Tuesday, February 28, 2012

83-640 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. All servers on the CERTKINGDOM.com network run Windows Server 2008.
Only one Active-Directory integrated zone has been configured in the CERTKINGDOM.com domain.
CERTKINGDOM.com has requested that you configure DNS zone to automatically remove DNS records
that are outdated.
What action should you consider?

A. You should consider running the netsh /Reset DNS command from the Command prompt.
B. You should consider enabling Scavenging in the DNS zone properties page.
C. You should consider reducing the TTL of the SOA record in the DNS zone properties page.
D. You should consider disabling updates in the DNS zone properties page.

Answer: B

Explanation: In the scenario you should enable scavenging through the zone properties because
scavenging removes the outdated DNS records from the DNS zone automatically. You should
additionally note that patience would be required when enabling scavenging as there are some
safety valves built into scavenging which takes long to pop.
Reference: http://www.gilham.org/Blog/Lists/Posts/Post.aspx?List=aab85845-88d2-4091-8088-
a6bbce0a4304&ID=211


QUESTION 2
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. All servers on the CERTKINGDOM.com network run Windows Server
2008.
The CERTKINGDOM.com network has a server named CERTKINGDOM-SR15. You install the Active
Directory Lightweight Directory Services (AD LDS) on CERTKINGDOM-SR15.
Which of the following options can be used for the creation of new Organizational Units (OU’s) in
the application directory partition of the AD LDS?

A. You should run the net start command on CERTKINGDOM-SR15.
B. You should open the ADSI Edit Microsoft Management Console on CERTKINGDOM-SR15.
C. You should run the repadmin /dsaguid command on CERTKINGDOM-SR15.
D. You should open the Active Directory Users and Computers Console on CERTKINGDOM-SR15.

Answer: B

Explanation: You need to use the ADSI Edit snap-in to create new OUs in the AD LDS
application directory partition. You also need to add the snap-in in the Microsoft Management
Console (MMC).


QUESTION 3
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. All servers on the CERTKINGDOM.com network run Windows Server
2008.
The CERTKINGDOM.com network has two domain controllers CERTKINGDOM-DC01 and CERTKINGDOMDC02.
CERTKINGDOM-DC01 suffers a catastrophic failure but it is causing problems because it was
configured to have Schema Master Operations role. You log on to the CERTKINGDOM.com domain as
a domain administrator but your attempts to transfer the Schema Master Operations role to
CERTKINGDOM-DC02 are unsuccessful.
What action should you take to transfer the Schema Master Operations role to CERTKINGDOMDC02?

A. Your best option would be to have the dcpromo /adv command executed on CERTKINGDOMDC02.
B. Your best option would be to have the Schema Master role seized to CERTKINGDOM-DC02.
C. Your best option would be to have Schmmgmt.dll registered on CERTKINGDOM-DC02.
D. Your best option would be to add your user account to the Schema Administrators group.

Answer: B

Explanation: To ensure that CERTKINGDOM-DC02 holds the Schema Master role you need to seize
the Schema Master role on CERTKINGDOM-DC02. Seizing the schema master role is a drastic step
that should be considered only if the current operations master will never be available again. So to
transfer the schema master operations role, you have to seize it on CERTKINGDOM-DC02.
Reference: http://technet2.microsoft.com/windowsserver/en/library/d4301a14-dd18-4b3c-a3ccec9a773f7ffb1033.
mspx?mfr=true


QUESTION 4
You work as the network administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
single forest. The forest functional level is set at Windows Server 2008.
The CERTKINGDOM.com network has a Microsoft SQL Server 2005 database server named
CERTKINGDOM-DB04 that hosts the Active Directory Rights Management Service (AD RMS).
You try to access the Active Directory Rights Management Services administration website but
received an error message stating:
"SQL Server does not exist or access is denied."
How can you access the AD RMS administration website?

A. You need to restart the Internet Information Server (IIS) service and the MSSQLSVC service on
CERTKINGDOM-DB04.
B. You need to install the Active Directory Lightweight Directory Services (AD LDS) on
CERTKINGDOM-DB04.
C. You need to reinstall the AD RMS instance on CERTKINGDOM-DB04.
D. You need to reinstall the SQL Server 2005 instance on CERTKINGDOM-DB04.
E. You need to run the DCPRO command on CERTKINGDOM-SR04

Answer: A

Explanation: You need to restart the internet information server (IIS) to correct the problem. The
starting of the MSSQULSVC service will allow you to access the database from AD RMS
administration website.


QUESTION 5
You work as an enterprise administrator at CERTKINGDOM.com. The CERTKINGDOM.com network has a
domain named CERTKINGDOM.com. The CERTKINGDOM.com network has a Windows Server 2008
computer named CERTKINGDOM-SR03 that functions as an Enterprise Root certificate authority (CA).
A new CERTKINGDOM.com security policy requires that revoked certificate information should be
available for examination at all times.
What action should you take adhere to the new policy?

A. This can be accomplished by having a list of trusted certificate authorities published to the
CERTKINGDOM.com domain.
B. This can be accomplished by having the Online Certificate Status Protocol (OCSP) responder implemented.
C. This can be accomplished by having the OCSP Response Signing certificate imported.
D. This can be accomplished by having the Startup Type of the Certificate Propagation service set to Automatic.
E. This can be accomplished by having the computer account of CERTKINGDOM-SR03 added to the
PGCertificates group.

Answer: B

Explanation: You should use the network load balancing and publish an OCSP responder. This
will ensure that the revoked certificate information will be available at all times. You do not need to
download the entire CRL to check for revocation of a certificate; the OCSP is an online responder
that can receive a request to check for revocation of a certificate. This will also speed up certificate
revocation checking as well as reducing network bandwidth tremendously.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

PB0-200 Q & A / Study Guide / Testing Engine

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


QUESTION 1
What is TVSS?

A. Transient voltage Static Switch
B. Terminal Voltage Surge Suppression
C. Transient voltage surge suppression
D. Transient variable surge suppression

Answer: C


QUESTION 2
If a rack-mount PDU is accidentally overloaded, which device activates and isolates the electric
power to the outlets?

A. TVSS
B. Transformer
C. Circuit breaker
D. Automatic Transfer Switch

Answer: C


QUESTION 3
What physical property of all electrical equipment dictates the amount of cooling it will require?

A. size of printed circuits boards
B. weight ofeletronic components
C. location of components inside equipment
D. inefficiency of power and digital components

Answer: D


QUESTION 4
What is current?

A. the flow of electrons through a conductor
B. the potential difference between two points
C. the capability of a conductor to store a charge
D. the amount of voltage flowing through a conductor

Answer: A


QUESTION 5
What distinguishes precision cooling from comfort cooling with regard to airflow?

A. Precision cooling has approximately 160 fm/kw vs 90 cfm/kw for comfort cooling
B. Precision cooling has approximately 90 fm/kw vs 160 cfm/kw for comfort cooling
C. Precision cooling must use a ducted airflow supply while comfort cooling must use a free airflow supply.
D. Precision cooling must use a free airflow supply while comfort cooling must use a ducted airflow supply.

Answer: A


Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

Monday, February 27, 2012

70-562 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
CERTKINGDOM.com has a server, named CERTKINGDOM-SR13, which runs an instance of Microsoft SQL Server 2005
locally and is configured to make use of Windows Authentication. You have developed a Web
application named CERTKINGDOMApp1 that will be hosted on CERTKINGDOM-SR13.
You are preparing to configure the role management and membership providers on CERTKINGDOM-SR13.
Which of the following actions should you take?

A. You should consider making use of the Aspnet_compiler.exe command.
B. You should consider making use of the aspnet_regiis.exe command.
C. You should consider making use of the Aspnet_merge.exe command
D. You should consider making use of the ASP.NET SQL Server registration tool.

Answer: A,B

Explanation:


QUESTION 2
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
You have recently developed a Web application named CERTKINGDOMWebApp1, and configured it to make
use of Windows Authentication. After specific group is granted NTFS permissions to access a
specific file named CERTKINGDOM.doc, you are informed that you have to make sure that users not
belonging to the group are prevented from accessing the file.
Which of the following actions should you take?

A. You should configure the machine.config file to include the element.
B. You should configure the machine.config file to include the element.
C. You should configure the app.config file to include the element.
D. You should configure the Web.config file to include the element.
E. You should configure the Web.config file to include the element.
F. You should configure the app.config file to include the element.

Answer: D

Explanation:


QUESTION 3
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop ASP.NET Web applications.
You have developed a web application named CERTKINGDOMWebApp. You are now preparing to configure
authentication for CERTKINGDOMWebApp so that clients are not allowed to access it anonymously. You also
need to make sure that access for users from untrusted domains are allowed.
You have written the code segment shown below:








Which of the following actions should you take NEXT?

A. You should consider adding the code segment to the web.config file.
B. You should consider adding the code segment to the project’s property pages.
C. You should consider adding the code segment to the app.config file.
D. You should consider adding the code segment to the workstation’s machine.config file.

Answer: A


QUESTION 4
You work as a Web Developer at CERTKINGDOM.com. An MS ASP.NET Web application, named CERTKINGDOMApp1,
has been developed using the 3.5 version of MS Net Framework.
Subsequent to retrieving the most recent project version from the source control repository, you try
to compile it on your workstation and find that the reference to the assembly is absent.
You want to add a reference path that connects to the absent assembly.
Which of the following options should you access to achieve this?

A. The project’s property pages.
B. CERTKINGDOMApp1’s web.config file.
C. CERTKINGDOMApp1’s app.config file.
D. Your workstation’s machine.config file.

Answer: A

Explanation:


QUESTION 5
You work as a Web Developer at CERTKINGDOM.com. You make use of Microsoft .NET Framework 3.5 to
develop Microsoft ASP.NET Web applications.
An existing Web application was developed using Microsoft .NET Framework 1.0. the Web
application makes use of Microsoft Internet Information Services (IIS) 6.0, but does not make use
of any features of Microsoft .NET Framework 3.5.
You want to configure the Web application for .NET Framework 3.5 with as little administrative
effort as possible.
Which of the following actions should you take?

A. You should consider accessing Microsoft Internet Information Services (IIS) 6.0 to modify the
handler runtime version.
B. You should consider accessing the machine.config file to modify the handler runtime version.
C. You should consider accessing the app.config file to modify the handler runtime version.
D. You should consider accessing the web.config file to modify the handler runtime version.

Answer: A

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Friday, February 24, 2012

70-561 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently developed an application that references a database named, CKDDatabase1,
which is hosted by a server, named CERTKINGDOM-SR13. You then created a storage schema
definition file, a conceptual schema definition file, and a mapping schema definition file. The files
are named CertKingdom.ssdl, CertKingdom.csdl, and CertKingdom.msl respectively.
After modifying the contents of the conceptual schema definition file and the mapping schema
definition file, you are required to create the .NET Framework entities from the modified schema
definitions.
You have decided to make use of the Edmgen.exe tool.
Which of the following actions should you take?

A. You should consider making use of the EntityClassGeneration mode.
B. You should consider making use of the FromSsdlGeneration mode.
C. You should consider making use of the ValidateArtifacts mode.
D. You should consider making use of the FullGeneration mode.

Answer: A


QUESTION 2
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently developed an application that has two entities named CKDClient and CKDOrders.
The CKDClient entity has a navigable property, named CKDOrders, which returns a collection of
CKDOrders entity instances.
You have been instructed to create code that returns the corresponding CKDOrders entity instances
when a CKDClient entity instance is queried.
Which of the following actions should you take?

A. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery query;
query = context.Client.Include("CKDOrders");
B. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery query;
query = context.Client.Insert("CKDOrders");
C. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery query;
query = context.Client.Release("CKDOrders");
D. You should construct the following code:
CKDEntities context = new CKDEntities();
ObjectQuery query;
query = context.Client.Remove("CKDOrders");

Answer: A


QUESTION 3
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
CertKingdom.com has a server, named CERTKINGDOM-SR35, which hosts a Microsoft SQL Server
2005 database named CKDDatabase1. You are in the process of developing a new application that
is linked to CKDDatabase1, which hosts has two tables. Each table is displayed in its own GridView
control using its own SqlConnection object.
You have received instructions to reconfigure the way that the tables are displayed, so that it
makes use of one SqlConnection object to display the tables at the same time.
Which of the following actions should you take?

A. You should consider making use of a SqlCommand object to simultaneously implement two
SqlDataReader objects.
B. In the connection string of the application, have the Multiple Active Result Sets (MARS)
enabled.
C. You should consider making use of the xsd.exe tool.
D. In the connection string of the application, have the Default Result Set enabled.

Answer: B


QUESTION 4
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You are in the process of configuring an application that you recently developed. You have to
configure the application so that it is able to connect to all kinds of databases.
You start by specifying the database driver name in the application's connection string.
Which of the following actions should you take NEXT?

A. You should make use of ODBC Connection Pooling for creating the connection object.
B. You should make use of the OLE DB Connection Manager for creating the connection object
C. You should consider making use of the subsequent code to construct the connection object:
DSProviderFactory factory = DSProviderFactories.GetFactory("System.Data");DbConnection =
CreateConnection();
D. You should consider making use of the subsequent code to construct the connection object:
DbProviderFactory factory =
DbProviderFactories.GetFactory(databaseProviderName);DbConnection connection =
factory.CreateConnection();

Answer: D


QUESTION 5
You work as an application developer at CertKingdom.com. You are making use of .NET Framework
3.5, as well as Microsoft ADO.NET for application development.
You have recently created a new application that has Microsoft OLE DB Provider configured as its
data provider.
You received instruction to reconfigure the application so that the data provider is Microsoft
SqlClient. Subsequent to the reconfiguration, you find that errors are thrown when the application
performs parameterized queries.
You are required to make sure that this does not occur.
Which of the following actions should you take?

A. You should make use of the OracleClient Provider instead of the OLE DB Provider.
B. You should insert an XSD file to the schema collections of the XmlReader object.
C. Use the Unicode attribute in the connection string to false.
D. You should consider reconfiguring the the application code by replacing the positional
parameters with named parameters.

Answer: D


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, February 21, 2012

640-864 Q & A / Study Guide

Cisco CCNA Training, Cisco CCNA Certification

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com


QUESTION 1
Which consideration is the most important for the network designer when considering IP routing?

A. convergence
B. scalability
C. on-demand routing
D. redistribution

Answer: B


QUESTION 2
You want to gather as much detail as possible during a network audit, to data time stamping
across a large number of interfaces, customized include according to interface, with a minimal
impact on the network devices themselves. Which tool would you use to meet these
requirements?

A. RMON
B. SNMFV3
C. NetFlow
D. Cisco Discovery Protocol

Answer: D


QUESTION 3
DataQuirk is a web-based medical transcription company for exotic-animal veterinarians. The
company recently added a third ISP for international business. They are organizing the enterprise
network into a fully operational Enterprise Edge.
To which two modules will the three ISPs be directly related? (Choose two)

A. PSTN
B. E- Commerce
C. WAN/MAN
D. Edge Distribution
E. Internet Connectivity
F. Remote Access VPN

Answer: B,E


QUESTION 4
Which two of these practices are considered to be best practices when designing the access layer
for the enterprise campus? (Choose two)

A. Implement all of the service (QoS, security, STP, and so on) in the access layer, offloading the
work from the distribution and core layers.
B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+.
C. Use automatic VLAN pruning to prune unused VLANs from trunked interface to avoid broadcast
propagation.
D. Avoid wasted processing by disabling STP where loops are not possible.
E. Use VTP transparent mode to decrease the potential for operational error

Answer: B,C


QUESTION 5
With deterministic Wireless LAN Controller redundancy design, the different options available to
the designer have their own strengths. Which one of these statements is an example of such a
strength?

A. Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of
oversubscription on aggregate network performance.
B. N+N redundancy configuration allows logically grouping access points on controllers to
minimize intercontroller roaming events.
C. N+N+1 redundancy configuration has the least impact to system management because all of
the controllers are collocated in an NOC or data center
D. N+1 redundancy configuration uses Layer 3 intercontroller roaming, maintaining traffic on the
same subnet for more efficiency.

Answer: B


QUESTION 6
Which of these statements is true concerning the data center access layer design?

A. The access layer in the data center is typically built at Layer 3, which allows for better shaping
of services across multiple servers.
B. With Layer 2 access, the default gateway for the servers can be configured at the access or
aggregation layer.
C. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the
dual IP address on the two server links to two separate switches.
D. The access layer is normally not required, as dual homing is standard from the servers to the
aggregation layer.

Answer: B


QUESTION 7
Which one of these statements should the designer keep in mind when considering the advanced
routing features?

A. one-way router redistribution avoids the requirement for state or default routes.
B. Redistribution, summarization, and filtering are most often applied between the campus core
and enterprise edge.
C. Filtering only occurs on the routing domain boundary using redistribution.
D. Summarize routes at the core toward the distribution layer.
E. The hierarchical flexibility of IPv6 addressing avoids the requirements for routing traffic
reduction using aggregation.

Answer: B


QUESTION 8
Which two statements about designing the Data Center Access layer are correct? (Choose two)

A. Multiport NIC servers should each have their own IP address
B. Layer 3 connectivity should never be used in the access layer
C. Layer 2 connectivity is primarily implemented in the access layer
D. Multiport NIC servers should never be used in the access layer
E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent

Answer: C,E


QUESTION 9
Which IPv6 feature enables routing to distribute connection requests to the nearest content
server?

A. Link-local
B. Site-local
C. Anycast
D. Multicast
E. Global aggregatable

Answer: C


QUESTION 10
Which one of these statements is true about addressing redundancy within the WAN
environment?

A. The reliability and speed of DSL allow for cost savings by not including redundant links.
B. CAMDM and dark fiber offer advanced redundancy features such as automatic backup and
repair mechanism to cope system faults.
C. An SLA is one way to eliminate the need for redundancy.
D. The failure of a single SONET/SDH link or network element does not lead to failure of the entire
network.

Answer: D


Cisco CCNA Training, Cisco CCNA Certification

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com

Monday, February 20, 2012

70-542 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
There is a web site CertKingdomWS.
CertKingdomWS uses MS Office SharePoint Server 2007 Search Center.
CertKingdomWS runs a fixed keyword query.
If the result of this query is a fail to return any data.
How can this be achieved?



Answer:




QUESTION 2
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
CertKingdomApp uses two tables Employees and EmployeesDetails.
They are related through a one-to many relation.
Two entities Employees and EmployeesDetails are defined in a BDC definition.
The metadata of this definition need to be defined.
Which code is appropriate?



Answer:




QUESTION 3
There is a MS Office SharePoint Server 2007 web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a security group named DOMAIN\Employees.
In CertKingdomWS there is content that this group should have access to.
How can this be ensured? Select two.

A. Add a custom Web Part…
B. Add an audience…
C. Add a site group…
D. Use a filter…
E. ..based on the DOMAIN\Employees group.
F. ..that has the DOMAIN\Employees group as a member.
G. ...that shows only the members of the DOMAIN\Employees group.

Answer: B,E

Explanation:


QUESTION 4
There is a MS Office SharePoint Server 2007 web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a MS Excel 2007 workbook which contain employee data such as name, city, salary.
End users must be able to filter the workbook on city.
How can this be achieved through MS Office SharePoint Server 2007 Excel services? Select two.

A. Add an Excel VBA application…
B. Add an ActiveX control...
C. Use the Data-Filter option…
D. ...in the workbook.
E. ..in CertKingdomApp.
F. ..in CertKingdomWS.

Answer: C,D

Explanation:


QUESTION 5
There is a MS SQL Server 2005 database CertKingdomDB.
There is a BDC definition which is used to search for employee data in CertKingdomDB.
Incremental crawls must be performed for indexing in CertKingdomDB.
How can this be ensured? Select two or three.

A. Add method
B. Add function..
C. Add stored procedure…
D. ..Finder
E. ..GenericInvoker
F. .. IDEnumerator
G. .. ViewAccessors
H. ..to have a return field representing the last update time of CertKingdomDB.
I. .. to return a different set of columns from the CertKingdomDB.

Answer: A,F,H

Explanation:


QUESTION 6
Exhibit:
public class CertKingdomClass
{
public double CertKingdom1 (double d)
{
return d * 9; }
public DateTime CertKingdom2 {
return ( DateTime.Today );
}
}
There are two UDFs CertKingdom1 and CertKingdom2.
These are defined as Excel Services in MS Office SharePoint Server 2007.
The code is displayed in the exhibit.
What action should you take?




Answer:



QUESTION 7
There is a ASP.NET web site CertKingdomWS.
There is a MS Office SharePoint Server 2007 application CertKingdomApp.
There is a Microsoft Office InfoPath form CertKingdomForm.
There is a custom control CertKingdomC that is derived from the XMLFormView class.
CertKingdomC will show CertKingdomForm inside an ASP.NET page on CertKingdomWS.
How can this be ensured?



Answer:



QUESTION 8
There is a web site CertKingdomWS.
There is a portal site template CertKingdomTempl.
CertKingdomTempl is used within CertKingdom Ltd. To recreate site hierarchies,
Extra sites must be added to the hierarchy.
What steps should be taken?
Your company uses a portal site template to recreate site hierarchies. You need to add additional
sites to the hierarchy that is defined in the portal site template. What should you do?

A. Modify file Webtemp*.xml…
B. Modify file webconfig…
C. Modify file global.aspx…
D. Modify the XML definition file..
E. Modify CertKingdomTempl…
F. Modify CertKingdomWS…
G. ..by adding a Template element that contains the site definitions for the new sites.
H. ..by adding extra Web elements to the XML definition file of the portal site template.
I. .. to include the new hierarchy and create a new site template on the Site Settings page.

Answer: D,H

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Sunday, February 19, 2012

640-863 Q & A / Study Guide

Cisco CCNA Training, Cisco CCNA Certification

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com


QUESTION 1
A Cisco Self-Defending Network has been installed, but DoS attacks are still being directed at ecommerce
hosts. The connection rate at the Internet firewall was limited, but the problem persists.
What more can be done?

A. Move the servers to the DMZ.
B. Install all relevant operating system patches.
C. Block the servers' TCP traffic at the Internet firewall.
D. Block the servers' UDP traffic at the Internet firewall.

Answer: B


QUESTION 2
RST Corporation is planning to upgrade its current network. The chief technology officer has
supplied a topology diagram and an IP addressing scheme of the current network during an
interview.
RST has been growing at about twenty percent per year. It has been difficult to maintain customer
support at a satisfactory level. Therefore, the RST board has met with and directed the chief
technology officer to look into network improvements.
Which two items are most relevant in documenting RST's business requirements? (Choose two.)

A. existing network topologies
B. network performance requirements
C. the IP addresses assigned by the ISP
D. improved customer support requirements
E. projected growth estimates

Answer: D,E


QUESTION 3
Refer to the exhibit. Which module is the Enterprise WAN module?


A. Enterprise A
B. Enterprise B
C. Enterprise F
D. Enterprise C
E. Enterprise D
F. Enterprise E

Answer: D


QUESTION 4
Which two of these best describe the implementation of a WAN Backup design over the Internet?
(Choose two.)

A. a best-effort method
B. bandwidth guaranteed based on interface configuration
C. designed as an alternative to a failed WAN connection
D. implemented with a point-to-point logical link using a Layer 2 tunnel
E. requires no ISP coordination or involvement

Answer: A,C


QUESTION 5
Which two design criteria require VLANs in a proposed solution? (Choose two.)

A. the segmenting of collision domains
B. a limited corporate budget
C. the use of multivendor equipment
D. security between departments
E. video streaming on the LAN
F. the segmenting of broadcast domains

Answer: D,F


QUESTION 6
Which two methods are used to enhance VPN performance on Cisco ISRs? (Choose two.)

A. SSL Acceleration Network Module
B. VPN Shared Port Adapter
C. VPN Acceleration Module
D. high-performance VPN encryption AIM
E. VPN Service Adapter
F. built-in hardware-based encryption acceleration

Answer: D,F


QUESTION 7
Which three factors best justify WAN link redundancy between geographically dispersed sites?
(Choose three.)

A. high expense of transmitting data
B. important traffic flows
C. excessive packet transmission rate
D. uncertain reliability
E. high link utilization
F. lack of speed

Answer: B,D,F


QUESTION 8
Which three pieces of information should be documented for each step of each phase in a design
implementation plan? (Choose three.)

A. easy guidelines in case of failure
B. estimated rollback time in case of failure
C. simple implementation guidelines
D. estimated implementation time
E. design document references
F. step description

Answer: D,E,F


QUESTION 9
The topology map in the draft design document should cover which two layers of the OSI model?
(Choose two.)

A. session
B. data link
C. transport
D. application
E. physical
F. network

Answer: E,F


QUESTION 10
In a Cisco CatOS switch, what is the recommended practice when configuring switch-to-switch
intercommunications to carry multiple VLANs for Dynamic Trunk Protocol?

A. auto toauto_negotiate
B. disable Dynamic Trunk Protocol when operating in the distribution layer
C. auto toauto_no_negotiate
D. desirable todesirable_no_negotiate
E. on toon_negotiate
F. desirable todesirable_negotiate

Answer: F

Cisco CCNA Training, Cisco CCNA Certification

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com

Thursday, February 16, 2012

JK0-701 Q & A / Study Guide

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


QUESTION 1
Which of the following memory types has a clock speed of 400MHz?

A. PC133
B. PC2700
C. PC3200
D. PC10600

Answer: C

Explanation:


QUESTION 2
A technician receives a Windows laptop that has not been operating correctly since a user
changed some registry settings by mistake. Which of the following should be attempted FIRST?

A. Reset the CMOS
B. Rollback to a restore point
C. Boot into Safe Mode
D. Reconfigure the BIOS

Answer: B

Explanation:


QUESTION 3
A technician encounters an IP address of 191.15.20.1. The IP address is a member of which of
the following classes?

A. Class A
B. Class B
C. Class C
D. Class D

Answer: B

Explanation:


QUESTION 4
Which of the following cables allows for the transfer of video and sound?

A. VGA
B. S-Video
C. DVI
D. HDMI

Answer: D

Explanation:


QUESTION 5
Which of the following is placed directly on the CPU in a new computer system to aid in the
cooling process?

A. Heatsink
B. Fan
C. Liquid cooling system
D. Thermal compound

Answer: D

Explanation:


QUESTION 6
When determining a customer's specific issue, which of the following is the BEST approach?

A. Ask the customer to speak with someone else that may be able to help.
B. Ask open-ended questions to narrow the scope of the problem.
C. Ask a co-worker what the customer is trying to explain.
D. Ask focused questions that lead the customer with yes or no answers.

Answer: B

Explanation:


QUESTION 7
Which of the following printer types is the BEST for a technician to recommend to a company
needing to print 10,000 black and white pages per month?

A. Laser
B. Thermal
C. Inkjet
D. Dot Matrix

Answer: A

Explanation:


QUESTION 8
Which of the following keyboard combinations will lock a Windows XP workstation?

A. Windows Key + L
B. CTRL + ALT + Delete
C. Windows Key + CTRL + Backspace
D. Windows Key + CTRL + Escape

Answer: B

Explanation:


QUESTION 9
A customer wants to be able to search the Internet wirelessly with their laptop, from any location.
Which of the following devices would be MOST effective in achieving this?

A. Bluetooth card
B. 802.11 a/b/g WiFicard
C. 802.11n WiFi card
D. Cellular WAN card

Answer: D

Explanation:


QUESTION 10
A customer wants to connect an external projector to a laptop. The projector is plugged into the
external video port but no video is shown on the projector. Which of the following will correct the
problem?

A. Upgrade the BIOS.
B. Release the LCD cutoff switch.
C. Toggle the WiFi switch.
D. Toggle the Fn key.

Answer: D

Explanation:

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

70-523 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

QUESTION 3
There is a service WCF (Windows Communication Foundation) Data Services CertKingdomService.
CertKingdomService has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
An application CertKingdomApp uses CertKingdomService.
There is a problem. Whenever CertKingdomApp sends DELETE and PUT requests to
CertKingdomService there is an error.
What should be done in this scenario? Select three.

A. When accessing CertKingdomService CertKingdomApp should use header..
B. When accessing CertKingdomService CertKingdomApp should use footer..
C. ..HTTP-Method..
D. .. X-HTTP-Method..
E. .. HTTP ContentType..
F. .. XML ContentType..
G. .. XLS-Method..
H. ..as part of a DELETE request.
I. ..as part of a GET request.
J. ..as part of a POST request.
K. ..as part of a PUT request.

Answer: A,D,J

Explanation:


QUESTION 4
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
There is a server CertKingdomSrv.
There is a Microsoft SQL Server 2008 database CertKingdomDb on CertKingdomSrv.
CertKingdomApp connects to CertKingdomDb.
CertKingdomDb includes a table CertKingdomProducts.
CertKingdomProducts includes product information.
CertKingdomProducts has a column ProductType.
ProductType is used to identify if the product is digital or physical.
There is Product entity base type.
There is an Association entity Digital inheriting from the Product entity base type.
All digital products must be bound to Digital class.
What should be done? Select three.

A. The Entity Data Model Designer should be used to..
B. Change the file..
C. ..code-behind to include..
D. ..global.aspx to include..
E. .. .edmx file to include..
F. ..to set up a referential constraint..
G. .. to set up an association between..
H. .. the primary key of the Digital class and ProductType.
I. .. between the Digital class and ProductType.
J.
K.

Answer: B,E,J

Explanation:


QUESTION 5
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
To model entities CertKingdomApp ADO.NET Entity Framework is used.
CertKingdomApp make sure that users can update entities even if they are not connected to the
central store. In such a case, when the user reconnects: changes the local data must be persisted,
latest updates from the central data store are loaded to the local store (when no local changes
have been made).
What should be done in this scenario? Select three.

A. Use method…
B. Use library..
C. Use attribute..
D. ..Execute..
E. ..Refresh of ObjectContext class..
F. ..Refresh of ViewContext class..
G. ..through usage of MergeOptions.OverwriteChanges
H. ..through usage of RefreshMode.StoreWins.AppendOnly
I. ..through usage of RefreshMode.ClientWins
J. ..through usage of MergeOptions.AppendOnly

Answer: A,E,I

Explanation:


QUESTION 6
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
You are implementing the CertKingdomApp data layer.
In particular when the GetDataReader method returns a SqlDataReader, the SqlDataReader can
retrieve rows from the database.
Also when the SqlDataReader is closed the active SQL connections, opened with the
GetDataReader method, must be closed.
What code should be used in this scenario?



Answer:



QUESTION 7
Sales Exhibit:
Sales Properties:
SalesID
CustomerID
OrderDate
ShipAddress
Sales_details Exhibit:
Properties:
SalesID
ProductID
UnitPrice
Quantity
There is an application CertKingdomApp.
CertKingdomApp has been developed with MS .NET Framework 4 and MS Visual Studio 2010.
There is a server CertKingdomSrv.
There is a Microsoft SQL Server 2008 database CertKingdomDb on CertKingdomSrv.
CertKingdomApp connects to CertKingdomDb.
LINQ is used to created the Sales and Sales_details in the exhibit.
There is a one- to-many relation from the SalesID of Sales to the SalesID of Sales_details.
The primary key of Sales is SalesID column.
The primary key of Sales_details is the SalesID and ProductID columns.
You are required to provide SQL code that produces the sum of the price of each Sales record.
Which code should be used?



Answer:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, February 6, 2012

70-515 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
There is an ASP.NET application CertKingdomApp.
CertKingdomApp is deployed to a production server.
CertKingdomApp is deployed in Release configuration.
The web.config connection string value must be changed to the production server’s string
value in the deployment process.
How can this be achieved?

Answer:

Explanation:


QUESTION 2
There is a ASP.NET MVC 2 Web Application named CertKingdomApp.
There is a single project area for CertKingdomApp.
In the Areas folder there is a subfolder CertKingdom.
There are files CertKingdomC.cs and CertKingdomD.aspx in proper subfolders.
The Route of the area is registered, the route is named CertKingdomRoute, and the name of
the area is CertKingdomArea.
Outside the area there is a view CertKingdomView.aspx.
The CertKingdomView.aspx must be linked to CertKingdomD.aspx.
What to do?

Answer:


Explanation:


QUESTION 3
There is an ASP.NET Web site CertKingdomWS.
There is an ASP.NET Web application CertKingdomApp.
There is an ASP.NET AJAX page CertKingdomPage.
CertKingdomPage has two DIV elements.
Considering content refreshing, each div element must be refreshed individually (the page
should not be refreshed).
How can this be achieved?

Answer:


Explanation:



QUESTION 4
There is an ASP.NET Web site CertKingdomWS.
There is an ASP.NET Web application CertKingdomApp.
There is an ASP.NET page CertKingdomPage.
CertKingdomPage has the following div element

.
CertKingdomPage has a jQuery $.ajax function that calls the server.
An error handler must be implemented. The error handler should add error information
from all page $.ajax calls to the div named ErrorInfo.
How can this be achieved?

Answer:

Explanation:


QUESTION 5
There is an ASP.NET Web site CertKingdomWS.
There is an ASP.NET Web application CertKingdomApp.
There is a Web page CertKingdomPage.
CertKingdomPage has the following div element Hello World
text
.
The contents of spam should be replaced with HTML.
The global variable PGURL specifies the URL from which the HTML is downloaded.
Which code should be used?

Answer:

Explanation:

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Saturday, February 4, 2012

70-513 Q & A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
Exhibit:

There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService use address tcp:www.CertKingdom.com/CertKingdomService to listens for
messages.
The logical address is www.CertKingdom.com/CertKingdomService
The WCF client is configured as in the exhibit.
However, the client is unable to communicate with the server.
In what way must the configuration be adjusted?



Answer:




QUESTION 2
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService has a callback contract.
There is a client application CertKingdomClient.
CertKingdomClient calls CertKingdomService.
How can you ensure that CertKingdomClient and CertKingdomService can communicate? Select two.

A. Use the OperationContractAttribute..
B. On CertKingdomService..
C. On CertKingdomClient..
D. ..set set the Async Pattern property value to false
E. ..set set the Async Pattern property value to true
F. ..use GetCallbackChannel
G. ..add a proxy derived from DuplexClientBase

Answer: C,G

Explanation:


QUESTION 3
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService has a callback contract.
There is a client application CertKingdomClient.
CertKingdomClient calls CertKingdomService.
How can you ensure that CertKingdomClient and CertKingdomService can communicate? Select two.

A. Use the OperationContractAttribute..
B. On CertKingdomService..
C. On CertKingdomClient..
D. ..set set the Async Pattern property value to false
E. ..set set the Async Pattern property value to normal
F. ..use GetCallbackChannel (Of T)
G. ..add a proxy derived from DuplexClientBase (Of TChannel)

Answer: C,G

Explanation:


QUESTION 4
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService supports transactions. Messages handled by CertKingdomService must be
encoded using a binary encoding, must be secured using Windows stream-based security, and
must be sent over TCR.
CertKingdomService must implement a custom binding for the service.
How should the stacking order be defined?



Answer:




QUESTION 5
There is a WCF (Windows Communication Foundation) application CertKingdomApp.
CertKingdomApp exposes a service as and end point (SOAP) for consumption by cross-platforms
clients.
You want to log messages that the service receives from the client.
What action should you take?



Answer:




QUESTION 6
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService communicates with a database CertKingdomDB.
CertKingdomDB uses a workflow engine.
CertKingdomDB handles data access authorization. A security exception is raised an unauthorized
user tries to access CertKingdomDB.
This exception must be transmitted the client that is calling CertKingdomService.
How can this be achieved? Select two.

A. Use CertKingdomDB..
B. Use CertKingdomService..
C. ..and configure service Debug.
D. ..and configure router.
E. ..and configure router Security Audit.
F. ..and configure Unhandled Exception

Answer: B,C

Explanation:


QUESTION 7
There is a WCF (Windows Communication Foundation) service CertKingdomService.
There are out of-process process resources that CertKingdomService must access on behalf of an
originating caller. What should you do?

A. Use the service contract PrincipalPermissionAttribute..
B. Use ServiceSecurityContext.CurrentWindowsidentity.ImpersonationLevel..
C. ..and set the value to…
D. ..and change the value of bindingConfiguration attribute in the endpoint element of the
configuration file to..
E. .. TokenImpersonationLevelDelegation
F. .. wsHttpBinding
G. .. ssHttpBinding
H. .. Impersonation

Answer: B,C,E

Explanation:


QUESTION 8
There is WCF (Windows Communication Foundation) application CertKingdomApp.
There is a data contract CertKingdomData, with several data members, that is used by
CertKingdomApp.
Consider a serialized instance of CertKingdomData which is deserialized. If any of data members
are not available CertKingdomApp must throw a Serialization Exception.
What action should you take? Select three.

A. For each data member…
B. Use CertKingdomData and..
C. Set a default value in each of the data member declarations.
D. .. Set the IsRequired property..
E. .. Emit Default Value proper..
F. .. Order property..
G. ..add the Unknown Type attribute.
H. ..add the Known Type attribute.
I. ..to false.
J. ..to true.
K. .. to a unique integer value.
L. .. to a unique string value.

Answer: A,D,J

Explanation:


QUESTION 9
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService exposes the operations CertKingdom1 and CertKingdom2.
CertKingdom1 should run with the identity of the client.
CertKingdom2 should run with the identity of the CertKingdomService.
How can this be achieved?



Answer:




QUESTION 10
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService handles accounting related processes.
You must ensure that CertKingdomService runs with the identity of the application that is calling
CertKingdomService.
How can this be ensured?



Answer:



QUESTION 11
There is a WCF (Windows Communication Foundation) service CertKingdomService.
CertKingdomService is secured.
How can you track attempts to access CertKingdomService that are unsuccessful? Select all that
apply.

A. Use the serviceAuthorization behavior..
B. Use the serviceDebugger behavior..
C. Use the serviceSecurityAudit behavior..
D. Use the security configuration element..
E. ..and use attribute..
F. ..and use method..
G. Mode
H. messageAuthenticationAuditLevel
I. includeExceptionDetailsInFaults
J. authorizationManagerType
K. ..and set it to..
L. True
M. False
N. Success
O. Failure
P. Service
Q. Message

Answer: C,E,H,K,O

Explanation:

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com