Wednesday 28 December 2016

JN0-541 Juniper Networks IDP Certified Internet Associate (JNCIA-IDP)

Concepts of intrusion detection
Identify the features and functions of an IDP sensor
Identify the use of IDP interfaces
Identify the TCP ports used by IDP sensors and Security Manager
Understanding the IDP provisioning modes

Initial configuration of an IDP sensor
Identify the steps involved in implementing the IDP sensor
Describe the configuration of a new sensor via the console
Describe the communication setup between Security Manager and IDP sensor

Configure and fine-tune policies
Assign the IDP attack terminology to the corresponding definitions
Understand the components of an IDP rule
Choice of appropriate IDP actions and IP actions
Describe the algorithm of the IDP rule assignment
Explain the use of captured packages
Explain the fine-tuning of guidelines

Configuring Other Policies for IDP
Explain the function of a rule database for exceptions
Explain the function of a rule database for anomalies
Explain the function of a rule database for backdoors
Explain the function of a SYN Protector rule database
Explain the function of honeypots in the network

Configure and use the profiler
Describe the normal functioning of a profiler
Showing the steps to a working profiler
Describe the use of a profiler for network detection
Describe the use of a profiler to identify new devices and ports
Describe the use of a profiler to detect policy violations

Sensor operation and sensor command line utility
Describe the sensor components and processes
Use scio to manage policies and display sensor configurations
Use sctop to display sensor statistics

Manage attack objects and create custom signatures
Describe the use of static and dynamic groups
Explain how to update the attack object database
List the steps for obtaining information about an attack
Understanding the purpose and use of the sensor commands "scio ccap" and "scio pcap"
List the steps for creating a simple attack object
Describe the purpose of combined attack objects

Maintenance and troubleshooting
Use the Appliance Configuration Manager (ACM) to view and modify sensor configurations
Use sensor and unix commands to resolve IDP issues
Understand the operation of external HA and NIC bypass
QUESTION 1
Which statement is true about the attack object database update process?

A. Each sensor updates its own attack object database automatically; however they must be able
to access the Juniper site on TCP port 443.
B. The attack object database update must be manually performed by the administrator, and the
administrator must manually install it on each sensor.
C. The attack object database update can be initiated manually or automatically.
D. The attack object database update can be automatically scheduled to occur using the Security
Manager GUI.

Answer: C

QUESTION 2
On a sensor, which command will indicate if log messages are being sent to Security Manager?

A. scio vr list
B. serviceidp status
C. scio agentstats display
D. scio getsystem

Answer: C

QUESTION 3
After you enable alerts for new hosts that are detected by the Enterprise Security Profiler, where
do you look in Security Manager to see those alerts?

A. Security Monitor > Profiler > Application Profiler tab
B. Security Monitor > Profiler > Violation Viewer tab
C. Security Monitor > Profiler > Network Profiler tab
D. Log Viewer > Profiler Log

Answer: D

QUESTION 4
When connecting to a sensor using SSH, which account do you use to login?

A. admin
B. super
C. netscreen
D. root

Answer: A

QUESTION 5
Which OSI layer(s) of a packet does the IDP sensor examine?

A. layers 2-7
B. layers 2-4
C. layer 7 only
D. layers 4-7

Answer: A

Monday 19 December 2016

JN0-646 Enterprise Routing and Switching, Professional (JNCIP-ENT) Exam

JNCIP-ENT Exam Objectives (Exam: JN0-643 and JN0-646)

OSPF
Describe the concepts, operation and functionality of OSPFv2 and OSPFv3
OSPF LSA types
OSPF area types and operations
LSA flooding through an OSPF multi-area network
DR/BDR operation
SPF algorithm
Metrics, including external metric types
Authentication options
Route summarization and restriction
Overload
Virtual links
OSPFv2 vs OSPFv3
Given a scenario, demonstrate knowledge of how to configure and monitor single-area and multi-area OSPF
Implement OSPF routing policy

BGP
Describe the concepts, operation and functionality of BGP
BGP route selection process
Next hop resolution
BGP attributes - concept and operation
BGP communities
Regular expressions
Load balancing - multipath, multihop, forwarding table
NLRI families - inet, inet6
Advanced BGP options
Given a scenario, demonstrate knowledge of how to configure and monitor BGP
Implement BGP routing policy

IP Multicast
Describe the concepts, operation and functionality of IP multicast
Components of IP multicast, including multicast addressing
IP multicast traffic flow
Any-Source Multicast (ASM) vs. Source-Specific Multicast (SSM)
RPF - concept and operation
IGMP, IGMP snooping
PIM dense-mode and sparse-mode
Rendezvous point (RP) - concept, operation, discovery, election
SSM - requirements, benefits, address ranges
Anycast RP
MSDP
Routing policy and scoping
Given a scenario, demonstrate knowledge of how to configure and monitor IGMP, PIM-DM and PIM-SM (including SSM)
Implement IP multicast routing policy

Ethernet Switching and Spanning Tree
Describe the concepts, operation and functionality of advanced Ethernet switching
Filter-based VLANs
Private VLANs
Dynamic VLAN registration using MVRP
Tunnel Layer 2 traffic through Ethernet networks
Layer 2 tunneling using Q-in-Q and L2PT
Given a scenario, demonstrate knowledge of how to configure and monitor advanced Ethernet switching
Filter-based VLANs
Private VLANs
Dynamic VLAN registration using MVRP
Tunnel Layer 2 traffic through Ethernet networks
Layer 2 tunneling using Q-in-Q and L2PT
Describe the concepts, operation and functionality of advanced spanning tree protocols, including MSTP and VSTP
Given a scenario, demonstrate knowledge of how to configure and monitor MSTP and VSTP

Layer 2 Authentication and Access Control
Describe the operation of various Layer 2 authentication and access control features
Authentication process flow
802.1x - concepts and functionality
MAC RADIUS
Captive portal
Server fail fallback
Guest VLAN
Considerations when using multiple authentication/access control methods
Given a scenario, demonstration how to configure and monitor Layer 2 authentication and access control

IP Telephony Features
Describe the concepts, operation and functionality of features that facilitate IP telephony deployments
Power over Ethernet (PoE)
LLDP and LLDP-MED
Voice VLAN
Given a scenario, demonstrated how to configure and monitor features used to support IP Telephony

Class of Service (CoS)
Describe the concepts, operation and functionality of Junos CoS for Layer 2/3 networks
CoS processing on Junos devices
CoS header fields
Forwarding classes
Classification
Packet loss priority
Policers
Schedulers
Drop profiles
Shaping
Rewrite rules
Given a scenario, demonstrate knowledge of how to configure and monitor CoS for Layer 2/3 networks




Monday 12 December 2016

JN0-533 FWV, Specialist (JNCIS-FWV)

JNCIS-FWV Exam Objectives (Exam: JN0-533)

System Setup and Initial Configuration
Identify the concepts and components of ScreenOS software
Security architecture components
Packet flow and decision process
IPv6 packet handling
ScreenOS firewall/VPN product lines
System components
Demonstrate knowledge of how to configure basic elements of ScreenOS software
Interfaces
Zones
Management access and services
User accounts and authentication
Administrative lockout options
DNS configuration
NTP configuration
Describe how to configure and monitor interfaces
VLANs, aggregated Ethernet
Management interface
Bridge Group
Tunnel interfaces
Loopback interface
Interface modes
Redundant Ethernet
Identify the concepts and functionality of virtual systems (vsys)
vsys interfaces and zones
Inter-vsys routing
Profiles
CPU resource management

Layer 3 Operations
Identify the concepts and functionality of Layer 3 operations (IPv4 and IPv6)
Routing lookup flow
Virtual routers
Static and default routing
Dynamic routing - RIP, OSPF, BGP
Considerations for routing over VPNs
Route optimization and aggregation
Route redistribution; access lists and route maps
Source-based vs. policy-based routing
IPv6 modes
Demonstrate knowledge of how to configure, monitor and troubleshoot Layer 3 operations (IPv4 and IPv6)
Zones
Interfaces
IP addressing
Virtual router
Static/default routes, including floating static routes
RIP
OSPF
BGP
Redistribution
Access lists and route maps
Source-based and policy-based routing
Layer 3 verification
Layer 3 troubleshooting - get vrouter, debug, flow filter, session table

Security Policies
Identify the concepts and functionality of security policies
Zones and policies
Policy components
Policy options
Policy ordering
Policy scheduling
Global policies
Multicell policies
Address books
Policing and guaranteed bandwidth
Services
Demonstrate knowledge of how to configure, monitor and troubleshoot security policies
Address books and address groups
Services and service groups
Policy verification
Policy troubleshooting - debug, get session

NAT

Identify the concepts and functionality of NAT
Interface-based vs. policy-based NAT
NAT type usage
Source NAT (NAT-src)
Dynamic IP addresses (DIP)
Destination NAT (NAT-dst)
Virtual IP addresses (VIP)
Mapped IP addresses (MIP)
Precedence
Demonstrate knowledge of how to configure, monitor and troubleshoot NAT
Policy-based NAT
Dynamic IP addresses (DIP)
Reachability/Routing
VIP and MIP
NAT verification
NAT troubleshooting - debug, get session, and traffic logs

IPsec VPNs
Identify the concepts and functionality of IPsec VPNs
Secure VPN characteristics and components
Encapsulating Security Payload (ESP)
Authentication Header (AH)
IPsec tunnel establishment - Internet Key Exchange (IKE)
Hub-and-spoke IPsec VPNs
Policy-based vs. route-based IPsec VPNs
Next-hop tunnel binding (NHTB)
Next Hop Resolution Protocol (NHRP)
Fixed vs. dynamic peers
Tunnel interfaces
Preshared keys
VPN Monitor
Demonstrate knowledge of how to configure, monitor and troubleshoot IPsec VPNs
Interfaces
Objects
IKE
Policy
Routing
VPN Monitor
IPsec VPN verification
IPsec VPN troubleshooting - system/event log, debug, get ike, get sa

High Availability
Identify the concepts and requirements for high availability (HA) in a ScreenOS firewall/VPN environment
NetScreen Redundancy Protocol (NSRP) characteristics
NSRP modes; usage guidelines
Links, ports and zones
Virtual security device (VSD), virtual security interfaces (VSI) and VSD groups
VSD states
Run-time objects (RTOs)
HA probes
Failover tuning
IP tracking
Virtual Router Redundancy Protocol (VRRP)
Redundant interfaces
Links between the firewalls
Redundant VPN gateways
Demonstrate knowledge of how to configure, monitor and troubleshoot HA
HA link
Cluster settings
Interfaces
VSD settings
RTO synchronization
Tracking and monitoring
Redundant interface
HA verification
HA monitoring for VPNs - IKE heartbeats, dead peer detection
HA troubleshooting - debug, get interface, get nsrp stats

Attack Prevention
Describe the purpose, configuration and operation of Screens
Attack types and phases
Screen options
Best practices
Configuration, verification and troubleshooting
Describe the purpose, configuration and operation of deep inspection (DI)
Attack object database
Custom attack objects
Signature database update methods
DI policies and actions
Licensing
Configuration, verification and troubleshooting
Describe the purpose, configuration and operation of Unified Threat Management (UTM)
Antispam profiles
Actions
Spam block list (SBL)
Antivirus scanning methods and options
Antivirus flow process
Licensing
Web filtering features and solutions
Data flow
Search order
White lists, black lists and categories
Configuration, verification and troubleshooting

System Administration, Management and Monitoring
Demonstrate knowledge of how to manage and monitor a ScreenOS firewall/VPN environment
File management
Password recovery
Licensing
Logs
Syslog
SNMP
Alarms
Counters



QUESTION 1
Which ScreenOS security feature helps protect against port scans and denial of service attacks?

A. session-based stateful firewall
B. IPsec VPNs
C. security policies
D. Screen options

Answer: B

Explanation:


QUESTION 2
What is the initial default username and password for all ScreenOS devices?

A. administrator/password
B. root/password
C. netscreen/netscreen
D. admin/netscreen1

Answer: D

Explanation:


QUESTION 3
What is a virtual system?

A. a mechanism to logically partition a single ScreenOS device into multiple logical devices
B. a collection of subnets and interfaces sharing identical security requirements
C. a method of providing a secure connection across a network
D. a tool to protect against DoS attacks

Answer: C

Explanation:


QUESTION 4
What is a zone?

A. a set of rules that controls traffic from a specified source to a specified destination using a
specified service
B. a collection of subnets and interfaces sharing identical security requirements
C. a method of providing a secure connection across a network
D. a tool to protect against DoS attacks

Answer: C

Explanation:


QUESTION 5
What is the function of NAT?

A. It performs Layer 3 routing.
B. It evaluates and redirects matching traffic into secure tunnels.
C. It provides translation between IP addresses.
D. It performs Layer 2 switching.

Answer: B

Explanation:




Thursday 8 December 2016

JN0-696 Security Support, Professional (JNCSP-SEC)

JNCSP-SEC Exam Objectives (Exam: JN0-696)

Security Policy Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot security policy evaluation issues on Junos devices
Transit traffic issues
To-the-device traffic issues
Default and global policy issues
Zone issues
Address book issues
Filter-based forwarding
NAT issues
Configuration issues

IPSec VPN Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot IPSec VPN issues on Junos device
Route-based VPN issues
Policy-based VPN issues
IKE phase 1 issues
IKE phase 2 issues
Configuration issues

Application-Aware Security Services Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot Junos AppSecure issues
AppID issues
AppTrack issues
AppFW issues
AppDoS issues
AppQoS issues
Configuration issues

Intrusion Prevention Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot Junos Intrusion Prevention System (IPS) issues
Licensing and platform issues
Signature database issues
IPS and security policy issues
Configuration issues

Unified Threat Management (UTM) Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot UTM issues on Junos devices
Licensing and platform issues
Antivirus issues
Antispam issues
Content-filtering issues
Web-filtering issues
UTM and security policy issues
Configuration issues

High Availability (HA) Clustering Troubleshooting
Given a scenario, demonstrate knowledge of how to troubleshoot chassis cluster issues on Junos devices
Cluster architecture issues
Cluster component issues
Cluster mode issues
Configuration issues


QUESTION 1
You are having problems establishing an IPsec tunnel between two SRX Series devices.
What are two explanations for this problem? (Choose two.)

A. proposal mismatch
B. antivirus configuration
C. preshared key mismatch
D. TCP MSS clamping is disabled

Answer: B,D

Explanation:

QUESTION 2
Two SRX Series devices are having problems establishing an IPsec VPN session. One of the
devices has a firewall filter applied to its gateway interface that rejects UDP traffic.
What would resolve the problem?

A. Disable the IKE Phase 1 part of the session establishment.
B. Disable the IKE Phase 2 part of the session establishment.
C. Change the configuration so that session establishment uses TCP.
D. Edit the firewall filter to allow UDP port 500.

Answer: A

Explanation:

QUESTION 3
Your SRX Series device has the following configuration:
user@host> show security policies
...
Policy: my-policy, State: enabled, Index: 5, Sequence number: 1
Source addresses: any
Destination addresses: any
Applications: snmp
Action: reject
From zone: trust, To zone: untrust
...
When traffic matches my-policy, you want the device to silently drop the traffic; however, you
notice that the device is replying with ICMP unreachable messages instead.
What is causing this behavior?

A. the snmp application
B. the reject action
C. the trust zone
D. the untrust zone

Answer: C

Explanation:

QUESTION 4
You want to allow remote users using PCs running Windows 7 to access the network using an
IPsec VPN. You implement a route-based hub-and-spoke VPN; however, users report that they
are not able to access the network.
What is causing this problem?

A. The remote clients do not have proper licensing.
B. Hub-and-spoke VPNs cannot be route-based; they must be policy-based.
C. The remote clients' OS is not supported.
D. Hub-and-spoke VPNs do not support remote client access; a dynamic VPN must be
implemented instead.

Answer: B

Explanation:

Monday 5 December 2016

JN0-355 Junos Pulse Secure Access, Specialist (JNCIS-SA)

JNCIS-SA Exam Objectives (Exam: JN0-355)

Overview
Components and elements
Component functions, interaction and relationships
Junos Pulse Gateway and Virtual Appliance product lines
Licensing
Deployment considerations and integration options
SSL, TLS and digital certificates overview
Access methods

Initial Configuration
Configure the basic elements of a Junos Pulse Secure Access Service environment
Initial configuration via CLI
Initial configuration via admin UI

Roles
Describe the concepts, operation and functionality of roles
Purpose of roles
Role mapping and merging
Customization of the end-user experience
Configure roles
Roles and role options

Policies and Profiles
Describe the concepts, operation and functionality of policies and profiles
Purpose of policies; policy types and elements
Purpose of profiles and profile types
Interrelationship and usage guidelines
Configure policies and profiles
Policies and policy options
Profiles and profile options

Authentication
Describe the authentication process for the Junos Pulse Secure Access Service
Authentication elements
Sign-in process
Digital certificates
Certificate validation process
Advanced authentication options
Configure authentication
Authentication servers
Authentication realms
Role mapping
Sign-in policies
Certificates
Advanced options

Client/Server Communications
Identify and describe client/server applications
WSAM
JSAM
VPN tunneling
Configure client/server applications
SAM
VPN tunneling

Junos Pulse Client
Describe the features, benefits and functionality of the Junos Pulse client
Components and features
Configure the Junos Pulse client
WSAM application access
VPN tunneling

Junos Pulse Collaboration
Describe the features, benefits and functionality of Junos Pulse Collaboration
Components and features
Deployment
Collaboration client
Scheduling meetings
Monitoring meetings
Configure Junos Pulse Collaboration
Collaboration configuration
Meeting options
Pulse Connection

Endpoint Security
Describe the concepts, operation and functionality of endpoint security
TNC architecture
Host Checker
Enhanced Endpoint Security (EES)
Secure Virtual Workspace (SVW)
Cache Cleaner
Enforcement
Configure endpoint security
Host Checker
Enhanced Endpoint Security (EES)
Secure Virtual Workspace (SVW)
Cache Cleaner

Virtualization
Describe the concepts, operation and functionality of virtualization in a Junos Pulse Secure Access Service environment
Concepts and components
Virtual appliances
Virtual Desktop Infrastructure
Configure virtualization
Licensing
Virtual desktops

High Availability
Describe the concepts and requirements for high availability in a Junos Pulse Secure Access Service environment
Clustering
Deployment options and considerations
Licensing
Configure high availability
Clustering configuration
Upgrades

Administration, Management and Troubleshooting
Demonstrate knowledge of how to manage and troubleshoot a Junos Pulse Secure Access Service environment
Configuration file management
Backup and archiving
Logging
System monitoring
Statistics
Policy tracing
Packet capture tools
Connectivity testing tools
Session recording
System snapshot
Client connectivity


QUESTION 1
Which two statements are correct regarding the MAG6611 Junos Pulse Gateway in an
active/active cluster configuration? (Choose two.)

A. Virtual IP (VIP) is available.
B. It supports up to two devices.
C. It supports up to four devices.
D. External load balancing is preferred.

Answer: C,D

Explanation:

QUESTION 2
What is the function of the smart caching setting within a Web caching policy?

A. to send the cache control compress header to the client
B. to remove the cache control headers from the origin server
C. to not modify the cache control header from the origin server
D. to send the appropriate cache control header based on Web content.

Answer: D

Explanation:

QUESTION 3
You have configured RADIUS authentication on the Junos Pulse Secure Access Service. Users
report that their authentication is rejected. The RADIUS administrator reports that the RADIUS
server requires a specific attribute that identifies the Junos Pulse Secure Access Service on the
RADIUS server.
In the Admin UI, which configuration parameter will address this issue?

A. Name
B. NAS-Identifier
C. RADIUS Server
D. Shared Secret

Answer: B

Explanation:

QUESTION 4
What are three benefits that resource profiles provide over resource policies? (Choose three.)

A. Resource profiles provide automatic mapping of users to roles.
B. Resource profiles provide a simplified process for creating bookmarks and resource policies.
C. One profile can be assigned to multiple roles.
D. Resource options can be customized for each profile.
E. Resource profiles provide a simplified process for configuring applications such as VPN
tunneling.

Answer: B,C,D

Explanation:

QUESTION 5
You must deploy VPN tunneling using Network Connect to multiple Microsoft Windows devices.
Due to access restrictions, the users do not have permission to install WSAM.
Which component resolves this issue?

A. Juniper Installer Service
B. Host Checker
C. third-party integrity measurement verifier
D. Windows Secure Application Manager scriptable launcher

Answer: A

Explanation:

Friday 25 November 2016

650-159 ICA Cisco IronPort Cloud Associate

Exam Number 650-159
Duration 90 minutes (25-35 questions)
Available Languages English

The 650-159 ICA Cisco IronPort Cloud Associate exam tests your knowledge of the following:
What ScanSafe does and how it works
The various deployment methods at a technical level so you can recommend the most suitable deployment to customers according to their needs and existing infrastructure

Basic administration, how to manage a web-filtering policy, and how to run reports on web usage within the ScanCenter GUI

Exam Topics
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

How to Sell ScanSafe QLMs
Web Filtering
Advanced WIRe
ScanCenter Lab Exercise
Deployment Options
Outbreak Intelligence
 


QUESTION 1
What important consideration do you need to be aware of when using a Connector?

A. Multiple DHCP servers
B. Multiple DNS servers
C. Multiple break-out points

Answer: C

Explanation:


QUESTION 2
How can AnyConnect be bypassed by a user when installed locked-down?

A. When locked-down, AnyConnect can be bypassed by a user by changing the Browser Proxy settings
B. When locked-down, AnyConnect can be bypassed by a user if they know the admin password
C. AnyConnect cannot ever be bypassed by a user when installed locked-down

Answer: C

Explanation:


QUESTION 3
How are different time zones supported by WIRe?

A. Each entry is converted to UTC as it is stored, so you can select any time zone in the GUI when
searching and see the times according to the user's local time
B. All entries are recorded only in their local time zone, so you need to calculate the time offset
when searching for data of users in different time zones
C. There is no support for different time zones in WIRe

Answer: A

Explanation:


QUESTION 4
If a customer wants roaming protection for laptops with Windows 7 64 bit, and is not using Cisco's VPN, which one of the following would be the best solution:

A. Anywhere*
B. AnyConnect Web Security standalone client
C. Anywhere* or AnyConnect are both suitable
D. This scenario cannot be supported by Anywhere* or AnyConnect

Answer: B

Explanation:



Monday 14 November 2016

650-665 CSPWCHD Cisco SP Video Wireline and Cable Headend Design for SE for Validating Knowledge (not for Cisco Certification)

SE Cisco SP Video Wireline Cable Headend Design (650-665)

Exam Description:
The 650-665 Cisco SP Video Wireline and Cable Headend Design for SE (CSPWCHD) 650-665 exam is a 45-minute test with 25–35 questions. The exam tests a candidate's knowledge on designing a service provider Wireline or cable video solution, configuring and testing the solution, and comparing it against competitive solutions by articulating key differentiators. Candidates can prepare for this exam by taking the Authorized Service Provider Video Partner Wireline and Cable Headend Design track of training, including Phases I, II, and III.

The following topics are general guidelines for the content that is likely to be included on the exam. However, other related topics may also appear on any specific instance of the exam. To better reflect the contents of the exam and for clarity purposes, these guidelines may change at any time without notice.

100% 1.0 SE Cisco SP Video Wireline Cable Headend Design

QUESTION 1
Which output formats are available from an IRD?

A. baseband, ASI and MPEGoIP
B. RF, SDI and optical
C. QAM, optical, and analog
D. RF, ASI, and MPEGoIP

Answer: A

Explanation:


QUESTION 2
What network management system can monitor and control video headend equipment?

A. ANA
B. Cisco Works
C. ROSA
D. SNMP

Answer: C

Explanation:


QUESTION 3
What is the modulation format used in Digital Video Broadcast-S?

A. QAM 256
B. FDM
C. QPSK
D. FM

Answer: C

Explanation:

Sunday 6 November 2016

700-172 FlexPod Sales

700-172 FlexPod Sales
Exam Description:
The FlexPod Sales (700-172) exam is a 45-minute, 35−45 item exam that assesses how sales teams can effectively position FlexPod in the Data Center. Some of the topics assessed are how to consider the challenges faced by business and IT today and how this relates to FlexPod opportunities. The exam also assesses who “the customer” is and the importance of applications to many of the customers that are influential in purchasing application-based solutions.
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

30% 1.0 Customer Challenges and Business Value of FlexPod
1.1 Identify the customer challenges addressed and the corresponding value that the FlexPod architecture brings
1.1.a Responsiveness and speed of delivery
1.1.b Limited IT staff and budget
1.1.c Provisioning complexity
1.1.d Exponential data growth
1.1.e Staying competitive in their market space
1.1.f Data security
1.1.g Mobile workforce productivity
1.1.h Application availability and rollout complexity
1.1.i Application characteristics

1.2 Describe the business value proposition of converged infrastructure vs legacy infrastructure
1.2.a Describe how FlexPod delivers business agility by accelerating application development
1.2.b Describe how FlexPod mitigates risk
1.2.c Describe operational efficiency through standardization of deployment
1.2.d Describe how FlexPod enables different cloud models

1.3 Identify what makes the FlexPod architecture superior to alternate solutions
1.3.a Cisco Validated Designs (CVD)
1.3.b Open approach toward various workloads and hypervisors
1.3.c Unified architecture
1.3.d Storage efficiency
1.3.e Clustering technology
1.3.f Cisco Unified support
1.3.g Converged infrastructure (#1 system worldwide) 2013 Cisco Systems, Inc. This document is Cisco Public. Page 1
1.3.h Scale up vs scale out discussion (standard FlexPod slide)
1.3.i Secure multitenancy

1.4 Describe competitive landscape and positioning vs. other architectures and offerings
1.4.a Reference architecture approach allows customer to buy what they need
1.4.b Extensive library of validate workloads across virtualization platforms and bare metal deployments
1.4.c Scalable solutions from mid-market with FlexPod Express to the Data Center and service providers with FlexPod Datacenter
1.4.d Integrated co-operative support include hypervisors
1.4.e Integrated unified storage and networking architecture
1.4.f Secure multitenancy

19% 2.0 Technical Features and Value of the Constituent Components
2.1 Describe Cisco Unified Computing System (UCS) and the value proposition
2.1.a Cisco UCS service profiles, stateless computing, simplified deployment for non-virtualized workloads
2.1.b Identify supported hypervisors (VMware, Microsoft, XenServer)
2.1.c Articulate the Cisco UCS market Impact
2.2 Describe Cisco Nexus family
2.2.a Describe the value proposition of Cisco Unified fabric – power, cooling, and cabling savings aspect
2.2.b Identify the benefits of various fabric options (switches, fabrics, and interconnects)
2.3 Describe NetApp storage
2.3.a Identify the benefits of a NetApp storage architecture
2.3.a (i) Leading storage efficiency
2.3.a (ii) Nondisruptive operations
2.3.a (iii) Seamless platform scalability
2.3.a (iv) Ease of management
2.3.a (v) Enable cloud computing evolution into hybrid environment
2.3.b Describe the differences between 7 Mode, Clustered Data ONTAP, and E Series
2.3.c Describe the characteristics of a unified storage platform

19% 3.0 FlexPod Management, Automation, and Orchestration
3.1 Describe the differences between management, automation, and orchestration
3.1.a Management
3.1.b Automation
3.1.c Orchestration
3.2 Identify the appropriate cloud solution for the customer use case (private, public, and hybrid)
3.2.a Private cloud
3.2.b Public cloud
3.2.c Hybrid cloud

20% 4.0 Application Workloads and Use Cases Enabled by FlexPod
4.1 Describe IT business transformation and related business process and application drivers
4.1.a Increase demand for more agile IT infrastructure to meet the business need
4.1.b Requirement to increase the efficiency within the data center
4.1.c Enable simple scaling of the infrastructure to meet the business requirements
4.1.d Enable future development of a hybrid cloud strategy
4.1.e Meet regulatory requirements
4.1.f Limited IT resources for managing infrastructure
4.1.g Requirement for IT to become a business enabler
4.1.h Transformation of IT from a builder of infrastructure to a provider of services
4.1.i Enable IT to be prepared for new workloads generated for new channels, such as mobile
4.1.j Enable the business to consume IT on demand
4.2 Identify various application buying centers within organizations – LOB, consultant, architect, server admins, VP of IT, CIO, Facilities, and Procurement
4.2.a Head of IT – Manager / VP / CIO
4.2.b Security office
4.2.c Business unit owner
4.2.d Application owner
4.2.e Application administrator
4.2.f Database administrator
4.2.g Infrastructure manager
4.2.h Operations management
4.2.i Data center manager
4.2.j Network manager
4.2.k Storage manager
4.2.l Data protection / backup administrator
4.2.m Procurement
4.3 Determine customer critical applications, insertion points and risk factors
4.3.a Business critical
4.3.a (i) Applications viewed as critical will vary between companies and based on the level of impact that downtime or logical corruption would have on the business
4.3.a (ii) ERP
4.3.a (iii) Collaboration – email and messaging
4.3.a (iv) Finance and accounting
4.3.a (v) Core databases
4.3.a (vi) Web-portals
4.3.a (vii) CRM
4.3.a (viii) Payroll
4.3.a (ix) Business Intelligence
4.3.b Risk factors
4.3.b (i) Network link failures
4.3.b (ii) Hardware failures
4.3.b (iii) Thermal or cooling issues 2014 Cisco Systems, Inc. This document is Cisco Public. Page 3
4.3.b (iv) Finance and accounting
4.3.b (v) Power failures
4.3.b (vi) Application or database failures
4.3.b (vii) Human error
4.3.b (viii) Malicious intent
4.3.b (ix) Building-level disruption
4.3.b (x) Metro-level disruption
4.3.b (xi) Regional disruption
4.4 Describe the need to collaborate with application software and hardware vendors
4.4.a All IT environments are made up of storage, networking, compute, operating system, application and management components that work together to create a solution.
4.4.b Each part within the solution has a dependency on one or more other layers, so working with vendors who work closely together minimizes the risk when deploying an infrastructure.
4.4.c Collaboration between vendors enables optimization of the infrastructure to ensure the best price, performance and reliability of an infrastructure.
4.5 Describe the different use cases and application workloads that can be virtualized and nonvirtualized and describe how FlexPod meets their needs
4.5.a Describe n-tier architecture
4.5.b Describe applications and service opportunities
4.5.b (i) Oracle (E-Business Suite, Siebel, PeopleSoft)
4.5.b (ii) SAP (HANA, NetWeaver, Business Suite)
4.5.b (iii) Microsoft (Exchange, Hyper-V, SharePoint, SQL, System Center)
4.5.b (iv) IBM (WebSphere, Tivoli, Rational Software, Informix)
4.5.c Identify application acronyms: CRM, SCM, PLM, HRIS, BI/DSS, ERP, FM
4.5.d Identify situations best suited for using virtualization (scenario questions)
4.5.e Application dependent
4.5.f Database – no
4.5.g Web, Microsoft, desktop, general purpose – yes
4.5.h Identify situations best suited for using bare-metal implementation
4.5.i Capacity, security, and corporate guidelines
4.5.j How FlexPod enhances desktop and server virtualization
4.5.k Identify applications addressed by CVDs

12% 5.0 FlexPod Programs, Tools, and Resources
5.1 Describe Premium Partner program and FlexPod Premium framework
5.1.a Identify what FlexPod Premium partners bring to the table (NetApp/Cisco certified training)
5.1.a (i) A scalable framework from Cisco and NetApp that recognizes and rewards partners for achieving the highest level of FlexPod competency
5.1.a (ii) A mutual investment from Cisco and NetApp to deliver greater value to those partners
5.1.a (iii) A single set of qualification criteria to identify and differentiate partners with highest level of competency 2014 Cisco Systems, Inc. This document is 5.1.a (iv) An opportunity to communicate with one voice to highest level of FlexPod partners
5.1.a (v) Incremental benefits
5.2 Describe FlexPod Partner profitability
5.2.a Rebate program
5.2.b Partner sales desk
5.2.c Extra margin programs and Cisco UCS Breakaway
5.2.d Cisco UCS and Nexus front-end partner programs, such as SIP and OIP
5.2.e Cisco UCS SmartPlay bundles
5.3 Identify FlexPod resources and tools
5.3.a Describe CiscoNetApp.com, Cisco.com, and NetApp partner portal
5.3.b Describe the CVD warehouse (design zone)
5.3.c Describe the ROI and TCO tools
5.3.d Describe the FlexPod support model

1. Overview
This document provides configuration guidance for users of Cisco® IOS SSLVPN. This feature is
designed to terminate SSL VPN connections on Cisco IOS Software-based routers (1800, 2800,
3700, 3800, 7200, and 7301). SSL VPN is comparable to and complements the popular IP
Security (IPsec) remote-access VPN.

The testing was performed at the NSITE lab in Research Triangle Park, North Carolina (RTP) on
the devices defined above. The objective of the testing was to configure and test interaction of
Cisco IOS SSLVPN with authentication, authorization, and accounting (AAA) policies using the
backup authentication setup. This is typically used by a provider with redundant AAA servers.
Advantage: The primary advantage of backup AAA authentication is the provider can have
redundant AAA servers. In the event of failure, users will still be authenticated. This setup can be
used with any of the AAA designs, and will work with authentication domains.
Note: All Cisco IOS SSL VPN/WebVPN features are included in a single, cost-effective license
that would be purchased separately. You can purchase the feature license in packs of 10, 25, or
100 simultaneous users directly from the Cisco.com configuration tool. If you already have a
router, use the following SKUs to order the license: FL-WEBVPN-10-K9=, FL-WEBVPN-25-K9=,
FL WEBVPN 100-K9=. Check the data sheet to find the maximum supported users for your platform.

2. Audience
This configuration guide is intended for customers and partners working to provide configuration
guidelines and best practices for smaller SSL VPN deployments.

3. Network Topology
Figure 1 shows a Cisco IOS SSL VPN topology that uses redundant AAA servers.
Figure 1. Cisco IOS SSL VPN Topology with Redundant AAA Servers



4. Basic Configurations
4.1 Global AAA Configuration
When the primary AAA server is unreachable, the service provider will typically have a backup
AAA server. When the router does not get a pass/fail response from the primary server, it will
eventually time out. Next it will send the request to the secondary server. It will work with the
authentication domains as well, but this will need to be set up on both servers.





Saturday 5 November 2016

Exam MB2-711 Microsoft Dynamics CRM 2016 Installation

Published: February 12, 2016
Languages: English, Chinese (Simplified), French, German, Japanese, Spanish
Audiences: IT Professionals
Technology: Microsoft Dynamics CRM
Credit toward certification: Specialist

This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Prepare to install Microsoft Dynamics CRM (10–15%)
Plan a deployment
Identify supported browsers, describe requirements for Dynamics CRM for tablets, describe Dynamics CRM offerings and editions, identify user client access license types, understand differences between device and user client access licenses, describe access modes
Identify system requirements
Identify technologies that support a Dynamics CRM installation, describe Dynamics CRM server hardware and software requirements, identify supported server topologies, describe server roles, implement Microsoft Dynamics Sure Step
Identify related technologies
Describe SQL Server hardware requirements, identify supported SQL Server editions, describe other SQL Server requirements, identify Active Directory requirements and Active Directory groups
Identify email processing options
Describe the advantages and disadvantages of each email processing option, identify email tracking and correlation methods, identify user options for automatic email tracking, describe email correlation, describe folder-level tracking for Microsoft Exchange folders, enable and configure folder-level tracking, describe the process for monitoring individual and forward mailboxes, describe synchronization methods, configure mailbox records, configure email address approval

Deploy Microsoft Dynamics CRM (10–15%)

Install Dynamics CRM
Identify components installed during setup, identify required installation rights, describe installation steps, troubleshoot an installation, install sample data, install Dynamics CRM using the command line, configure multiple languages, and currencies
Install Report Authoring Extensions and Reporting Extensions
Identify tools for creating custom reports, describe SQL-based and fetch-based reports, describe Reporting Extensions, describe reporting options, identify installation requirements
Install and configure the Email Router
Describe the role of the Email Router, identify Email Router components and hardware and software requirements, identify installation steps, install the Rule Deployment Wizard, set up a forward mailbox, deploy Inbox rules, configure mailbox forwarding rules

Manage Microsoft Dynamics CRM 2016 (10–15%)
Configure Dynamics CRM
Identify deployment administrators, manage organizations, manage servers in the deployment, modify web addresses, view license information, upgrade the Dynamics CRM edition, administer Dynamics CRM using PowerShell
Manage organizations
Identify options for importing organizations, describe import steps, map users
Redeploy Dynamics CRM
Identify conditions for redeploying Dynamics CRM, describe redeployment steps

Upgrade to Microsoft Dynamics CRM 2016 (10–15%)
Plan an upgrade
Identify versions that can be upgraded, identify upgrade process, describe the base and extension table merge process, describe upgrade methods, describe steps to perform an in-place installation, describe the steps to perform a migration with the same SQL Server, migrate using a new SQL Server instance, identify other upgrade considerations
Upgrade to Dynamics CRM 2016
Identify the steps to prepare an upgrade, establish a test environment, upgrade and validate the test environment, upgrade and validate the production environment
Upgrade related components
Identify considerations for upgrading Microsoft Dynamics CRM for Outlook, describe the process to upgrade the Email Router, identify options for upgrading Reporting Extensions.

Install and configure server-side synchronization (10–15%)
Plan for server-side synchronization
Identify the role of server-side synchronization, identify features, identify supported configurations, create a server profile for Microsoft Exchange Online or Exchange on-premises, configure authentication, identify connection encryption requirements
Configure and manage server-side synchronization
Set up a forward mailbox, test email configuration, test and enable mailboxes, configure alerts, monitor performance using the Server-Side Synchronization Performance dashboard

Install and configure Microsoft Dynamics CRM for Outlook (10–15%)
Prepare to install Dynamics CRM for Outlook
Identify Dynamics CRM for Outlook, identify supported operating systems and components, identify support for Dynamics CRM for Outlook versions
Deploy Dynamics CRM for Outlook
Describe deployment methods, identify installation steps, deploy Dynamics CRM for Outlook using the command line
Configure Dynamics CRM for Outlook
Configure multiple organizations, enable offline capabilities, describe offline capabilities, identify fields that can be synchronized, describe limitations for synchronized fields, configure synchronized fields, configure data synchronization filters

Manage an Internet-facing deployment (10–15%)
Plan authentication
Describe claims-based authentication, identify requirements, configure required DNS entries, describe Active Directory Federation Services certificates, describe Microsoft Dynamics CRM website and claims certificates, describe wildcard certificates
Install and configure an Internet-facing deployment
Identify installation methods, configure a Claims Provider Trust, implement the Configure Claims-Based Authentication Wizard, add a Relying Party trust, implement the Configure Internet-facing Deployment Wizard, add required domain names

Maintain and troubleshoot a deployment (10–15%)
Monitor Microsoft Dynamics CRM
Identify installed services, identify where service accounts are used, manage service accounts, manage system jobs, limit asynchronous jobs, bulk delete records, configure disaster recovery methods, identify registry keys for server tracing, configure and enable tracing
Update Microsoft Dynamics CRM
Identify update types, identify order of updates, implement Microsoft Update, update clients and multiple servers, determine which updates are installed

Friday 4 November 2016

700-070 IX5K Cisco TelePresence IX5000 Series Immersive Solutions

Exam Number 700-070 IX5K
Associated Certifications Cisco TelePresence Solutions Specialist
Cisco TelePresence Video Master Authorized Technology Provider Program (ATP)
Duration 60 minutes (45-55 questions)
Available Languages English

This exam is designed to provide students with a strong understanding of the installation, configuration, operation, maintenance, and troubleshooting of the Cisco IX5000 and IX5200 systems. The Cisco IX5000 exam assessment topics include features and options, physical installation, configuration, operations, maintenance, upgrades, and troubleshooting.

The Cisco TelePresence IX5000 Series Immersive Solutions exam (700-070) is a 60 minute, 45-55 question assessment that is associated with the Cisco IX5000 Series Immersive Solutions course. The Cisco IX5000 Series Immersive Solutions course is designed to provide students with a strong understanding of the installation, configuration, operation, maintenance, and troubleshooting of the Cisco IX5000 and IX5200 systems. The Cisco IX5000 exam assessment topics include features and options, physical installation, configuration, operations, maintenance, upgrades, and troubleshooting.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Immersive TelePresence 10%
1.1 Describe Immersive TelePresence and how it is implemented
1.2 Describe the Cisco IX5000 Series system characteristics

2.0 Cisco IX5000 Overview 10%
2.1 Identify the components of the IX5000 Series endpoints
2.2 Identify the components of the infrastructure needed to support the IX5000 Series

3.0 Cisco IX5000 Installation Overview 15%
3.1 Describe the pre-installation tasks for the IX5000 Series
3.2 Describe the physical setup of the IX5000 Series systems
3.3 Describe the electrical, network, and system wiring tasks for the IX5000 Series
3.4 Describe first-time setup considerations for the IX5000 Series endpoints
3.5 Describe the optional hardware peripheral devices available with the IX5000 Series endpoints

4.0 Cisco IX5000 Configuration 15%
4.1 Explain how to configure the infrastructure that supports the IX5000 Series
4.2 Explain how to configure the IX5000 endpoint

5.0 Cisco IX5000 Operations 20%
5.1 Explain how to schedule OBTP calls with the IX5000 System and Cisco TMS
5.2 Explain how to use the Cisco Touch Control Panel to place and manage calls on the IX5000 Series
5.3 Explain how to share content using the IX5000 Series
5.4 Explain how to change user controlled options on the IX5000 Series

6.0 Cisco IX5000 Maintenance 15%
6.1 Describe basic maintenance tasks for the IX5000 endpoint
6.2 Describe basic maintenance tasks for the infrastructure that supports the IX5000
6.3 Describe the upgrade considerations for the IX5000 Series

7.0 Cisco IX5000 Basic Troubleshooting 15%
7.1 Describe common issues that can be encountered by IX5000 users
7.2 Describe how to troubleshoot common problems for the IX5000 Series


QUESTION 1
What causes echo or reverberation in the room during a call?

A. too many acoustic panels
B. too many hard surfaces
C. too many people
D. too many devices

Answer: B

Explanation:
A common problem with rooms larger than the Cisco recommended dimensions is excessive
reverberation. Large rooms with smooth surface areas such as glass or long parallel walls reflect
more sound and in some cases create a noticeable echo, giving the room a ‘boomy’ or ‘echoy’
effect. Additionally, rooms with hard floors or hard-finished ceilings have more reverberation due to
the increased hard-surface areas present. Generally reverberation is more of a concern for
participants in the room than for the audio being shared with the other side of the Immersive Cisco
TelePresence meeting.
Reference:http://www.cisco.com/c/dam/en/us/solutions/collateral/collaboration-endpoints/c07-
643449-00_tp_dg.pdf


QUESTION 2
What is the purpose of the IX5000?

A. immersive collaboration
B. mobile-device use
C. desktop use
D. home use

Answer: A

Explanation:


QUESTION 3
Which two peripheral devices are available for the IX5000? (Choose two.)

A. additional Touch 12 screens
B. additional Touch 10 screens
C. additional Touch 8 screens
D. document scanner
E. auxiliary monitors

Answer: B,E
Reference:
http://www.cisco.com/c/en/us/td/docs/telepresence/ix5000/recommendations/ix5000_room_require
ments.html


QUESTION 4
Which two standards does the IX5000 codec support? (Choose two.)

A. H.324
B. H.320
C. H.265
D. G.729AB
E. G.728

Answer: A,C

Explanation:


QUESTION 5
Which infrastructure component is needed for OBTP?

A. Prime Collaboration
B. Cisco VCS
C. Cisco TMS
D. Cisco TelePresence System

Answer: C

Explanation:
The Cisco TelePresence Management Suite (TMS) is delivered as a management appliance or
software that can be loaded on a server. Cisco TMS provides one-button-to-push (OBTP) call
launching, scheduling, monitoring, and provisioning for TelePresence endpoints registered with
the VCS.
Reference:
http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/uc_system/design/guides/videodg/vidguide/infrastr.html


Thursday 3 November 2016

Exam MB2-710 Microsoft Dynamics CRM 2016 Online Deployment

Published: January 26, 2016
Languages: English, Chinese (Simplified), French, German, Japanese, Spanish
Audiences: IT Professionals
Technology: Microsoft Dynamics CRM
Credit toward certification: Specialist

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Implement a Microsoft Dynamics CRM Online deployment (10% - 15%)
Access Microsoft Dynamics CRM Online
Describe methods for accessing Microsoft Dynamics CRM Online; identify supported browsers; identify supported phone operating systems; describe requirements for Dynamics CRM for tablets; identify supported web browsers; identify user subscription license types; describe subscription add-ons
Plan a deployment
Identify the storage requirements; plan security; determine the number of instances and licenses that are required; identify implications of implementing single sign-on
Import data
Compare the methods for importing data; import data by using the Import Data Wizard; identify limitations of import processes
Customize Microsoft Dynamics CRM Online
Create new fields; modify values for option sets; modify entity forms; create new entities and reports; modify views and dashboards

Configure Microsoft Dynamics CRM Online (10% - 15%)
Configure subscriptions
Identify methods to sign-up for a subscription; identify subscription requirements; describe the subscription cancellation process; describe the methods for purchasing add-ons
Manage users
Identify the methods to add users to Dynamics CRM Online; assign Microsoft Dynamics CRM Online licenses to users; assign security roles; enable and disable users; describe non-interactive users; mark a user as non-interactive; identify administrative roles
Synchronize user accounts
Compare Dynamics CRM Online accounts with company accounts; describe user synchronization; identify the steps to synchronize Active Directory with Office 365; describe Active Directory Federation Services

Manage Microsoft Dynamics CRM Online (10% - 15%)
Administer Microsoft Dynamics CRM Online instances
Define instances; describe the relationship between instances subscriptions, tenants, and security groups; describe instance types; set instance properties; switch an instance; reset an instance; place an instance in administrative mode; delete an instance; describe methods to copy an instance; create a copy of an instance
Describe tenant considerations
Identify limitations on the number and type of instances per tenant; configure the region for a tenant; describe limitation and requirements for multiple tenants
Manage storage and administrative notifications
Identify the storage limit for a subscription; describe the implications of reaching the storage limit; view resources used; identify requirements and limitations for sending administrative notifications
Describe the Microsoft Dynamics CRM Online update policy
Identify the frequency of updates; describe the update process; determine the version of Microsoft Dynamics CRM Online; skip updates; approve updates; determine what updates are available; reschedule an update

Manage related services (10% - 15%)
Describe related services
Identify related online services; integrate Microsoft Social Engagement with Microsoft Dynamics CRM Online; manage campaigns with Microsoft Dynamics Marketing
Integrate Yammer and SharePoint Online
Describe Yammer and SharePoint Online; identify SharePoint Online integration types; describe the integration process
Integrate OneNote, Skype, Skype for Business, Office 365 Groups, and OneDrive for Business
Compare Dynamics CRM Notes and OneNote; identify storage location for OneNote notebooks; configure OneNote integration; integrate Skype and Skype for Business; identify limitations for Skype and Skype for Business; describe Office 365 Groups; identify requirements for Office 365 Groups; integrate Office 365 Groups with Microsoft Dynamics CRM Online

Manage mobile device apps (10% - 15%)
Install and use mobile device apps
Identify the mobile apps for phones and tablets; describe requirements for mobile apps; identify supported mobile device hardware and software; install mobile apps; configure security privileges; describe restrictions for working offline; create draft records
Configure entities for mobile
Identify entity types that can be accessed from mobile apps; hide form components; enable dashboards for mobile apps

Implement Microsoft Dynamics CRM for Microsoft Office Outlook (10% - 15%)
Deploy Dynamics CRM for Outlook
Identify supported operating systems; describe required software components; compare Dynamics CRM for Outlook versions; identify deployment methods; configure Dynamics CRM for Outlook; configure multiple organizations
Configure offline capabilities
Describe offline capabilities; identify fields that can be synchronized; describe limitations for synchronized fields; configure synchronized fields

Manage email (10% - 15%)
Select an email processing option
Identify email processing options; describe the advantages of each email processing option; identify limitations and requirements for each email processing option
Track and correlate email
Compare email tracking with email correlation; describe user options for automatic tracking; describe correlation options; identify limitations of folder-level tracking; configure folder-level tracking for Exchange folders
Manage mailbox records and email
Describe synchronization methods for incoming and outgoing email; configure the default synchronization method for users and queues; describe mailbox records; configure approval for email addresses

Manage server-side synchronization (10% - 15%)
Configure server-side synchronization
Describe server-side synchronization; identify server-side synchronization features and supported configurations; set the email processing method; configure mailbox records
Set up a forwarding mailbox
Describe mailbox forwarding; create a forward mailbox record; add email forwarding rules for users; add mailbox records to server profile; enable mailboxes; test email configuration; describe synchronization alerts; view the Performance Dashboard


QUESTION 1
You need to allow Microsoft Dynamics CRM Online users to use the same password they use to logon to your on-premises Active Directory Domain Services (AD DS) domain to logon to Azure Active Directory.
Which two components must be configured to achieve this goal? Each correct answer presents part of solution.

A. Microsoft Azure Active Directory Connect tool
B. Password Sync
C. Active Directory Application Mode (ADAM)
D. Active Directory Federation Services (AD FS)

Answer: B,C


QUESTION 2
You are unrig Microsoft Dynamics CRM 20X6 on–premises.
Which server role does server-side synchronization utilize?

A. Sandbox Processing Service
B. Web Application Server
C. Asynchronous Service
D. Organization Web Service

Answer: A


QUESTION 3
You are a marketing manager for a company. The company has a subscription to a Microsoft Dynamics CRM Online organizationthat is fully integrated with Microsoft Dynamics Marketing and the Seller Portal solution.
You need to create andmanage a marketing campaign to include tracking campaign performance and click-through rates, and use data derived from the campaign to score and qualify leads.
Which action should you take?

A. Open Microsoft Dynamics Marketing.
B. Open Microsoft Dynamics CRM Online.
C. Open the Seller Portal.
D. Open the Microsoft Dynamics Marketing Connector.

Answer: B


QUESTION 4
You receive an email that indicates a new update for Microsoft Dynamics CRM Online is available. You are a global administrator for a tenant that contains two Microsoft Dynamics CRM Online instances.
Which statement describes the Microsoft Dynamics CRM Online update policy?

A. Updates must be installed twice per year within the customer driven update time period and cannot be skipped.
B. Updates are installed automatically within 30 days from the release date.
C. Updates are installed once it is approved at the tenant level.
D. Updates are installed once it is approved at the instance level.

Answer: A


QUESTION 5
You select Forward Mailbox as your incoming synchronization method. You process emails with the Microsoft Dynamics CRM 2016 Email Router between Microsoft Dynamics CRM
Online and a SMTP/POP3 server.
You need to deploy inbox rules so emails addressed to the 100 Microsoft Dynamics CRM Online users in theorganization are forwarded to the forward mailbox for processing.
Which solution can be used to deploy forwarding rules for all the users?

A. Run the Rule Deployment Wizard.
B. Enable folder-level synchronization.
C. Create manually in Microsoft Outlook.
D. Create Exchange transport rules.

Answer: D


Monday 24 October 2016

200-125 CCNA Cisco Certified Network Associate Exam

Exam Number 200-125 CCNA
Associated Certifications CCNA Routing and Switching
Duration 90 Minutes (50-60 questions)
Available Languages English, Japanese

This exam tests a candidate's knowledge and skills related to network fundamentals, LAN switching technologies, IPv4 and IPv6 routing technologies, WAN technologies, infrastructure services, infrastructure security, and infrastructure management.

The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50–60 question assessment that is associated with the CCNA Routing and Switching certification. This exam tests a candidate's knowledge and skills related to network fundamentals, LAN switching technologies, IPv4 and IPv6 routing technologies, WAN technologies, infrastructure services, infrastructure security, and infrastructure management.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Subscribe to Cisco Learning Network Premium and access the most comprehensive e-learning training, resources and tools you’ll need to prepare for your CCENT, CCNA and CCNP Routing and Switching certifications.

1.0 Network Fundamentals 15%

1.1 Compare and contrast OSI and TCP/IP models

1.2 Compare and contrast TCP and UDP protocols

1.3 Describe the impact of infrastructure components in an enterprise network

1.3.a Firewalls
1.3.b Access points
1.3.c Wireless controllers

1.4 Describe the effects of cloud resources on enterprise network architecture

1.4.a Traffic path to internal and external cloud services
1.4.b Virtual services
1.4.c Basic virtual network infrastructure

1.5 Compare and contrast collapsed core and three-tier architectures

1.6 Compare and contrast network topologies

1.6.a Star
1.6.b Mesh
1.6.c Hybrid

1.7 Select the appropriate cabling type based on implementation requirements

1.8 Apply troubleshooting methodologies to resolve problems

1.8.a Perform and document fault isolation
1.8.b Resolve or escalate
1.8.c Verify and monitor resolution

1.9 Configure, verify, and troubleshoot IPv4 addressing and subnetting

1.10 Compare and contrast IPv4 address types

1.10.a Unicast
1.10.b Broadcast
1.10.c Multicast

1.11 Describe the need for private IPv4 addressing

1.12 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment

1.13 Configure, verify, and troubleshoot IPv6 addressing

1.14 Configure and verify IPv6 Stateless Address Auto Configuration

1.15 Compare and contrast IPv6 address types

1.15.a Global unicast
1.15.b Unique local
1.15.c Link local
1.15.d Multicast
1.15.e Modified EUI 64
1.15.f Autoconfiguration
1.15.g Anycast

2.0 LAN Switching Technologies 21%

2.1 Describe and verify switching concepts

2.1.a MAC learning and aging
2.1.b Frame switching
2.1.c Frame flooding
2.1.d MAC address table

2.2 Interpret Ethernet frame format

2.3 Troubleshoot interface and cable issues (collisions, errors, duplex, speed)

2.4 Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches

2.4.a Access ports (data and voice)
2.4.b Default VLAN

2.5 Configure, verify, and troubleshoot interswitch connectivity

2.5.a Trunk ports
2.5.b Add and remove VLANs on a trunk
2.5.c DTP, VTP (v1&v2), and 802.1Q
2.5.d Native VLAN

2.6 Configure, verify, and troubleshoot STP protocols

2.6.a STP mode (PVST+ and RPVST+)
2.6.b STP root bridge selection

2.7 Configure, verify and troubleshoot STP related optional features

2.7.a PortFast
2.7.b BPDU guard

2.8 Configure and verify Layer 2 protocols

2.8.a Cisco Discovery Protocol
2.8.b LLDP

2.9 Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel

2.9.a Static
2.9.b PAGP
2.9.c LACP

2.10 Describe the benefits of switch stacking and chassis aggregation

3.0 Routing Technologies 23%

3.1 Describe the routing concepts

3.1.a Packet handling along the path through a network
3.1.b Forwarding decision based on route lookup
3.1.c Frame rewrite

3.2 Interpret the components of a routing table

3.2.a Prefix
3.2.b Network mask
3.2.c Next hop
3.2.d Routing protocol code
3.2.e Administrative distance
3.2.f Metric
3.2.g Gateway of last resort

3.3 Describe how a routing table is populated by different routing information sources

3.3.a Admin distance

3.4 Configure, verify, and troubleshoot inter-VLAN routing

3.4.a Router on a stick
3.4.b SVI

3.5 Compare and contrast static routing and dynamic routing

3.6 Compare and contrast distance vector and link state routing protocols

3.7 Compare and contrast interior and exterior routing protocols

3.8 Configure, verify, and troubleshoot IPv4 and IPv6 static routing

3.8.a Default route
3.8.b Network route
3.8.c Host route
3.8.d Floating static

3.9 Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)

3.10 Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)

3.11 Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub)

3.12 Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub)

3.13 Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution)

3.14 Troubleshoot basic Layer 3 end-to-end connectivity issues

4.0 WAN Technologies 10%

4.1 Configure and verify PPP and MLPPP on WAN interfaces using local authentication

4.2 Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication

4.3 Configure, verify, and troubleshoot GRE tunnel connectivity

4.4 Describe WAN topology options

4.4.a Point-to-point
4.4.b Hub and spoke
4.4.c Full mesh
4.4.d Single vs dual-homed

4.5 Describe WAN access connectivity options

4.5.a MPLS
4.5.b Metro Ethernet
4.5.c Broadband PPPoE
4.5.d Internet VPN (DMVPN, site-to-site VPN, client VPN)

4.6 Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)

4.7 Describe basic QoS concepts

4.7.a Marking
4.7.b Device trust
4.7.c Prioritization
4.7.c. [i] Voice
4.7.c. [ii] Video
4.7.c. [iii] Data
4.7.d Shaping
4.7.e Policing
4.7.f Congestion management

5.0 Infrastructure Services 10%

5.1 Describe DNS lookup operation

5.2 Troubleshoot client connectivity issues involving DNS

5.3 Configure and verify DHCP on a router (excluding static reservations)

5.3.a Server
5.3.b Relay
5.3.c Client
5.3.d TFTP, DNS, and gateway options

5.4 Troubleshoot client- and router-based DHCP connectivity issues

5.5 Configure, verify, and troubleshoot basic HSRP

5.5.a Priority
5.5.b Preemption
5.5.c Version

5.6 Configure, verify, and troubleshoot inside source NAT

5.6.a Static
5.6.b Pool
5.6.c PAT

5.7 Configure and verify NTP operating in a client/server mode

6.0 Infrastructure Security 11%

6.1 Configure, verify, and troubleshoot port security

6.1.a Static
6.1.b Dynamic
6.1.c Sticky
6.1.d Max MAC addresses
6.1.e Violation actions
6.1.f Err-disable recovery

6.2 Describe common access layer threat mitigation techniques

6.2.a 802.1x
6.2.b DHCP snooping
6.2.c Nondefault native VLAN

6.3 Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering

6.3.a Standard
6.3.b Extended
6.3.c Named

6.4 Verify ACLs using the APIC-EM Path Trace ACL analysis tool

6.5 Configure, verify, and troubleshoot basic device hardening

6.5.a Local authentication
6.5.b Secure password
6.5.c Access to device
6.5.c. [i] Source address
6.5.c. [ii] Telnet/SSH
6.5.d Login banner

6.6 Describe device security using AAA with TACACS+ and RADIUS

7.0 Infrastructure Management 10%

7.1 Configure and verify device-monitoring protocols

7.1.a SNMPv2
7.1.b SNMPv3
7.1.c Syslog

7.2 Troubleshoot network connectivity issues using ICMP echo-based IP SLA

7.3 Configure and verify device management

7.3.a Backup and restore device configuration
7.3.b Using Cisco Discovery Protocol or LLDP for device discovery
7.3.c Licensing
7.3.d Logging
7.3.e Timezone
7.3.f Loopback

7.4 Configure and verify initial device configuration

7.5 Perform device maintenance

7.5.a Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify)
7.5.b Password recovery and configuration register
7.5.c File system management

7.6 Use Cisco IOS tools to troubleshoot and resolve problems

7.6.a Ping and traceroute with extended option
7.6.b Terminal monitor
7.6.c Log events
7.6.d Local SPAN

7.7 Describe network programmability in enterprise network architecture

7.7.a Function of a controller
7.7.b Separation of control plane and data plane
7.7.c Northbound and southbound APIs

QUESTION 22
A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?
A. session
B. transport
C. network
D. data link
E. physical

Answer: D
Explanation:
The Data Link layer provides the physical transmission of the data and handles error notification, network topology, and flow control. The Data Link layer formats the message into pieces, each called a data frame, and adds a customized header containing the hardware destination and source address. Protocols Data Unit (PDU) on Datalink layer is called frame. According to this question the frame is damaged and discarded which will happen at the Data Link layer.


QUESTION 23
A router has two Fast Ethernet interfaces and needs to connect to four VLANs in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance?
A. Use a hub to connect the four VLANS with a Fast Ethernet interface on the router.
B. Add a second router to handle the VLAN traffic.
C. Add two more Fast Ethernet interfaces.
D. Implement a router-on-a-stick configuration.

Answer: D
Explanation:
A router on a stick allows you to use sub-interfaces to create multiple logical networks on a single physical interface.

QUESTION 25
In an Ethernet network, under what two scenarios can devices transmit? (Choose two.)
A. when they receive a special token
B. when there is a carrier
C. when they detect no other devices are sending
D. when the medium is idle
E. when the server grants access

Answer: C,D
Explanation:
Ethernet network is a shared environment so all devices have the right to access to the medium. If more than one device transmits simultaneously, the signals collide and cannot reach the destination.
If a device detects another device is sending, it will wait for a specified amount of time before attempting to transmit.
When there is no traffic detected, a device will transmit its message. While this transmission is occurring, the device continues to listen for traffic or collisions on the LAN. After the message is sent, the device returns to its default listening mode.

QUESTION 28
VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan 3 command in interface configuration mode?
A. The command is rejected.
B. The port turns amber.
C. The command is accepted and the respective VLAN is added to vlan.dat.
D. The command is accepted and you must configure the VLAN manually.

Answer: C
Explanation:
The “switchport access vlan 3” will put that interface as belonging to VLAN 3 while also updated the VLAN database automatically to include VLAN 3.


QUESTION 29
Which term describes a spanning-tree network that has all switch ports in either the blocking or forwarding state?
A. converged
B. redundant
C. provisioned
D. spanned

Answer: A
Explanation:
Spanning Tree Protocol convergence (Layer 2 convergence) happens when bridges and switches have transitioned to either the forwarding or blocking state. When layer 2 is converged, root bridge is elected and all port roles (Root, Designated and Non-Designated) in all switches are selected.


Tuesday 18 October 2016

Exam 70-743 Upgrading Your Skills to MCSA: Windows Server 2016 (beta)

Published: July 22, 2016
Languages:  English
Audiences: IT professionals
Technology: Windows Server 2016
Credit toward certification: MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Install Windows Servers in host and compute environments
Install, upgrade, and migrate servers and workloads
Determine Windows Server 2016 installation requirements; determine appropriate Windows Server 2016 editions per workloads; install Windows Server 2016; install Windows Server 2016 features and roles; install and configure Windows Server Core; manage Windows Server Core installations using Windows PowerShell, command line, and remote management capabilities; implement Windows PowerShell Desired State Configuration (DSC) to install and maintain integrity of installed environments; perform upgrades and migrations of servers and core workloads from Windows Server 2008 and Windows Server 2012 to Windows Server 2016; determine the appropriate activation model for server installation, such as Automatic Virtual Machine Activation (AVMA), Key Management Service (KMS), and Active Directory-based Activation
Install and configure Nano Server
Determine appropriate usage scenarios and requirements for Nano Server, install Nano Server, implement Roles and Features on Nano Server, manage and configure Nano Server, manage Nano Server remotely using Windows PowerShell
Create, manage, and maintain images for deployment
Plan for Windows Server virtualization; plan for Linux and FreeBSD deployments; assess virtualization workloads using the Microsoft Assessment and Planning (MAP) Toolkit; determine considerations for deploying workloads into virtualized environments; update images with patches, hotfixes, and drivers; install roles and features in offline images; manage and maintain Windows Server Core, Nano Server images, and VHDs using Windows PowerShell

Implement storage solutions
Implement Server Storage
Configure storage pools; implement simple, mirror, and parity storage layout options for disks or enclosures; expand storage pools; configure Tiered Storage; configure iSCSI target and initiator; configure iSNS; configure Datacenter Bridging (DCB); configure Multi-Path IO (MPIO); determine usage scenarios for Storage Replica; implement Storage Replica for server-to-server, cluster-to-cluster, and stretch cluster scenarios
Implement Data Deduplication
Implement and configure Deduplication, determine appropriate usage scenarios for Deduplication, monitor Deduplication, implement a backup and restore solution with Deduplication

Implement Hyper-V
Install and configure Hyper-V
Determine hardware and compatibility requirements for installing Hyper-V, install Hyper-V, install management tools, upgrade from existing versions of Hyper-V, delegate virtual machine management, perform remote management of Hyper-V hosts, configure virtual machines using Windows PowerShell Direct, implement nested virtualization
Configure virtual machine (VM) settings
Add or remove memory in running a VM, configure dynamic memory, configure Non-Uniform Memory Access (NUMA) support, configure smart paging, configure Resource Metering, manage Integration Services, create and configure Generation 1 and 2 VMs and determine appropriate usage scenarios, implement enhanced session mode, create Linux and FreeBSD VMs, install and configure Linux Integration Services (LIS), install and configure FreeBSD Integration Services (BIS), implement Secure Boot for Windows and Linux environments, move and convert VMs from previous versions of Hyper-V to Windows Server 2016 Hyper-V, export and import VMs; implement Discrete Device Assignment (DDA)
Configure Hyper-V storage
Create VHDs and VHDX files using Hyper-V Manager, create shared VHDX files, configure differencing disks, modify virtual hard disks, configure pass-through disks, resize a virtual hard disk, manage checkpoints, implement production checkpoints, implement a virtual Fibre Channel adapter, configure storage Quality of Service (QoS)
Configure Hyper-V networking
Add and remove virtual network interface cards (vNICs), configure Hyper-V virtual switches, optimize network performance, configure MAC addresses, configure network isolation, configure synthetic and legacy virtual network adapters, configure NIC teaming in VMs, configure virtual machine queue (VMQ), enable Remote Direct Memory Access (RDMA) on network adapters bound to a Hyper-V virtual switch using Switch Embedded Teaming (SET), configure Bandwidth Management

Implement Windows containers
Deploy Windows containers
Determine installation requirements and appropriate scenarios for Windows containers, install and configure Windows Server container host in physical or virtualized environments, install and configure Windows Server container host to Windows Server Core or Nano Server in a physical or virtualized environment, install Docker on Windows Server and Nano Server, configure Docker daemon start-up options, configure Windows PowerShell for use with containers, install a base operating system, tag an image, uninstall an operating system image, create Windows Server containers, create Hyper-V containers
Manage Windows containers
Manage Windows or Linux containers using the Docker daemon, manage Windows or Linux containers using Windows PowerShell, manage container networking, manage container data volumes, manage Resource Control, create new container images using Dockerfile, manage container images using DockerHub repository for public and private scenarios, manage container images using Microsoft Azure

Implement high availability
Implement high availability and disaster recovery options in Hyper-V
Implement Hyper-V Replica, implement Live Migration, implement Shared Nothing Live Migration, configure CredSSP or Kerberos authentication protocol for Live Migration, implement storage migration
Implement failover clustering
Implement Workgroup, Single, and Multi Domain clusters; configure quorum; configure cluster networking; restore single node or cluster configuration; configure cluster storage; implement Cluster-Aware Updating; implement Cluster Operating System Rolling Upgrade; configure and optimize clustered shared volumes (CSVs); configure clusters without network names; implement Scale-Out File Server (SoFS); determine different scenarios for the use of SoFS versus clustered File Server; determine usage scenarios for implementing guest clustering; implement a Clustered Storage Spaces solution using Shared SAS storage enclosures; implement Storage Replica; implement Cloud Witness; implement VM resiliency; implement shared VHDX as a storage solution for guest clusters
Implement Storage Spaces Direct
Determine scenario requirements for implementing Storage Spaces Direct, enable Storage Spaces direct using Windows PowerShell, implement a disaggregated Storage Spaces Direct scenario in a cluster, implement a hyper-converged Storage Spaces Direct scenario in a cluster
Manage failover clustering
Configure role-specific settings, including continuously available shares; configure VM monitoring; configure failover and preference settings; implement stretch and site-aware failover clusters; enable and configure node fairness
Manage VM movement in clustered nodes
Perform live migration; perform quick migration; perform storage migration; import, export, and copy VMs; configure VM network health protection; configure drain on shutdown

Implement Domain Name System (DNS)
Install and configure DNS servers
Determine DNS installation requirements, determine supported DNS deployment scenarios on Nano Server, install DNS, configure forwarders, configure Root Hints, configure delegation, implement DNS policies, implement DNS global settings using Windows PowerShell, configure Domain Name System Security Extensions (DNSSEC), configure DNS Socket Pool, configure cache locking, enable Response Rate Limiting; configure DNS-based Authentication of Named Entities (DANE), configure DNS logging, configure delegated administration, configure recursion settings, implement DNS performance tuning, configure global settings using Windows PowerShell

Implement IP Address Management (IPAM)
Install and configure IPAM
Provision IPAM manually or by using Group Policy, configure server discovery, create and manage IP blocks and ranges, monitor utilization of IP address space, migrate existing workloads to IPAM, configure IPAM database storage using SQL Server, determine scenarios for using IPAM with System Center Virtual Machine Manager for physical and virtual IP address space management
Manage DNS and DHCP using IPAM
Manage DHCP server properties using IPAM, configure DHCP scopes and options, configure DHCP policies and failover, manage DNS server properties using IPAM, manage DNS zones and records, manage DNS and DHCP servers in multiple Active Directory forests, delegate administration for DNS and DHCP using role-based access control (RBAC)

Implement network connectivity and remote access solutions
Implement virtual private network (VPN) and DirectAccess solutions
Implement remote access and site-to-site (S2S) VPN solutions using remote access gateway, configure different VPN protocol options, configure authentication options, configure VPN reconnect, create and configure connection profiles, determine when to use remote access VPN and site-to-site VPN and configure appropriate protocols, install and configure DirectAccess, implement server requirements, implement client configuration, troubleshoot DirectAccess

Implement an advanced network infrastructure
Implement high performance network solutions
Implement NIC Teaming or the Switch Embedded Teaming (SET) solution and identify when to use each, enable and configure Receive Side Scaling (RSS), enable and configure network Quality of Service (QoS) with Data Center Bridging (DCB), enable and configure SMB Direct on Remote Direct Memory Access (RDMA) enabled network adapters, enable and configure SMB Multichannel, enable and configure virtual Receive Side Scaling (vRSS) on a Virtual Machine Queue (VMQ) capable network adapter, enable and configure Virtual Machine Multi-Queue (VMMQ), enable and configure Single-Root I/O Virtualization (SR-IOV) on a supported network adapter
Determine scenarios and requirements for implementing software-defined networking (SDN)
Determine deployment scenarios and network requirements for deploying SDN; determine requirements and scenarios for implementing Hyper-V Network Virtualization (HNV) using Network Virtualization Generic Route Encapsulation (NVGRE) encapsulation or Virtual Extensible LAN (VXLAN) encapsulation; determine scenarios for implementation of Software Load Balancer (SLB) for North-South and East-West load balancing; determine implementation scenarios for various types of Windows Server Gateways, including L3, GRE, and S2S, and their use; determine requirements and scenarios for distributed firewall policies and network security groups

Install and configure Active Directory Domain Services (AD DS)
Install and configure domain controllers
Install a new forest, add or remove a domain controller from a domain, upgrade a domain controller, install AD DS on a Server Core installation, install a domain controller from Install from Media (IFM), resolve DNS SRV record registration issues, configure a global catalog server, transfer and seize operations master roles, install and configure a read-only domain controller (RODC), configure domain controller cloning

Implement identity federation and access solutions
Install and configure Active Directory Federation Services (AD FS)
Upgrade and migrate previous AD FS workloads to Windows Server 2016; implement claims-based authentication, including Relying Party Trusts; configure authentication policies; configure multi-factor authentication; implement and configure device registration; integrate AD FS with Microsoft Passport; configure for use with Microsoft Azure and Office 365; configure AD FS to enable authentication of users stored in LDAP directories
Implement Web Application Proxy (WAP)
Install and configure WAP, implement WAP in pass-through mode, implement WAP as AD FS proxy, integrate WAP with AD FS, configure AD FS requirements, publish web apps via WAP, publish Remote Desktop Gateway applications; configure HTTP to HTTPS redirects, configure internal and external Fully Qualified Domain Names (FQDNs)