Saturday 27 February 2016

Exam 220-901 CompTIA A+ Certification Exam

Today’s IT professionals face an ever expanding variety of technical issues. CompTIA A+ 220-901 & 902 has been updated to address the
increased diversity of knowledge required of today’s technicians and validates what is currently necessary to perform effectively on the job.

“A+ opens the door to understanding mobile device sensors, small and large storage, as well as wired and wireless transmission standards.
These three things are, in many ways, three pillars for the Internet of Things

The New A+ Preparing today’s IT pros for tomorrow’s technology

A+ 900 SERIES DOMAINS
Hardware - 34%
Networking - 21%
Mobile Devices - 17%
Hardware & Network Troubleshooting - 28%

Candidates still earn the CompTIA A+ certification by passing two CompTIA A+ exams: 220-901 & 220-902.
Both exams include multiple-choice and performance-based questions that require candidates to solve real-world problems.

What’s Changed and Why

SECURITY
Security is not just for the Security Administrator. Help desk and technical support professionals form one of the first lines of defense for any organization.

• While the Security domain weighting remains the same at 22%, there is an increased emphasis on the ability to apply security-related knowledge. For example, candidates are asked more frequently to “deploy” and “use” security best practices, rather than simply “describe.”

• The sub-objectives for the Security domain have also been expanded to reflect the increased attack surface of a typical organization along with the resources and tools that have arisen to protect it. For example, compare sub-objective 3.4 in A+ 902 with sub-objective 2.3 in A+ 802.

• Security concerns permeate both the 901 and the 902 exams. In fact, 8 of the 9 total certification domains have an objective or sub-objective containing a security consideration.

HARDWARE
Broad adoption of a variety of computing devices demands more of today’s IT technicians.

• Mobile devices earn their own hardware-focused domain on the 901 exam.

• The new exams are weighted less heavily toward PC-focused hardware, decreasing from 51% spread across two domains on the 801 exam to 34% on the 901 exam.

• While the weighting changes (meaning the total number of items presented), the range of knowledge specific to hardware remains intact – familiar printer and PC hardware objectives remain on the exams.

NETWORKING
The increasingly network-aware help desk/tech support environment requires command of networking principles to perform the IT support role.

• Enterprises increasingly rely on a combination of cloud and on-premises IT systems. For those supporting those systems and their users, cloud concepts must be well-understood.
The A+ 900 series starts an IT pro on that journey with an introduction to cloud and virtualization, the cloud’s core underlying technology.

• Like the 800 series exams, the 900 series continues the emphasis on a tech’s ability to apply core concepts and protocols such as IPv4, IPv6, DHCP, and subnet mask to set up and support wired and wireless networks

MOBILE DEVICES
Mobile continues to dominate personal and business technology with multiple types of systems tied to one user.

• 5 of the 8 new objectives found in the 900 series belong to mobile devices.

• Mobile devices break out of their single-domain treatment. Previously they were covered only in 802, now 220-901 covers mobile device hardware and 220-902 covers mobile device applications, operating systems and security.

• Also added are items specifically related to troubleshooting mobile device issues.


SOFTWARE, HARDWARE & NETWORK TROUBLESHOOTING
Customers increasingly demand instant, accurate diagnosis and resolution.

• The IT role has expanded from supporting desktops and laptops to include myriad types of other devices, from laptops and mobile phones to industrial sensors and wearables.

• The demand is high for quick accurate problem solving.

• Technicians must consider many different scenarios when solving a problem including:
- Wireless
- Mobile
- Cloud Technologies

• Troubleshooting is represented on both A+220-901 and A+ 220-902. Previously, it was only represented on A+ 802.


OPERATING SYSTEMS
Technicians need to increase their knowledge of operating systems across a wide variety of devices to effectively support the end user.

• The 900 series features a Windows OS domain along with a second OS-focused domain - The second OS domain includes objectives requiring a working knowledge of Mac OS X and Linux.

• Operating systems serving as the platforms for mobile device applications – including iOS, Android and Windows – are covered within the 220-902 exam.

QUESTION 1
A technician replaces a failed hard drive with a brand new one. The technician boots from a PE CD and attempts to install a custom OS build deployed from the network. The hard drive is visible in the system’s BIOS. However, once in the preinstallation environment, the drive is not recognized in the imaging process and the process fails. Which of the following is MOST likely the cause of failure?

A. The boot CD has failed and needs to be replaced.
B. The hard drive needs to have its configuration manually defined in the BIOS.
C. The PC’s power supply is not providing enough power to the new hard drive.
D. The hard drive has not been partitioned correctly.

Answer: D


QUESTION 2
Which of the following wireless technologies is LEAST likely to be intercepted by a third party?

A. NFC
B. Bluetooth
C. WiFi
D. Cellular

Answer: A


QUESTION 3
Joe, a user, receives a wireless router from his ISP with a pre-set password and configuration. He can connect to the router fine via Ethernet but cannot see the wireless signal on any of his devices. The LEDs on the router indicate that a wireless signal is broadcasting. Which of the following settings on the router does Joe need to adjust to enable the devices to see the wireless signal?

A. DHCP
B. IPv6
C. DMZ
D. SSID

Answer: D


QUESTION 4
Which of the following protocols would be used for file sharing between MAC OS and Windows OS workstations on a LAN?

A. IMAP
B. SMB
C. SSH
D. RDP

Answer: B


QUESTION 5
Which of the following is used to facilitate communications with a user’s smartphone in order to make purchases and payments by proximity?

A. Bluetooth
B. IR
C. NFC
D. WPS

Answer: C


Wednesday 24 February 2016

MB2-866 Microsoft Dynamics CRM 2011 Customization and Configuration


QUESTION 1
You work as a Microsoft Dynamics CRM Implementation Consultant. You have been hired by
ABC.com to plan, customize and deploy a Microsoft Dynamics CRM 2011 solution for the company.
One of your decisions as a consultant is to decide whether to deploy an on-premises solution or
an online solution of Microsoft Dynamics CRM 2011.
Which two of the following statements are true?

A. Offline synchronization with Microsoft Outlook 2010 is not supported by Microsoft Dynamics CRM Online 2011.
B. The Internet lead capture feature is only supported by Microsoft Dynamics CRM Online 2011.
C. Customworkflow assemblies are not supported by Microsoft Dynamics CRM Online 2011.
D. Custom workflow assemblies are not supported by Microsoft Dynamics CRM 2011 onpremises.

Answer: B,C

Explanation:


QUESTION 2
You work as a Microsoft Dynamics CRM Implementation Consultant. You are using Microsoft
Dynamics CRM 2011 to create a solution package.
Which of the following are solution components that you can use in your solution? (Choose all that
apply)

A. Client Extensions.
B. Service Endpoints.
C. Option Sets.
D. Article Templates.
E. None of the above.

Answer: A,B,C,D

Explanation:


QUESTION 3
You work as a project manager at ABC.com. The company uses Microsoft Dynamics CRM 2011
for its customer relationship management solution.
All users in the company use Microsoft Outlook 2010 with the Microsoft Dynamics CRM 2011 for
Outlook client software.
You modify the system settings in Microsoft Dynamics CRM to configure the synchronizing client
option for Outlook.
Which other Outlook settings can you configure using the system settings in Microsoft Dynamics
CRM 2011?

A. You can use Microsoft Dynamics CRM to determine which data is synchronized with the
Outlook folders.
B. You can use Microsoft Dynamics CRM to configure the synchronization schedule.
C. You can use Microsoft Dynamics CRM to configure the email message sending interval.
D. You can use Microsoft Dynamics CRM to configure the interval between the downloading of
Microsoft Dynamics CRM email messages.

Answer: B

Explanation:


QUESTION 4
You work as a Microsoft Dynamics CRM Implementation Consultant. You have been hired by
ABC.com to plan, customize and deploy a Microsoft Dynamics CRM 2011 solution for the
company.
You have been asked to describe some of the features of the Microsoft Dynamics CRM 2011
platform to ABC.com managers.
Which of the following statements about the Microsoft Dynamics CRM 2011 platform is false?

A. The Microsoft Dynamics CRM 2011 platform prevents direct access to the database by
controlling access through the data access layer.
B. The Microsoft Dynamics CRM 2011 platform allows developers to create software to directly
access the underlying database.
C. The Microsoft Dynamics CRM 2011 platform raises events for workflow processes and custom
business logic implementations.
D. The Microsoft Dynamics CRM 2011 platform uses security to control access to objects.

Answer: B

Explanation:


QUESTION 5
You work as a Microsoft Dynamics CRM Implementation Consultant. You have been hired by
ABC.com to plan, customize and deploy a Microsoft Dynamics CRM 2011 solution for the
company.
A developer asks you to describe the customization features of Microsoft Dynamics CRM 2011.
Which three of the following answers describe ways in which you can customize Microsoft
Dynamics CRM 2011?

A. You can useapplication event programming to extend Microsoft Dynamics CRM 2011.
B. You can create custom processes and entities in Microsoft Dynamics CRM 2011.
C. You can use Microsoft Dynamics CRM dialogs to automate business processes.
D. You can create custom forms and charts within Microsoft Dynamics CRM 2011.

Answer: A,B,D

Explanation:

Saturday 13 February 2016

7 Android tools that can help your personal security

Forget security suites: These sensible tools are all you really need on your phone to stay safe.

This isn't your typical Android security story.

Most articles about Android security tools focus on malware-scanning suites like Lookout, Norton and AVG. But with the layers of protection already built into the platform, those sorts of apps are arguably unnecessary and often counterproductive -- or even needlessly expensive.

For most Android users, the seven tools below should cover all the important bases of device and data security. Some are third-party apps, while others are native parts of the Android operating system. They all, however, will protect your personal info in meaningful ways -- and without compromising your phone's performance. Plus, all but two of them are free.

(If you're an enterprise-level user, of course, your company may require extra layers of protection to safeguard shared data and separate personal info from corporate property -- but that's a whole other can of worms.)

Your mission, should you choose to accept it: Make your way through this list, then tighten up your Google account security settings -- and breathe easy. Security doesn't have to be scary.

1. Android's own screen pinning system

One of Android's most useful security tools is also one of its most easily overlooked. Screen pinning made its debut with Google's Android 5.0 Lollipop release in 2014 -- but I'm willing to bet the vast majority of Android phone-owners either have forgotten all about it or never even realized it existed in the first place.

Let's fix that, shall we? Screen pinning is designed for those moments when you want to hand someone your phone -- to look at a photo, check something out on a Web page or maybe make a quick call -- without taking the chance of them poking around and getting into your personal stuff.

Take a minute and make sure the feature's activated now so it'll be ready when you need it: Just head into the Security section of your system settings and look for the option labeled "Screen pinning." Tap that line, then check to see that the toggles are activated next to both "On" and "Ask for unlock pattern before unpinning."

You activate the screen pinning feature in the Security section of Settings (left). Go to Recent Apps, scroll up and tap the pushpin key to lock your phone to that app (right).

The next time you need to pass your phone to someone, first open the app you want them to be able to use. Then tap the Recent Apps key (the typically square-shaped icon next to the Home key). Your app should be in front as the most recently opened app; just scroll upwards until you see a circular pushpin icon.

Tap that pushpin, and you're all set: Your phone is now locked to that app and that app alone. In order to do anything else on the device, you'll need to tap and hold the Back and the Overview key at the same time and then enter your pattern, PIN or password to continue.

2. A password management app

Perhaps the greatest risk to your personal security is the use of weak or frequently repeated passwords. We all have about a billion passwords to our names these days, and it's virtually impossible to make each one strong and unique without a little help.

Well, here's your knight in shining armor: a password management app like LastPass. LastPass makes it dead simple to generate and store strong passwords for every site you sign into. It'll even fill the passwords in for you across all the apps on your phone (and do the same on your tablet, laptop or desktop system as well). The program uses advanced encryption to keep your info safe; all you have to do is remember a single secure password to unlock your vault at the start of each session.

LastPass costs $12/yr. for the full premium version, which is what most people will want. Other popular password managers include 1Password and Dashlane, though the former is less polished and user-friendly than LastPass while the latter is significantly more expensive, at $40/yr. for the full set of features.

3. A two-factor authentication utility

No matter how secure your passwords may be, they'll never be bulletproof. Adding a second layer of protection is the best way to keep unwanted intruders out -- and it's really quite easy to do.

The dual-layer protection process is known as two-factor authentication, and it basically means that in order to get into your most important accounts -- like those on Google, Dropbox, a variety of financial institutions and even password management apps like LastPass -- you'll need both your regular password and a second temporary code generated by a device only you would have. With the combination of those two keys, the odds of someone else being able to pick your virtual lock is impressively low.

A free app called Authy is a great place to get started, as it's intuitively designed and able to run on your phone, tablet and even your desktop or laptop system if you'd like. Google also has its own Authenticator app for Android, but it's far less versatile and pleasant to use than Authy's offering.

4. Android's Smart Lock feature

Securing your phone with a pattern, PIN or password is important; we all know that. But having to put in that code every time you want to use the device can get annoying fast -- so it's no surprise a lot of people opt to skip the hassle and just leave their phones unprotected.

Android's Smart Lock feature gives you the best of both worlds by cutting down on the annoyance factor while still allowing you to keep your phone secured when it really counts. You can choose to have your phone remain unlocked whenever you're in a trusted location, like your home, or anytime you're connected to a trusted Bluetooth device, like a smartwatch that's always on your arm or a stereo that's inside your car. You can even opt to have the device stay unlocked if it hasn't left your pocket or purse since you last put in your passcode.

Android's Smart Lock tool gives you a variety of ways to keep your content safe without too much trouble (left). You can even opt to have the device stay unlocked if it hasn't left your pocket (right).

Any time you aren't in one of those secure situations, your phone automatically locks itself and requires your code to get in. And that's the end goal that matters.

Look for Smart Lock in the Security section of your system settings (on Android 5.0 or higher) to get set up.

5. Android's advanced app-scanning feature

You wouldn't know it from all the third-party companies peddling anti-virus software for smartphones, but Android has actually had its own native malware-scanning system in place since 2012. In addition to checking apps for potentially harmful code when they're installed, the OS can continuously scan your device over time to make sure nothing problematic ever pops up.

All you have to do is opt in by going into the Google section of your system settings (or into a separate app called Google Settings, if you have an older device). Select "Security" and then activate the "Scan device for security threats" option, if it isn't already activated. That's it: Your device and the software already on it will handle the rest.

(It's worth noting that this system works in conjunction with a server-side system that scans all apps uploaded to the Google Play Store before you ever see them. All Android devices also automatically watch for signs of SMS abuse, and the Chrome Android browser keeps an eye out for dangerous sites on the Web.)

6. Android Device Manager

Another important security tool Android provides is one that can find, ring and even remotely lock or erase your phone from a computer or other mobile device.

The tool is called Android Device Manager, and it's already on your smartphone and waiting to be used. Confirm that you have it enabled by going into the Google section of your system settings (or into the separate app called Google Settings) and then selecting "Security." You'll want both options under "Android Device Manager" to be activated.

The Android Device Manager can locate your device, have it ring (so you can find it) and, in the worst case, erase all the contents.

Now, if you ever lose your device, just open up the Android Device Manager website or Android Device Manager app (from another phone or a tablet) to track and secure it.

7. An Android VPN client

This final item isn't one everyone needs, but if you spend a lot of time surfing the Web through open Wi-Fi networks -- at airports, hotels or other public places -- it's worth considering. A VPN, or virtual private network, encrypts all of your data and keeps strangers from snooping in and seeing your personal info.

It can allow you to mask your actual IP address and location, too, and thus access websites and services that might normally be blocked in your area -- something that could be relevant and beneficial for some users.

Android has a fair number of VPN clients available, but the one I'd recommend looking at is an app called SurfEasy. A big part of the reason is trustworthiness, especially for an app of this nature: SurfEasy is owned and operated by the same company behind the Opera browser -- in other words, a known and reputable organization. But beyond that, the app is exceptionally simple to use and also reasonably priced, with plans starting at $3/mo. for unlimited use on a single device.

All said and told, taking into account everything on this list, that brings your grand total for personal Android security to a whopping $1 to $4 per month. And you know what? That's a small price to pay for practical peace of mind.

Wednesday 10 February 2016

650-128 CGAM Authorized Connected Grid Account Manager Knowledge Verification

650-128 CGAM Authorized Connected Grid Account Manager Knowledge Verification

Exam Number 650-128
Duration 30 minutes (20-25 questions)
Available Languages English

This exam will test the knowledge of account managers regarding the features, functions, and design of the Cisco Connected Grid technology solution. There will be a focus on the features and benefits of the Cisco 2010 Connected Grid Router (CGR 2010) and the Cisco 2500 Series Connected Grid Switch (CGS 2500). How these products are positioned within energy and utility companies and how to identify new opportunities and set customer expectations will also be covered on this exam.

Exam Topics
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Introduction to Cisco Connected Grid Go-to-Market and Product Positioning
How to Sell
Cisco Connected Grid Ordering and Support
Cisco Connected Grid Solutions

QUESTION 1
Which of these trends is the main driver toward smart grid technology?

A. increased supply, which requires the integration of distributed generation sources
B. reduced demand, which causes an increase in demand and peak load
C. compliance with regulations involving government funding and rules
D. increased carbon footprint

Answer: C

Explanation:


QUESTION 2
How many levels or types of priority can be assigned on a Cisco TAC case?

A. 1
B. 2
C. 4
D. 3

Answer: C

Explanation:


QUESTION 3
Which statement reflects the overall Cisco Smart Grid vision?

A. Sell the existing Cisco IP-based products from end-to-end of our utility customer's smart grid
deployments.
B. Design and architect an end-to-end communications infrastructure that is integrated with the
power grid.
C. Integrate intelligent routing protocols into existing electrical grids.
D. Create a single infrastructure for unified communications from electrical generation plants to all
primary and secondary substations.

Answer: D

Explanation:


QUESTION 4
Which of these is a grouping of elements that are part of the Cisco Substation Automation
solution?

A. multi service communications networks
B. protection and control, auto meter reading, data analysis
C. protection and control, grid monitoring, multi service communications networks data center and
customer call centers
D. customer call centers, electrical auto recharging, home energy management

Answer: C

Explanation:


QUESTION 5
Which of these is part of mission critical substation communications (Operation Data)?

A. physical security alarm
B. workstation email
C. physical access (deny access)
D. fault detection and restoration

Answer: D

Explanation:

Thursday 4 February 2016

650-082 MITSE Mobile Internet Technology for System Engineers

Exam Number 650-082
Duration 60 minutes (55-65 questions)

This exam will test System Engineer's knowledge of features, functions and design of the Cisco ASR 5000 mobile internet solution. There will be a focus on design and planning for deployment. Candidates should prepare for this exam by taking the Mobile Internet Technology for Account Managers course as the MIT SE exam covers content from both the AM and SE training courses.

Exam Topics
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Describe ASR 5000 Hardware and Software
Describe Understanding the StarOS Command Line Interface (CLI)
Describe Software Licensing and Upgrade
Describe ASR 5000 Core services for GPRS/UMTS - SGSN and GGSN Functionalities
Describe the Design and Implementation of xGSN
Describe Billing & Policy
Describe Statistics and Alarms
Describe Services Overview
Describe the Design and Implementation of LTE


QUESTION 1
What Cisco ASR 5000 services are needed for communication between a Serving Gateway and
Packet Data Network Gateway?

A. EGTP and GTPU
B. GTPU and PGW
C. SGW and GTPU
D. EGTP and SGW

Answer: B


QUESTION 2
Which option helps to define activities that are needed to successfully deploy and operate Cisco
technologies?

A. Smart Services
B. Cisco lifecycle Services
C. TAC
D. Cisco Technical Services

Answer: A


QUESTION 3
Which card has the resources to run multiple services?

A. system management card
B. switch processor I/O card
C. packet service card
D. redundant crossbar card

Answer: C


QUESTION 4
Which of these statements about the Web element Manager is true?

A. Clients can connect only by using the internet explorer or Safari Web browser.
B. The application provides FCAPS.
C. Fault management implements an easy-to-use point-and-click GUI to provide configuration for
one or more systems.
D. Supported accounting management operation system allow user to examine and perform real
time statistical analysis.

Answer: C


QUESTION 5
Which controller task is used to facilitate IP routing across and within contexts?

A. Session controller
B. Drive controller
C. VPN controller
D. Resource management controller

Answer: A