Saturday, 20 June 2015

Microsoft needs SDN for Azure cloud

Microsoft needs SDN for Azure cloud

Couldn't scale without it, Azure CTO says
The Microsoft cloud, through which the company’s software products are delivered, has 22 hyper-scale regions around the world. Azure storage and compute usage is doubling every six months, and Azure lines up 90,000 new subscribers a month.

Six TED Talks that can change your career
Of the hundreds of TED talks available online, many are geared toward helping people view life in a new

Fifty-seven percent of the Fortune 500 use Azure and the number of hosts quickly grew from 100,000 to millions, said CTO Mark Russinovich during his Open Network Summit keynote address here this week. Azure needs a virtualized, partitioned and scale-out design, delivered through software, in order to keep up with that kind of growth.

“When we started to build these networks and started to see these types of requirements, the scale we were operating at, you can’t have humans provisioning things,” Russinovich said. “You’ve got to have systems that are very flexible and also delivering functionality very quickly. This meant we couldn’t go to the Web and do an Internet search for a scalable cloud controller that supports this kind of functionality. It just didn’t exist.”

Microsoft wrote all of the software code for Azure’s SDN. A description of it can be found here.
Microsoft uses virtual networks (Vnets) built from overlays and Network Functions Virtualization services running as software on commodity servers. Vnets are partitioned through Azure controllers established as a set of interconnected services, and each service is partitioned to scale and run protocols on multiple instances for high availability.

Controllers are established in regions where there could be 100,000 to 500,000 hosts. Within those regions are smaller clustered controllers which act as stateless caches for up to 1,000 hosts.
Related

Why is Microsoft killing off Internet Explorer?
Microsoft builds these controllers using an internally developed Service Fabric for Azure. Service Fabric has what Microsoft calls a microservices-based architecture that allows customers to update individual application components without having to update the entire application.

Microsoft makes the Azure Service Fabric SDK available here.
Much of the programmability of the Azure SDN is performed on the host server with hardware assist. A Virtual Filtering Platform (VFP) in Hyper-V hosts enable Azure’s data plane to act as a Hyper-V virtual network programmable switch for network agents that work on behalf of controllers for Vnet and other functions, like load balancing.

Packet processing is done at the host where a NIC with a Field Programmable Gate Array offloads network processing from the host CPU to scale the Azure data plane from 1Gbps to 40Gbps and beyond. That helps retain host CPU cycles for processing customer VMs, Microsoft says.

Remote Direct Memory Access is employed for the high-performance storage back-end to Azure.
Though SDNs and open source go hand-in-hand, there’s no open source software content in the Azure SDN. That’s because the functionality required for Azure was not offered through open source communities, Russinovich says.

“As these requirements were hitting us, there was no open source out there able to meet them,” he says. “And once you start on a path where you’re starting to build out infrastructure and system, even if there’s something else that comes along and addresses those requirements the switching cost is pretty huge. It’s not an aversion to it; it’s that we haven’t seen open source out there that really meets our needs, and there’s a switching cost that we have to take into account, which will slow us down.”

Microsoft is, however, considering contributing the Azure Service Fabric architecture to the open source community, Russinovich said. But there has to be some symbiosis.

“What’s secret sauce, what’s not; what’s the cost of contributing to open source, what’s the benefit to customers of open source, what’s the benefit to us penetrating markets,” he says. “It’s a constant evaluation.”

Some of the challenges in constructing the Azure SDN were retrofitting existing controllers into the Service Fabric, Russinovich says. That resulted in some scaling issues.
Resources

7 Critical Questions to Demystify DRaaS
“Some of the original controllers were written not using Service Fabric so they were not microservice oriented,” he says. “We immediately started to run into scale challenges with that. Existing ones are being (rewritten) onto Service Fabric.

“Another one is this evolution of the VFP and how it does packet processing. That is not something that we sat down initially and said, ‘it’s connections, not flows.’ We need to make sure that packet processing on every packet after the connection is set up needs to be highly efficient. It’s been the challenge of being able to operate efficiently, scale it up quickly, being able to deliver features into it quickly, and being able to take the load off the server so we can run VMs on it.”

What’s next for the Azure SDN? Preparing for more explosive growth of the Microsoft cloud, Russinovich says.

“It’s a constant evolution in terms of functionality and features,” he says. “You’re going to see us get more richer and powerful abstractions at the network level from a customer API perspective. We’re going to see 10X scale in a few years.”
Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, 9 June 2015

Apple shows iOS 9's major upgrades, from multitasking to picture-in-picture

Apple shows iOS 9's major upgrades, from multitasking to picture-in-picture

Side-by-side apps, video overlays, and much more are coming to iPads when Apple's mobile OS releases this fall.

Major changes are coming to our iPads, from the way we select text, to the way we interact with our favorite apps and play videos.

Speaking at Apple's Worldwide Developer Conference on Monday, Senior Vice President Craig Federighi showcased an updated version of iOS 9 that included a few new features designed specifically with tablet users in mind.

Let’s start with QuickType, an enhancement to the iPad’s onscreen keyboard that includes new shortcuts and turns into a trackpad when you place two fingers on it. The trackpad can be used to select text, move objects around, and generally combine the convenience of touch controls and the precision of a mouse.

iPads will also get access to true, onscreen multitasking, which allows two apps to run side-by-side on the screen at the same time. The new feature, which Apple calls Split View, opens two resizable virtual windows on the screen. Users will be able to control each app independently, transferring information from one to the other using simple gestures, and quickly change the program running inside each panel using a brand-new app switcher. Note: While multitasking will work on most recent iPad models, Split View will be available only on the iPad Air 2.

Finally, a new picture-in-picture feature allows users to play a video from one app while using a different app. The video appears in a tiny window can be moved around, or even pushed temporarily off-screen to allow you to focus on your work while your favorite movie or game keeps playing along. The window also includes a set of simple controls that let you pause the video or close and dismiss it without leaving the current app.

The new iPad features will arrive with iOS 9 this fall, with a public beta program open to all starting in July.




Wednesday, 3 June 2015

Exam 70-412 Configuring Advanced Windows Server 2012 Services

Exam 70-412 Configuring Advanced Windows Server 2012 Services

Published: 17 September 2012
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows Server 2012 R2
Credit towards certification: MCP, MCSA, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

As of January 2014, this exam includes content covering Windows Server 2012 R2.

Configure and manage high availability (15–20%)

Configure Network Load Balancing (NLB)

Install NLB nodes, configure NLB prerequisites, configure affinity, configure port rules, configure cluster operation mode, upgrade an NLB cluster

Configure failover clustering
Configure quorum, configure cluster networking, restore single node or cluster configuration, configure cluster storage, implement Cluster-Aware Updating, upgrade a cluster, configure and optimise clustered shared volumes, configure clusters without network names, configure storage spaces

Manage failover clustering roles
Configure role-specific settings, including continuously available shares; configure virtual machine (VM) monitoring; configure failover and preference settings; configure guest clustering

Manage VM movement
Perform live migration; perform quick migration; perform storage migration; import, export and copy VMs; configure VM network health protection; configure drain on shutdown

Preparation resources
Managing Network Load Balancing clusters
Setting Network Load Balancing parameters
Failover cluster deployment guide

Configure file and storage solutions (15–20%)

Configure advanced file services
Configure Network File System (NFS) data store, configure BranchCache, configure File Classification Infrastructure (FCI) using File Server Resource Manager (FSRM), configure file access auditing

Implement Dynamic Access Control (DAC)
Configure user and device claim types, implement policy changes and staging, perform access-denied remediation, configure file classification, create and configure Central Access rules and policies, create and configure resource properties and lists

Configure and optimise storage
Configure iSCSI target and initiator, configure Internet Storage Name server (iSNS), implement thin provisioning and trim, manage server free space using Features on Demand, configure tiered storage

Preparation resources
Network File System
File Server Resource Manager
Dynamic Access Control: Scenario overview

Implement business continuity and disaster recovery (15–20%)

Configure and manage backups
Configure Windows Server backups, configure Microsoft Azure backups, configure role-specific backups, manage VSS settings using VSSAdmin

Recover servers
Restore from backups, perform a Bare Metal Restore (BMR), recover servers using Windows Recovery Environment (Win RE) and safe mode, configure the Boot Configuration Data (BCD) store

Configure site-level fault tolerance
Configure Hyper-V Replica, including Hyper-V Replica Broker and VMs; configure multi-site clustering, including network settings, Quorum and failover settings; configure Hyper-V Replica extended replication; configure Global Update Manager; recover a multi-site failover cluster

Preparation resources
Windows Server backup overview
Windows Recovery Environment (RE) explained
How to configure bare-metal restore/recovery media

Configure Network Services (15–20%)

Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution
Create and configure superscopes and multicast scopes; implement DHCPv6; configure high availability for DHCP, including DHCP failover and split scopes; configure DHCP Name Protection; configure DNS registration

Implement an advanced DNS solution
Configure security for DNS, including Domain Name System Security Extensions (DNSSEC), DNS Socket Pool, and cache locking; configure DNS logging; configure delegated administration; configure recursion; configure netmask ordering; configure a GlobalNames zone; analyse zone level statistics

Deploy and manage IP Address Management (IPAM)
Provision IPAM manually or by using Group Policy, configure server discovery, create and manage IP blocks and ranges, monitor utilisation of IP address space, migrate to IPAM, delegate IPAM administration, manage IPAM collections, configure IPAM database storage

Preparation resources
Dynamic Host Configuration Protocol (DHCP) overview
Step-by-step: Demonstrate DNSSEC in a test lab
Holistic administration of IP address space using Windows Server 2012 IP Address Management

Configure the Active Directory infrastructure (15–20%)

Configure a forest or a domain
Implement multi-domain and multi-forest Active Directory environments, including interoperability with previous versions of Active Directory; upgrade existing domains and forests, including environment preparation and functional levels; configure multiple user principal name (UPN) suffixes

Configure trusts
Configure external, forest, shortcut and realm trusts; configure trust authentication; configure SID filtering; configure name suffix routing

Configure sites
Configure sites and subnets, create and configure site links, manage site coverage, manage registration of SRV records, move domain controllers between sites

Manage Active Directory and SYSVOL replication
Configure replication to Read-Only Domain Controllers (RODCs), configure Password Replication Policy (PRP) for RODC, monitor and manage replication, upgrade SYSVOL replication to Distributed File System Replication (DFSR)

Preparation resources
Deploy Active Directory Domain Services (AD DS) in your enterprise
Active Directory domains and trusts
Introduction to Active Directory replication and topology management using Windows PowerShell (Level 100)

Configure Identity and Access Solutions (15–20%)

Implement Active Directory Federation Services (AD FS)
Install AD FS; implement claims-based authentication, including Relying Party Trusts; configure authentication policies; configure Workplace Join; configure multi-factor authentication

Install and configure Active Directory Certificate Services (AD CS)
Install an Enterprise Certificate Authority (CA), configure certificate revocation lists (CRL) distribution points, install and configure Online Responder, implement administrative role separation, configure CA backup and recovery

Manage certificates
Manage certificate templates; implement and manage certificate deployment, validation, and revocation; manage certificate renewal; manage certificate enrolment and renewal to computers and users using Group Policies; configure and manage key archival and recovery

Install and configure Active Directory Rights Management Services (AD RMS)
Install a licensing or certificate AD RMS server, manage AD RMS Service Connection Point (SCP), manage RMS templates, configure Exclusion Policies, back up and restore AD RMS

Preparation resources
AD FS deployment guide
Active Directory Certificate Services overview
Deploy a private CA with Windows Server 2012






QUESTION 1
You are employed as a network administrator at ABC.com. ABC.com has an Active Directory
domain named ABC.com. All servers on the ABC.com network have Windows Server 2012
installed.
ABC.com has a server, named ABC-SR07, which is configured as a DHCP server. You have
created a superscope on ABC-SR07.
Which of the following describes a reason for creating a superscope? (Choose all that apply.)

A. To support DHCP clients on a single physical network segment where multiple logical IP
networks are used.
B. To allow for the sending of network traffic to a group of endpointsdestination hosts.
C. To support remote DHCP clients located on the far side of DHCP and BOOTP relay agents.
D. To provide fault tolerance.

Answer: A,C

Explanation:


QUESTION 2
You are employed as a network administrator at ABC.com. ABC.com has an Active Directory
domain named ABC.com. All servers, including domain controllers, on the ABC.com network have
Windows Server 2012 installed.
ABC.com has a domain controller, named ABC-DC01, which is configured as a DNS server. You
are planning to unsign the ABC.com zone.
Why should you unsign the zone?

A. To remove the zone.
B. To change the current zone type.
C. To add a new primary zone.
D. To create an Active Directory-integrated zone.

Answer: B

Explanation:


QUESTION 3
You are employed as a network administrator at ABC.com. ABC.com has an Active Directory
domain named ABC.com. All servers on the ABC.com network have Windows Server 2012
installed.
ABC.com has a server named ABC-SR01, which hosts the IP Address Management (IPAM)
Server feature. ABC.com also has a server, named ABC-SR02, which is configured as a DHCP
server.
You have been instructed to make sure that a user, named Mia Hamm, who belongs to the IPAM
Users group on ABC-SR01, has the ability to modify the DHCP scopes on ABC-SR02 by making
use of use IPAM. You want to achieve this without assigning Mia Hamm any unnecessary
permissions.
Which of the following actions should you take?

A. You should consider making Mia Hamm a member of the DHCP Administrators group on ABCSR02.
B. You should consider making Mia Hamm a member of the IPAM Administrators group on ABCSR02.
C. You should consider making Mia Hamm a member of the Local Administrators group on ABCSR02.
D. You should consider making Mia Hamm a member of the Domain Administrators group.

Answer: A

Explanation:


QUESTION 4
You are employed as a senior network administrator at ABC.com. ABC.com has an Active
Directory domain named ABC.com. All servers on the ABC.com network have Windows Server
2012 installed.
You are currently running a training exercise for junior network administrators. You are discussing
the DNSSEC NRPT rule property.
Which of the following describes the purpose of this rule property?

A. It is used to indicate the namespace to which the policy applies.
B. It is used to indicate whether the DNS client should check for DNSSEC validation in the
response.
C. It is used to indicate DNSSEC must be used to protect DNS traffic for queries belonging to the
namespace.
D. It is used to whether DNS connections over DNSSEC will use encryption.

Answer: A

Explanation:


QUESTION 5
You work as an administrator at ABC.com. The ABC.com network consists of a single domain
named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
ABC.com has a server, named ABC-SR07, which has the AD DS, DHCP, and DNS server roles
installed. ABC.com also has a server, named ABC-SR08, which has the DHCP, and Remote
Access server roles installed. You have configured a server, which has the File and Storage
Services server role installed, to automatically acquire an IP address. The server is named ABCSR09.
You then create a filter on ABC-SR07.
Which of the following is a reason for this configuration?

A. To make sure that ABC-SR07 issues ABC-SR09 an IP address.
B. To make sure that ABC-SR07 does not issue ABC-SR09 an IP address.
C. To make sure that ABC-SR09 acquires a constant IP address from ABC-SR08 only.
D. To make sure that ABC-SR09 is configured with a static IP address.

Answer: B

Explanation:

Wednesday, 27 May 2015

Windows 10: Which classic Microsoft default apps should be killed?

Windows 10: Which classic Microsoft default apps should be killed?
Based on what we’ve seen in Microsoft’s Windows 10 preview editions, here’s our take on which classic apps should be kept and which should be killed when the final version of Windows 10 ships.

Windows 10
One of the most important features in Windows 10 will be the ability to run Windows Store apps in resizable windows on the desktop environment. This will also cause redundancy with many of the classic default apps that have come preinstalled on previous versions of Windows. Based on what we’ve seen in Microsoft’s Windows 10 preview editions, here’s our take on which classic apps should be kept and which should be killed when the final version of Windows 10 ships.

Classic Calculator: KEEP
Windows 10 will have a new Calculator app with a revamped GUI to accommodate for resizing it in the desktop environment. It will have the same functions as the one that comes with Windows 8/8.1 (standard and scientific calculating, a unit converter), and add a mode for programmer calculations. Yet it still won’t be as full-featured as the old desktop Calculator application, which additionally has a statistics mode, and some extra tools, like for date and mortgage calculation. This trusty desktop Calculator is in Windows 8/8.1, but hasn’t shown up in the latest Windows 10 Insider Preview.

Notepad: KEEP
Most users who compose lines for the Windows command prompt appreciate the bare-bones and fast-running nature of this application. Sure, there are lots of third-party clones of Notepad that have more features, but if you really need such a thing, then you should be using a simple word processor anyway. Notepad has appeared in the Windows 10 Insider Preview, and it’ll probably be in the final release of the OS, which we think it should, as a callback to the history of Windows.

Paint: KEEP
Along with Notepad, this is the second classic Windows desktop application that we think should appear for the sake of tradition in the next Windows and versions beyond into infinity. (Microsoft added Fresh Paint to Windows 8/8.1, and it will probably return in Windows 10, but this painting app is really for touchscreens.) And, odd as this may sound, we hope Microsoft doesn’t change a thing at all about Paint: Its charm is its consistent lack of sophisticated features and simplicity throughout the years. Even though its tools are limited, the pixel art that talented people have managed to make with them have a retro appeal and cult following nowadays.

Silverlight: KILL
Microsoft’s streaming video technology never matched use numbers in the marketplace against Adobe’s Flash, but it was at one point the required plug-in for watching content protected by DRM on major sites, like Amazon and Netflix. Despite this, Microsoft no longer develops it and will cease support for it. Silverlight wasn’t pre-installed on Windows 8/8.1. What happened?

Over the last few years, there’s been a move away from relying on the closed, proprietary Flash and Silverlight, and, instead, using open formats to stream video. This includes an open standard for streaming DRM-locked video, which is supported by Chrome, Firefox, Safari, and even Internet Explorer.

Sound Recorder: KILL
This dead-simple desktop application has just one button to press to start and stop recording audio from your device’s mic. The app version of Sound Recorder works about as simply, and also includes a basic tool to edit your audio clips. Both versions of Sound Recorder come with Windows 8/8.1, and were also together in the early builds of Windows 10 Insider Preview, but the latest Insider Preview no longer has this old desktop application version.

Windows Fax and Scan: KILL

There’s an app named Scan in Windows 8/8.1 and the Windows 10 Insider Preview, it doesn’t do the same thing as this desktop app. Scan is for scanning in images from a scanner. Windows Fax and Scan is for sending and receiving faxes, and scanning in documents with your scanner to send out as faxes. It’s so old school that it requires your computer be plugged into a telephone line. Yes, that’s right: Your computer needs to have a dial-up modem. (To be fair, alternately, you can connect your computer to a fax server.) So, surely, Windows Fax and Scan will not return for Windows 10? We wouldn’t count against it. This application has shown up in the Windows 10 Insider Preview.

Windows Journal: KILL
Here’s a good example of a classic Windows desktop application that should be retired to let its better Windows Store app successor fully take over. The OneNote app effectively does the same things as Windows Journal, and more. OneNote has been preinstalled in the Windows 10 Insider Preview -- but so has Windows Journal. Windows Journal’s name perhaps failed to convey accurately what it was designed for: jotting down handwritten notes, and sketching doodles, with a digital pen. Although typed text can be entered onto a note, you do so by first adding a graphical element (a text box) and then typing. This application’s GUI also muddled perceptions of how you’re supposed to use it since it looks like one for a text editor.

Windows Media Player: KILL
At one time, Microsoft angled for this media player to be the main application in their grand vision of a Windows home media center. Now, it’s pretty much hidden under the Windows Accessories folder/group of Windows 8/8.1, which also comes with two apps for playing media. The simply named Music and Video also let users buy music, movies and TV shows as downloads or streams. The current Windows 10 Insider Preview includes new versions of these apps, called Music Preview and Video Preview. Since both apps will run under Windows 10 in resizable windows in the desktop environment, Microsoft should probably not include Windows Media Player in the final Windows 10 release.

WordPad: KEEP
Along with Notepad, WordPad is the other text editor that has been in recent versions of Windows including the Windows 10 Insider Preview. It’s a surprisingly capable, basic word processor. It has a decent font selection; line, paragraph and spacing adjustment; plus the ability to insert images into your document; and to save documents in RTF or Microsoft Office DOCX formats. It’s probably safe to assume that WordPad will be in Windows 10.

XPS Viewer: KILL
Like Silverlight, XPS was devised by Microsoft to compete against another Adobe format (this one being PDF), and, obviously, never achieved widespread adoption. Unlike Silverlight, Microsoft hasn’t officially stopped developing XPS, though they haven’t talked it in over six years. Both an application for viewing XPS documents (XPS Viewer) and a driver to print documents into the format (XPS Document Writer) come with Windows 8/8.1 and appear in the Windows 10 Insider Preview. We think it’s time that Microsoft quietly admit defeat and get rid of both things. When’s the last time, if ever, you’ve looked at an XPS document… or even knew what XPS was before reading this?


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Friday, 22 May 2015

Exam 74-338 Lync 2013 Depth Support Engineer

Exam 74-338 Lync 2013 Depth Support Engineer

Published: 29 April 2013
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Microsoft Lync Server 2013
Credit towards certification: MCP, Microsoft Specialist

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Analyse and troubleshoot Enterprise Voice (25-30%)
Troubleshoot call setup and tear down

Troubleshoot internal phone calls (PC to PC), external phone calls (PC to Public Switched Telephone Network [PSTN]), inbound and outbound routing, network configuration and internal and external clients

Troubleshoot Voice quality issues

Analyse Call Detail Recording/Quality of Experience (CDR/QOE) logs, analyse call flow by using Snooper and troubleshoot third-party devices, QOS and network bandwidth

Troubleshoot Voice configuration

Analyse dial plans (normalisation, translation), analyse session management (trunk routing); analyse policies, routes and usages; and troubleshoot external connectivity (gateways, SBA, PBX, SBC, PSTN) and media bypass

Analyse Voice applications

Troubleshoot call park, response groups, unassigned numbers, Exchange voicemail, third-party applications, and LIS and E911 implementation

Troubleshoot unified communications (UC) devices and peripherals

Troubleshoot device update issues, device connectivity issues (LPE + non-LPE), PIN authentication issues, peripherals and VDI plug-in device pairing

Troubleshoot mobile devices

Troubleshoot mobile auto-discover issues, mobile device usage issues, mobile callback feature, push notification, call establishment and mobile conference data

Troubleshoot conferencing and application sharing (20-25%)

Troubleshoot AV

Troubleshoot multi-party video, conference network bandwidth, server resources, media relay and third-party interop

Troubleshoot dial-in conferencing

Troubleshoot Conferencing Auto Application (CAA), Client Access Server (CAS), contact objects and conference directories

Troubleshoot the conference life cycle

Troubleshoot web scheduler, multipoint control unit (MCU) health, simple URLs (join launcher), UC add-in for Microsoft Outlook, Lync Web Access (LWA) and content expiry

Troubleshoot data

Troubleshoot Microsoft PowerPoint presentation connections, WAC server configurations, dataproxy and WAC topology

Analyse and troubleshoot application sharing

Troubleshoot network issues, latency, external access, connectivity and configuration

Troubleshoot IM and Presence (20-25%)

Troubleshoot sign-in issues

Troubleshoot DNS, certificates, registration, network connectivity, authentication and auto-discover

Troubleshoot Presence

Troubleshoot aggregation (OOF, calendar, machine, user), enhanced privacy, subscriptions, contact list and privacy relationship

Troubleshoot federation

Troubleshoot XMPP, connectivity, Public IM connectivity (PIC), federation types (open, direct, enhanced), federation policy and legacy interop

Troubleshoot client configuration

Troubleshoot file transfer, policy assignment, URL filtering, client version filtering, GPO assignment and user photo

Troubleshoot Address Book

Troubleshoot normalisation, local versus web lookup, internal file download, external file download, Address Book generation and contact merge

Troubleshoot Persistent Chat

Troubleshoot policies and settings, connectivity, Persistent Chat compliance role, migration issues with earlier group chat and Persistent Chat performance

Troubleshoot infrastructure and tools (20-25%)

Troubleshoot high availability and resiliency
Perform a cut-over from one Lync pool to another and troubleshoot server storage replication; file-share replication by using DFS; single-server failure (Lync, SQL); data centre failure, including CMS; and branch survivability

Identify issues by using troubleshooting tools
Identify issues using CLSlogging Scenarios, demonstrate use of Snooper for database analysis, and identify issues using NetMonitor, OCS Logger, Event Viewer and Performance Monitor

Troubleshoot topology and dependent infrastructure
Troubleshoot database synchronisation issues, including SQL mirroring and LYSS replication, topology replication, IIS, user placement and role-based access control (RBAC) rights assignment

Who should take this exam?

Candidates for this exam are IT consultants or telecommunications professionals who provide product support services for unified communications solutions. Candidates should be able to translate a support call, resolve the issue and produce a knowledge-base article for future support references.

Candidates should have a minimum of two years of experience with Microsoft Lync technologies and be familiar with various deployments and configurations. Candidates should be proficient in Lync Server 2013 solutions for end users, endpoint devices, telephony, audio/video and web conferences, security and high availability. Candidates should also know how to monitor and troubleshoot Lync Server 2013 using Microsoft tools and third-party vendor tools.

In addition, candidates should be proficient with Active Directory Domain Services, data networks, and telecommunications standards and components that support the configuration of Lync Server 2013. Candidates should be familiar with the requirements for integrating Lync Server 2013 with Microsoft Exchange Server and Office 365.




QUESTION 1
You work for a company named ABC.com. Your role of Lync Administrator includes the
management of the Microsoft Lync Server 2013 infrastructure.
Two Windows Server 2012 servers named ABC-DB01 and ABC-DB02 run SQL Server 2012.
ABC-DB01 and ABC-DB02 host a mirrored database for the Lync Server Central Management
Store (CMS). ABC-DB01 currently has the principle database and ABC-DB02 currently has the
mirror database. The mirrored database does not use a witness instance.
You need to manually failover the mirrored database to enable you to perform maintenance on
ABC-DB01.
Which of the following Windows PowerShell cmdlets should you run?

A. Invoke-CsPooIFailover
B. Invoke-CsManagementStoreReplication
C. Invoke-CsBackupServiceSync
D. Invoke-CSManagementServerFailover

Answer: D

Explanation:


QUESTION 2
You work for a company named ABC.com. The company has a Microsoft Lync Server 2013
infrastructure that includes two Lync Server pools. Your role of Lync Administrator includes the
management of the Microsoft Lync Server 2013 infrastructure.
An Edge server named ABC-Edge1 is configured to use a pool named ABC-LyncPool1.ABC.com
as its next hop. You plan to failover to a second pool named ABC-LyncPool2.ABC.com. Before
failing over the pool, you need to reconfigure the next hop for ABC-Edge1 to be ABCLyncPool2.
ABC.com.
Which of the following Windows PowerShell cmdlets should you run?

A. Set-CsEdgeServer
B. Set- CsAVEdgeConfiguration
C. New-CsEdgeAllowList
D. Set-CsAccessEdgeConfiguration
E. Move-CsApplicationEndpoint

Answer: A

Explanation:


QUESTION 3
You work for a company named ABC.com. The company has two Active Directory sites in a
single Active Directory Domain Services domain named ABC.com. Your role of Lync
Administrator includes the management of the Microsoft Lync Server 2013 infrastructure.
The Lync infrastructure consists of a single pool named ABC-LyncPool1.ABC.com.
You have been asked to design a disaster recovery (DR) plan in the event of a failure of ABCLyncPool1.
ABC.com. Part of the DR plan would be to configure a backup pool.
Which three of the following Windows PowerShell cmdlets would you need to run to recover the
CMS (Central Management Store) and the Lync user accounts? (Choose three)

A. Set-CsManagementServer
B. Install-CsDatabase
C. Set-CsLocationPolicy
D. Move-CsManagementServer
E. Invoke-CSManagementServerFailover
F. Invoke-CsPoolFailover

Answer: B,D,F

Explanation:


QUESTION 4
You work for a company named ABC.com. The company has a single Active Directory Domain
Services domain named ABC.com. The company has a datacenter located in New York.
The New York datacenter hosts two Microsoft Lync Server 2013 pools named ABCLyncPool1.
ABC.com and ABC-LyncPool2.ABC.com. ABC-LyncPool1.ABC.com hosts the CMS
(Central Management Store). All of the company’s 70,000 users are enabled for Lync. Your role
of Lync Administrator includes the management of the Microsoft Lync Server 2013 infrastructure.
The servers in ABC-LyncPool1.ABC.com suffer irreparable hardware failure. You need to recover
the Lync environment by failing over ABC-LyncPool1.ABC.com. All users will be hosted
permanently on ABC-LyncPool2.ABC.com.
Which of the following Windows PowerShell cmdlets should you run? (Choose all that apply)

A. Invoke-CSManagementServerFailover
B. Invoke-CsPoolFailover
C. Invoke-CsManagementStoreReplication
D. Invoke-CsPoolFailover
E. Move-CsManagementServer
F. Install-CsDatabase

Answer: D,E,F

Explanation:


QUESTION 5
You work for a company named ABC.com. Your role of Lync Administrator includes the
management of the Microsoft Lync Server 2013 infrastructure.
You receive reports from users that they are sometimes unable to make outbound calls. You
discover that the failures are caused by there being no available trunks.
To help troubleshoot the issue, you plan to run performance monitor counters to monitor the total
number of calls and the total number of inbound calls to determine trunk usage.
Against which server should you run the performance monitor counters?

A. Edge Server
B. Front End Server
C. Database Server
D. Mediation Server

Answer: D

Explanation:

Saturday, 16 May 2015

70-341: Core Solutions of Microsoft Exchange Server 2013

70-341: Core Solutions of Microsoft Exchange Server 2013
Published: 15 January 2013
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Microsoft Exchange Server 2013
Credit towards certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

From July 2014, the questions on this exam include content covering Microsoft Exchange Server 2013 Service Pack 1.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Plan, install, configure and manage transport (25%)

Plan a high availability solution for common scenarios

Set up redundancy for intra-site scenarios; plan for SafetyNet; plan for shadow redundancy; plan for redundant MX records

Design a transport solution

Design inter-site mail flow; design inter-org mail flow; plan for Domain Secure/TLS; design Edge transport; design message hygiene solutions; design shared namespace scenarios

Configure and manage transport

Configure Edge servers; configure Send/Receive connectors; configure transport rules; configure accepted domains; configure email policies; configure Address Rewriting

Troubleshoot and monitor transport

Interpret message tracking logs and protocol logs; troubleshoot a shared namespace environment; troubleshoot SMTP mail flow; given a failure scenario, predict mail flow and identify how to recover; troubleshoot Domain Secure/TLS; troubleshoot the new transport architecture

Configure and manage hygiene

Manage content filtering; manage recipient filtering; manage SenderID; manage connection filtering; manage Spam Confidence Level (SCL) thresholds; manage anti-malware

Preparation resources

Transport high availability
Use an Edge Transport Server in Exchange 2013
Hygiene management

Install, configure and manage the mailbox role (25%)

Plan the mailbox role

Plan for database size and storage performance requirements; plan for virtualisation requirements and scenarios; plan mailbox role capacity and placement; design public folder placement strategy; validate storage by running JetStress

Configure and manage the mailbox role

Create and configure Offline Address Book (OAB); create and configure public folders; deploy mailbox server roles; design and create hierarchical address lists

Deploy and manage high availability solutions for the mailbox role

Create and configure a Database Availability Group (DAG); identify failure domains; manage DAG networks; configure proper placement of a file share witness; manage mailbox database copies

Monitor and troubleshoot the mailbox role

Troubleshoot database replication and replay; troubleshoot database copy activation; troubleshoot mailbox role performance; troubleshoot database failures; monitor database replication and content indexing

Develop backup and recovery solutions for the mailbox role and public folders

Manage lagged copies; determine most appropriate backup solution/strategy; perform a dial tone restore; perform item-level recovery; recover the public folder hierarchy; recover a mailbox server role

Create and configure mail-enabled objects

Configure resource mailboxes and scheduling; configure team mailboxes; configure distribution lists; configure moderation; configure a linked mailbox

Manage mail-enabled object permissions

Configure mailbox folder permissions; configure mailbox permissions; set up room mailbox delegates; set up team mailbox membership; set up auto-mapping; determine when to use Send As and Send On Behalf permissions

Preparation resources

Mailbox server
Database availability groups
Perform a dial tone recovery

Plan, install, configure and manage client access (25%)

Plan, deploy and manage a Client Access Server (CAS)

Design to account for differences between legacy CAS and Exchange CAS/CAF; configure Office web application

Plan and configure namespaces and client services

Design namespaces for client connectivity; configure URLs; plan for certificates; configure authentication methods; implement auto-discover for a given namespace

Deploy and manage mobility solutions

Deploy OWA for Devices; configure OWA policies; configure mobile device mailbox policies; configure Allow Block Quarantine (ABQ); deploy and manage Office Apps

Implement load balancing

Configure namespace load balancing; configure Session Initiation Protocol (SIP) load balancing; plan for differences between layer seven and layer four load balancing methods; configure Windows Network Load Balancing (WNLB)

Troubleshoot client connectivity

Troubleshoot Outlook Anywhere connectivity; troubleshoot POP/IMAP; troubleshoot authentication; troubleshoot web services; troubleshoot AutoDiscover; troubleshoot mobile devices

Preparation resources

Client access server
Clients and mobile
Load balancing

Design and manage an Exchange infrastructure (25%)

Plan for impact of Exchange on Active Directory services

Plan the number of domain controllers; plan placement of Global Catalogue (GC); determine DNS changes required for Exchange; prepare domains for Exchange; evaluate impact of schema changes required for Exchange; plan around Active Directory site topology

Administer Exchange workload management

Configure user workload policies; configure system workload policies; monitor system workload events; monitor user workload events

Plan and manage Role Based Access Control (RBAC)

Determine appropriate RBAC roles and cmdlets; limit administration using existing role groups; evaluate differences between RBAC and Active Directory split permissions; configure a custom-scoped role group; configure delegated setup

Design an appropriate Exchange solution for a given SLA

Plan for updates; plan for change management; design a solution that meets SLA requirements around scheduled downtime; design a solution that meets SLA requirements around RPO/RTO; design a solution that meets SLA requirements around message delivery

Preparation resources

Prepare Active Directory and domains
Exchange workload management
Planning for role-based access control




QUESTION 1
You need to prepare the environment for the implementation of phase 1.
What changes must be made to the environment before you can install Exchange Server 2013?

A. The operating system or service pack level of TexDC1 needs to be upgraded.
B. The Windows 2008 R2 domain controllers in Washington and Boston need to be upgraded.
C. A server running Exchange Server 2007 or Exchange Server 2010 needs to be installed in
Texas.
D. The PDC emulator role needs to be transferred to a domain controller in Washington or Boston.

Answer: A

Explanation:


QUESTION 2
You are evaluating whether the proposed Exchange solution will meet the current and future
capacity requirements.
You want to gather statistics about the current Exchange environment.
Which of the following tools would you use to determine the number of emails sent to and received
by the current users?

A. Remote Server Administration Tools.
B. Microsoft Exchange Server Profile Analyzer.
C. Microsoft Exchange Server Deployment Assistant.
D. ESEUtil.exe.
E. Microsoft Exchange Server Jetstress.

Answer: B

Explanation:


QUESTION 3
You need to apply the required size restriction to the mailboxes in the new environment.
Which of the following commands should you run?

A. Get-MailboxDatabase | Set-MailboxDatabase –ProhibitSendReceiveQuota
B. Get-MailboxDatabase | Set-Mailbox –ProhibitSendReceiveQuota
C. Get-Mailbox | Set-Mailbox –ProhibitSendReceiveQuota
D. Get-MailboxDatabase | Get-Mailbox | Set-Mailbox –ProhibitSendReceiveQuota

Answer: A

Explanation:


QUESTION 4
You are evaluating whether the proposed Exchange solution will meet the current and future
capacity requirements.
You want to gather statistics about the current Exchange environment.
Which of the following tools would you use to determine the number of IOPS (Input/Output
Operations Per Second) required for the mailbox database storage?

A. ESEUtil.exe.
B. Microsoft Exchange Server Jetstress.
C. Microsoft Exchange Server Deployment Assistant.
D. Exchange Mailbox Server Role Requirements Calculator.
E. SQL Server Analysis Services.

Answer: D

Explanation:


QUESTION 5
You need to install and configure anti-spam and antimalware filtering.
Which servers should you install the anti-spam agents and enable the anti-spam and antimalware
filtering? (Choose two).

A. You should install the anti-spam agents on the Client Access Servers only.
B. You should install the anti-spam agents on the Mailbox serversonly.
C. You should install the anti-spam agents on the Client Access Servers and the Mailbox Servers.
D. You should enable antimalware filtering on the Client Access Serversonly.
E. You should enable antimalware filtering on the Mailbox serversonly.
F. You enable antimalware filtering on the Client Access Servers and the Mailbox Servers.

Answer: B,E

Explanation:

Monday, 4 May 2015

Certification Generation – Learn More About MCITP Exam! - See more at:

Now a day’s Microsoft certifications play an important role in carrier making. This certification program allows professionals to enhanced and show up their area of professional and technical proficiency.

Why Microsoft Certification?

The Microsoft Certified IT Professional certification is an addition to Microsoft certification programs, its recognition and projected value is no doubt an assurance of MCITP’s certification necessity in current and upcoming generation. The MCITP certification helps the individual to meet the requirements of jobs in the fields of the database administrator and developer, network administrator, server system administrator, windows server administrator and monitoring operator.

How to Become a MCTIP Certified?
The base line of MCITP certification is actually an amalgamation of Microsoft Certified Technology Specialist which will give a golden opportunity to expand technical skills and knowledge. This is quite difficult to start with as there are numerous MCITP’s categories. Now you have to decide that what to do rather you would like to go to system administrators, enterprise messaging administrator, database developer etc and most importantly you must aware of the reasons behind your selection are. The selection depends on professionals and students’ current status of MCSE. If one has an older MCSE certification that is pre 2003.In that case one will have to start from the initial stage. One should be very clear about these things.

How to study?
To achieve the MCITP certification few simple steps should be kept in mind. Look for MCITP training courses at several training programs are accessible for the certification, but it’s extremely suggested to choose one that is referred by a certified instructor. To save your money and precious time thinks about to select online training courses offered by a boot camp or university. The boot camp will facilitate you with a sound, smooth, glowing understanding and practice in the groundwork and training for the exams. Don’t become a victim of examination fever. Stays relax and calm. Time management for study is a key factor. It’s up to you to study consistently for hours or study in intervals by taking mental and physical rest. Always try to take proper advantage of Microsoft‘s promotions. Like once Microsoft launched a promotion known as “Second Shot”. 2nd Shot provides a blissful chance to take MCITP examination free of cost if you are not successful in your first attempt of MCITP exam.

Certification Policy
To identify the value of Microsoft’s fresh generation certifications, it is highly advised that continuous Microsoft MCITP training should be in practice, even after your carrier targets achieved. According to Microsoft’s certification policy the MCITP certification requires a refurbishment of credential after every three years.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com