application for a Microsoft Office SharePoint Server 2007 server. You create a call center dashboard. You create a Key Performance Indicator (KPI) list that contains KPIs. You add a KPI Web Part to the dashboard to view KPIs. You need to permit users to view details that make up each KPI. 

What should you do?

A. Add a link to each KPI in the list to take the user to a details page.
B. Add data to a custom SharePoint list and use built-in filter and view capabilities.
C. Add a Filter Web Part to the dashboard page and connect the page to the KPI list Web Part.
D. Filter the items in the KPI list Web Part by the indicator that the user wants to view.

Answer: A

Question 5.
You are creating a Microsoft Office SharePoint Server 2007 Report Center Web site. Your company stores product data in a Microsoft SQL Server 2005 database named Product Management. You need to ensure that the product data is available for use in Microsoft Office Excel 2007 reports. 

What should you do?

A. Upload a custom Office Data Connection file to the Data Connections library.
B. Upload a custom set of Microsoft SQL Server Reporting Services Report Model files to the 
    Data Connections library.
C. Create a single sign-on (SSO) provider that manages access to the Product Management 
    database.
D. Create a Business Data Connection for the Product Management database, and define 
     entities in the Business Data Catalog (BDC) definition.

Answer: A

Question 6.
You are developing a Microsoft Office SharePoint Server 2007 solution that integrates with Microsoft SQL Server 2005 Reporting Services. You need to configure the SharePoint solution to allow storage of reports in SharePoint document libraries. 

What should you do? 

A. Speci the Report Server URL in the Report Explorer Web Part.
B. Configure the proxy server endpoint in the Reporting Services Configuration tool.
C. Specify a Report Explorer Web Part as the target for the Report Viewer Web Part.
D. Specify a Report Viewer Web Part as the target for the Report Explorer Web Part.

Answer: B

Question 7.
You are creating a Microsoft Office SharePoint Server 2007 application. The application reads data from the Microsoft Office Excel 2007 workbook named SalesGoals.xls. SalesGoals.xls is located in a document library. The first sheet of the SalesGoals.xls workbook contains the following information.

You need to retrieve the values for 2008 from within your application.
 
Which two actions should you pertorm? (Each correct answer provides part of the solution. Choose two.)

A. Instantiate a new PangeCoordinates object.
B. Instantiate the Microsoft Office Excel Web Services service.
C. Call the GetRangeA1 method by passing B3:D3 as a parameter.
D. Call the GetRange method along with a RangeCoordinates object by using the following 
    parameters. column=2, row=3, height=1, width=3

Answer: B, C

Question 8.
You have a Microsoft Office SharePoint Server 2007 site. You create a Microsoft Office Excel 2007 workbook that contains the telephone numbers of all your company locations. You need to ensure that users can filter the Excel 2007 workbook on the basis of company locations by using Excel Services in Microsoft Office SharePoint Server 2007. 

What should you do? 


A. Create an ActiveX control in the workbook.
B. Create an Excel 2007 Microsoft Visual Basic for Applications (VBA) application in the 
    workbook.
C. Filter the workbook by using the Data-Filter option of the Excel 2007 workbook.
D. Filter the list in place by using Excel 2007, and protect the Excel 2007 workbook that contains 
    the telephone numbers.

Answer: C

Question 9.
Your company stores employee details in a Microsoft SQL Server database. You are creating a Report Center site on a Microsoft Office SharePoint Server 2007 server. You need to ensure that a report on employee details can be generated in the Report Center site. 

What should you do? 

A. Add the Data Connections library to the trusted file locations.
B. Import the application definition to the Business Data Connector.
C. Import the Office Data Connection file to the trusted data providers.
D. Create an Office Data Connection file in a trusted Data Connections library.

Answer: D

Question 10.
You are creating two user-defined functions (UDFs) of Excel Services in Microsoft Office SharePoint Server 2007. You write the following code segment.
public class Class 1
{
public double MyDouble (double d)
{
return d * 9.
}
public DateTime ReturnDateTimeToday ()
{
return ( DateTime.Today);
}
}
You need to ensure that the MyDouble method and the ReturnDateTimeToday method are recognized as UDFs of Excel Services. 

What should you do?

A. Add a reference to the Excel Services DLL.
B. Change the methods from public to private.
C. Add an out parameterto each of the method statements.
D. Mark the class by using the UdfClass attribute and mark the methods by using the UdfMethod 
    attribute.

Answer: D


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-622 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-622" Exam

Microsoft Desktop Support - ENTERPRISE

 Question 1.
You are a desktop support technician for your company. Your company monitors user logon times on a daily basis. You need to generate a report when users log on after 9 A.M. and have it sent to your e-mail account.

What should you do?

A. Create a new task, add the At Log On trigger, run a custom-created VBS file to check the time, 
    and send the e-mail message through the VBS script if the time is after 9 A.M.
B. Create a new task, add the At Startup trigger, run a custom-created VBS file to check the time, 
    and send the e-mail message through the VBS script if the time is after 9 A.M.
C. Create a new task, add the At Startup trigger, run a custom-created VBS file to check the time, 
    and send the e-mail message through the task scheduler if the time is after 9 A.M.
D. Create a new task, add the At Log On trigger, run a custom-created VBS file to check the 
    logon time, and send the e-mail message through the task scheduler if the time is after 9 A.M.

Answer: A

Question 2.
You are a desktop support technician for your company. Your company computers run Windows Vista. You need to verify the updates that have been installed on your Windows Vista computer. 

Which two actions should you perform? (Each correct answer presents a complete solution. Choose two.)

A. Click on View update history in the Windows Update applet.
B. Analyze the Security event log.
C. Click Check for updates in Windows Update applet.
D. Analyze the Setup event log.
E. Open the ReportingEvents.log file under %systemroot%\SoftwareDistribution to check whether 
    the update is applied.

Answer: A, E

Question 3.
You are a desktop support technician for your company. The corporate network has a domain controller that runs Microsoft Windows Server 2003 and computers that run Microsoft Windows XP Professional and Windows Vista Business. You set up group policies on the domain controller. When you log on to the corporate network, only the computers that run Windows Vista Business are able to retrieve the updated policies. You need to process the group policy for all the computers on the corporate network.

Which Internet Control Message Protocol (ICMP) setting should you enable?

A. Allow incoming echo request
B. Allow incoming mask request
C. Allow outgoing source quench
D. Allow outgoing parameter problem

Answer: A

Question 4.
You are a desktop support technician for your company. The computers in your company run Windows Vista. A users computer automatically downloads and installs a critical patch for the vulnerability in a system DLL file. The user reports that she receives an error message when she attempts to start Windows. You need to restore the users computer to a bootable state without installing the earlier update files. You must achieve this goal by using the minimum amount of administrative effort. 

What should you do?

A. Access the recovery console and run fixmbr c:.
B. Start the computer in safe mode and restore the original system DLL file.
C. Perform a system restore from the Windows Vista installation DVD and restore to an earlier 
    date.
D. Access the recovery console from the Windows Vista installation DVD and extract only the 
    original system DLL file. Then, overwrite the faulty file.

Answer: C

Question 5.
You are a desktop support technician for your company. The company's network consists of 10 Windows Vista computers and a server installed with Windows Server Update Services (WSUS). You must centralize Windows updates from Microsoft on all the computers. You need to configure all the computers to retrieve updates from the WSUS server. 

What should you do?

A. Ensure that intranet statistic server and intranet Microsoft Update services are hosted on 
    different servers.
B. Ensure that intranet statistic server and intranet Microsoft Update services are configured on 
    the Windows Vista computers.
C. Ensure that the Allow non-administrator to receive update notifications Group Policy is 
    enabled on all the computers.
D. Ensure that all computers are in the same workgroup as the WSUS server.

Answer: B

Question 6.
You are a desktop support technician for your company. The computers in your company run Windows XP. You upgrade the computers to Windows Vista. You download new updates by using Windows Update Agent. You discover that the update files are corrupted. You need to force Windows Update Agent to download the entire update again.

What should you do?

A. Run the wuauclt.exe /detectnow command.
B. Run the wuauclt.exe /resetauthorization /detectnow command.
C. Stop the Windows Update service and rename the C:\Program Files\WindowsUpdate folder.
    Then, restart the Windows Update service.
D. Stop the Windows Update service and rename the %systemroot%\SoftwareDistribution folder.
    Then, restart the Windows Update service.

Answer: D

Question 7.
You are a desktop support technician for your company. The computers in your company run Windows Vista. A user reports that Disk Defragmenter is running on his computer when he arrives at the office. You discover that Disk Defragmenter is set to run at the same time that a software application maintenance program is set to run. You need to ensure that Disk Defragmenter runs at 3 A.M. on the user's computer. You must achieve this goal by using the minimum amount of administrative effort.

What should you do?

A. In Task Scheduler, locate the Disk Defragment task and set it to 3 A.M.
B. In Local Group Policy, set the Disk Defragmenter program to run at 3 A.M.
C. Open Task Scheduler and create a new task to run the Disk Defragmenter program at 3 A.M.
D. Configure a Group Policy Object across the domain and set the Disk Defragmenter program to 
    run at 3 A.M.

Answer: A

Question 8.
You are a desktop support technician for your company. The computers in your company run Windows Vista. The computers run Performance Monitor daily. Performance logging data is saved to a file named perfmon.blg. You need to view the performance data in an SQL database.

What should you do?

A. Use Sort.exe to output a .sql file.
B. Use Fc.exe to perform a binary comparison.
C. Use the type command to pipe the file to a .sql file.
D. Run Relog.exe to export the file to a new output file format.

Answer: D

Question 9.
You are a desktop support technician for your company. The computers in your company run Windows Vista. You need to prevent users from installing devices on their computers. Your solution must achieve this goal without modifying administrator permissions.

Which two policy settings in group policy object editor should you enable? (Each correct answer presents part of the solution. Choose two.)

A. Prevent installation of removable devices
B. Allow administrators to override device installation policy
C. Prevent installation of devices that match these device IDs
D. Allow installation of devices that match any of these device IDs
E. Prevent installation of devices not described by other policy settings

Answer: B, E

Question 10.
You are a desktop support technician for your company. You need to disable the User Account Control (UAC) feature for local administrators by using the Group Policy Object Editor. Your solution must not disable UAC for standard users. 

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Set Disabled for the User Account Control: Run all administrators in Admin Approval Mode 
     option.
B. Set Disabled for the User Account Control: Detect application installations and prompt for 
    elevation option.
C. Set Disabled for the User Account Control: Switch to the secure desktop when prompting for 
    elevation option.
D. Set Enabled for the User Account Control: Admin Approval Mode for the Built-in Administrator 
    account option.
E. Set Elevate without prompting for the User Account Control: Behavior of the elevation prompt 
    for administrators in Admin Approval Mode option.

Answer: A, E



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.