Tuesday, June 30, 2015

A look at the new Microsoft Skype for Business Server 2015

 In March, Microsoft released Skype for Business Server 2015, its enterprise communications product that is the successor to both Lync Server for on-premises installations and Lync Online for cloud customers.

Skype for Business Server 2015 is a modest upgrade that takes care of a lot of plumbing on the server side but is more of a cosmetic polish on the client side. In this piece, I will take a look at exactly what Skype for Business is, what is new or improved in this release, some things to look forward to and perhaps some "gotchas" as well. Let's dive in.

Busting some myths

Let me take this opportunity to talk a little bit about what Skype for Business is not:

Skype for Business is not a replacement for Skype. Yes, it seems Microsoft has done it again -- it has created two services that seemingly have the same purpose and outcome but go about it in entirely different and mostly incompatible ways (think OneDrive and OneDrive for Business). Skype for Business is Lync, renamed. Skype that you freely download is still Skype, the same customer service Microsoft purchased from eBay a few years ago. It operates independently of Lync/Skype for Business, although some companies have

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Tuesday, June 23, 2015

Twitter wants a 'full-time' CEO, deflates Dorsey's candidacy

The interim CEO would have to leave his post at Square to take over at Twitter

A week and a half after Dick Costolo announced that he would be stepping down from the CEO role at Twitter, the company's board of directors has sent a shot across the bow of one of the expected front-runner candidates to take the social network's top job.

The social micro-blogging company's search committee will only consider CEO candidates "who are in a position to make a full-time commitment to Twitter," the board said.That would seem to rule out Jack Dorsey, the company's co-founder who currently works as the CEO of Square and will be filling in as interim CEO of Twitter.

Dorsey has said that he plans to remain at the helm of the payment processing company he co-founded, but hasn't explicitly ruled out a bid for a permanent berth in Twitter's top job. Now the Twitter board has made it clear that he would have to depart Square if he wants to run Twitter. That's a rough proposition for Dorsey, especially since Square is reportedly planning to go public this year.

As for the overall search process, Twitter's search committee has contracted with executive search firm Spencer Stuart to evaluate internal and external candidates for the job. The board hasn't set a firm time frame for its hiring of a new CEO, saying that there's a "sense of urgency" to the process but that it will take its time to find the right person for the job.

Whoever steps into the top spot at Twitter will have to contend with increased pressure on the company from Wall Street. Investors have been disappointed by Twitter's revenue and user growth in recent quarters.




Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Friday, June 19, 2015

5 reasons you should move your video to specialty storage

Segregating video storage can deliver a host of benefits, from increasing performance to decreasing costs
Video is everywhere, and growing exponentially. According to a recent report, 35 billion video ads were viewed in December, representing year-over-year growth of more than 100%. And every industry is seeing video growth, which creates a problem for data managers because video challenges storage management in four ways:
If, however, you move video to specialty storage, you’ll achieve five amazing benefits:
* Higher Performance. Video has different characteristics and performance requirements from traditional corporate data. A single video file is often up to a TB or more. Collaborative video processing applications (e.g., post production) may or may not be IOPS- or bandwidth-centric, but they often require almost zero latency.
This combination of large file and latency sensitivity is a challenge for traditional storage architectures. Storage arrays typically utilize intelligent memory caches to deliver performance; having written data to the cache, the application is freed to perform its next operation. Read transactions from memory buffers can occur at much higher speed than a read from disk. For traditional data, this model works well.  But these software-managed caches are not large or flexible enough to manage unpredictable video data streams.
ADVERTISING
Video files overflow storage caches, causing the array to pause while it pages data to and from the disk. Meanwhile, the latency-sensitive video application continues to send data. This results in “frame drop”; writes which are not serviced rapidly enough are “dropped” by the storage system. This results in a performance problem and may, in some cases, cause data to be lost.
When video causes this data traffic jam, other transactional or productivity data which is better suited for this architecture isn’t getting serviced either. Resources are being used but nobody’s getting good performance.
Field engineers from the best array vendors will anticipate these problems and deal with them by turning the caches off and overprovisioning disk heads in the storage system to address the needs of the video/image data. But, besides adding expense, this leaves traditional data without the tools needed to address performance.
Segregating out large, latency-sensitive video data – and applying specialty storage which is engineered to match its needs – gives both sets of applications better data access and performance.
* Faster, smoother, cheaper backups. In addition to being super-sized, video data is unique in a second way: these files are static. While users may clip pieces of these files to make new files, the original files aren’t modified. For this reason, they can create an unnecessary burden in your backup process.  Smart incremental backup technologies will avoid backing up these files, but when you need to do a full backup, these large static files will get copied – over and over again, using lots of bandwidth and storage.
Moreover, unless a file is an exact copy of a prior video, these files do not de-dupe. But their volume and capacity will consume compute resources as the deduplication process attempts to do its (fruitless) job. Meanwhile, other non-video files are waiting to be protected.
This challenge is exacerbated by video’s long useful life.  This data is often high value, causing it to be saved for years. As a first step, simply identifying this data and segregating it from your normal backups will have a strong positive impact on backup schedules and costs.
Moving it to specialty storage will have additional benefits. Video-optimized storage is architected with smart metadata that only store copies of new versions as files, groupings of files, or directories are added. This model avoids the need for a traditional file walk process and optimizes the capacity of protected storage. Backups of all your data will operate more smoothly.
* Increased customer satisfaction. Having segregated video from primary storage, your applications and users will all get better data access, availability and performance. Work will complete more rapidly. Avoiding backup window overruns also means avoiding production maintenance outages or performance issues. Finally, because you won’t need to respond to the challenges that this data can cause, you’ll have more time to plan for the future – and to consider and deploy other options for improving quality of service. All your customers (and you!) will be happier.
* Managing data growth. Video data is growing exponentially and it needs kept for a long time. However, when this data is combined with traditional data, optimizing its placement (for performance and access) is a challenge. Moving the data to specialty storage solves this issue by providing intelligent storage tiering, driven by either workflow or data usage.
Video is often integrated with a business workflow – a combination of multiple applications that deliver business results. Specialized storage for video is architected to work in combination with these applications (“workflow-managed”) so data is moved to the right storage automatically.
As an example, content associated with completed projects can be automatically archived on direction by an application process. The specialty storage controller is also aware of content usage, so it can automatically move data to lower-cost storage while maintaining transparent online access.
These combined capabilities give the user the right quality of service while the data is stored at the lowest cost.   This can even occur at initial data write – e.g., video surveillance data can be transparently moved from camera to digital tape, and only restored to disk if needed for analysis. This capability allows you to make much more efficient use of your primary storage. If you are running near capacity on primary, the system automatically migrates data to next tier disk, object storage, or tape, allowing you to maintain access until your primary disk upgrade is completed.
Segregating video data also enables accurate tracking of this high growth data for applying billing. You can better manage overall data growth.
* Lower operating cost. Finally, all of the prior benefits of applying specialty storage combine to deliver a lower total cost of ownership. Specialty storage will need fewer disks to deliver performance. Improving your backup process will decrease labor costs and reduce needed software licenses. Having more satisfied users means less work. And better management of growth saves hardware, power and cooling, floor space and labor. The application of specialty storage for video data is a win for everyone.
Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com

Tuesday, June 9, 2015

400-101 CCIE Routing and Switching

400-101 CCIE Routing and Switching

Exam Description
The CCIE written exam is a two-hour qualification exam. The exam uses a combination of 90-110 multiple choice questions and simulations to assess skills. Exams are closed book and no reference materials are allowed.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Network Principles 10%

1.1 Network theory
1.1.a Describe basic software architecture differences between IOS and IOS XE
1.1.a [i] Control plane and Forwarding plane
1.1.a [ii] Impact to troubleshooting and performances
1.1.a [iii] Excluding specific platform's architecture
1.1.b Identify Cisco express forwarding concepts
1.1.b [i] RIB, FIB, LFIB, Adjacency table
1.1.b [ii] Load balancing Hash
1.1.b [iii] Polarization concept and avoidance
1.1.c Explain general network challenges
1.1.c [i] Unicast flooding
1.1.c [ii] Out of order packets
1.1.c [iii] Asymmetric routing
1.1.c [iv] Impact of micro burst
1.1.d Explain IP operations
1.1.d [i] ICMP unreachable, redirect
1.1.d [ii] IPv4 options, IPv6 extension headers
1.1.d [iii] IPv4 and IPv6 fragmentation
1.1.d [iv] TTL
1.1.d [v] IP MTU
1.1.e Explain TCP operations
1.1.e [i] IPv4 and IPv6 PMTU
1.1.e [ii] MSS
1.1.e [iii] Latency
1.1.e [iv] Windowing
1.1.e [v] Bandwidth delay product
1.1.e [vi] Global synchronization
1.1.e [vii] Options
1.1.f Explain UDP operations
1.1.f [i] Starvation
1.1.f [ii] Latency
1.1.f [iii] RTP/RTCP concepts

1.2 Network implementation and operation
1.2.a Evaluate proposed changes to a network
1.2.a [i] Changes to routing protocol parameters
1.2.a [ii] Migrate parts of a network to IPv6
1.2.a [iii] Routing protocol migration
1.2.a [iv] Adding multicast support
1.2.a [v] Migrate spanning tree protocol
1.2.a [vi] Evaluate impact of new traffic on existing QoS design

1.3 Network troubleshooting
1.3.a Use IOS troubleshooting tools
1.3.a [i] debug, conditional debug
1.3.a [ii] ping, traceroute with extended options
1.3.a [iii] Embedded packet capture
1.3.a [iv] Performance monitor
1.3.b Apply troubleshooting methodologies
1.3.b [i] Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause]
1.3.b [ii] Design and implement valid solutions according to constraints
1.3.b [iii] Verify and monitor resolution
1.3.c Interpret packet capture
1.3.c [i] Using Wireshark trace analyzer
1.3.c [ii] Using IOS embedded packet capture

2.0 Layer 2 Technologies 15%

2.1 LAN switching technologies
2.1.a Implement and troubleshoot switch administration
2.1.a [i] Managing MAC address table
2.1.a [ii] errdisable recovery
2.1.a [iii] L2 MTU
2.1.b Implement and troubleshoot layer 2 protocols
2.1.b [i] CDP, LLDP
2.1.b [ii] UDLD
2.1.c Implement and troubleshoot VLAN
2.1.c [i] Access ports
2.1.c [ii] VLAN database
2.1.c [iii] Normal, extended VLAN, voice VLAN
2.1.d Implement and troubleshoot trunking
2.1.d [i] VTPv1, VTPv2, VTPv3, VTP pruning
2.1.d [ii] dot1Q
2.1.d [iii] Native VLAN
2.1.d [iv] Manual pruning
2.1.e Implement and troubleshoot EtherChannel
2.1.e [i] LACP, PAgP, manual
2.1.e [ii] Layer 2, layer 3
2.1.e [iii] Load-balancing
2.1.e [iv] Etherchannel misconfiguration guard
2.1.f Implement and troubleshoot spanning-tree
2.1.f [i] PVST+/RPVST+/MST
2.1.f [ii] Switch priority, port priority, path cost, STP timers
2.1.f [iii] port fast, BPDUguard, BPDUfilter
2.1.f [iv] loopguard, rootguard
2.1.g Implement and troubleshoot other LAN switching technologies
2.1.g [i] SPAN, RSPAN, ERSPAN
2.1.h Describe chassis virtualization and aggregation technologies
2.1.h [i] Multichassis
2.1.h [ii] VSS concepts
2.1.h [iii] Alternative to STP
2.1.h [iv] Stackwise
2.1.h [v] Excluding specific platform implementation
2.1.i Describe spanning-tree concepts
2.1.i [i] Compatibility between MST and RSTP
2.1.i [ii] STP dispute, STP bridge assurance

2.2 Layer 2 multicast
2.2.a Implement and troubleshoot IGMP
2.2.a [i] IGMPv1, IGMPv2, IGMPv3
2.2.a [ii] IGMP snooping
2.2.a [iii] IGMP querier
2.2.a [iv] IGMP filter
2.2.a [v] IGMP proxy
2.2.b Explain MLD
2.2.c Explain PIM snooping

2.3 Layer 2 WAN circuit technologies
2.3.a Implement and troubleshoot HDLC
2.3.b Implement and troubleshoot PPP
2.3.b [i] Authentication [PAP, CHAP]
2.3.b [ii] PPPoE
2.3.b [iii] MLPPP
2.3.c Describe WAN rate-based ethernet circuits
2.3.c [i] Metro and WAN Ethernet topologies
2.3.c [ii] Use of rate-limited WAN ethernet services

3.0 Layer 3 Technologies 40%

3.1 Addressing technologies
3.1.a Identify, implement and troubleshoot IPv4 addressing and subnetting
3.1.a [i] Address types, VLSM
3.1.a [ii] ARP
3.1.b Identify, implement and troubleshoot IPv6 addressing and subnetting
3.1.b [i] Unicast, multicast
3.1.b [ii] EUI-64
3.1.b [iii] ND, RS/RA
3.1.b [iv] Autoconfig/SLAAC, temporary addresses [RFC4941]
3.1.b [v] Global prefix configuration feature
3.1.b [vi] DHCP protocol operations
3.1.b [vii] SLAAC/DHCPv6 interaction
3.1.b [viii] Stateful, stateless DHCPv6
3.1.b [ix] DHCPv6 prefix delegation

3.2 Layer 3 multicast
3.2.a Troubleshoot reverse path forwarding
3.2.a [i] RPF failure
3.2.a [ii] RPF failure with tunnel interface
3.2.b Implement and troubleshoot IPv4 protocol independent multicast
3.2.b [i] PIM dense mode, sparse mode, sparse-dense mode
3.2.b [ii] Static RP, auto-RP, BSR
3.2.b [iii] BiDirectional PIM
3.2.b [iv] Source-specific multicast
3.2.b [v] Group to RP mapping
3.2.b [vi] Multicast boundary
3.2.c Implement and troubleshoot multicast source discovery protocol
3.2.c [i] Intra-domain MSDP [anycast RP]
3.2.c [ii] SA filter
3.2.d Describe IPv6 multicast
3.2.d [i] IPv6 multicast addresses
3.2.d [ii] PIMv6

3.3 Fundamental routing concepts
3.3.a Implement and troubleshoot static routing
3.3.b Implement and troubleshoot default routing
3.3.c Compare routing protocol types
3.3.c [i] Distance vector
3.3.c [ii] Link state
3.3.c [iii] Path vector
3.3.d Implement, optimize and troubleshoot administrative distance
3.3.e Implement and troubleshoot passive interface
3.3.f Implement and troubleshoot VRF lite
3.3.g Implement, optimize and troubleshoot filtering with any routing protocol
3.3.h Implement, optimize and troubleshoot redistribution between any routing protocol
3.3.i Implement, optimize and troubleshoot manual and auto summarization with any routing protocol
3.3.j Implement, optimize and troubleshoot policy-based routing
3.3.k Identify and troubleshoot sub-optimal routing
3.3.l Implement and troubleshoot bidirectional forwarding detection
3.3.m Implement and troubleshoot loop prevention mechanisms
3.3.m [i] Route tagging, filtering
3.3.m [ii] Split horizon
3.3.m [iii] Route poisoning
3.3.n Implement and troubleshoot routing protocol authentication
3.3.n [i] MD5
3.3.n [ii] Key-chain
3.3.n [iii] EIGRP HMAC SHA2-256bit
3.3.n [iv] OSPFv2 SHA1-196bit
3.3.n [v] OSPFv3 IPsec authentication

3.4 RIP [v2 and v6]
3.4.a Implement and troubleshoot RIPv2
3.4.b Describe RIPv6 [RIPng]

3.5 EIGRP [for IPv4 and IPv6]
3.5.a Describe packet types
3.5.a [i] Packet types [hello, query, update, and such]
3.5.a [ii] Route types [internal, external]
3.5.b Implement and troubleshoot neighbor relationship
3.5.b [i] Multicast, unicast EIGRP peering
3.5.b [ii] OTP point-to-point peering
3.5.b [iii] OTP route-reflector peering
3.5.b [iv] OTP multiple service providers scenario
3.5.c Implement and troubleshoot loop free path selection
3.5.c [i] RD, FD, FC, successor, feasible successor
3.5.c [ii] Classic metric
3.5.c [iii] Wide metric
3.5.d Implement and troubleshoot operations
3.5.d [i] General operations
3.5.d [ii] Topology table, update, query, active, passive
3.5.d [iii] Stuck in active
3.5.d [iv] Graceful shutdown
3.5.e Implement and troubleshoot EIGRP stub
3.5.e [i] Stub
3.5.e [ii] Leak-map
3.5.f Implement and troubleshoot load-balancing
3.5.f [i] equal-cost
3.5.f [ii] unequal-cost
3.5.f [iii] add-path
3.5.g Implement EIGRP [multi-address] named mode
3.5.g [i] Types of families
3.5.g [ii] IPv4 address-family
3.5.g [iii] IPv6 address-family
3.5.h Implement, troubleshoot and optimize EIGRP convergence and scalability
3.5.h [i] Describe fast convergence requirements
3.5.h [ii] Control query boundaries
3.5.h [iii] IP FRR/fast reroute [single hop]
3.5.8 [iv] Summary leak-map
3.5.h [v] Summary metric

3.6 OSPF [v2 and v3]
3.6.a Describe packet types
3.6.a [i] LSA yypes [1, 2, 3, 4, 5, 7, 9]
3.6.a [ii] Route types [N1, N2, E1, E2]
3.6.b Implement and troubleshoot neighbor relationship
3.6.c Implement and troubleshoot OSPFv3 address-family support
3.6.c [i] IPv4 address-family
3.6.c [ii] IPv6 address-family
3.6.d Implement and troubleshoot network types, area types and router types
3.6.d [i] Point-to-point, multipoint, broadcast, non-broadcast
3.6.d [ii] LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
3.6.d [iii] Internal router, ABR, ASBR
3.6.d [iv] Virtual link
3.6.e Implement and troubleshoot path preference
3.6.f Implement and troubleshoot operations
3.6.f [i] General operations
3.6.f [ii] Graceful shutdown
3.6.f [iii] GTSM [Generic TTL Security Mechanism]
3.6.g Implement, troubleshoot and optimize OSPF convergence and scalability
3.6.g [i] Metrics
3.6.g [ii] LSA throttling, SPF tuning, fast hello
3.6.g [iii] LSA propagation control [area types, ISPF]
3.6.g [iv] IP FRR/fast reroute [single hop]
3.6.g [v] LFA/loop-free alternative [multi hop]
3.6.g [vi] OSPFv3 prefix suppression

3.7 BGP
3.7.a Describe, implement and troubleshoot peer relationships
3.7.a [i] Peer-group, template
3.7.a [ii] Active, passive
3.7.a [iii] States, timers
3.7.a [iv] Dynamic neighbors
3.7.b Implement and troubleshoot IBGP and EBGP
3.7.b [i] EBGP, IBGP
3.7.b [ii] 4 bytes AS number
3.7.b [iii] Private AS
3.7.c Explain attributes and best-path selection
3.7.d Implement, optimize and troubleshoot routing policies
3.7.d [i] Attribute manipulation
3.7.d [ii] Conditional advertisement
3.7.d [iii] Outbound route filtering
3.7.d [iv] Communities, extended communities
3.7.d [v] Multi-homing
3.7.e Implement and troubleshoot scalability
3.7.e [i] Route-reflector, cluster
3.7.e [ii] Confederations
3.7.e [iii] Aggregation, AS set
3.7.f Implement and troubleshoot multiproctocol BGP
3.7.f [i] IPv4, IPv6, VPN address-family
3.7.g Implement and troubleshoot AS path manipulations
3.7.g [i] Local AS, allow AS in, remove private AS
3.7.g [ii] Prepend
3.7.g [iii] Regexp
3.7.h Implement and troubleshoot other features
3.7.h [i] Multipath
3.7.h [ii] BGP synchronization
3.7.h [iii] Soft reconfiguration, route refresh
3.7.i Describe BGP fast convergence features
3.7.i [i] Prefix independent convergence
3.7.i [ii] Add-path
3.7.i [iii] Next-hop address tracking

3.8 ISIS [for IPv4 and IPv6]
3.8.a Describe basic ISIS network
3.8.a [i] Single area, single topology
3.8.b Describe neighbor relationship
3.8.c Describe network types, levels and router types
3.8.c [i] NSAP addressing
3.8.c [ii] Point-to-point, broadcast
3.8.d Describe operations
3.8.e Describe optimization features
3.8.e [i] Metrics, wide metric

4.0 VPN Technologies 15%

4.1 Tunneling
4.1.a Implement and troubleshoot MPLS operations
4.1.a [i] Label stack, LSR, LSP
4.1.a [ii] LDP
4.1.a [iii] MPLS ping, MPLS traceroute
4.1.b Implement and troubleshoot basic MPLS L3VPN
4.1.b [i] L3VPN, CE, PE, P
4.1.b [ii] Extranet [route leaking]
4.1.c Implement and troubleshoot encapsulation
4.1.c [i] GRE
4.1.c [ii] Dynamic GRE
4.1.c [iii] LISP encapsulation principles supporting EIGRP OTP
4.1.d Implement and troubleshoot DMVPN [single hub]
4.1.d [i] NHRP
4.1.d [ii] DMVPN with IPsec using preshared key
4.1.d [iii] QoS profile
4.1.d [iv] Pre-classify
4.1.e Describe IPv6 tunneling techniques
4.1.e [i] 6in4, 6to4
4.1.e [ii] ISATAP
4.1.e [iii] 6RD
4.1.e [iv] 6PE/6VPE
4.1.g Describe basic layer 2 VPN —wireline
4.1.g [i] L2TPv3 general principals
4.1.g [ii] ATOM general principals
4.1.h Describe basic L2VPN — LAN services
4.1.h [i] MPLS-VPLS general principals
4.1.h [ii] OTV general principals

4.2 Encryption
4.2.a Implement and troubleshoot IPsec with preshared key
4.2.a [i] IPv4 site to IPv4 site
4.2.a [ii] IPv6 in IPv4 tunnels
4.2.a [iii] Virtual tunneling Interface [VTI]
4.2.b Describe GET VPN

5.0 Infrastructure Security 5%

5.1 Device security
5.1.a Implement and troubleshoot IOS AAA using local database
5.1.b Implement and troubleshoot device access control
5.1.b [i] Lines [VTY, AUX, console]
5.1.b [ii] SNMP
5.1.b [iii] Management plane protection
5.1.b [iv] Password encryption
5.1.c Implement and troubleshoot control plane policing
5.1.d Describe device security using IOS AAA with TACACS+ and RADIUS
5.1.d [i] AAA with TACACS+ and RADIUS
5.1.d [ii] Local privilege authorization fallback

5.2 Network security
5.2.a Implement and troubleshoot switch security features
5.2.a [i] VACL, PACL
5.2.a [ii] Stormcontrol
5.2.a [iii] DHCP snooping
5.2.a [iv] IP source-guard
5.2.a [v] Dynamic ARP inspection
5.2.a [vi] port-security
5.2.a [vii] Private VLAN
5.2.b Implement and troubleshoot router security features
5.2.b [i] IPv4 access control lists [standard, extended, time-based]
5.2.b [ii] IPv6 traffic filter
5.2.b [iii] Unicast reverse path forwarding
5.2.c Implement and troubleshoot IPv6 first hop security
5.2.c [i] RA guard
5.2.c [ii] DHCP guard
5.2.c [iii] Binding table
5.2.c [iv] Device tracking
5.2.c [v] ND inspection/snooping
5.2.c [vii] Source guard
5.2.c [viii] PACL
5.2.d Describe 802.1x
5.2.d [i] 802.1x, EAP, RADIUS
5.2.d [ii] MAC authentication bypass

6.0 Infrastructure Services 15%

6.1 System management
6.1.a Implement and troubleshoot device management
6.1.a [i] Console and VTY
6.1.a [ii] telnet, HTTP, HTTPS, SSH, SCP
6.1.a [iii] [T]FTP
6.1.b Implement and troubleshoot SNMP
6.1.b [i] v2c, v3
6.1.c Implement and troubleshoot logging
6.1.c [i] Local logging, syslog, debug, conditional debug
6.1.c [ii] Timestamp

6.2 Quality of service
6.2.a Implement and troubleshoot end-to-end QoS
6.2.a [i] CoS and DSCP mapping
6.2.b Implement, optimize and troubleshoot QoS using MQC
6.2.b [i] Classification
6.2.b [ii] Network based application recognition [NBAR]
6.2.b [iii] Marking using IP precedence, DSCP, CoS, ECN
6.2.b [iv] Policing, shaping
6.2.b [v] Congestion management [queuing]
6.2.b [vi] HQoS, sub-rate ethernet link
6.2.b [vii] Congestion avoidance [WRED]
6.2.c Describe layer 2 QoS
6.2.c [i] Queuing, scheduling
6.2.c [ii] Classification, marking

6.3 Network services
6.3.a Implement and troubleshoot first-hop redundancy protocols
6.3.a [i] HSRP, GLBP, VRRP
6.3.a [ii] Redundancy using IPv6 RS/RA
6.3.b Implement and troubleshoot network time protocol
6.3.b [i] NTP master, client, version 3, version 4
6.3.b [ii] NTP Authentication
6.3.c Implement and troubleshoot IPv4 and IPv6 DHCP
6.3.c [i] DHCP client, IOS DHCP server, DHCP relay
6.3.c [ii] DHCP options
6.3.c [iii] DHCP protocol operations
6.3.c [iv] SLAAC/DHCPv6 interaction
6.3.c [v] Stateful, stateless DHCPv6
6.3.c [vi] DHCPv6 prefix delegation
6.3.d Implement and troubleshoot IPv4 network address translation
6.3.d [i] Static NAT, dynamic NAT, policy-based NAT, PAT
6.3.d [ii] NAT ALG
6.3.e Describe IPv6 network address translation
6.3.e [i] NAT64
6.3.e [ii] NPTv6

6.4 Network optimization
6.4.a Implement and troubleshoot IP SLA
6.4.a [i] ICMP, UDP, Jitter, VoIP
6.4.b Implement and troubleshoot tracking object
6.4.b [i] Tracking object, tracking list
6.4.b [ii] Tracking different entities [e.g. interfaces, routes, IPSLA, and such]
6.4.c Implement and troubleshoot netflow
6.4.c [i] Netflow v5, v9
6.4.c [ii] Local retrieval
6.4.c [iii] Export [configuration only]
6.4.d Implement and troubleshoot embedded event manager
6.4.d [i] EEM policy using applet
6.4.e Identify performance routing [PfR]
6.4.e [i] Basic load balancing
6.4.e [ii] Voice optimization



QUESTION 1
Refer to the exhibit.



If you change the Spanning Tree Protocol from pvst to rapid-pvst, what is the effect on the
interface Fa0/1 port state?

A. It transitions to the listening state, and then the forwarding state.
B. It transitions to the learning state and then the forwarding state.
C. It transitions to the blocking state, then the learning state, and then the forwarding state.
D. It transitions to the blocking state and then the forwarding state.

Answer: C

Explanation:


QUESTION 2
Refer to the exhibit.



Which configuration is missing that would enable SSH access on a router that is running Cisco
IOS XE Software?

A. int Gig0/0/0
management-interface
B. class-map ssh-class
match access-group protect-ssh
policy-map control-plane-in
class ssh-class
police 80000 conform transmit exceed drop
control-plane
service-policy input control-plane-in
C. control-plane host
management-interface GigabitEthernet0/0/0 allow ssh
D. interface Gig0/0/0
ip access-group protect-ssh in

Answer: C

Explanation:


QUESTION 3
Which two options are causes of out-of-order packets? (Choose two.)

A. a routing loop
B. a router in the packet flow path that is intermittently dropping packets
C. high latency
D. packets in a flow traversing multiple paths through the network
E. some packets in a flow being process-switched and others being interrupt-switched on a transit
router

Answer: D,E

Explanation:


QUESTION 4
A TCP/IP host is able to transmit small amounts of data (typically less than 1500 bytes), but
attempts to transmit larger amounts of data hang and then time out. What is the cause of this
problem?

A. A link is flapping between two intermediate devices.
B. The processor of an intermediate router is averaging 90 percent utilization.
C. A port on the switch that is connected to the TCP/IP host is duplicating traffic and sending it to a
port that has a sniffer attached.
D. There is a PMTUD failure in the network path.

Answer: D

Explanation:


QUESTION 5
Refer to the exhibit.



ICMP Echo requests from host A are not reaching the intended destination on host B. What is the
problem?

A. The ICMP payload is malformed.
B. The ICMP Identifier (BE) is invalid.
C. The negotiation of the connection failed.
D. The packet is dropped at the next hop.
E. The link is congested.

Answer: D

Explanation:

Friday, June 5, 2015

Exam 70-459 Transition Your MCITP: Database Administrator 2008 or MCITP: Database Developer 2008 to MCSE: Data Platform

Exam 70-459 Transition Your MCITP: Database Administrator 2008 or MCITP: Database Developer 2008 to MCSE: Data Platform

Published: 11 June 2012
Languages: English
Audiences: IT professionals
Technology: Microsoft SQL Server 2014
Credit towards certification: MCP, MCSA, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below.

Starting 15 May 2014, the questions on this exam include content covering SQL Server 2014.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Implement database objects

Create and alter tables
Develop an optimal strategy for using temporary objects (table variables and temporary tables); manage a table without using triggers; data version control and management; create tables without using the built-in tools; understand the difference between @Table and #table; create calculated columns; implement partitioned tables, schemas and functions; implement column collation; implement online transaction processing (OLTP)

Design, implement and troubleshoot security
Grant, deny, revoke; connection issues; execute as; certificates; loginless user; database roles and permissions; implement contained users; implement cross db ownership chaining; implement schema security; implement server roles; review effective permissions; troubleshoot and repair orphaned users

Create and modify constraints (complex statements)
Create constraints on tables; define constraints, modify constraints according to performance implications, implement cascading deletes, configure constraints for bulk inserts

Preparation resources
CREATE TABLE (Transact-SQL)
CREATE USER (Transact-SQL)
UNIQUE constraints and CHECK constraints

Implement programming objects

Design and implement stored procedures

Create stored procedures and other programmatic objects; implement different types of stored procedure results; create stored procedures for data access layer; analyse and rewrite procedures and processes; program stored procedures by using T-SQL and CLR; implement parameters, including table-valued parameter, input and output; implement encryption; implement error handling, including TRY…CATCH; configure appropriate connection settings, design appropriate query paging, including OFFSET and FETCH

Design T-SQL table-valued and scalar functions

Modify scripts that use cursors and loops into a SET-based operation; design deterministic and non-deterministic functions

Create and alter views

Set up and configure partitioned tables and partitioned views; create indexed views

Preparation resources
Create a stored procedure
CREATE FUNCTION (Transact-SQL)
CREATE VIEW (Transact-SQL)

Design database objects

Design tables
Apply data design patterns; develop appropriately normalised and de-normalised SQL tables; design transactions; design views; implement GUID as a clustered index appropriately; design temp tables appropriately, including # versus @; implement set-based logic; design an encryption strategy; design table partitioning; design a BLOB storage strategy, including filestream and filetable; design tables for In-Memory OLTP

Create and alter indexes
Create indexes and data structures; create filtered indexes; create an indexing strategy, including column store, semantic indexes and INCLUDE; design indexes and statistics; assess which indexes on a table are likely to be used given different search arguments (SARG); create indexes that contain included columns; create spatial indexes

Design data integrity
Design table data integrity policy, including checks, private key, foreign key, uniqueness, XML schema and nullability; select a primary key

Preparation resources
CREATE TABLE (Transact-SQL)
CREATE INDEX (Transact-SQL)
SET IMPLICIT_TRANSACTIONS (Transact-SQL)

Optimise and troubleshoot queries

Optimise and tune queries
Tune a poorly performing query, including avoiding unnecessary data-type conversions; identify long-running queries; review and optimise code; analyse execution plans to optimise queries; tune queries using execution plans and Microsoft Database Tuning Advisor (DTA); optimise queries using pivots and utilising common table expressions (CTEs); design the database layout to optimise queries; implement query hints; tune query workloads; implement recursive CTE; implement full text and semantic search; analyse execution plans; implement plan guides

Troubleshoot and resolve performance problems
Interpret performance monitor data; integrate performance monitor data with SQL Traces; design an appropriate recovery model; optimise data files; identify and fix transactional replication problems; detect and resolve server failures; identify and troubleshoot data access problems; manage tempdb contention and autogrowth; implement Resource Governor; monitor and resolve In-Memory OLTP issues, including merge and rubbish collection

Collect performance and system information
Monitor performance using Dynamic Management Views; collect output from the Database Engine Tuning Advisor; design Extended Events Sessions; review and interpret Extended Event logs; optimise Extended Event session settings; use Activity Monitor to minimise server impact and determine IO bottlenecks; monitor In-Memory OLTP resources

Preparation resources
Database Engine Tuning Advisor
Manage the size of the transaction log file
SQL Server Profiler

Design database structure

Design for business requirements
Translate business needs to data structures; identify which SQL Server components to use to support business requirements; design a normalisation area; de-normalise by using SQL Server features, including materialisation using indexed views, distributed partitioned views, filtered and non-key column indexes and snapshots

Design physical database and object placement
Design a physical database, including file placement, FILESTREAM, FILETABLE, file groups and RAID; configure system database settings

Design SQL Server instances
Identify hardware for new instances; design CPU affinity; design clustered instances, including Microsoft Distributed Transaction Control (MSDTC); define instance memory allocation; design installation strategies, including sysprep, slipstream and SMB file server; define cross db ownership chaining

Preparation resources
Create indexed views
FileTables (SQL Server)
Failover clustering and AlwaysOn Availability Groups (SQL Server)

Design databases and database objects

Design a database model
Design a logical schema; design data access and data layer architecture; design a database schema; design security architecture; design a cross-server instance database model, including linked servers, security, providers, distributed transactions, distributed partitioned views and Service Broker

Design tables
Design tables appropriately, including physical tables, temp tables, temp table variables, common table expressions, column store indexes and user-defined table types; FILESTREAM, FILETABLE and In-Memory OLTP; design views and table values functions; design a compression strategy, including row and page; select an appropriate data type; design computed columns

Design T-SQL stored procedures
Create stored procedures; design a data-access strategy using stored procedures; design appropriate stored procedure parameters, including input, output and Table Valued; design error handling; design an In-Memory OLTP strategy for stored procedures

Preparation resources
Collation and Unicode support
Row compression implementation
Stored procedures (database engine)

Design database security
Design an application strategy to support security

Design security, including security roles, signed stored procedures, encryption, contained logins, EXECUTE AS and credentials; implement schemas and schema security; design security maintenance, including SQL logins, integrated authentication, permissions and mirroring

Design instance-level security configurations
Implement separation of duties using different login roles; choose authentication type, including logon triggers, regulatory requirements and certificates; implement data encryption, including master key and configuration; implement DDL triggers; define a secure service account

Preparation resources
Tutorial: Signing stored procedures with a certificate
Logon triggers
DDL triggers

Design a troubleshooting and optimisation solution
Troubleshoot and resolve concurrency issues

Examine deadlocking issues using the SQL server logs and trace flags; design a reporting database infrastructure, including replicated databases; monitor concurrency, including Dynamic Management Views (DMV); diagnose blocking, including live locking and deadlocking; diagnose waits; use Extended Events; implement query hints to increase concurrency

Design a monitoring solution at the instance level
Design auditing strategies, including Extended Events, Event traces, SQL Audit, Profiler-scheduled or event-based maintenance, Performance Monitor and DMV usage; set up file and table growth monitoring; collect performance indicators and counters; create jobs to monitor server health; audit using Windows

Preparation resources
KILL (Transact-SQL)
SQL Server audit (database engine)

MCTS Training, MCITP Trainnig
Best Microsoft MCTS Certification, Microsoft 70-459 Training at certkingdom.com


QUESTION 1
You need to configure the ProcessUpdateProc stored procedure to stop running in the event of a
failure of one of the UPDATE statements.
How should you modify the ProcessUpdateProc stored procedure?

A. By configuring the SET NOCOUNT to on.
B. By configuring the SET NOEXEC option to on.
C. By configuring the XACT_ABORT option to on.
D. By configuring the XACT_ABORT option to off.

Answer: C

Explanation:


QUESTION 2
You need to design a solution to that enables the recovery of the DailyReportsTemp database in
less than one hour in the event of a storage hardware failure. Your solution must minimize costs.
What should you recommend?

A. SQL Server Failover Clustering
B. Peer-to-peer replication
C. Differential backups
D. Log shipping
E. Database snapshots

Answer: D

Explanation:


QUESTION 3
You need to recommend a solution to meet the recovery requirements for the Manufacturing
database. Your solution must minimize costs.
What should you recommend?

A. Database snapshots
B. Transaction log backups.
C. Differential backups
D. SQL Server Failover Clustering
E. Peer-to-peer replication

Answer: A

Explanation:


QUESTION 4
You need to address the backup issues of the Sales database.
How can you reduce the time it takes to back up the Sales database?

A. By configuring table partitioning.
B. By configuring filegroups.
C. By configure the Resource Governer
D. By configuring Copy-Only backups.

Answer: B

Explanation:


QUESTION 5
You need to provide a group of users from the IT and Manufacturing departments the minimum
administrative rights to view database information and server state for the Manufacturing database
on MainDB1.
What should you do?

A. You should configure a Database Role.
B. You should configure a Server Role.
C. You should configure a Shared SQL Server Login.
D. You should configure a Local Security Group.

Answer: B

Explanation: