Friday, 15 December 2017

DES-1D11 Specialist, Technology Architect | Midrange Storage Solutions Exam

Overview
This exam is a qualifying exam for the Specialist-Technology Architect, Midrange Storage (DECS-TA) track.

This exam tests the candidate’s knowledge to architect and size solutions for Dell EMC Unity and SC Series systems. This exam also tests the candidate’s knowledge of key product features of both of these storage systems.

Dell EMC provides free practice tests to assess your knowledge in preparation for the exam. Practice tests allow you to become familiar with the topics and question types you will find on the proctored exam. Your results on a practice test offer one indication of how prepared you are for the proctored exam and can highlight topics on which you need to study and train further. A passing score on the practice test does not guarantee a passing score on the certification exam.

Products
Products likely to be referred to on this exam include but are not limited to:
 Dell EMC Unity(All Flash Array, Hybrid, VSA)
 SC Series

ExamTopics
Topics likely to be covered on this exam include:

Dell EMC Midrange Architectures (25%)
 Identify and describe the Unity hardware (e.g., enclosures, I/O components, storage media options, etc.)
 Explain Unity storage resources and features (e.g., dynamic pools, RAID functions)
 Identify and describe SC Series storage resources, connectivity options (e.g., RAID, Consistency Groups, SSD, HDD options), and use cases
 Identify and describe the various controller options available in the SC Series models

Dell EMC Midrange Product Solutions (42%)
 Identify key features of the SC Series operating system
 Describe SC Series cross-platform replication functionality and use cases
 Describe how to provision and access Unity storage; including Block, Files, and VMware datastores
 Identify Unity advanced features for Block storage; e.g, FAST Suite, D@RE, host I/O limit availability, thin clones
 Identify Unity advanced features for File storage; e.g, IP Multi-tenancy, Advanced Static Routing, IP Packet Reflect, etc.
 Identify and describe Unity Data Protection (e.g., Snapshots, Replication, and Snapshot Replication architecture) solutions and use cases
 Describe Unity Data Mobility features, requirements, and use cases
 Compare and contrast similar features between the Unity and SC Series products

Dell EMC Midrange Best Practices, Sizing, and Design (33%)
 Apply Dell EMC midrange best practice recommendations for data service, system, storage, and host application configurations
 Identify and describe the sizing and design considerations for Unity and SC Series features
 Identify and describe how to size and design a midrange solution for performance, capacity, security, and resilience
 Describe the data gathering methods to size and design an SC Series solution
 Identify and describe the tools and resources available to size and design Unity and SC Series solutions
 Explain how to size an SC Series solution that includes Tiers 1-3, storage requirements, front-end and back-end connections, and common use cases
The percentages after each topic above reflects the approximate distribution of the total question set across the exam.

Recommended Training


Monday, 6 November 2017

UK0-001 UKI Social Media Security Professional (SMSP) Certification exam Voucher Only

The SMSP course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings.
Wilder Guerra, information systems technician, U.S. Navy

The UKI Social Media Security Professional (SMSP) certification, powered by CompTIA, will be available on April 9.
The SMSP certification designates professionals with demonstrated technical knowledge of social networking platforms, as well as the skills to effectively mitigate risks in order to safeguard organizations' critical information from social media hackers. SMSPs have established competency to help guide organizations' social media personnel security policy. The unique aspect of the SMSP certification is its focus on technical granularity specific to social media platforms such as cross-site scripting, socware (social media malware), phishing, data profiling, geo-tagging, identity theft, and evil twin attacks.

The SMSP exam (UK0-001) will be available only through Pearson VUE testing centers. The certification exam features 65 multiple-choice questions, which must be completed within 90 minutes. Candidates can prepare for this exam by attending an official training course administered by Ultimate Knowledge Institute's (UKI) Authorized Training Partners (ATPs), or they can opt to challenge the exam without official training. SMSP exam vouchers are available through UKI's online store.

Ideal Candidates for SMSP Powered by CompTIA

The SMSP certification is designed for IT security professionals with a minimum of one year of cybersecurity work experience. This certification is ideal for individuals who either already work with social media solutions or who want to expand their skill set to ensure their readiness to tackle emerging cyber threats. Candidate job roles include information security technician, security administrator, security architect, security engineer or any other role that is responsible for information security.

The SMSP certification and training program is also designed for Information Assurance professionals in Chief Information Security Officer (CISO), Chief Information Officer (CIO) or other roles responsible for developing social media usage policies and education programs for end users.

The SMSP beta exam was attempted by IS professionals from Fortune 500 enterprises and government organizations covering various industries and sectors, and included organizations such as Booz Allen Hamilton, SAIC, SRA International, Wells Fargo, Wyndham International, Symantec, U.S. Department of Defense, FBI and many others.

"The SMSP course is definitely an eye opener," said Wilder Guerra, an information systems technician with the U.S. Navy. "With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm."

Why is social media security important?
The sophisticated attacks that originate from social media platforms have been named one of the biggest challenges for the information assurance industry in 2013 by Sourcefire, McAfee, Forrester and Norton. With a network like Facebook, which boasts more than 1 billion users globally, those with criminal intentions are investing resources to access the wealth of data that users often voluntarily disclose about themselves and their organizations, be it private enterprises, government agencies or the military.

Since social networks rely on trust and sharing, hackers often choose social media as a platform for spreading malware and launching phishing and social engineering attacks to access sensitive information. In a recent study by McAfee, half of organizations surveyed admitted to a security scare resulting from social media. Also, a recent survey by Protiviti Inc. revealed that CIOs view improved competency in security for social media, which is now at the core of many enterprises, as one of their most pressing concerns.

While most IT professionals are aware of the dangers of social media usage, only about a third of corporations have a breach prevention and response strategy in place. Many organizations indicate the lack of skilled workforce to handle threats emerging from new media. This growing lack of experts in social media security and request for training development by the U.S. Department of Defense led Ultimate Knowledge Institute to design the SMSP training course and partner with Examplify, a wholly owned subsidiary of CompTIA, to develop the SMSP certification exam. UKI's strong training development background combined with CompTIA's experience in exam development offer a credible and reliable way to validate the skills of individuals taking the exams in the exploding IT arena of social media.

 

Saturday, 21 October 2017

C1000-003 IBM Mobile Foundation v8.0 Application Development


Number of questions: 59
Number of questions to pass: 43
Time allowed: 90 mins

This exam consists of 9 sections described below.

Section 1- Development Environment Set-up 7%
Download and install Dev Kit
Set up a platform specific IDE and tools
Install Eclipse plug-in
Install Mobile Foundation CLI

Section 2 - Development: Architecture 7%
Describe Mobile Foundation components and architecture
Integrate with data sources
Understand and be able to differentiate the different types of client-side development enabled by Mobile Foundation

Section 3 - Using the Command Line Interface (CLI) 12%
Configure and use the CLI
Manage the server profile
Create and manage apps
Create and manage adaptors

Section 4 - Development: Client Side 20%
Add the Mobile Foundation SDK to an application
Connect to the Mobile Foundation Server
Customize the startup process
Use WL resources requests to connect to server side resources
Debug an application
Add multilingual support for Mobile Foundation to the application
Use direct update to refresh web resources
Use live update to segment users and deliver customized content
Use JSONStore
Implement the Simple Data Sharing feature

Section 5 - Development: Server Side 14%
Create Mobile Foundation adapters
Test adapters using the OpenAPI Specification
Invoke Java code from adapters
Invoke adapters from other adapters
Use Mobile First server side APIs

Section 6 - Notifications 7%
Configure Push notifications
Implement and test Push and SMS Notification mechanisms

Section 7 - Authentication and Security 15%
Describe the OAuth 2.0 based Mobile Foundation security framework
Manage device enrollment
Create predefined security checks
Create custom security checks
Implement application authenticity
Implement device single sign-on (SSO)
Create and use Confidential Clients
Implement Certificate Pinning

Section 8 - Deployment 10%
Build and deploy applications and adapters to multiple environments
Configure Mobile Foundation Server settings
Configure and deploy adapters
Migrating from earlier realeases

Section 9 - Analytics and Reports 8%
Understand the capabilities provided by Mobile Foundation Operational Analytics
Enable access to raw and analytic reporting
Use the Analytics REST API
Access client side crash logs
Use MobileFirst Analytics to capture custom user analytics

PartnerWorld Code: C0000102
Replaces PW Code: Not Applicable

Status: Live
This intermediate level certification is intended for application developers who have hands-on experience using Mobile Foundation V8.0 to develop mobile applications.

A mobile application developer who achieves this certification can use Mobile Foundation V8.0 to develop client-side applications, develop server-side integration and security components, as well as test and deploy Mobile Foundation V8.0 projects. Overall, a mobile application developer can develop and implement mobile solutions.

The mobile application developer is generally self-sufficient and is able to perform most of the tasks involved in the role with limited assistance from peers and vendor support services. The mobile application developer efficiently uses product documentation.

To attain the IBM Certified Mobile Application Developer - Mobile Foundation V8.0 certification, candidates must pass 1 test. To prepare for the test, it is recommended to refer to the job role description and recommended prerequisite skills, and click the link to the test below to refer to the test objectives (skills measured on the test) and the Test preparation tab.

Recommended Prerequisite Skills
Knowledge and foundational skills one needs to possess before acquiring skills measured on the certification test. These foundational skills are NOT measured on the test. For skills measured on the test, see Test Objectives.)

Java programming
Web Services and REST
Database connectivity
Mobile Integrated Development Environments and tools
Command Line Interface (CLI)
JavaScript, HTML/CSS
Designing applications for mobile devices
Developing hybrid and native applications for both Android and iOS
Swift programming
Maven, Node, NPM and Git


Friday, 13 October 2017

C5050-287 Foundations of IBM Cloud Reference Architecture V5

Number of questions: 60
Number of questions to pass:
Time allowed: 90 mins

Section 1 - Cloud Computing Concepts and Benefits
Define the cloud computing business advantages.
Define cloud architecture.
Describe considerations such as risk, cost and compliance around cloud computing.
Define automation as it pertains to cloud computing.
Define why standardization is important to cloud computing.
Define service catalog as it pertains to cloud computing.
Define a public cloud.
Define a private cloud.
Define a hybrid cloud.
Define the difference between a private cloud, a public cloud, and a hybrid cloud.
Define Software as a Service (SaaS).
Define Platform as a Service (PaaS).
Define Infrastructure as a Service (IaaS).
Define DevOps as it pertains to cloud computing.
Explain Maturity as it relates to SaaS, PaaS, and IaaS.
Explain the benefits of patterns as description of cloud services.
Define software defined environments as they relate to cloud computing.
Summarize how business processes can be automated in a cloud environment.

Section 2 - Cloud Computing Design Principles
Demonstrate base knowledge needed to advise on creating a cloud infrastructure.
Explain Cloud networking principles.
Explain Cloud storage principles such as block object file and storage area networks
Describe security strategies in a cloud computing environment.
Design principle for cloud ready applications including patterns, chef, puppet, and heat templates.
Design principles for cloud native applications such as open standards and 12-Factor app.
Design principles for DevOps.
Designing consumable applications for the cloud.
Define hybrid integration capabilities.
Define API Economy in Cloud Computing.
Define how solutions in the cloud can be more effective.
Explain to the customer how some popular billing models work and how they pertain to the software the customer has.
Describe principles for governance, compliance and service management.

Section 3 - IBM Cloud Reference Architecture
Explain the four defining principles of IBM Cloud.
Explain the benefits of using the IBM Cloud Reference Architecture (ICRA).
Explain the Cloud Platform Services for ICRA including containers, foundational services, etc.
Explain the Cloud Service Provider Adoption Pattern for ICRA.
Describe the ICRA Building SaaS cloud adoption pattern.
Explain the Hybrid patterns for ICRA
Describe the solution integration process detailed in the ICRA to take an existing environment to an IBM Cloud Computing environment.
Design a secure cloud service model using ICRA.
Describe high availability and disaster recovery as it pertains to cloud computing.
Describe actors and roles as defined in ICRA (Cloud Service Consumers, Cloud Service Creators, Cloud Service Provider, Cloud Services and the Common Cloud Management Platform).
Describe how IBM Service Management can effectively manage a customer's cloud environment.
Describe the IBM API management capabilities.
Describe the role of governance in the ICRA.
Describe non-functional requirements (NFRs) as described by ICRA.
Explain the role of mobile as part of the ICRA.
Explain the Cognitive pattern as part of the ICRA.
Explain the IOT pattern as part of the ICRA.
Explain the DevOps pattern as part of the ICRA.
Explain the Big Data and Analytics pattern as part of the ICRA.

Section 4 - IBM Cloud Solutions
Describe the IBM capabilities for Cloud Managed Services.
Describe the IBM capabilities for hybrid integration.
Describe the IBM capabilities for video services.
Describe the IBM capabilities for cloud brokerage.
Describe the IBM capabilities for DevOps.
Describe the IBM capabilities for cloud native applications.
Describe the IBM capabilities for service management.
Describe the IBM capabilities for storage.
Describe the IBM capabilities for business process management.
Describe the IBM capabilities for the IBM Marketplace.

Overview
PartnerWorld Code: 50001105
Replaces PW Code: 50001104

Status: Live
An IBM Certified Solution Advisor - Cloud Reference Architecture V5 is a person who can clearly explain the benefits and underlying concepts of cloud computing. They can also demonstrate how the IBM Cloud solution offerings can help customers realize these benefits.

Key areas of competency include:
Explain cloud computing concepts.
Describe how the customer can realize the benefits of cloud computing within their environment.
Identify IBM Cloud architecture and design principles.
Map customer's requirements to the IBM Cloud solution offerings.

Recommended Prerequisite Skills

The following qualifications are requirements for success:
Working knowledge of cloud principles and architecture
Working knowledge of the various cloud deployment models
Working knowledge of the various types of "as a service" offerings
Working knowledge of various cloud business models
Working knowledge of key concerns and how they are addressed in cloud such as security, compliance, performance, storage, and data.
Working knowledge of emerging trends in cloud computing such as API economy, big data and analytics, internet of things, microservices, and mobile.
Working knowledge of the IBM Cloud Reference Architecture and associated adoption patterns.
Working knowledge of the IBM Cloud solution offerings.

Requirements
This certification requires 1 exam

Exam Required:
Click on the link below to see exam details, exam objectives, suggested training and sample tests.

C5050-287 - Foundations of IBM Cloud Reference Architecture V5
QUESTION: No: 1
Which technology best supports application portability?

A. docker containers
B. OpenFIow
C. docker stacks
D. OpenDayIight

Answer: A


QUESTION: No: 2
What challenge of hybrid cloud environments is addressed by IBM solutions like IBM Cast Iron, IBM
MobiIeFirst platform integration and IBM API Management?

A. lack of workload portability
B. integration of systems of engagement and systems of record
C. service management of provisioned systems
D. mobile applications security in hybrid cloud environments

Answer: B


QUESTION: No: 3
What is the principal reason that continuous testing is necessary in the agile world?

A. So that multiply teams can get better utilization out of testing environments
B. To bridge the gap between slow and fast speed IT development
C. For supports the large volume and high frequency of changes driven by cloud native development approaches
D. To ensure application interoperability across public cloud providers.

Answer: B


QUESTION: No: 4
What are three essential cloud characteristics?

A. broad network access
B. on-demand self Service
C. economies of scale
D. measured service
E. vendor lock-in prevention
F. workload virtualization

Answer: A, B, D

Thursday, 5 October 2017

C2170-051 BM i2 Analyst's Notebook V8.9

Test information:
Number of questions: 53
Time allowed in minutes: 105
Required passing score: 62%
Languages: English

Related certifications:
IBM Certified Analyst - i2 Analyst's Notebook V8.9

This multiple-choice test contains questions requiring single and multiple answers. For multiple-answer questions, you need to choose all required options to get the answer correct. You will be advised how many options make up the correct answer.
This test is designed to provide diagnostic feedback on the Examination Score Report, correlating back to the test objectives, informing the test taker how he or she did on each section of the test. As a result, to maintain the integrity of each test, questions and answers are not distributed.

The test contains five sections totalling 53 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 - General IBM i2 Analyst's Notebook Application Knowledge (17%)
Understand the key elements of entities and connections
Understand and describe the purpose of an identity
Distinguish the differences between data locations such as date and time, and cards
Understand standard attributes

Section 2 - Manual Chart Creation (17%)
Implement methodologies on creating charts from unstructured data
Add and change entity representations and types
Add links and change link properties
Differentiate between the structure of association and timeline charts
Add standard attributes and create custom attributes

Section 3 - Import Data to Create a Chart (21%)
Analyze how to structure the source data for import
List some of the different file formats that may be imported into IBM i2 Analyst's Notebook
Demonstrate ability to standardize data using Column Actions
Select appropriate import designs
Use Assign Columns to specify how to create a chart
Format date and time within an Import Specification
Identify how to resolve warnings and errors when running an Import Specification

Section 4 - Basic Principles and Analysis Tools (34%)
Differentiate between analysis functions
Construct a question and select key data using Visual Search
Demonstrate comprehension of the features in List Items
Construct a search using wildcards and regular expressions
Identify potential duplicate entities and merge them
Identify trends in data by using Filters, Histograms and the HeatMatrix
Analyze the role of semantic types in IBM i2 Analyst's Notebook
Know the differences between the centrality measures in Social Network Analysis
Demonstrate how to run a Conditional Formatting Specification and create custom Conditional Formatting Specifications
Select an appropriate chart layout for a specific task

Section 5 - Analysis to Presentation Charts (11%)
Create a presentation chart from an analytical chart
Manipulate association and timeline charts for presentation
Create and implement the different functionalities of a Legend
Understand different dissemination tools in IBM i2 Analyst's Notebook

IBM Certified Analyst - i2 Analyst's Notebook V8.9

Job Role Description / Target Audience
This intermediate level certification is intended for professionals who are regular users of IBM i2 Analyst's Notebook V8.9. A minimum of six (6) months of experience in the product is recommended before attempting this certification.

This certification is relevant to national security law enforcement and commercial intelligence/fraud/information analysts, supervisors and managers who actively use the product, as well as researchers.

These professionals typically perform some or all of the following:
create intelligence analysis products
create associations and timeline charts; develop pattern of life
analyze financial and communication data
analyze networks and nodes
deconstruct organized crime groups
apply analytic trade craft
import structured data
assess and communicate analytical data through presentation charts

Recommended Prerequisite Skills
Before preparing for this certification, basic understanding of the following is recommended and assumed:

knowledge of Windows and Microsoft Office Suite

In preparing for this certification, the following IBM courses are recommended to further improve your skills:
9I02G: IBM i2 Analyst's Notebook Essentials
QUESTION 1
The investigator wants to perform a search for "FARADAY" in Analyst's Notebook. Which wildcard
search will return the desired results?

A. F?Y
B. F*AY
C. F*day
D. FA???

Answer: B

Explanation:


QUESTION 2
Which of the following will find all entities within two links of separation in a specific direction, and
in chronological order of a targeted entity?

A. Find Path
B. Find Linked
C. Visual Search
D. Find Matching Entities

Answer: B

Explanation:


QUESTION 3
Which of the following is a semantic type that can be assigned to the chart items from the
Semantic Type Library?

A. Chart semantic types
B. Entity semantic types
C. Palette semantic types
D. Identity semantic types

Answer: B

Explanation:
QUESTION 4
An analyst is creating an Import Specification. During the Assign Columns step, which task MUST
be performed?

A. Assign all the identities.
B. Create more than one entity.
C. Add additional entities and links.
D. Assign all of the columns in the spreadsheet.

Answer: A

Explanation:


QUESTION 5
The Filters and Histograms feature in Analyst's Notebook allows the user to do all of the following
EXCEPT for the ability to:

A. use analysis attributes for analyzing data.
B. isolate data based on filters or histograms selected.
C. drill-down into the data to do more in depth analysis.
D. view the data in different ways while at the same time changing the underlying data.

Answer: D

Explanation:

Friday, 22 September 2017

C2150-613 IBM Security AppScan Enterprise Edition V9.0.3 Deployment

Test information:
Number of questions: 60
Time allowed in minutes: 90
Required passing score: 66%
Languages: English

Related certifications:
IBM Certified Deployment Professional - Security AppScan Enterprise Edition V9.0.3


The test consists of 4 sections containing a total of approximately 60 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 - Planning (22%)
Determine the supported hardware or software requirement based on projected usage.
Understand the customer environment to utilize the planning checklist.
Plan for license requirements.

Section 2 - Installation and Configuration (30%)
Determine pre-configuration requirements prior to installation.
Determine the requirements for downloading and installing software.
Configure the license key server and license key administrator.
Use the configuration wizard to configure the product.

Section 3 - Administration (27%)
Determine applicable post installation setup.
Set up user and security permissions.

Section 4 - Verification and Troubleshooting (22%)
Configure a verification scan.
Determine an appropriate solution for common troubleshooting issues.

IBM Certified Deployment Professional - Security AppScan Enterprise Edition V9.0.3

Job Role Description / Target Audience
This intermediate level certification is for deployment professional who work with IBM Security AppScan Enterprise Edition, V9.0.3. They plan, install, configure, verify, administer, maintain and troubleshoot.

These deployment professionals are generally self-sufficient and able to perform most of the tasks involved in the job role with limited assistance.

To attain the IBM Certified Deployment Professional - IBM Security AppScan Enterprise Edition V9.0.3 certification, candidates must pass 1 test. To prepare for the test, it is recommended to refer to the job role description and recommended prerequisite skills, and click the link to the test below to refer to the test objectives and the Test preparation tab.

Basic knowledge of:
Application security
Operating systems
Administering applications for servers (Windows and Linux)
Administering SQL servers
User authentication

Tuesday, 8 August 2017

70-773 Analyzing Big Data with Microsoft R

Exam 70-773
Analyzing Big Data with Microsoft R


Published: January 3, 2017
Languages: English
Audiences: Data scientists
Technology Microsoft R Server, SQL R Services
Credit toward certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Read and explore big data
Read data with R Server
Read supported data file formats, such as text files, SAS, and SPSS; convert data to XDF format; identify trade-offs between XDF and flat text files; read data through Open Database Connectivity (ODBC) data sources; read in files from other file systems; use an internal data frame as a data source; process data from sources that cannot be read natively by R Server
Summarize data
Compute crosstabs and univariate statistics, choose when to use rxCrossTabs versus rxCube, integrate with open source technologies by using packages such as dplyrXdf, use group by functionality, create complex formulas to perform multiple tasks in one pass through the data, extract quantiles by using rxQuantile
Visualize data
Visualize in-memory data with base plotting functions and ggplot2; create custom visualizations with rxSummary and rxCube; visualize data with rxHistogram and rxLinePlot, including faceted plots

Process big data
Process data with rxDataStep
Subset rows of data, modify and create columns by using the Transforms argument, choose when to use on-the-fly transformations versus in-data transform trade-offs, handle missing values through filtering or replacement, generate a data frame or an XDF file, process dates (POSIXct, POSIXlt)
Perform complex transforms that use transform functions
Define a transform function; reshape data by using a transform function; use open source packages, such as lubridate; pass in values by using transformVars and transformEnvir; use internal .rx variables and functions for tasks, including cross-chunk communication
Manage data sets
Sort data in various orders, such as ascending and descending; use rxSort deduplication to remove duplicate values; merge data sources using rxMerge(); merge options and types; identify when alternatives to rxSort and rxMerge should be used
Process text using RML packages
Create features using RML functions, such as featurizeText(); create indicator variables and arrays using RML functions, such as categorical() and categoricalHash(); perform feature selection using RML functions

Build predictive models with ScaleR
Estimate linear models
Use rxLinMod, rxGlm, and rxLogit to estimate linear models; set the family for a generalized linear model by using functions such as rxTweedie; process data on the fly by using the appropriate arguments and functions, such as the F function and Transforms argument; weight observations through frequency or probability weights; choose between different types of automatic variable selections, such as greedy searches, repeated scoring, and byproduct of training; identify the impact of missing values during automatic variable selection
Build and use partitioning models
Use rxDTree, rxDForest, and rxBTrees to build partitioning models; adjust the weighting of false positives and misses by using loss; select parameters that affect bias and variance, such as pruning, learning rate, and tree depth; use as.rpart to interact with open source ecosystems
Generate predictions and residuals
Use rxPredict to generate predictions; perform parallel scoring using rxExec; generate different types of predictions, such as link and response scores for GLM, response, prob, and vote for rxDForest; generate different types of residuals, such as Usual, Pearson, and DBM
Evaluate models and tuning parameters
Summarize estimated models; run arbitrary code out of process, such as parallel parameter tuning by using rxExec; evaluate tree models by using RevoTreeView and rxVarImpPlot; calculate model evaluation metrics by using built-in functions; calculate model evaluation metrics and visualizations by using custom code, such as mean absolute percentage error and precision recall curves
Create additional models using RML packages
Build and use a One-Class Support Vector Machine, build and use linear and logistic regressions that use L1 and L2 regularization, build and use a decision tree by using FastTree, use FastTree as a recommender with ranking loss (NDCG), build and use a simple three-layer feed-forward neural network

Use R Server in different environments
Use different compute contexts to run R Server effectively
Change the compute context (rxHadoopMR, rxSpark, rxLocalseq, and rxLocalParallel); identify which compute context to use for different tasks; use different data source objects, depending on the context (RxOdbcData and RxTextData); identify and use appropriate data sources for different data sources and compute contexts (HDFS and SQL Server); debug processes across different compute contexts; identify use cases for RevoPemaR
Optimize tasks by using local compute contexts
Identify and execute tasks that can be run only in the local compute context, identify tasks that are more efficient to run in the local compute context, choose between rxLocalseq and rxLocalParallel, profile across different compute contexts
Perform in-database analytics by using SQL Server
Choose when to perform in-database versus out-of-database computations, identify limitations of in-database computations, use in-database versus out-of-database compute contexts appropriately, use stored procedures for data processing steps, serialize objects and write back to binary fields in a table, write tables, configure R to optimize SQL Server ( chunksize, numtasks, and computecontext), effectively communicate performance properties to SQL administrators and architects (SQL Server Profiler)
Implement analysis workflows in the Hadoop ecosystem and Spark
Use appropriate R Server functions in Spark; integrate with Hive, Pig, and Hadoop MapReduce; integrate with the Spark ecosystem of tools, such as SparklyR and SparkR; profile and tune across different compute contexts; use doRSR for parallelizing code that was written using open source foreach
Deploy predictive models to SQL Server and Azure Machine Learning
Deploy predictive models to SQL Server as a stored procedure, deploy an arbitrary function to Azure Machine Learning by using the AzureML R package, identify when to use DeployR

Question No : 1

Note: This question Is part of a series of questions that use the same or similar answer choice. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided In a question apply only to that question. You need to evaluate the significance of coefficient that are produced by using a model that
was estimated already.

Which function should you use?

A. rxPredict
B. rxLogit
C. Summary
D. rxLinMod
E. rxTweedie
F. stepAic
G. rxTransform
H. rxDataStep

Answer: D

Explanation: https://docs.microsoft.com/en-us/r-server/r/how-to-revoscaler-linear-model

Question No : 2
You need to build a model that looks at the probability of an outcome. You must regulate between L1 and L2. Which classification method should you use?

A. Two-Class Neural Network
B. Two-Class Support Vector Machine
C. Two-Class Decision Forest
D. Two-Class Logistic Regression

Answer: A