Sunday, March 27, 2016

300-101 ROUTE Implementing Cisco IP Routing

Exam Number 300-101 ROUTE
Associated Certifications CCNP Routing and Switching CCDP
Duration 120 minutes (45-65 questions)

Implementing Cisco IP Routing (ROUTE 300-101) is a qualifying exam for the Cisco CCNP Routing and Switching and CCDP certifications. The ROUTE 300-101 exam certifies the routing knowledge and skills of successful candidates. They are certified in using advanced IP addressing and routing in implementing scalable and highly secure Cisco routers that are connected to LANs, WANs, and IPv6.

The exam also covers the configuration of highly secure routing solutions to support branch offices and mobile workers.

Exam Description
Implementing Cisco IP Routing (ROUTE 300-101) is a 120-minute qualifying exam with 50‒60 questions for the Cisco CCNP Routing and Switching and CCDP certifications. The ROUTE 300-101 exam certifies the routing knowledge and skills of successful candidates. They are certified in using advanced IP addressing and routing in implementing scalable and highly secure Cisco routers that are connected to LANs, WANs, and IPv6.

The exam also covers the configuration of highly secure routing solutions to support branch offices and mobile workers.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Subscribe to Cisco Learning Network Premium and access the most comprehensive e-learning training, resources and tools you’ll need to prepare for your CCENT, CCNA and CCNP Routing and Switching certifications.

1.0 Network Principles 10%
1.1 Identify Cisco Express Forwarding concepts
1.1.a FIB
1.1.b Adjacency table

1.2 Explain general network challenges
1.2.a Unicast
1.2.b Out-of-order packets
1.2.c Asymmetric routing

1.3 Describe IP operations
1.3.a ICMP Unreachable and Redirects
1.3.b IPv4 and IPv6 fragmentation
1.3.c TTL

1.4 Explain TCP operations
1.4.a IPv4 and IPv6 (P)MTU
1.4.b MSS
1.4.c Latency
1.4.d Windowing
1.4.e Bandwidth-delay product
1.4.f Global synchronization

1.5 Describe UDP operations
1.5.a Starvation
1.5.b Latency

1.6 Recognize proposed changes to the network
1.6.a Changes to routing protocol parameters
1.6.b Migrate parts of the network to IPv6
1.6.c Routing protocol migration

2.0 Layer 2 Technologies 10%
2.1 Configure and verify PPP
2.1.a Authentication (PAP, CHAP)
2.1.b PPPoE (client side only)
2.2 Explain Frame Relay
2.2.a Operations
2.2.b Point-to-point
2.2.c Multipoint

3.0 Layer 3 Technologies 40%
3.1 Identify, configure, and verify IPv4 addressing and subnetting

3.1.a Address types (Unicast, broadcast, multicast, and VLSM)
3.1.b ARP
3.1.c DHCP relay and server
3.1.d DHCP protocol operations

3.2 Identify IPv6 addressing and subnetting

3.2.a Unicast
3.2.b EUI-64
3.2.c ND, RS/RA
3.2.d Autoconfig (SLAAC)
3.2.e DHCP relay and server
3.2.f DHCP protocol operations

3.3 Configure and verify static routing

3.4 Configure and verify default routing

3.5 Evaluate routing protocol types

3.5.a Distance vector
3.5.b Link state
3.5.c Path vector

3.6 Describe administrative distance

3.7 Troubleshoot passive interfaces

3.8 Configure and verify VRF lite

3.9 Configure and verify filtering with any protocol

3.10 Configure and verify redistribution between any routing protocols or routing sources

3.11 Configure and verify manual and autosummarization with any routing protocol

3.12 Configure and verify policy-based routing

3.13 Identify suboptimal routing

3.14 Explain ROUTE maps

3.15 Configure and verify loop prevention mechanisms

3.15.a Route tagging and filtering
3.15.b Split-horizon
3.15.c Route poisoning

3.16 Configure and verify RIPv2

3.17 Describe RIPng

3.18 Describe EIGRP packet types

3.19 Configure and verify EIGRP neighbor relationship and authentication

3.20 Configure and verify EIGRP stubs

3.21 Configure and verify EIGRP load balancing

3.21.a Equal cost
3.21.b Unequal cost

3.22 Describe and optimize EIGRP metrics

3.23 Configure and verify EIGRP for IPv6

3.24 Describe OSPF packet types

3.25 Configure and verify OSPF neighbor relationship and authentication

3.26 Configure and verify network types, area types, and router types

3.26.a Point-to-point, multipoint, broadcast, nonbroadcast
3.26.b LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
3.26.c Internal router, backbone router, ABR, ASBR
3.26.d Virtual link

3.27 Configure and verify OSPF path preference

3.28 Configure and verify OSPF operations

3.29 Configure and verify OSPF for IPv6

3.30 Describe, configure, and verify BGP peer relationships and authentication

3.30.a Peer group
3.30.b Active, passive
3.30.c States and timers

3.31 Configure and verify eBGP (IPv4 and IPv6 address families)

3.31.a eBGP
3.31.b 4-byte AS number
3.31.c Private AS

3.32 Explain BGP attributes and best-path selection

4.0 VPN Technologies 10%

4.1 Configure and verify GRE

4.2 Describe DMVPN (single hub)

4.3 Describe Easy Virtual Networking (EVN)

5.0 Infrastructure Security 10%

5.1 Describe IOS AAA using local database

5.2 Describe device security using IOS AAA with TACACS+ and RADIUS

5.2.a AAA with TACACS+ and RADIUS
5.2.b Local privilege authorization fallback

5.3 Configure and verify device access control

5.3.a Lines (VTY, AUX, console)
5.3.b Management plane protection
5.3.c Password encryption

5.4 Configure and verify router security features

5.4.a IPv4 access control lists (standard, extended, time-based)
5.4.b IPv6 traffic filter
5.4.c Unicast reverse path forwarding

6.0 Infrastructure Services 20%

6.1 Configure and verify device management

6.1.a Console and VTY
6.1.b Telnet, HTTP, HTTPS, SSH, SCP
6.1.c (T)FTP

6.2 Configure and verify SNMP

6.2.a v2
6.2.b v3

6.3 Configure and verify logging

6.3.a Local logging, syslog, debugs, conditional debugs
6.3.b Timestamps

6.4 Configure and verify Network Time Protocol (NTP)

6.4.a NTP master, client, version 3, version 4
6.4.b NTP authentication

6.5 Configure and verify IPv4 and IPv6 DHCP

6.5.a DHCP client, IOS DHCP server, DHCP relay
6.5.b DHCP options (describe)

6.6 Configure and verify IPv4 Network Address Translation (NAT)

6.6.a Static NAT, dynamic NAT, PAT

6.7 Describe IPv6 NAT

6.7.a NAT64
6.7.b NPTv6

6.8 Describe SLA architecture

6.9 Configure and verify IP SLA

6.9.a ICMP

6.10 Configure and verify tracking objects

6.10.a Tracking objects
6.10.b Tracking different entities (for example, interfaces, IPSLA results)

6.11 Configure and verify Cisco NetFlow

6.11.a NetFlow v5, v9
6.11.b Local retrieval
6.11.c Export (configuration only)

QUESTION 1
Which three problems result from application mixing of UDP and TCP streams within a network with no QoS? (Choose three.)

A. starvation
B. jitter
C. latency
D. windowing
E. lower throughput

Answer: A,C,E


QUESTION 2
Which statement about the use of tunneling to migrate to IPv6 is true?

A. Tunneling is less secure than dual stack or translation.
B. Tunneling is more difficult to configure than dual stack or translation.
C. Tunneling does not enable users of the new protocol to communicate with users of the old protocol without dual-stack hosts.
D. Tunneling destinations are manually determined by the IPv4 address in the low-order 32 bits of IPv4-compatible IPv6 addresses.

Answer: C


QUESTION 3
Which two actions must you perform to enable and use window scaling on a router? (Choose two.)

A. Execute the command ip tcp window-size 65536.
B. Set window scaling to be used on the remote host.
C. Execute the command ip tcp queuemax.
D. Set TCP options to "enabled" on the remote host.
E. Execute the command ip tcp adjust-mss.

Answer: A,B


QUESTION 4
A network administrator executes the command clear ip route. Which two tables does this command clear and rebuild? (Choose two.)

A. IP routing
B. FIB
C. ARP cache
D. MAC address table
E. Cisco Express Forwarding table
F. topology table

Answer: A,B


QUESTION 5
Under which condition does UDP dominance occur?

A. when TCP traffic is in the same class as UDP
B. when UDP flows are assigned a lower priority queue
C. when WRED is enabled
D. when ACLs are in place to block TCP traffic

Answer: A

Monday, March 21, 2016

Exam 70-345 Designing and Deploying Microsoft Exchange Server 2016 (beta)

Published: January 8, 2016
Languages: English
Audiences: IT professionals
Technology: Microsoft Exchange Server 2016
Credit toward certification: MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft
Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Plan, deploy, manage, and troubleshoot mailbox databases (15–20%)
Plan, deploy, and manage mailbox databases
Plan for database size and storage performance requirements, plan mailbox database capacity and placement, plan archive mailboxes capacity and placement, plan modern public folder capacity and placement, plan for storage architecture (SAN, DAS, RAID, JBOD), plan file system requirements, plan for auto reseed, plan for virtualization requirements and scenarios, validate storage design by running JetStress, create and configure mailbox databases, manage mailbox databases, configure transaction log properties and file placement
Plan, deploy, and manage high-availability solutions for mailbox databases
Identify failure domains; plan a solution that meets SLA requirements around scheduled downtime; plan for software updates and server maintenance; plan for change management; create, configure, and manage Database Availability Groups (DAGs); create, configure, and manage DAG networks; create, configure, and manage proper placement of a file share witness (FSW); create and configure mailbox database copies; create, configure, and manage Azure file share witness (FSW); create, configure, and manage Azure DAG members
Plan, deploy, and manage a site-resilient Database Availability Group (DAG)
Recommend quorum options with given customer requirements; plan, create, and configure cross-site DAG configuration; plan, deploy, and configure Datacenter Activation Coordination (DAC); configure and manage proper placement of an alternate file share witness (FSW); test and perform site recovery
Monitor and troubleshoot mailbox databases
Monitor mailbox database replication and content indexing, troubleshoot mailbox database replication and replay, troubleshoot mailbox database copy activation, troubleshoot mailbox database performance, troubleshoot database failures (e.g., repair, defrag, recover), resolve quorum issues, troubleshoot data center activation
Plan, deploy, and manage backup and recovery solutions for mailbox databases
Plan most appropriate backup solution that meets SLA requirements of recovery point objectives and recovery time objectives; deploy, configure, and manage lagged mailbox database copies; recover an Exchange Server, mailbox database, mailbox, public folder, or mail item; recover the public folder hierarchy; perform a dial tone restore

Plan, deploy, manage, and troubleshoot client access services (15–20%)
Plan, deploy, and manage client access services
Plan namespaces for client connectivity; plan proxy and redirection requirements; plan and deploy certificates; plan and configure authentication (including FBA, Basic, NTLM, and Kerberos); plan, deploy, and configure Autodiscover, Outlook Anywhere, Outlook MAPI over HTTP, Exchange Web Services, Outlook on the Web, Exchange Admin Center, Exchange ActiveSync, POP3, and IMAP4; plan, deploy, and configure Office Online Servers (OOS); plan, create, and configure Offline Address Book (OAB); plan, create, and configure hierarchical address lists; plan, deploy, and configure address book policies
Plan, deploy, and manage mobility solutions
Plan, deploy, and configure OWA for Devices, Outlook for the Web policies, and mobile device mailbox policies; plan, deploy, and configure Allow Block Quarantine (ABQ); plan, deploy, and configure Office Apps
Plan, deploy, and manage load balancing
Configure namespace load balancing, plan for differences between layer seven and layer four load balancing methods
Monitor and troubleshoot client connectivity
Troubleshoot Outlook Anywhere connectivity, troubleshoot Outlook MAPI over HTTP connectivity, troubleshoot Exchange Web Services (EWS), troubleshoot Outlook on the Web, troubleshoot POP3 and IMAP4, troubleshoot authentication, troubleshoot Autodiscover, troubleshoot Exchange ActiveSync, troubleshoot proxy and redirection issues
Plan, deploy, and manage a site-resilient client access services solution
Plan site-resilient namespaces, configure site-resilient namespace URLs, perform and test steps for site failover and switchover, plan certificate requirements for site failovers, manage expected client behavior during a failover and switchover

Plan, deploy, manage, and troubleshoot transport services (15–20%)
Plan, deploy, and manage transport services
Plan a solution that meets SLA requirements around message delivery; plan inter-site mail flow; plan inter-org mail flow; plan, deploy, and configure redundancy for intra-site scenarios; plan and configure for SafetyNet; plan and configure for shadow redundancy; plan and configure for redundant MX records; plan, create, and configure TLS transport, Edge transport, Send/Receive connectors, transport rules, accepted domains, email address policies, and Address Rewriting
Troubleshoot and monitor transport services
Interpret message tracking logs and protocol logs; troubleshoot a shared namespace environment; troubleshoot SMTP mail flow; given a failure scenario, predict mail flow and identify how to recover; troubleshoot TLS; troubleshoot the new transport architecture
Plan, deploy, and manage message hygiene
Plan and configure malware filtering, plan and configure connection filtering, plan and configure spam filtering, plan and configure recipient filtering, plan and configure Sender Policy Framework, plan and configure Spam Confidence Level (SCL) thresholds
Plan, deploy, and manage site resilience transport services
Plan, create and configure MX records for failover scenarios; manage resubmission and reroute queues; plan, create, and configure Send/Receive connectors for site resiliency; test and perform steps for transport failover and switchover

Plan, deploy, and manage an Exchange infrastructure, recipients, and security (15–20%)
Plan and configure Active Directory (AD) Domain Services for Exchange and Organizational settings
Plan the number of domain controllers, plan placement of Global Catalog (GC), plan and configure DNS changes required for Exchange, plan for schema changes required for Exchange, prepare AD for Exchange, prepare domains for Exchange, plan and configure Active Directory site topology, plan and configure throttling policies
Create and configure mail-enabled objects
Create and configure mailboxes, create and configure resource mailboxes and scheduling, create and configure shared mailboxes, create and configure mail-enabled users and contacts, create and configure distribution lists, configure moderation, create and configure linked mailboxes, create and configure modern public folders
Manage mail-enabled object permissions
Determine when to use Send-As and Send-On-Behalf permissions, configure mailbox folder permissions, configure mailbox permissions, set up room mailbox delegates, configure auto-mapping, create and configure public folder permissions
Plan, deploy, manage, and troubleshoot Role Based Access Control (RBAC)
Determine appropriate RBAC roles and cmdlets, limit administration using existing role groups, evaluate differences between RBAC and Active Directory split permissions, plan and configure a custom-scoped role group, plan and configure delegated setup, plan and create unscoped top-level roles, troubleshoot RBAC, plan and configure user assignment policies
Plan an appropriate security strategy
Plan and configure BitLocker, plan and configure S/MIME
Plan, deploy, manage, and troubleshoot IRM with Active Directory Rights Management Services (AD RMS) or Azure RMS
Plan and configure Information Rights Management (IRM) in Exchange, create an RMS template, plan and create transport protection rules, plan and create Outlook protection rules, plan and configure journal report decryption, plan and configure IRM for eDiscovery, plan and configure pre-licensing for client access, troubleshoot failed IRM protection

Plan, deploy, and manage compliance, archiving, eDiscovery, and auditing (10–15%)
Plan and configure Data Loss Prevention (DLP) solutions
Plan a DLP solution to meet business requirements, plan and configure pre-built rules, plan and create custom rules, plan and configure custom DLP policies, plan and configure DLP fingerprinting
Plan, configure, and manage Archiving and Message Records Management (MRM)
Plan and configure retention policies; plan, create, and configure custom tags; assign policies to users; plan and configure the Managed Folder Assistant; remove and delete tags; plan and configure online archiving (Office 365); plan and create archive policies; plan and configure in-place archiving
Plan, configure, and perform eDiscovery
Plan and delegate RBAC roles for eDiscovery; enable a legal/litigation hold; perform a query-based InPlace hold; perform multi-mailbox searches in Exchange Administration Center (EAC) and Exchange Management Shell; integrate InPlace federated searches with Microsoft SharePoint Discovery center
Plan, configure, and manage a compliance solution
Plan and configure MailTips; plan, create, configure, and deploy message classifications; plan and configure transport rules to meet specified compliance requirements; plan and configure journaling
Plan, manage, and use mailbox and administrative auditing
Plan and configure mailbox audit logging, plan and configure administrative audit logging, search and interpret all audit logs

Implement and manage coexistence, hybrid scenarios, migration, and federation (10–15%)
Plan, deploy, and troubleshoot coexistence with Office 365 (Exchange Online)
Plan, deploy, and manage hybrid configuration; evaluate limitations of the Hybrid Configuration Wizard; plan and manage hybrid deployment OAuth-based authentication; plan and configure certificate and firewall requirements for Exchange Hybrid setup; troubleshoot transport with Exchange Online; troubleshoot client access with Exchange Online; troubleshoot directory synchronization
Plan, deploy, manage, and troubleshoot Exchange federation
Plan, create, and manage federation trusts with Microsoft federation gateways; manage sharing policies; manage organization relationships; plan and create certificate and firewall requirements for federation; troubleshoot Exchange federation trust and organization relationships; troubleshoot cross-forest availability
Plan, deploy, and troubleshoot on-premises coexistence with earlier supported versions of Exchange
Plan, create, and configure namespaces for coexistence; plan and configure proxy redirect; plan firewall configuration for coexistence; plan and configure for mail flow requirements; plan for mailbox migrations; troubleshoot transport in coexistence; troubleshoot client access in coexistence
Migrate from earlier supported versions of Exchange
Determine transition paths to Exchange, migrate to modern public folders, migrate mailboxes, plan for discontinued features, transition and decommission servers, troubleshoot Mailbox Replication Services

Who should take this exam?
This exam is designed for candidates who have a minimum of three years of experience designing and managing Exchange Server and who are responsible for the Exchange Server 2016 messaging environment in an enterprise environment. They are IT consultants or senior administrators who act as the technical lead over a team of administrators. Candidates should be familiar with the requirements for integrating Microsoft Exchange Server with Skype for Business and Office 365.

Thursday, March 10, 2016

Exam 70-247 Configuring and Deploying a Private Cloud with System Center 2012

Published: April 7, 2014
Languages: English, Japanese
Audiences: IT professionals
Technology: Microsoft System Center 2012 and Microsoft System Center 2012 R2
Credit toward certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Design and deploy System Center (15–20%)
Design a scalable System Center architecture
Planning for capacity, high availability, scalability, business continuity, delegation, and disaster recovery; assess the current datacenter environment; identify the appropriate System Center components for the private cloud implementation
Install the System Center Infrastructure
Install prerequisites required for System Center; install System Center components
Upgrade System Center components
In-place upgrade, side-by-side migration

Preparation resources
Infrastructure planning and design guides for System Center
Upgrade to System Center 2012
Preparing a target computer for System Center 2012 components

Configure System Center infrastructure (20–25%)
Configure System Center components
Configure Data Protection Manager (DPM) storage pools; configure DPM site-to-site replication; configure System Center agents; configure System Center Management Groups; configure System Center data retention; configure Orchestrator watcher nodes; configure Public Key Infrastructure (PKI) for System Center; configure user roles, Run-As accounts, Run-As profiles; configure Service Manager database; configure Operations Manager Gateway
Configure portals and dashboards
App Controller portal; Service Manager self-service portal; Operations Manager dashboards including Application Monitoring dashboards

Preparation resources
Automate private cloud protection and recovery with Microsoft System Center 2012 – Data Protection Manager
Self-service portal deployment scenarios for System Center 2012 – Service Manager
How to install the VMM self-service portal

Configure the fabric (25–30%)
Configure the storage fabric
Classification and pools; providers; arrays; File server cluster; storage pools; file shares
Configure the network fabric
Logical networks; VM networks; IP/MAC resource pools; VIP templates; load balancing; logical switches; network isolation, including network virtualization with Windows Server Gateway; private VLANs and VLANs
Configure and manage the deployment and update servers
Integrate a Windows Server Update Services (WSUS) server into the Virtual Machine Manager fabric; configure and manage a library server; integrate Windows Deployment Services (WDS)/PXE into the Virtual Machine Manager fabric, including virtualization hosts deployment using Windows Deployment Services (WDS)
Configure clouds and virtualization hosts
Clouds and host groups; configure and deploy virtualization hosts

Preparation resources
Configuring Fabric Resources in VMM
Managing your Fabric with System Center Virtual Machine Manager 2012
Workloads: Monitoring the Microsoft Private Cloud Fabric with Microsoft System Center 2012 SP1 – Operations Manager

Configure System Center integration (15–20%)
Configure private cloud integration
Configure Operations Manager connectors; Orchestrator integration packs; Service Manager connectors; SharePoint integration; Configure IP Address Management (IPAM) server integration, configure AppController
Configure integration of private and public clouds
Configure Service Provider Framework (SPF), configure Microsoft Azure Pack for Windows Server

Preparation resources
Integration packs for System Center 2012 – Orchestrator
Creating profiles and templates in VMM
System Center 2012 integration guide

Configure and deploy virtual machines and services (15–20%)
Configure profiles
Configure physical computer profiles, guest operating system profiles, hardware profiles, SQL server profiles, application profiles, capability profiles
Create and configure server App-V packages
Sequence an application, configure App-V package settings; configure and deploy a server App-V agent
Configure and deploy a service
Import and export templates; configure VM templates; configure service templates; deploy a SQL DAC package; deploy a web deploy package; deploy a Server App-V package; create and configure pre-install post-install, and First VM When Created scripts
Update a service
Apply updates to existing VMs (in-place); deploy new VMs with updated settings; update/replace the operating system; update/replace apps; update/replace SQL; scale out service tiers

Preparation resources
Configuring profiles and templates
Server App-V, sequencing and deploying datacenter apps
QUESTION 1
You need to recommend a deployment topology for the PKI. The deployment topology must meet the cloud requirements.
What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.)

A. An online enterprise root certification authority (CA) only
B. An online standalone root certification authority (CA) only
C. An offline root certification authority (CA) and an online enterprise subordinate CA
D. An offline root certification authority (CA) and an online standalone subordinate CA

Answer: C


QUESTION 2
You need to recommend a solution for the management packs. The solution must meet the cloud requirements.
What should you recommend? (More than one answer choice may achieve the goal. Select the BEST answer.)

A. Export the management packs, and then modify the settings of the management packs. Seal the management packs, and then import the management packs.
B. Export the management packs, modify the settings of the management packs, and then import the unsealed management packs.
C. Unseal the management packs, and then modify the settings of the management packs.
D. Create a new management pack that contains overrides.

Answer: B


QUESTION 3
You need to recommend a solution to meet the requirements for App2.
What should you include in the recommendation?

A. Active Directory Rights Management Services (AD RMS)
B. Active Directory Federation Services (AD FS)
C. Windows Azure Active Directory Rights Management Services
D. Microsoft Forefront Identity Manager (FIM) 2010 R2

Answer: B


QUESTION 4
You need to recommend the configuration settings for the SQL Server instance that will host the App Controller database. The solution must support the planned changes.
What should you include in the recommendation?

A. Change the database collation.
B. Enable case sensitivity.
C. Disable full-text search.
D. Install the SQL Server Reporting Services (SSRS).

Answer: A

Explanation: To support Simplified Chinese change MS SQL Collation http://msdn.microsoft.com/en-us/library/ms144250(v=sql.105).aspx


QUESTION 5
You need to identify which components must be created to meet the App1 deployment requirements.
Which components should you identify?

A. A service template and a service request template
B. A guest operating system profile and a virtual IP (VIP) template
C. A guest operating system profile and a service request template
D. A service template and a virtual IP (VIP) template

Answer: C