Monday, April 30, 2012

HP0-263 Q&A / Study Guide / Testing Engine

Cisco CCNA Training, Cisco CCNA Certification

Best HP Certification Training and HP Exams Training and more HP exams log in to Certkingdom.com


QUESTION 1
On the Color LaserJet 9500, what does CPR stand for?

A. color plane registration
B. color print registration
C. color position registration
D. color point registration

Answer: A


QUESTION 2
On the Color LaserJet 9500, what prints a duplexed page showing lines in all four colors?

A. engine test page
B. demo page
C. color line test page
D. coverage page

Answer: A


QUESTION 3
On the Color LaserJet 9500, which tool is used to configure and manage a network EIO card?

A. supplies status page
B. Web JetAdmin
C. Embedded Web Server
D. Web browser
E. print driver

Answer: B


QUESTION 4
On the Color LaserJet 9500, how many paper rollers are included with the Image Transfer Kit?

A. 9
B. 7
C. 1
D. 12

Answer: A


QUESTION 5
Where are firmware version, paper tray settings, and installed options found on the Color LaserJet
9500?

A. demo page
B. configuration page
C. event log
D. usage page

Answer: B


Cisco CCNA Training, Cisco CCNA Certification

Best HP Certification Training and HP Exams Training and more HP exams log in to Certkingdom.com

Friday, April 27, 2012

Learning Microsoft MCTS 70-516 Exam

Microsoft certification exams are a great way to build your resume and let the world know about your level of expertise. Certification exams validate your on-the-job experience and product knowledge. While there is no substitution for on-the-job experience, preparation through study and hands-on practice can help you prepare for the exam. We recommend that you round out your exam preparation plan by using a combination of available study materials and courses. For example, you might use the Training kit and another study guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


for your “at home” preparation, and take a Microsoft Official Curriculum course for the classroom experience. Choose the combination that you think works best for you.

This article will let you understand the core developers who write or support applications that access
data written in C# or Visual Basic using Visual Studio 2012 and the Microsoft .NET Framework 4.0 and who also plan to take the Microsoft Certified Technology Specialist (MCTS) exam 70-516. Before you begin using this kit, you must have a solid foundation-level understanding of Microsoft C# or Microsoft Visual Basic and be familiar with Visual Studio 2012..

Topics to know in C# or Visual Basic using Visual Studio 2012
ADO.NET Disconnected Classes
ADO.NET Connected Classes
Introducing LINQ
LINQ to SQL
LINQ to XML
ADO.NET Entity Framework
WCF Data Services
Developing Reliable Applications
Deploying Your Application

Most of the examples in the article could run very well on a single server running both the Active Directory and Exchange Server 2010, if you do not have the time or resources to set up a fully functional lab. (Keep in mind that it is highly recommended that the Active Directory Domain Controller and the Exchange Server do not coexist on the same physical or virtual machine in the real world for a variety of reasons.)

Make use of the Testing Engines that are available, as well as the free Webcasts. Practice test material is just for that... PRACTICE. It may help you pass the test but believe me you will only last one day in a job if you don't know what you are doing, so if you use practice material, read the question and if you don't know the answer, research it and learn it, don't just memorize the answer....I will tell you right now that their answers are not always right.

If your ready for career change and looking for Microsoft MCTS Training, Microsoft MCITP Training or any other Microsoft Certification preparation get the best online training from Certkingdom.com they offer all Microsoft, Cisco, Comptia certification exams training in just one Unlimited Life Time Access Pack, included self study training kits including, Q&A, Study Guides, Testing Engines, Videos, Audio, Preparation Labs for over 2000+ exams, save your money on boot camps, training institutes, It's also save your traveling and time. All training materials are "Guaranteed" to pass your exams and get you certified on the fist attempt, due to best training they become no1 site 2012.

About The Author
Hi I educated in the U.K. with working experienced for 5 years in multinational companies, As an IT Manager and IT Instructor, I am attached with certkingdom.com here they provide IT exams study material, the study materials included exams Q&A with Explanation, Testing Engine, Study Guides, Training Labs, Exams Simulations, Training Videos, Audio Exams Training, etc. for certification like MCTS Training, MCITP MCTS, MCSD, MCSA, MCSE Training, CCNA exams preparation, CompTIA A+ Training, and more Certkingdom.com provide you the best training 100% guarantee. “Best Material Great Results”

My Specialties
I’ve worked with a lot of technologies, but these are where my focus has been in recent years:
* Microsoft SQL Server (particularly high availability and disaster recovery)
* VMWare Virtualization
* Oracle (yes, Oracle, I’ve worked on 7-11)
* Microsoft Clustering
* Red Hat Linux (I can still write shell scripts)

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Thursday, April 26, 2012

642-263 Q&A / Study Guide / Testing Engine

Cisco CCNA Training, Cisco CCNA Certification

Best CCNA Training and CCNA Certification
and more Cisco exams log in to Certkingdom.com


QUESTION 1
Which database engine is used in Cisco Unity Connection?

A. PostgreSQL
B. MySQL
C. Informix
D. SQL Server

Answer: C

Explanation:


QUESTION 2
Which are the minimum system requirements to install Cisco Unity Connection on a virtual
machine?

A. 1-vCPU, 1-GB vRAM, 80-GB vDisk
B. 2-vCPU, 2-GB vRAM, 160-GB vDisk
C. 4-vCPU, 2-GB vRAM, 2X146-GB vDisk

Answer: B

Explanation:


QUESTION 3
How many phones and mailboxes can be supported with the Cisco Unified Communications
Manager Business Edition?

A. 225 phones, 250 mailboxes
B. 500 phones, 500 mailboxes
C. 700 phones, 750 mailboxes
D. 1250 phones, 1000 mailboxes

Answer: B

Explanation:


QUESTION 4
Which protocol is used to exchange information between VPIM networked voice-mail systems?

A. SCCP
B. SIP
C. SNMP
D. SMTP

Answer: D

Explanation:


QUESTION 5
Which choice most accurately describes the licensing components for Cisco Unity Connection?

A. Users with mailboxes, users with IMAP access to voice message, SpeechView users
B. Port licensing for phone system integration, Unified Messaging
C. End-user licensing based on the number of users for voice mail, IMAP access to voice mail,
voice recognition, Cisco Unity Inbox, LDAP, and email TTS
D. Port licensing and VPIM licensing

Answer: A

Explanation:


Cisco CCNA Training, Cisco CCNA Certification

Best CCNA Training and CCNA Certification
and more Cisco exams log in to Certkingdom.com

Over View Microsoft Exchange Server 2010 : MCTS 70-662 and MCITP 70-663

A number of articles have been published on Windows PowerShell, but very few of these are dedicated to Exchange Server 2012. I am an Exchange administrator. I am not a developer. Yet, I have found an increasing need to improve my development skills in order to be an effective administrator—first with Exchange Server 2007, then with Windows Server 2008, and now with Exchange Server 2010. Fortunately, with Windows
PowerShell and Exchange Management Shell, I can do so without having to learn a complicated language and extensive developmental concepts—something I really have no desire to do as an administrator. With just a simple verb-noun combination, I can achieve fantastic things in the Exchange organization and still be able to sleep at night without pieces of code swirling around in my head as I dream.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


What’s New in PowerShell 2.0
Microsoft Windows PowerShell is a combined command-line shell and scripting language designed primarily for administrators, not developers. Prior to the introduction of Windows PowerShell into operating systems, administrators were forced to learn a programming language such as Visual Basic to fully manipulate objects in the Active Directory and Exchange environment if the graphical user interface (GUI) did not provide
an easy means for administration. Mainly, an administrator found the need for additional tools, such as custom VB scripts, when he or she wanted to manage objects in bulk. PowerShell 2.0 includes significant changes from the original version.

Topics To Understand Exchange Server 2010 Portable Command:
An Overview of Windows PowerShell 2.0 for Exchange 2010
New Features and the Exchange Management Shell
Basic Techniques
Achieving a Comfort Level with PowerShell
Advanced Techniques
Customizing the PowerShell Environment
PowerShell and the Exchange 2010 Deployment Process
Standard Deployments
Disaster Recovery Deployments
PowerShell and Recipient Objects
Working with Recipient Objects
Bulk Management of Recipients
PowerShell and the Transport Roles Message Routing
The Hub Transport Role
The Edge Transport Role
Configuring Rules and Agents on Transport Servers
PowerShell and the Client Access Server Role
CAS Services
Working with Certificates
PowerShell and the Mailbox Role
Mailbox Servers and Databases
Working with Mailboxes
Using the Recovery Database (RDB)
PowerShell and the Unified Messaging Role
Working with Unified Messaging (UM) Role Objects
Managing Unified Messaging (UM) Users
PowerShell and Message Routing
Exchange Server 2010 Message Routing
Integrating Exchange Server 2010 into an Existing Exchange
Server 2003 Environment
PowerShell and High Availability in Exchange 2010
Database Availability Groups (DAGs)
Mailbox Database Copies
Using DAG to Mitigate Failures
Monitoring Highly Available Databases
PowerShell and Public Folders
Public Folder Database Management
Managing Public Folders
Public Folder Permissions
Troubleshoot Exchange Server 2010 Using PowerShell
Troubleshooting with the Test Cmdlets
Event Logging with PowerShell
PowerShell and Automating Exchange Server 2010 Administration
Using and Finding Scripts to Automate
Monitoring Role-Based Access Control (RBAC) Permissions,
Mailbox Audit Logging, and Reporting with PowerShell in Exchange Server 2010
Configuring Role-Based Access Control (RBAC) Permissions
Using Mailbox Audit Logging to Monitor Exchange Server
Reporting and Other Useful Cmdlets

Most of the examples in the article could run very well on a single server running both the Active Directory and Exchange Server 2010, if you do not have the time or resources to set up a fully functional lab. (Keep in mind that it is highly recommended that the Active Directory Domain Controller and the Exchange Server do not coexist on the same physical or virtual machine in the real world for a variety of reasons.)

Make use of the Testing Engines that are available, as well as the free Webcasts. Practice test material is just for that... PRACTICE. It may help you pass the test but believe me you will only last one day in a job if you don't know what you are doing, so if you use practice material, read the question and if you don't know the answer, research it and learn it, don't just memorize the answer....I will tell you right now that their answers are not always right.

If your ready for career change and looking for Microsoft MCTS Training, Microsoft MCITP Training or any other Microsoft Certification preparation get the best online training from Certkingdom.com they offer all Microsoft, Cisco, Comptia certification exams training in just one Unlimited Life Time Access Pack, included self study training kits including, Q&A, Study Guides, Testing Engines, Videos, Audio, Preparation Labs for over 2000+ exams, save your money on boot camps, training institutes, It's also save your traveling and time. All training materials are "Guaranteed" to pass your exams and get you certified on the fist attempt, due to best training they become no1 site 2012.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Wednesday, April 25, 2012

Microsoft 70-640 Exam Quick Pass Tips (Windows Server 2008)

As the your know that getting good job you need pass Microsoft exams and get certified to eligible for the job. Some Microsoft exams are not as simple and easy to pass; you need get the core concept of the exam this article will help you to under stand Microsoft Server 2008 for the exams of 70-640, 70-642.

MCTS Training, MCITP Trainnig
Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


WHAT IS WINDOWS SERVER 2008
Windows Server 2008 R2, or simply R2 for short, is the second release of Windows Server 2008 . It isn’t a completely new release, but rather adds additional features and refinements to the existing release . In this book, we focus on the new features and refinements in R2 . We assume you have at least a general knowledge of Windows Server, and that you have some familiarity with Windows Server 2008, although we don’t assume you’re actively running Windows Server 2008 . Where an R2 feature is a refinement of a feature that was new in Windows Server 2008, we provide background on the Windows Server 2008 feature to provide context .

THE ROLE OF SERVER ADMINISTRATOR
Windows server administrators who are responsible for hands-on deployment and day-to-day management of Windows-based servers for large organizations . Windows server administrators manage file and print servers, network infrastructure servers, Web servers, and IT application servers . They use graphical administration tools as their primary interface but also use Windows PowerShell commandlets and occasionally write Windows PowerShell scripts for routine tasks and bulk operations . They conduct most server management tasks remotely by using Terminal Server or administration tools installed on their local workstation .

9 THINGS YOU NEED TO KNOW ABOUT WINDOWS SERVER 2008
1. What’s New in Windows Server R2
2. Installation and Configuration: Adding R2 to Your World
3. Hyper-V: Scaling and Migrating Virtual Machines
4. Remote Desktop Services and VDI: Centralizing Desktop and Application Management
5. Active Directory: Improving and Automating Identity and Access
6. The File Services Role
7. IIS 7.5: Improving the Web Application Platform
8. DirectAccess and Network Policy Server
9. Other Features and Enhancements

Make use of the Testing Engines that are available, as well as the free Webcasts. Practice test material is just for that... PRACTICE. It may help you pass the test but believe me you will only last one day in a job if you don't know what you are doing, so if you use practice material, read the question and if you don't know the answer, research it and learn it, don't just memorize the answer....I will tell you right now that their answers are not always right.

If your ready for career change and looking for Microsoft MCTS Training, Microsoft MCITP Training or any other Microsoft Certification preparation get the best online training from Certkingdom.com they offer all Microsoft, Cisco, Comptia certification exams training in just one Unlimited Life Time Access Pack, included self study training kits including, Q&A, Study Guides, Testing Engines, Videos, Audio, Preparation Labs for over 2000+ exams, save your money on boot camps, training institutes, It's also save your traveling and time. All training materials are "Guaranteed" to pass your exams and get you certified on the fist attempt, due to best training they become no1 site 2012.

MCTS Training, MCITP Trainnig
Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Friday, April 20, 2012

Windows sales defy predictions, grow 4%

All credit to businesses upgrading to Windows 7, says MicrosoftComputerworld - Stronger-than-expected sales of Windows helped Microsoft post a 6% increase in revenue for the first quarter of 2012, the company said yesterday.

The Windows and Windows Live division brought in $4.6 billion during the three months ending March 31, an increase of 4% over the same period the year before.

That was a turnaround of sorts: Windows' revenue for the quarter was just $112 million less than sales during the last three months of 2011, traditionally a strong quarter in the calendar because of holiday purchases of PCs. But in 2011's fourth quarter, Windows revenue was down 6% compared to the year before.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


Business purchases of PCs -- Windows' revenue is directly tied to the sale of new machines -- fueled the gain, with system sales to companies up 8% year-over-year, while consumer computer sales, long sluggish, remained flat.

"The business PC is what really drove the Windows business," said Peter Klein, Microsoft's chief financial officer Thursday during an earnings call with Wall Street analysts.

Most analysts had expected a poorer performance, largely on the projections by Gartner and IDC, which initially predicted a PC sales slump but then last week raised their estimates, saying that shipments actually increased about 2% in the quarter.

Microsoft estimated that PC sales grew between 2% and 4% during the quarter.

PC sales have struggled to match previous periods because of tougher competition from tablets and smartphones for consumer dollars, and the lingering effects of a hard disk drive shortage sparked by flooding last year in Thailand.

The Windows group accounted for 27% of the company's revenue for the quarter, second behind the Business division, which handles the Office line. Windows' piece of the pie was larger than the previous quarter -- the division contributed 23% of all revenue in the last three months of 2011 -- but slightly less than the same period a year before.

Windows 7 continued to gain ground among corporate users, said Klein, who claimed that 40% of all enterprise desktops were running the OS. Klein did not name a source for that number, but Net Applications, which Microsoft's IE team regularly cites, said that 41% of all machines running Windows worldwide last month did it with Windows 7.

As executives touted the strong sales for Windows 7, they also, although only in the broadest strokes, reminded analysts of the upcoming Windows 8.

After noting that the next fiscal year -- which runs July 1, 2012, to June 30, 2013 -- will include an "unprecedented refresh" of the company's core products, Klein was upbeat about Windows 8, even though customers have seen only a beta of the desktop version and nothing at all on ARM.

"With Windows 8 and its availability on both x86 and ARM, we believe the ecosystem will capitalize on the new range of capabilities and scenarios Windows 8 enable," said Klein in prepared remarks.

Although executives divulged no new information about Windows 8's release date during yesterday's conference call, Bill Koefoed, the general manager of Microsoft's investor relations, said that the development of Windows 8 and Windows RT -- the official name for the version designed for ARM processors -- is "on our schedule."

Klein dodged a question from one analyst about revenue swings later this year caused by Windows 8 upgrade giveaways. "We haven't said anything and will not today, but we'll have more to talk about in terms of programs and promotions as we get closer to the launch date," Klein said.

With Windows 7, Microsoft offered free or nearly free upgrades to people who purchased a new Vista PC in the months before and after its launch. The company also aggressively discounted Windows 7 upgrades during a two-week pre-sale period. Microsoft may repeat one or both of those promotions with Windows 8.

If it does, the deals will impact the bottom line: Two years ago, Microsoft deferred $1.7 billion in revenue to account for the Windows 7 upgrades due Vista PC buyers.

Klein also sidestepped a question about whether Windows XP's looming retirement will create additional incentive to upgrade to Windows 7, or even Windows 8, and accelerate sales of those editions. "Obviously, it's high on the priority list for CIOs to upgrade their business desktop [from XP]," said Klein. "Exactly how that will play out over the next couple of years is hard to say."

XP will fall off Microsoft's support list in early April 2014.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Monday, April 16, 2012

End of Windows XP support era signals beginning of security nightmare

Consumer, corporate and even SCADA systems could be at risk when Microsoft stops supporting Windows XP.

Microsoft’s recent announcement that it will end support for the Windows XP operating system in two years signals the end of an era for the company, and potentially the beginning of a nightmare for everyone else.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification Microsoft MCITP Training
at certkingdom.com

When Microsoft cuts the cord on XP in two years it will effectively leave millions of existing Windows-based computers vulnerable to continued and undeterred cyberattacks, many of which hold the potential to find their way into consumer, enterprise and even industrial systems running the latest software.

RELATED: Critical Patch Tuesday bulletin addresses Microsoft Office attack seen in the wild

MORE: Useful security threat data advisory tools

Jason Miller, manager of research and development at VMware, says the introduction of Windows XP “was the hey-dey of buying computers,” with markets having become familiar with Windows 95 or 98 and manufacturers like Dell releasing affordable options. With such an influx of new users, it comes as no surprise that Windows XP remains one of the most common operating systems despite the introduction of two entirely new versions in the decade since it hit shelves. In fact, March 2012 statistics from NetMarketShare.com show XP in the lead for operating system market share, at 43.09%.

Although that number is on a steady decline, its high volume just two years before support is cutoff is cause for concern, Qualys CTO Wolfgang Kandek says. Most enterprises are likely to upgrade their operating systems in the wake of the announcement that XP support would be cutoff. They have plenty of reasons to, such as security concerns raised by the IT department or the need for the latest version of Word or Excel to open new document formats.

Remaining consumers, though, will be much less inclined to make an upgrade.

Several trends account for this. First, and foremost, is cost. At-home computer users who are still content with XP are unlikely to purchase a new operating system without any financial incentive, especially considering that many of the features for Windows 7 require hardware upgrades. Try telling someone who uses their home computer to just check their email and read the latest Yahoo News headlines that they need to spend $500 for a new one.

Then there’s the awareness issue. How many at-home consumer users will even know that Microsoft will be cutting off XP support? How many will know what “the end of support” means for them at the user level, and how many will actually care? Microsoft is of course doing what it can to help spread the word, providing a deployment toolkit and its "Springboard Series" to hold its users hands through the process. Microsoft can only lead these XP-running horses to water, though. It can’t make them drink it.

Finally, the burgeoning tablet market could present a roadblock to PC software upgrades. Amol Sarwate, director of Vulnerability Labs for Qualys, says that many entertainment-minded users who purchase a tablet may still have XP-based PCs still kicking around their homes.

“If I have a Windows XP machine and I go buy a new tablet, for most of my needs I will use my tablet, but I still keep my XP machine for doing some chores that only a desktop can do. So that could also play a role here,” Sarwate says.

Although most of the subsequent security issues appear to be at the consumer level, it may not be long until they find a way into corporate networks or industrial systems, Miller says.

“Where do you think all these botnets are set up? They’re not set up on the corporate computers,” Miller says. “They’re set up on my grandmother’s computer, my mother’s computer, and they don’t even know its running because they’re running vulnerable software out there.”

Even scarier, Sarwate says many SCADA systems for industrial networks still run a modified version of XP, and are not in a position to upgrade. Because much of the software running on SCADA systems is not compatible with traditional Microsoft OS capabilities, an OS upgrade would entail much more work than it would for a home or corporate system.

“A lot of these systems are connected to critical infrastructure and that particular SCADA software running on Windows XP has to be first upgraded to a new operating system,” Sarwate says. “So there is a SCADA vendor also in this picture and some SCADA software and hardware which is already configured in plants, factories or critical infrastructure. So in the typical SCADA environment I don’t think Microsoft could encourage people to upgrade because the problems there are completely different.”

In a blog post, Sarwate also highlighted the dangers inherent in many SCADA systems stemming from an inadvertent connection to the public internet. Many companies are under the impression that their SCADA networks are disconnected from others, Sarwate wrote, when in fact they may be just as susceptible to malware as corporate or at-home desktops.

“A search for ‘data presentation and control’ software on the internet yields SCADA systems with management services exposed to the internet,” Sarwate wrote. “If an organization's SCADA network is not securely connected with the IT network, worms can jump from the HR desktops or reception kiosk into the SCADA network.”

Of course, there are other factors to consider, including the notion that many XP users who will not be protected by Microsoft in 2014 most likely haven’t been deploying the patches Microsoft has issued since 2004. Similarly, Sarwate says that traditionally when Microsoft issues its monthly bulletins, “SCADA system administrators will not apply the patch.”

But at the same time the sophistication of cyberthreats appears to be evolving. Miller cited the increased intelligence of spam attacks, which used to make such obvious spam-like claims as discounts on designer handbags or erectile dysfunction medication, but have lately begun more frequently sending more fake, but seemingly legitimate, emails from UPS or Delta Airlines. By then, new attacks may be designed to leverage these outstanding XP devices without the knowledge of their owners nor the others that they infect, Miller says.

"If you’re writing viruses your main goal is to be non-intrusive. I do not blue-screen the machine. I do not crash the machine. I am on the machine silently. They do not even know I’m there. Hence the bot that runs," Miller says. "So there probably will be quite a few people that will be in a security nightmare in that aspect of it."

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification Microsoft MCITP Training
at certkingdom.com


Saturday, April 14, 2012

Leaked Microsoft roadmap shows 2013 launch for Office 15

Microsoft needs to better communicate plans to developers, enterprises and customers, says analyst


Computerworld - A leaked Microsoft roadmap shows that the next version of Office won't ship until the first quarter of 2013, according to the Dutch developer who found the document.

Maarten Visser, the CEO of Meetroo and a decade-long Microsoft partner, stumbled upon the roadmap a week ago after clicking on a link posted on Microsoft's Dutch website. The PDF was not password protected.

"I'm always curious about the roadmaps," said Visser in a YouTube video he posted yesterday. "For me, since we build SharePoint applications, the release of SharePoint 15 is an important thing. The better I know when this will happen, the better I will be to ready my products before launch."

Visser's Meetroo is building project management software that relies on SharePoint.

While Visser noted that much of the information in the roadmap was already known -- that Microsoft will release a public beta of Office alongside betas of supporting products like SharePoint and Exchange -- he pointed out that the document pegged the suite's final release as the first quarter of 2013.

The roadmap's date for the public beta, however, doesn't jibe with Microsoft's recent comments.

On the roadmap, the Office beta was marked as smack-dab between the third and fourth quarters. While Microsoft has not yet revealed a detailed timetable for Office, two months ago the executive who runs the Office group, P.J. Hough, said "Everyone will have the opportunity to try the Office 15 public beta later this summer."

To meet Hough's "summer" promise, the beta would have to appear in the stretch between late in the second quarter and near the end of the third.

Microsoft has not assigned the next Office an official name, but has used "Office 15" as a placeholder. The roadmap used the same label.

Another section of the roadmap showed timelines for Windows -- both client and server editions -- as well as Internet Explorer 10 (IE10) and Windows Phone.

Windows 8's schedule was bare, with only last September's Developer Preview marked, and others, including Windows Server 8 -- which is expected to launch at the same time as the client editions -- simply showing a label of "Historical Release Cadence" that stretched from mid-2012 through early 2013.

Most experts anticipate a formal release of Windows 8 -- at least the desktop version -- in the fourth quarter, possibly October, because they assume Microsoft wants new Windows 8 PCs on shelves during this year's holiday sales season.

IE10's launch was marked as some time in the second half of 2012.

One analyst said the roadmap demonstrated just how opaque Microsoft is when it comes to disseminating information to customers. "Not only do ISVs [independent software vendors] and corporations need to know release dates, but as a customer, you need to know them, too," said Michael Cherry of Directions on Microsoft.

"Everyone needs a timeline that's dependable, but it's not enough to just give us dates," Cherry said, referring to the leaked document. "You have to give us descriptions why those dates are what they are."

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


That's something that Microsoft doesn't do early enough in its development process, Cherry said, making it nearly impossible for software makers like Visser, companies that craft their own applications for internal use, and customers -- especially enterprises -- to make intelligent decisions on developing for a new platform or migrating to it.

Cherry argued that a reliable timeline was more important for an operating system than for an application like Office, big as the latter is to Microsoft's revenue, because fewer partners work with Office than with Windows.

"For an OS like Windows, especially WOA [Windows on ARM], I'm kind of stunned at the lack of information available at this point," Cherry said. "There are a lot of people who need to be aware of the changes in Windows and WOA."

Directions on Microsoft creates detailed roadmaps for its clients, but the job is neither simple or easy.

"It's very hard to do, to represent [a roadmap] well," said Cherry, adding that it's necessary to show dependencies between products -- how Internet Explorer relies on Windows, for instance -- and timelines that include older products for those rare times when Microsoft takes features from a new edition and backports them to a predecessor.

Cherry highlighted the roadmap's Office 15 launch in early 2013 as another example of dependency. If Office won't be available until then, Cherry was skeptical of a WOA launch in 2012, what with Microsoft having stressed the importance of Office on that tablet-oriented OS.

"Apple can be secretive because they build the hardware," Cherry said. "The more you control the ecosystem, the more closed you can be. But I've always thought of Windows as open."

Microsoft declined to comment today on the roadmap that Visser uncovered.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Friday, April 13, 2012

HP0-262 Q&A / Study Guide / Testing Engine / Videos

Cisco CCNA Training, Cisco CCNA Certification

Best HP Certification Training and HP Exams Training
and more HP exams log in to Certkingdom.com


QUESTION 1
What type of ink is used in the DesignJet 500/800 series printers?

A. 3 color print heads (pigmented) and one black print head (dye)
B. 3 color print heads (dye) and one black print head (pigmented)
C. 4 print heads (dye)
D. 4 print heads (pigmented)

Answer: B


QUESTION 2
On the DesignJet 5X00, how do you access the submenu Service Test Menu for onsite support?

A. boot up with the Up arrow and the Enter keys held down
B. go to Printer Setup>Utilities and press the Up arrow and Enter
C. go to Printer Setup>Device Setup and press the Up arrow and Enter
D. go to Printer Setup>Calibrations

Answer: B


QUESTION 3
Where is the spittoon assembly located on the 7XX series Large Format Printer?

A. there are two, at both sides of the unit
B. under the right end cover
C. there is no spittoon
D. below the Service Station under the left end cover

Answer: B


QUESTION 4
What should you do when repackaging or moving a DesignJet 5X00 printer?

A. unload the media, remove the tube assembly and ink supply, and power off using the front switch
B. unload the media
C. unload the media, choose Park HDD in Device Setup, and power off using the rear switch
D. unload the media and remove ink supplies

Answer: B


QUESTION 5
On a DesignJet 1000 series printer, the print head status 'monitor' appears in the display. What
does this indicate?

A. one of the print heads is not seated correctly
B. the print head must be replaced
C. an excessive number of nozzles have failed
D. the print head has reached the end of its expected life

Answer: D


Cisco CCNA Training, Cisco CCNA Certification

Best HP Certification Training and HP Exams Training
and more HP exams log in to Certkingdom.com

Monday, April 9, 2012

Expert: iPad Wi-Fi issues may be linked to power management

Unlikely that faulty hardware causing poor wireless connections

Computerworld - The Wi-Fi reliability problems reported by iPad owners can probably be solved with a software update, a hardware expert said Friday.

"It's unlikely that hardware is the primary cause of the [problem]," said Aaron Vronko, CEO of Michigan-based Rapid Repair, a repair shop and do-it-yourself parts supplier for the iPad, iPhone and iPod Touch. "This is probably a software problem, or a hardware quirk that software must negotiate."

Vronko said iPad owners hinted as much. "If this was hardware related, it would almost certainly have to be an error in assembly or failure in the chip itself," Vronko said in an email reply to questions. "However, chip-related failure would likely be more absolute in its effects."

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Users have not said that their iPads are never able to connect to a Wi-Fi network; instead they have said the signal is weak -- and download speeds are extremely slow -- or they're unable to maintain a connection.

Complaints about the iPad's wireless reliability surfaced within hours of the iPad's March 16 sales debut.

Vronko also relied on advice given by Apple to back up his speculation. Last week, an Apple support representative told Computerworld that resetting the iPad's network settings to their factory defaults might solve the Wi-Fi problem.

"The fact that a network settings reset can sometimes resolve the issue points strongly to a power-saving feature run amok," said Vronko.

According to Vronko and several tear-down experts, the new iPad features the Broadcom BCM4330 chip, which handles Wi-Fi and Bluetooth. That chip, new to the iPad, also is inside the iPhone 4S, which launched last October.

"[The Broadcom BCM4330 chip] boasts a new design including several new power-saving features," said Vronko. "Wi-Fi can be a hungry customer in mobile devices and Apple knew that the new LCD and its requisite monster truck GPU would be guzzling battery juice. They had to go aggressive on performance per milliwatt on every other component."

For that reason, Vronko wasn't surprised to hear users gripe. "Tune a few million test subjects tightly against the performance limit and you're bound to have some problems in the field," he said.

The solution could turn on adjusting the iPad's power management software to make more battery power available to the Broadcom chip.

Apple has not publicly acknowledged a Wi-Fi issue in the new iPad, or hinted whether a fix is in the works, and if so, when it would be released.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Saturday, April 7, 2012

CAS-001 Q&A / Study Guide / Testing Engine

MCTS Certification, MCITP Certification

Microsoft Commptia A+ Training , Comptia A+ Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


QUESTION 1
You need to ensure that a session key derived from a set of long-term public and private keys will
not be compromised if one of the private keys is compromised in the future?

A. Perfect forward secrecy
B. Secure socket layer
C. Secure shell
D. Security token

Answer: A

Explanation:
Perfect forward secrecy (or PFS) is the property that ensures that a session key derived from a set
of long-term public and private keys will not be compromised if one of the (long-term) private keys
is compromised in the future.
Forward secrecy has been used as a synonym for perfect forward secrecy, since the term perfect
has been controversial in this context. However, at least one reference distinguishes perfect
forward secrecy from forward secrecy with the additional property that an agreed key will not be
compromised even if agreed keys derived from the same long-term keying material in a
subsequent run are compromised.
Answer option C is incorrect. Secure Shell (SSH) is a program that is used for logging into a
remote computer over a network. Secure Shell can be used to execute commands on a remote
machine and to move files from one machine to another. SSH uses strong authentication and
secure communications over insecure channels.
Answer option B is incorrect. Secure Sockets Layer (SSL) is a protocol that was developed by
Netscape for transmitting private documents via the Internet. It uses a cryptographic system
thatuses public and private keys to encrypt data. A public key is globally available and a private
key is known only to the recipient of the message. Both Netscape Navigator and Internet Explorer
support the SSL protocol. Several web sites use this protocol to obtain confidential user
information. When the SSL protocol is used to connect to a Web site, the URL must begin with
https instead of http.
Answer option D is incorrect. Security token can be a physical device that an authorized user of
computer services is given to ease authentication. The term may also refer to software tokens.
Security tokens are used to prove one's identity electronically (as in the case of a customer trying
to access his bank account). The token is used in addition to or in place of a password to prove
that the customer is who he claims to be. The token acts like an electronic key to access
something.


QUESTION 2
The Security Development Lifecycle (SDL) consists of various security practices that are grouped
under seven phases. Which of the following security practices are included in the Requirements
phase?
Each correct answer represents a complete solution. Choose all that apply.

A. Incident Response Plan
B. Create Quality Gates/Bug Bars
C. Attack Surface Analysis/Reduction
D. Security and Privacy Risk Assessment

Answer: B,D

Explanation:
The Requirements phase of the Security Development Lifecycle (SDL) includes the following
security practices:
• Security and Privacy Requirements
• Create Quality Gates/Bug Bars
• Security and Privacy Risk Assessment
Answer option C is incorrect. Attack Surface Analysis/Reduction is a security practice included in
the Design phase of the Security Development Lifecycle (SDL).
Answer option A is incorrect. Incident Response Plan is a security practice included in the Release
phase of the Security Development Lifecycle (SDL).


QUESTION 3
Which of the following components of a VoIP network is frequently used to bridge video
conferencing connections?

A. MCU
B. Videoconference station
C. IP Phone
D. Call agent

Answer: A

Explanation:
A Multipoint Control Unit (MCU) is a device frequently used to bridge video conferencing
connections. The Multipoint Control Unit is an endpoint on the LAN that provides the ability for 3 or
more terminals and gateways to participate in a multipoint conference. The MCU consists of a
mandatory Multipoint Controller (MC) and optional Multipoint Processors (MPs).
Answer option C is incorrect. IP Phones provide IP endpoints for voice communication. Answer
option D is incorrect. A call agent provides call control for IP phones, CAC, bandwidth control and
management, and address translation. Unlike a gatekeeper, which in a Cisco environment
typically runs on a router, a call agent typically runs on a server platform. Cisco Unified
Communications Manager is an example of a call agent.
The call agent controls switching logic and calls for all the sites under the central controller. A
central gateway controller includes both centralized configuration and maintenance of call control
functionality, when new functionality needs to be added, only the controller needs to be updated.
Answer option B is incorrect. A videoconference station provides access for end-user involvement
in videoconferencing. The videoconference station contains a video capture device for video input
and a microphone for audio input. A user can view video streams and hear audio that originates at
a remote user station.


QUESTION 4
Which of the following is a declarative access control policy language implemented in XML and a
processing model, describing how to interpret the policies?

A. SAML
B. SOAP
C. SPML
D. XACML

Answer: D

Explanation:
XACML stands for extensible Access Control Markup Language. It is a declarative access control
policy language implemented in XML and a processing model, describing how to interpret the
policies.
Latest version 2.0 was ratified by OASIS standards organization on 1 February 2005. The planned
version 3.0 will add generic attribute categories for the evaluation context and policy delegation
profile (administrative policy profile).
Answer option B is incorrect. SOAP, defined as Simple Object Access Protocol, is a protocol
specification for exchanging structured information in the implementation of Web Services in
computer networks, it relies on extensible Markup Language as its message format, and usually
relies on other Application Layer protocols for message negotiation and transmission. SOAP can
form the foundation layer of a web services protocol stack, providing a basic messaging
framework upon which web services can be built.
Answer option C is incorrect. Service Provisioning Markup Language (SPML) is an XML-based
framework developed by OASIS (Organization for the Advancement of Structured Information
Standards). It is used to exchange user, resource and service provisioning information between
cooperating organizations.
SPML is the open standard for the integration and interoperation of service provisioning requests.
It has a goal to allow organizations to securely and quickly set up user interfaces for Web
applications and services, by letting enterprise platforms such as Web portals, application servers,
and service centers produce provisioning requests within and across organizations.
SPML is the open standard for the integration and interoperation of service provisioning requests.
It has a goal to allow organizations to securely and quickly set up user interfaces for Web
applications and services, by letting enterprise platforms such as Web portals, application servers,
and service centers produce provisioning requests within and across organizations.
Answer option A is incorrect. Security Assertion Markup Language (SAMLJ is an XML-based
standard for exchanging authentication and authorization data between security domains, that is,
between an identity provider and a service provider. SAML is a product of the OASIS Security
Services Technical Committee.


QUESTION 5
You work as a Network Administrator for uCertify Inc. You want to allow some users to access a
particular program on the computers in the network. What will you do to accomplish this task?

A. Apply remote access policies
B. Apply NTFS permissions
C. Apply group policies
D. Apply account policies

Answer: C

Explanation:
In order to accomplish the task, you should apply group policy in the network.
A group policy that is created by an administrator affects all users on a computer or all users on a
domain. Group policies can be used for defining, customizing, and controlling the functioning of
network resources, computers, and operating systems. They can be set for a single computer with
multiple users, for users in workgroups, or for computers in a domain. Administrators can
configure group policy settings for users as well as for computers in many ways. Group policies
can be used to allow or restrict the access of a particular program by a particular user. It can also
be used to configure the desktop, the Start menu, the taskbar. the Control Panel, security settings,
among other things. In Windows XP, group policies can be configured by using the Group Policy
Console dialog box, which can be opened by running the GPEDIT.MSC command from the Start
menu.
Answer option D is incorrect. An account policy controls the password expiration policy, the
lockout policy, and other password features.
Answer option B is incorrect. NTFS permissions are attributes of the folder or file for which they
are configured. These include both standard and special levels of settings. The standard settings
are combinations of the special permissions which make the configuration more efficient and
easier to establish.
Answer option A is incorrect. A remote access policy specifies how remote users can connect to
the network and the requirements for each of their systems before they are allowed to connect. It
defines the methods users can use to connect remotely such as dial up or VPN. This policy is
used to prevent damage to the organizational network or computer systems and to prevent
compromise or loss of data.


MCTS Certification, MCITP Certification

Microsoft Commptia A+ Training , Comptia A+ Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

CA1-001 Q&A / Study Guide / Testing Engine

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com


QUESTION 1
You need to ensure that a session key derived from a set of long-term public and private keys will
not be compromised if one of the private keys is compromised in the future?

A. Perfect forward secrecy
B. Secure socket layer
C. Secure shell
D. Security token

Answer: A

Explanation:
Perfect forward secrecy (or PFS) is the property that ensures that a session key derived from a set
of long-term public and private keys will not be compromised if one of the (long-term) private keys
is compromised in the future.
Forward secrecy has been used as a synonym for perfect forward secrecy, since the term perfect
has been controversial in this context. However, at least one reference distinguishes perfect
forward secrecy from forward secrecy with the additional property that an agreed key will not be
compromised even if agreed keys derived from the same long-term keying material in a
subsequent run are compromised.
Answer option C is incorrect. Secure Shell (SSH) is a program that is used for logging into a
remote computer over a network. Secure Shell can be used to execute commands on a remote
machine and to move files from one machine to another. SSH uses strong authentication and
secure communications over insecure channels.
Answer option B is incorrect. Secure Sockets Layer (SSL) is a protocol that was developed by
Netscape for transmitting private documents via the Internet. It uses a cryptographic system that
uses public and private keys to encrypt data. A public key is globally available and a private key is
known only to the recipient of the message. Both Netscape Navigator and Internet Explorer
support the SSL protocol. Several web sites use this protocol to obtain confidential user
information. When the SSL protocol is used to connect to a Web site, the URL must begin with
https instead of http.
Answer option D is incorrect. Security token can be a physical device that an authorized user of
computer services is given to ease authentication. The term may also refer to software tokens.
Security tokens are used to prove one's identity electronically (as in the case of a customer trying
to access his bank account). The token is used in addition to or in place of a password to prove
that the customer is who he claims to be. The token acts like an electronic key to access
something.


QUESTION 2
The Security Development Lifecycle (SDL) consists of various security practices that are grouped
under seven phases. Which of the following security practices are included in the Requirements phase?
Each correct answer represents a complete solution. Choose all that apply.

A. Incident Response Plan
B. Create Quality Gates/Bug Bars
C. Attack Surface Analysis/Reduction
D. Security and Privacy Risk Assessment

Answer: B,D

Explanation:
The Requirements phase of the Security Development Lifecycle (SDL) includes the following
security practices:
• Security and Privacy Requirements
• Create Quality Gates/Bug Bars
• Security and Privacy Risk Assessment
Answer option C is incorrect. Attack Surface Analysis/Reduction is a security practice included in
the Design phase of the Security Development Lifecycle (SDL).
Answer option A is incorrect. Incident Response Plan is a security practice included in the Release
phase of the Security Development Lifecycle (SDL).


QUESTION 3
Which of the following components of a VoIP network is frequently used to bridge video
conferencing connections?

A. MCU
B. Videoconference station
C. IP Phone
D. Call agent

Answer: A

Explanation:
A Multipoint Control Unit (MCU) is a device frequently used to bridge video conferencing
connections. The Multipoint Control Unit is an endpoint on the LAN that provides the ability for 3 or
more terminals and gateways to participate in a multipoint conference. The MCU consists of a
mandatory Multipoint Controller (MC) and optional Multipoint Processors (MPs).
Answer option C is incorrect. IP Phones provide IP endpoints for voice communication. Answer
option D is incorrect. A call agent provides call control for IP phones, CAC, bandwidth control and
management, and address translation. Unlike a gatekeeper, which in a Cisco environment
typically runs on a router, a call agent typically runs on a server platform. Cisco Unified
Communications Manager is an example of a call agent.
The call agent controls switching logic and calls for all the sites under the central controller. A
central gateway controller includes both centralized configuration and maintenance of call control
functionality, when new functionality needs to be added, only the controller needs to be updated.
Answer option B is incorrect. A videoconference station provides access for end-user involvement
in videoconferencing. The videoconference station contains a video capture device for video input
and a microphone for audio input. A user can view video streams and hear audio that originates at
a remote user station.


QUESTION 4
Which of the following is a declarative access control policy language implemented in XML and a
processing model, describing how to interpret the policies?

A. SAML
B. SOAP
C. SPML
D. XACML

Answer: D

Explanation:
XACML stands for extensible Access Control Markup Language. It is a declarative access control
policy language implemented in XML and a processing model, describing how to interpret the
policies.
Latest version 2.0 was ratified by OASIS standards organization on 1 February 2005. The planned
version 3.0 will add generic attribute categories for the evaluation context and policy delegation
profile (administrative policy profile).
Answer option B is incorrect. SOAP, defined as Simple Object Access Protocol, is a protocol
specification for exchanging structured information in the implementation of Web Services in
computer networks, it relies on extensible Markup Language as its message format, and usually
relies on other Application Layer protocols for message negotiation and transmission. SOAP can
form the foundation layer of a web services protocol stack, providing a basic messaging
framework upon which web services can be built.
Answer option C is incorrect. Service Provisioning Markup Language (SPML) is an XML-based
framework developed by OASIS (Organization for the Advancement of Structured Information
Standards). It is used to exchange user, resource and service provisioning information between
cooperating organizations.
SPML is the open standard for the integration and interoperation of service provisioning requests.
It has a goal to allow organizations to securely and quickly set up user interfaces for Web
applications and services, by letting enterprise platforms such as Web portals, application servers,
and service centers produce provisioning requests within and across organizations.
SPML is the open standard for the integration and interoperation of service provisioning requests.
It has a goal to allow organizations to securely and quickly set up user interfaces for Web
applications and services, by letting enterprise platforms such as Web portals, application servers,
and service centers produce provisioning requests within and across organizations.
Answer option A is incorrect. Security Assertion Markup Language (SAMLJ is an XML-based
standard for exchanging authentication and authorization data between security domains, that is,
between an identity provider and a service provider. SAML is a product of the OASIS Security
Services Technical Committee.


QUESTION 5
You work as a Network Administrator for uCertify Inc. You want to allow some users to access a
particular program on the computers in the network. What will you do to accomplish this task?

A. Apply remote access policies
B. Apply NTFS permissions
C. Apply group policies
D. Apply account policies

Answer: C

Explanation:
In order to accomplish the task, you should apply group policy in the network.
A group policy that is created by an administrator affects all users on a computer or all users on a
domain. Group policies can be used for defining, customizing, and controlling the functioning of
network resources, computers, and operating systems. They can be set for a single computer with
multiple users, for users in workgroups, or for computers in a domain. Administrators can
configure group policy settings for users as well as for computers in many ways. Group policies
can be used to allow or restrict the access of a particular program by a particular user. It can also
be used to configure the desktop, the Start menu, the taskbar. the Control Panel, security settings,
among other things. In Windows XP, group policies can be configured by using the Group Policy
Console dialog box, which can be opened by running the GPEDIT.MSC command from the Start
menu.
Answer option D is incorrect. An account policy controls the password expiration policy, the
lockout policy, and other password features.
Answer option B is incorrect. NTFS permissions are attributes of the folder or file for which they
are configured. These include both standard and special levels of settings. The standard settings
are combinations of the special permissions which make the configuration more efficient and
easier to establish.
Answer option A is incorrect. A remote access policy specifies how remote users can connect to
the network and the requirements for each of their systems before they are allowed to connect. It
defines the methods users can use to connect remotely such as dial up or VPN. This policy is
used to prevent damage to the organizational network or computer systems and to prevent
compromise or loss of data.


Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com

70-620 Q&A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

QUESTION 1
You are employed as a Desktop Technician at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com.
Certkingdom.com has acquired a computer named Certkingdom-WS624. The operating system on the computer is
Microsoft Windows XP Professional and its specifications are:
• 1 GB of RAM
• 2GHz processor
• 64-MB video adapter
• 60-GB hard disk with 15 GB of free space
You received instructions for installation of Microsoft Windows Vista on Certkingdom-WS624.
After performing fresh installation you need to identify the which of uCertkingdomrade is needed for
supporting Microsoft Windows Aero Experience?

A. You need to uCertkingdomrade the hard disk to 100 GB.
B. You need to clear 40 GB of free space on the hard disk.
C. You need to uCertkingdomrade the memory to 2 GB of RAM.
D. You need to install a 128 MB of RAM video adapter supporting Microsoft DirectX 9, and
Microsoft Pixel Shader 2.0.
E. You need to uCertkingdomrade the processor to a dual-core processor.

Answer: D

Explanation: To support the Microsoft Windows Aero Experience, you need a video adapter that
has at least 128 MB of RAM, support for Microsoft DirectX 9, and Microsoft Pixel Shader 2.0.


QUESTION 2
You are employed as a network administrator at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com.
A client computer named Certkingdom-WS620 is running Microsoft Windows 2000 with Service Pack 3.
Certkingdom-WS620 also runs some legacy applications. The Certkingdom.com management wants all computers
to be running Microsoft Windows Vista. To this end you have received instructions from the CIO to
uCertkingdomrade Certkingdom-WS620 to Microsoft Windows Vista.
Which two steps should you take to uCertkingdomrade Certkingdom-WS620 and keeping the current applications
intact and not requiring reinstallation?

A. By Installing Windows Vista into a separate partition.
B. By using the Windows Easy Transfer wizard.
C. By uCertkingdomrading to Microsoft Windows XP Professional.
D. By uCertkingdomrading to Windows Vista.
E. By installing the latest version of the Service Pack.
F. By copying your user profile to a removable media.
G. By Performing a clean installation of Windows Vista.
H. By Copying the user profile to the C:\Windows\Users directory.

Answer: C,D

Explanation: To move to Windows Vista without having to reinstall your applications, you need to
do an ‘in-place’ uCertkingdomrade. However, you cannot uCertkingdomrade directly to Windows Vista from
Windows 2000 Professional (you would need a clean install which would delete your applications).
Therefore, you need to uCertkingdomrade to Windows XP Professional first. Then you can uCertkingdomrade to
Windows Vista and keep the applications.


QUESTION 3
You are employed as a network administrator at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com. All client computers on the Certkingdom.com network run
Microsoft Windows Vista.
Certkingdom.com contains a client computer named Certkingdom-WS621. Certkingdom-WS621 has been assigned to a
Certkingdom.com user named Andy Booth. You received a report from Andy Booth complaining that CertkingdomWS621
is performing slower than it should. You have a suspicion that it could be malware that is
causing the problem.
How can you find out what is causing the problems?

A. You need to run a Windows Defender scan.
B. You need to view the processes list in Task manager.
C. You need to view the startup items in the System Configuration utility.
D. You need to run Disk Defragmenter.

Answer: A

Explanation: Windows Defender is an application that can scan for malware or other potentially
harmful files. You can initiate a Windows Defender scan to scan all the files on your system for
malware or other potentially harmful files.


QUESTION 4
You are employed as a network technician at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com. All client computers on the Certkingdom.com network run
Microsoft Windows Vista.
A Certkingdom.com user named Andy Booth has been assigned a client computer named Certkingdom-WS629.
One morning Andy Booth complains that Certkingdom-WS629 does not produce any sound when he
views a video file clip. You open the Device Manager as shown below.



What configuration change should you make to Certkingdom-WS629?

A. You need to update the driver for the audio device.
B. You need to uninstall the device then run a hardware scan.
C. You need to enable the audio device in Device Manager.
D. You need to change the IRQ for the device.
E. You need to run Microsoft Windows Update and install the latest updates for Certkingdom-WS629.
F. You need to replace the audio device with one that is compatible with Windows Vista.

Answer: C

Explanation: The icon by the sound device (the Creative SB Live! Series device) shows that the
device is disabled. Therefore, to receive audio output from Certkingdom-WS629, you simply need to
enable the device. You can do this by right-clicking on the device and selecting Enable.


QUESTION 5
You are employed as a help desk technician at Certkingdom.com. The Certkingdom.com network consists of a
Workgroup named Certkingdom. The client computers on the Certkingdom.com network run a mix of Windows XP
Professional and Windows Vista. You
The Certkingdom.com management wants to conduct a meeting with all their users. You need to facilitate
this meeting. However, invitation to the Certkingdom.com users are not getting sent as they do not appear
in the Invite people list of the Microsoft Windows Meeting Space meeting.
What should you do to be able to invite all Certkingdom.com users to the Windows Meeting Space
meetings? (Each correct answer presents part of the solution. Choose TWO.)

A. You need to instruct the Certkingdom.com users with Windows XP Professional computers to create an
exception for invitations from Windows Meeting Space in the Microsoft Windows Firewall.
B. You need to uCertkingdomrade the Windows XP Professional computers to Windows Vista.
C. You need to configure the Windows XP Professional computers to use Microsoft NetMeeting to
connect to the meeting.
D. You need to instruct all members of the Certkingdom workgroup to sign in to the People Near Me feature.
E. You need to install Service Pack 3 on the Windows XP Professional computers.

Answer: B,D

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Tuesday, April 3, 2012

Leaving IT may be your best IT career path

The best way to ensure a successful IT career in the long run may be to go off the IT reservation. That was my takeaway from the Career Without Boundaries session at the Computerworld Premier 100 conference.

The panelists didn't come right out and say that. But the IT executives on the stage all had done stints in other parts of the business – and brought that experience back. Kate Bass, CIO at Valspar, spent 21 years in finance. Dr. Katrina Lane, senior vice president and CTO at Ceasars Entertainment Corp., has a technical degree but cut her teeth in marketing, focusing on areas such as analytics, media planning and teleservices.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Sheila McGovern, managing partner for the Human Capital division at IBM, has a degree in quantitative business analytics. She started in tech but then moved into the HR field before landing her current job. One day, she says, "I sat down with a business leader and he said, 'You know Sheila, you'll never go any higher with IT.'" So McGovern moved around, working in HR, supply chain, financial systems and finally HR consulting. "A few years ago I came back. I really benefitted from getting on the business side. I wouldn't trade that experience," she says.

Gaining business cred
This movement back and forth is more common between other business units than it is in IT, but such a move can help rising IT stars overcome a major stumbling block for IT executives: The general lack of understanding -– and lack of respect -- for what IT does.

"Running an IT organization is like managing an iceberg. There's only small piece of that anyone ever sees," says Bass. And everyone and their mother thinks they can do that piece it better.

"When you go to legal or finance everyone knows you need an expert," says McGovern. IT is different. "Most people go home and turn on consumer electronics and they work and work better than what they have at work," she says. "And it's only getting worse."

"I left a finance organization, which is very highly respected. You don't have to work at it, whereas in IT that's not always the case," says Bass. But coming in from another group can give an IT executive a level of credibility that may be difficult to achieve for those rising up within the IT ranks.

Leaving IT is not the only way to gain experience. Another way to attack this issue is to embed IT people directly into the business units, a strategy that David Zanca, vice president of IT at FedEx Services, has embraced. "If you want to understand the business units you have to walk in their shoes," he says. But FedEx still fights the good fights against silo mentality. Marketing and IT, even when in adjacent offices, may still not be fully aligned. If you're going to walk in their shoes, why not really walk in their shoes?

Increasingly, the IT career path demands this from IT leaders. IT careers are bifurcating into two groups: The uber-specialists with deep technical knowledge, and IT executives who can manage as business analysts. The great middle of IT organizations is falling away, says Barbara Cooper, CIO for Toyota Operations of North America. So getting very deep technically -– or getting that deep knowledge of the business, will be the career path choices.

The vast middle tier of administrative IT functions will become commoditized and "sourceable," Cooper says. "What's sweeping away is the bureaucratic layer of managers who are mostly administrative in nature. You're either up and into this new frontier or you're sourced."

"The thing that's left is the consultative roles around serious business problem solving and investment strategies for solutions sets for the business," Cooper adds. She has actively recruited from the business to fill those new positions, but it's easier to groom someone from the IT side to learn the business acumen than the other way around. It is, she says, "a new breed."

At Toyota the door to IT now swings both ways. A former CIO for sales and distribution at Toyota, whom Cooper had managed and mentored, left IT to work in the business side. Three years later Cooper hired him back as part of her succession plan. If a tour of duty in the business is important, good mentoring is essential to develop a mature, nuanced management style and to develop the political skills to make it happen, Cooper says.

That's what happened with another mentee of Coopers: 2011 Computerworld Premier 100 IT award winner Doug Beebe, formerly corporate manager of information systems, who was recently recruited by the business to a new position as corporate manager of real estate and facilities.

Cooper may have lost Beebe -- that's a consequence of developing strong business acument and leadership skills in your management. But she's not worried about the brain drain. "This is a way station in his journey for broadening and rounding out his experience. I have a notion that he is destined to come back to the IT line of business."