Friday, June 30, 2017

Exam RC0-N06 CompTIA Network+ Recertification Exam for Continuing Education

Eligibility Candidates MUST have:
An active Network+ CE certification earned by passing exam N10-005 or earlier.
Received an email from CompTIA containing a Private Access Code (PAC).

Exam Description
The CompTIA Network+ Recertification Exam covers these domains:

1.0 Network Architecture (17% of total)
2.0 Network Operations (15% of total)
3.0 Network Security (20% of total)
4.0 Troubleshooting (28% of total)
5.0 Industry standards, practices, and network theory (20% of total)

Number of Questions 45
Type of Questions Multiple choice questions (single and multiple response)
Length of Test 75 Minutes
Passing Score 7​20 (on a scale of 100-900)

Only candidates with an active Network+ CE certification will receive CEU credit.
Passing the exam will automatically renew your existing Network+ CE. Please allow 1-3 days for your record to be updated.
INTRODUCTION
The  CompTIA Network

Re certification  Exam is one way for CompTIA certified professionals to keep their Network+ certification active. A CompTIA Network+ certification earned on or after January 1st, 2011 is valid for three years from the date the certification was earned. The certification must be renewed within three years in order for the individual to remain certified. To remain certified, individuals may:

Re-take (and pass) the current certification exam (N10-006)
Participate in continuing education activities

Take (and pass) the Network+ recertification exam (RC0-N06)

The CompTIA Network+ Recertification Exam RC0-N06 bridges the competencies measured by the Network+ N10-005 series and the N10-006 series. The exam (RC0-N06) blueprint includes the objectives new to the N10-006 series and also assesses the highest weighted competencies that appear on the exam (i.e., the knowledge and skills rated by SMEs as most relevant for on-the-job -performance).

NOTE: Availability of RC0-N06 is LIMITED TO THOSE who have kept their Network+ certification active and have not taken and passed the current N10-006 series exam.
CompTIA Network+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives. The following CompTIA Network+ Recertification RC0-N06 exam objectives result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an entry-level IT technical support professional.

This examination blueprint includes domain weighting, test objectives, and example content. Example topics and concepts are included to clarify the test objectives and should not be construed as a
comprehensive listing of all the content of this examination.

Candidates are encouraged to use this document to guide their studies. The table below lists the domains measured by this examination and the extent to which they are represented. The CompTIA Network+ RC0-N06 exam is based on these objectives

QUESTION 1 - (Topic 1)
A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?

A. 10.0.0.1
B. 127.0.0.1
C. 172.16.1.1
D. 192.168.1.1

Answer: B

Explanation:
The loopback address is a special IP address that is designated for the software loopback interface of a computer. The loopback interface has no hardware associated with it, and it
is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which willpoint back to the computer's TCP/IP network configuration.
In IPv4, the loopback address is 127.0.0.1.
In IPv6, the loopback address is 0:0:0:0:0:0:0:1, more commonly notated as follows. ::1


QUESTION 2 - (Topic 1)
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?

A. Leases
B. Helper addresses
C. Scopes
D. Reservations

Answer: D

Explanation:
A reservation is used in DHCP to ensure that a computer always receives the same IP address. To create a reservation, you need to know the hardware MAC address ofthe network interface card that should receive the IP address.
For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always get 192.168.0.7 as its IP address, you can map the MAC address of Server1 with the IP address to configure reservation.


QUESTION 3 - (Topic 1)
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?

A. /24
B. /32
C. /28
D. /29
E. /30

Answer: E

Explanation:
An IPv4 addressconsists bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines how many bits form the network address and from that, we can calculate how many bits are used for the host addresses.
In this question, the /30 subnet mask dictates that the first 30 bits of the IP address are used for network addressing and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n - 2. The "n" in the host's formula represents the number of bits used for host addressing. If we apply the formula (22 – 2), a /30 subnet mask will provide 2 IP addresses.


QUESTION 4 - (Topic 1)
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

A. Multilayer switch
B. Access point
C. Analog modem
D. DOCSIS modem

Answer: C

Explanation:
Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By today’s standards, analog modems are very slow typically offering a maximum bandwidth Kbps.
An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computerto an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer.
An analog modem uses an RJ-11 connector to connect to a phone line (POTS)in the same way a phone does.


QUESTION 5 - (Topic 1)
A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?

A. APIPA
B. MAC
C. Static
D. Public

Answer: A

Explanation:
APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems. When a client computer is configured to use automatic addressing (DHCP), APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is unavailable.
When a client computer configured to use DHCP boots up, it first looks for a DHCP server to provide the client with IP address and subnet mask. If the client is unable to contact a DHCP server, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft. The client also configures itself with a default class Bsubnet mask .255.0.0. The client will use the self-configured IP address until a DHCP server becomes available.


QUESTION 6 - (Topic 1)
A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement?

A. Star
B. Bus
C. Ring
D. Mesh

Answer: C

Explanation:
Token Ring networks are quite rare today. Token Ring networks use the ring topology. Despite being called a Ring topology, the ring is logical and the physical network structure often forms a ‘star’ topology with all computers on the network connecting to a central multistation access unit (MAU). The MAU implements the logical ring by transmitting signals to each node in turn and waiting for the node to send them back before it transmits to the next node. Therefore, although the cables are physically connected in a star, the data path takes the form of a ring. If any computer or network cable fails in a token ring network, the remainder of the network remains functional. The MAU has the intelligence to isolate the failed segment.
To ensure that the computers need to wait to talk on the network to avoid congestions, a Token Ring network uses a ‘token’. The token continually passes around the network until a computer needs to send data. The computer then takes the token and transmits the data beforereleasing the token. Only a computer in possession of the token can transmit data onto the network.

Saturday, June 24, 2017

C2090-560 PureData System for Analytics v7.1

Test information:
Number of questions: 67
Time allowed in minutes: 90
Required passing score: 63%
Languages: English, Japanese

Section 1 Database Design
Ability to design, create and manage databases and database objects (tables, views, etc.)
Ability to create and manage users and groups
Knowledge of the Netezza schema concept
Demonstrate the ability to design, implement and maintain materialilzed views
Knowledge of the benefits of clustered based tables
Demonstrate knowledge and application of sequences
Demonstrate knowledge of zone maps
Demonstrate knowledge of and application of data types
Demonstrate knowledge of table defaults and constraints

Section 2 Physical Optimization
Demonstrate knowledge of data distribution and skew
Ability to select an appropriate data distribution key
Knowledge of PureData System for Analytics implementation of temporary tables
Demonstrate knowledge of optimizer settings
Abilty to maintain statistics and knowledge of impact on performance
Demonstrate the abillity to correctly size system for capacity planning
Abilty to utlize groom table feature and knowledge of impact on performance and storage

Section 3 Netezza Appliance Components
Knowledge of the TwinFin architecture and disks/dataslices
Ability to identify the number of disks/dataslices on a system
Knowledge of the appliance architecture (FPGA, SPU, Disk Array, etc.)

Section 4 High Availability Architecture
Demonstrate knowledge of Linux High Availability (HA) and Distributed Replicated Block Device (DRDB)
Knowledge of behavior of nzLoad and query processing with a state change (host, disk, blade)

Section 5 Security
Knowledge of access/priviledge database objects
Knowledge of using Lightweight Directory Access Protocol (LDAP)�
Knowledge of Linux system administration�
Knowledge of ODBC/JDBC in a Unix or Windows environment and OLE-DE connectivity
Knowledge of new cryptographics mode and Row Secure Tables

Section 6 Data Movement
Demonstrate ability to use external tables in loading and unloading data
Demonstrate ability to use backup/restore utilities
Demonstrate ability to perform inserts (external tables vs cross system)
Demonstrate ability to design cross database access
Demonstrate ability to use nzload

Section 7 Monitoring and Performance
Demonstrate knowledge of log files
Demonstrate knowledge of locks with update, delete, insert, and select
Demonstrate knowledge of transactions that use temporary tables
Demonstrate knowledge of system views
Describe alerts
Describe data flow and life of a query
Demonstrate knowledge of compression
Demonstrate knowledge of broadcasts and co-location/redistribute
Demonstrate knowledge of data skew
Analyzing Query Plan Files (Explain plans vs execution plans; Joins (expression based, cross product, merge, hash joins); recognizing the correct query plan (original vs executing))
Performance Tuning (Multiple Snippets (Data Restrict Optimization); Snippets Limiter; Invisible Columns)

Section 8 Troubleshooting
Demonstrate knowledge of directory location (log files)
Demonstrate knowledge of nzdumpschema
Demonstrate knowledge of Event Manager Changes

Section 9 Operations
Ability to manage the system using the command line interface
Demonstrate knowledge of NZ_ defaults settings

Query History (Enablement, management, selection tables, configuration files, staging, notifications)
Software Support Toolkit (common tasks - migration, table movement)
Backup and Recovery
Replication
System Health Check (basic and advanced)
Demonstrate knowledge to administer BI and Analytic functionality

Section 10 Transaction Management
Serialization issues
Data Columns (housekeeping) (CreateXID, DeleteXID, RowID)
Unreferencable rows

Section 11 Workload Management
GRA (Guarenteed Resource Allocation)
PQE (Priority Query Execution)
SQB (Short Query Bias)
Virtual Tables
New features (7.1 and later)�
Scheduler Rules

IBM Certified Specialist - PureData System for Analytics v7.1

Job Role Description / Target Audience
An IBM Certified Specialist drives the design, implementation and support applications on the PureData System for Analytics platform. This individual has experience designing a PureData System for Analytics in accordance with best practices of ETL, BI, data modeling, and analytical solution.

Recommended Prerequisite Skills
Knowledge and experience managing IBM PureData System for Analytics Platform applications
Knowledge of SQL fundamentals within IBM PureData System for Analytics Platform applications
Experience in data warehouse industry best practices
Basic understanding of Linux and UNIX


QUESTION 1
What are the minimum permissions required to install an IBM Tivoli Endpoint Manager (TEM) Relay from the TEM Console?

A. TEM Operator
B. Local Administrator
C. Domain Administrator
D. TEM Master Operator

Answer: A


QUESTION 2
What is an IBM Tivoli Endpoint Manager analysis?

A. It allows viewing of various client properties.
B. It allows changing of various client properties.
C. It is a task used to analyze the status of the clients.
D. It is a Fixlet used to analyze the status of the clients.

Answer: A


QUESTION 3
What statement is correct when assigning roles to Active Directory security groups in IBM Tivoli Endpoint Manager Web Reports?

A. Security groups can be assigned any role.
B. Security groups can only be assigned the role Normal.
C. Security groups can only be assigned the role Read-only.
D. Security groups can only be assigned the role Administrator.

Answer: A


QUESTION 4
Which statement is true about Relay Affiliation group names?

A. The names are case sensitive.
B. Names must start with a double underscore.
C. Names must not use a relay machine name.
D. Any naming scheme can be set up by an administrator.

Answer: D


QUESTION 5
Why would an IBM Tivoli Endpoint Manager (TEM) administrator use the task relay setting Name Override?

A. to provide an alternate domain name for the agent connections to a relay
B. to have the relay report a different name to the server to avoid name collision with another relay
C. to have the relay display a different name in the TEM Console than its default name so it can be grouped with other relays
D. to have the relay use a different domain name so it can be part of a Managed Service Point segmented customer environment

Answer: A

Friday, June 2, 2017

Exam 70-346 Managing Office 365 Identities and Requirements

Published: February 17, 2014
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Japanese, Portuguese (Brazil), Spanish
Audiences: IT professionals
Technology: Microsoft Office 365
Credit toward certification: MCP, MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of June 30, 2016, this exam includes content covering the latest updates and features of Office 365. To learn more about these changes and how they affect the skills measured, please download and review the exam 70-346 change document.

Provision Office 365 (15–20%)
Provision tenants
Configure the tenant name, tenant region, initial global administrator; manage tenant subscriptions; manage the licensing model; configure tenant for new features and updates
Add and configure custom domains
Specify domain name, confirm ownership, specify domain purpose, set default domain, and move ownership of DNS to Office 365
Plan a pilot
Designate pilot users; identify workloads that don’t require migration; run the Office 365 Health, Readiness, and Connectivity Checks; run IdFix; create a test plan or use case, and connect existing email accounts for pilot users; understand service descriptions and planning to onboard users to Office 365; configure connected accounts

Plan and implement networking and security in Office 365 (15–20%)
Configure DNS records for services
Create DNS records for Exchange Online, Skype for Business Online, and SharePoint Online
Enable client connectivity to Office 365
Configure proxy to allow client access to Office 365 URLs, configure firewalls for outbound port access to Office 365, recommend bandwidth, configure Internet connectivity for clients, deploy desktop setup for previous versions of Office clients
Administer Microsoft Azure Rights Management (RM)
Activate rights management, configure Office integration with rights management, assign roles for rights management, enable recovery of protected documents
Manage administrator roles in Office 365
Implement a permission model; create or revoke assignment of administrative roles or the administrative model; determine and assign global administrator, billing administrator, user administrator, and delegated administrator; control password resets

Preparation resources
Create DNS records for Office 365 when you manage your DNS records
Assigning admin roles in Office 365

Manage cloud identities (15–20%)
Configure password management
Set expiration policy, password complexity, password resets in Administration Center
Manage user and security groups
Import users using bulk import (CSV), soft delete, Administration Center, and multi-factor authentication
Manage cloud identities with Windows PowerShell
Configure passwords to never expire, bulk update of user properties, bulk user creation, Azure Active Directory cmdlets, bulk user license management, hard delete users

Preparation resources
Password policy for Office 365
User account management
Manage Azure AD using Windows PowerShell

Implement and manage identities by using Azure AD Connect (15–20%)
Prepare on-premises Active Directory for Azure AD Connect
Plan for non-routable domain names, clean up existing objects, plan for filtering Active Directory, implement support for multiple forests
Set up Azure AD Connect tool
Implement soft match filtering and identify synchronized attributes, password sync, and installation requirements
Manage Active Directory users and groups with Azure AD Connect in place
Delete (soft delete), create, modify users and groups with Azure AD Connect in place, schedule and force synchronization

Preparation resources
Prepare for directory synchronization
Synchronize your directories

Implement and manage federated identities for single sign-on (SSO) (15–20%)

Plan requirements for Active Directory Federation Services (AD FS)
Plan namespaces and certificates, plan AD FS internal topologies and dependencies, plan WAP/AD FS proxy topologies, network requirements, multi-factor authentication, and access filtering using claims rules
Install and manage AD FS servers
Create AD FS service account, configure farm or stand-alone settings, add additional servers, convert from standard to federated domain, manage certificate lifecycle
Install and manage WAP/AD FS proxy servers
Set up perimeter network name resolution, install required Windows roles and features, set up certificates, configure WAP/AD FS proxy settings, set custom proxy forms login page, switch between federated authentication and password sync

Preparation resources

Plan your AD FS deployment
Checklist: Use AD FS to implement and manage single sign-on
Administering Office 365 Jump Start (03): DirSync, SSO, and AD FS

Monitor and troubleshoot Office 365 availability and usage (15–20%)

Analyze reports
Analyze service reports, mail protection reports, analyze Office 365 audit log reports, analyze portal email hygiene reports
Monitor service health
Monitor health using RSS feed, use service health dashboard (including awareness of planned maintenance, service updates, and historical data), Office 365 Management Pack for System Center Operations Manager, and Windows PowerShell cmdlets
Isolate service interruption
Create a service request; determine connection issues using the Microsoft Remote Connectivity Analyzer (RCA), Microsoft Lync Connectivity Analyzer tool, and Microsoft Connectivity Analyzer tool; determine availability issues using the hybrid free/busy troubleshooter; determine client configuration issues using Office 365 Client Performance Analyzer and Microsoft Support and Recovery Assistant for Office 365

Preparation resources
Reporting features and troubleshooting tools
Service health
QUESTION 1
An organization plans to migrate to Office 365.
You need to estimate the post-migration network traffic.
Which tool should you use?

A. Lync 2013 Bandwidth Calculator
B. Process Monitor
C. Microsoft Network Monitor
D. Microsoft OnRamp Readiness tool

Answer: A

Explanation:
Office 365 includes Lync 2013.
With this latest version of the Microsoft Lync Server 2010 and 2013 Bandwidth Calculator, you can enter information about your users and the Lync Server features that you want to deploy, and the Bandwidth Calculator will determine bandwidth requirements for the WAN that connects sites in your deployment. The accompanying Bandwidth Calculator User Guide describes the recommended process for estimating your WAN bandwidth needs for Lync client real-time traffic.
Reference: Lync Server 2010 and 2013 Bandwidth Calculator Version 2.0
http://blogs.technet.com/b/nexthop/archive/2013/06/07/lync-server-2010-and-2013-
bandwidth-calculator-version-2-0.aspx

QUESTION 2
A company has an Office 365 tenant that has an Enterprise E1 subscription. The company has offices in several different countries.
You need to restrict Office 365 services for existing users by location.
Which Windows PowerShell cmdlet should you run?

A. Set-MsolUser
B. Redo-MsolProvisionUser
C. Set-MsolUserLicense
D. Set-MsolUserPrincipalName
E. Convert-MsolFederatedUser
F. Set-MailUser
G. Set-LinkedUser
H. New-MsolUser

Answer: A

Explanation:
The Set-MsolUser cmdlet is used to update a user object.
Example: The following command sets the location (country) of this user. The country must be a two-letter ISO code. This can be set for synced users as well as managed users. Set-MsolUser -UserPrincipalName user@contoso.com -UsageLocation "CA"
Note:
Some organizations may want to create policies that limit access to Microsoft Office 365 services, depending on where the client resides.
Active Directory Federation Services (AD FS) 2.0 provides a way for organizations to configure these types of policies. Office 365 customers using Single Sign-On (SSO) who require these policies can now use client access policy rules to restrict access based on the location of the computer or device that is making the request. Customers using Microsoft Online Services cloud User IDs cannot implement these restrictions at this time.
Reference: Limiting Access to Office 365 Services Based on the Location of the Client https://technet.microsoft.com/en-us/library/hh526961(v=ws.10).aspx
Reference: Set-MsolUser https://msdn.microsoft.com/en-us/library/azure/dn194136.aspx