21 April, 2010

MBS AX 4.0 exam MB6-510 and MB6-511 will be available this week!

There are lots of persons contact me to ask for the information about the MBS AX 4.0 exams recently, so I checked the website, but all the exams are still for AX 3.0, so I contacted the tech team from pass4sure. They told me there are two AX 4.0 exams will be available soon:
MB6-510 AX 4.0 Human Resource Management
MB6-511 AX 4.0 Production

The samples will also be posted here as soon as the question pools are repleased, and one can check these links to make sure whether the exams are ready or not: MB6-510 MB6-511

QUESTION 1
You work as an application developer at Certkiller .com. You are in the process of
creating an application that will display confidential employee information.
When your manager informs you that only managers and administrators should be
able to view the information, you utilize windows authentication and .NET
role-based security to guarantee this.
The network administrator in your department informs you that he has noticed that
there are certain users that are not managers or administrators are able to view the
employee information. You immediately analyze your code, and discover an issue
with domain group memberships.
The network administrator asks you to trace the user account and security
identifier (SID) of each user in the application so that he can use this information to
detect users across the enterprise and verify that their group memberships are
correct.
How would you do this?
A. Use the following code:
WindowsIdentity curID = WindowsIdentity.GetCurrent ();
NTAccount account = new NTAccount (curID.Name);
SecurityIdentifier sid = (SecurityIdentifier);
account.Translate (typeof (SecurityIdentifier));
Trace.Write (”User’s SID is” + sid.Value, “User” + account.Value);
B. Use the following code:
WindowsIdentity curID = WindowsIdentity.GetCurrent ();
NTAccount account = new NTAccount (curID.Name);
Trace.Write (”User’s SID is” + sid.Value, “User” + account.Value);
C. Use the following code:
WindowsIdentity curID = WindowsIdentity.GetCurrent ();
Trace.Write (”User’s SID is” + curID.Value, “User” + sid.Name);
D. Use the following code:
WindowsIdentity curID = WindowsIdentity.GetCurrent ();
SecurityIdentifier sid = new SecurityIdentifier (curID.Name);
Trace.Write (”User’s SID is” + curID.Value, “User” + sid.Name);
Answer: A
Explanation: This code retrieves the current WindowsIdentity object associated
with the user, instantiates an NTAccount object using the Name property, invokes
the Translate method to retrieve the current SecurityIdentifier object, and invokes
the Write method on the Trace class to record the Value property of both the

Actualtests.org – The Power of Knowing
SecurityIdentifier and NTAccount objects. The GetCurrent method of the
WindowsIdentity object represents the identity of the application user. The
NTAccount class represents a Windows user group account in the local Security
Accounts Manager (SAM) or in the Active Directory domain. The constructor of the
NTAccount class accepts either a single string representing the account name or two
strings, one representing the domain name and the other representing the account
on that domain. To facilitate SID lookups, the Translate method takes a Type
argument and returns an IdentityReference object. You must convert or cast the
IdentityReference object to a SecurityIdentifier object to retrieve the Sid for the
specified account. The Value property of the SecurityIdentifier and NTAccount
class returns a SID and fully-qualified user name string, respectively. The Write
method of the Trace class outputs the specified message into the specified category.
Incorrect Answers:
B: You should not use the code that does not specify the SecurityIdentifier class because
the NTAccount class does not have a SID property.
C: You should not use the code that does not specify the NTAccount and
SecurityIdentifier classes because there is no SID property in the WindowsIdentity class.
D: You should not use the code that does not specify the NTAccount class because a
SecurityIdentifier object cannot be instantiated using an account name as an argument,
and it does not contain a Name property.
QUESTION 2
You work as an application developer at Certkiller .com. You are currently creating
a sales report application that requires Windows authentication on Certkiller .com’s
domain.
To achieve this, you are required to implement role-based security within the sales
report application.
You establish that the method shown below should only be invoked by members of
the Managers group:
public void UpdateEmpSalesBonus (int empID, double amount)
{
//Update employee’s salary
}
You need to ensure that invocation of the UpdateEmpSalesBonus method is
restricted to only managers.
What should you do? (Choose two)
A. Apply the following attribute to the UpdateEmpSalesBonus method:
[WindowsPricipalPermission (SecurityAction.Demand, Role = "Managers")]
B. Apply the following code to the UpdateEmpSalesBonus method:
WindowsIdentity user = WindowsIdentity.GetCurrent ();
if (user.IsInRole (”Managers”))
{
//Update employee’s salary
}
C. Apply the following attribute to the UpdateEmpSalesBonus method:

Actualtests.org – The Power of Knowing
[PricipalPermission (SecurityAction.Demand, Role = "Managers")]
D. Apply the following code to the UpdateEmpSalesBonus method:
if (Thread.CurrentPricipal.IsInRole (”Managers”))
{
//Update employee’s salary
}
Answer: C, D
Explanation: Imperative role-based security can use the PricipalPermission class or
the IPrincipal object directly. The PricipalPermission class takes a user name and
role as string arguments representing the required membership. The Demand
method indicates that all callers must belong to the user or group membership
specified in the constructor to access the resource. The IPrincipal object can be
retrieved using the Thread.CurrentPricipal property. The IsInRole method takes a
role argument as a string and returns a Boolean value indicating whether the
current caller belongs to that group or not.
Incorrect Answers:
A: You should not use the attribute that applies the WindowsPricipalPermission attribute
because no such attribute exists in the .NET Framework 2.0 class library.
B: You should not use the code that invokes the IsInRole method on the
WindowsIdentity class because no such method exists.
QUESTION 3
You work as the application developer at Certkiller .com. Certkiller .com uses Visual
Studio.NET 2005 as its application development platform. You use a Windwos XP
Professional client computer named Certkiller -WS536 as your development
computer.
You are developing a .NET Framework 2.0 application on Certkiller -WS536. You
are trying to port an old Certkiller .com management application that was written in
unmanaged Windows code with no COM interfaces. The application you are
developing makes calls to the old Certkiller .com management unmanaged library
namedBillPerformance.dll.
You are required to make a call to the GetPerformaceScore method of the
unmanaged Performance.dll library.
What should you do?
A. The Type Library Exporter tool (tlbexp.exe) should be used
B. The Type Library Importer tool (tlbimp.exe) should be used
C. The Assembly Registration tool (regasm.exe) should be used
D. The Platform Invoke (DllImportAttribute) should be used
Answer: D
Explanation: The feature Platform Invoke is used to allow you to call methods that
are in unmanaged libraries but you need to declare the unmanaged method in the

Actualtests.org – The Power of Knowing
managed code using the extern and static keywords with the DllImport attribute
which is used to specify the unmanaged library.
Incorrect Answers:
A, B, C: The tool should not be considered for usage in the scenario because th

13 April, 2010

pass4sure HP0-402 study guide

Implementing HP Enterprise Virtual Array Solutions : HP0-402 Exam
Product Description
Exam Number/Code: HP0-402
Exam Name: Implementing HP Enterprise Virtual Array Solutions
Questions Type: Multiple choice,

“Implementing HP Enterprise Virtual Array Solutions”, also known as HP0-402 exam, is a HP certification.
Preparing for the HP0-402 exam? Searching HP0-402 Test Questions, HP0-402 Practice Exam, HP0-402 Dumps?

With the complete collection of questions and answers, Pass4sure has assembled to take you through 71 questions to your HP0-402 Exam preparation. In the HP0-402 exam resources, you will cover every field and category in HP AIS helping to ready you for your successful HP Certification.

Questions and Answers : 71 questions
Updated: March 20th , 2008

Question: 1
Using Command View EVA, which attributes are displayed for HSV2×0 Controller Properties. Select THREE.

A. mirror port states
B. temperature sensors
C. UPS voltage indicators
D. cache battery module states
E. levels of protection from shelf failures
Answer: A, B, D Question: 2
What are two capabilities of the HP Command View EVAPerf? Select TWO.

A. review port status
B. creation of vdisks
C. display SAN topology
D. collect host connection data
E. review capacity planning data
Answer: A, D Question: 3
What is the maximum number of disk enclosures for an EVA6000?

A. 4
B. 6
C. 8
D. 18
Answer: C Question: 4
What does the EVA provide in a heterogeneous environment? Select TWO.

A. mainframe support
B. no single point of failure
C. reliable and infinitely scalable
D. modular and scalable storage
E. preconfigured operating system solutions
Answer: B, D Question: 5
A customer requires a six hour call-to-repair commitment. Which minimum type of HP Care Pack
Service is appropriate?

A. HP Support Plus
B. HP Critical Service
C. HP 4 Hour, 24×7 Hardware Support
D. HP Proactive Essentials 24×7 Unlimited

Answer: B

Page 1 of 16

TK

Exam Name: Implementing HP Enterprise Virtual Array Solutions
Exam Type HP
Exam Code: HP0-402 Total Questions: 70

Question: 6
What is the best practice when adding disks to an EVA 2C8D for a Robust Availability
Configuration?

A. After adding the disks, delete and recreate the disk group.
B. Add disks in multiples of eight; distributed evenly across the shelves.
C. Install any number of disks and assign each of them individually to the appropriate redundant storage set.
D. After installing a single disk, wait until leveling has taken place in the existing disk group before you install the next disk.
Answer: B Question: 7
Which methods are available to provide system administrators direct notification of Field
Replaceable Unit (FRU) failures? Select TWO.

A. e-mail
B. RPC traps C. SCMI traps D. SNMP traps E. syslog event
Answer: A, D Question: 8
Which disks are used to optimize price per capacity for your EVA storage subsystem? Select
TWO.

A. higher performance disks
B. near online disks
C. larger capacity disks
D. smaller capacity disks
Answer: B, C Question: 9
Why would you consider configuring two separate disk groups instead of a single one? Select
TWO.

A. higher availability
B. lower cost of ownership
C. higher storage efficiency
D. better database performance
E. better utilization of disk space
Answer: A, D Question: 10
How many FC switched fabric connections are there on each M5314A drive enclosure?

A. 0
B. 2
C. 4
D. 8

Page 2 of 16

TK

Exam Name: Implementing HP Enterprise Virtual Array Solutions
Exam Type HP
Exam Code: HP0-402 Total Questions: 70

Answer: A

Question: 11
How is the drive enclosure address assigned?

A. by the loop switches
B. by the enclosure address bus
C. by the HSV controllers at power up
D. by the order that the drive enclosures are powered up
Answer: B Question: 12
What does the EMU do? Select TWO.

A. powers off HSV controllers
B. monitors disk enclosure temperatures
C. monitors disk enclosure and controller temperature sensors
D. reports disk enclosure events through the Enclosure Address Bus (EAB)
Answer: B, D Question: 13
In an EVA4000, what happens to the remaining disk enclosures when one disk enclosure becomes unavailable?

A. The remaining enclosures are unaffected.
B. The remaining enclosures shut down to retain data consistency.
C. The HSV controllers reroute the data around the unavailable enclosure.
D. The remaining enclosures reset enclosure addresses to bypass the failed enclosure.
Answer: A

P4S 642-654 question

I have been thinking about the Cisco certification for a long time, and never had time to prepare for it. But now, I know it is time for it.I have never expected that the 642-654 exam would be so difficult.
Many study materials in the market nowadays contain too many questions which are far from that of the real exams. Doing these practice that will never appear in the 642-654 exam wastes me lots of time.
A colleague of mine, who have got the Cisco certification, recommend Pass 4 sure to me, saying that without the help of Pass4sure, he couldn't have passed the exams.
The quality is the key of PASS4SURE's development and success. Many efforts have been made to ensure that the PASS4SURE products can assistant the students to pass the Pass4sure 642-654 exam without any other stuff.
Pass4sure exams contain realistic questions, validated answers and detailed explanations. What's more, more than 90% of the test objectives are covered by Pass4sure, which ensures the user to pass the 642-654 question exam definitely.
To remove your last worry when shopping at pass4sure, they provide the Free Demo Trial. Thus you can try and see for yourself before you make your decision. During your trial, you will find that everything—the friendly interface, the condensed questions, the accurate answers, the detailed analysis, the professional explanations, and the simplified software—is developed to your satisfaction!