15 October, 2009

Microsoft TS authentification, a cornerstone in your road to high salary

With the continuous development of high technology, the market for computer information industry-related professionals.Though ebbs and flows happen to the economy, the trend of informationizing is destined to expand instead of heading back.

Companies often attach more importance to individual strength when selecting talents.Microsoft TS Certificate is the best attestation of professional strength but one must keep abreast of professional technical competence after the obtainment of Microsoft 70-640.To an individual, Microsoft TS certification is a weapon of striving for high position in career and the protection of high-paying positions, and the amulet of ensuring job.In addition, Microsoft TS certificates are recognized globally, and the technical capability they represent is highly affirmed by the industry.According to the survey and for enterprises, the personals who have IT certification, are better at problem solving and have stronger capacity to produce.The certificates will be the most significant consideration in future IT talent market and corporate recruitment.

Several important items before preparation for Microsoft 70-640:

1) Make clear why you want a certification and what a certification you want.
2. Get a correct recognition of the value of a certificate. Together coming with TS certificates and related experiences will be more competitiveness.
(3) Properly selecting the training institutions, good training institutions should have adequate teaching staff, as well as a greater influence.
4) Be prepared for continued learning.

13 October, 2009

TestKing COGNOS BI0-112 Exam Questions free download

Slide 1: Vendor: COGNOS
Exam: BI0-112
Version:#1 in IT Testing & Certification Tools
testking free dumps provides you some free dumps.
1. In Report Studio, based on the crosstab below, which of the following is true?
A. Sales territory is a parent to Quantity and Revenue.
B. Quantity and Revenue have a parent-child relationship.
C. Order method is a peer of Retailer type.
D. Sales territory is a peer of Order method.
Answer: A

2. In Report Studio, what is true about a crosstab node?
A. It contains at least one nested crosstab node.
B. It contains at least one crosstab node member.
C. It contains more than one nested crosstab node.
D. It must contain more than one crosstab node member.
Answer: B

3. The sales department requires a report that numerically compares the gross profit generated for all product lines in each territory. In Report Studio, which is the most appropriate report type?
A. List
B. Chart
C. Crosstab
D. Repeater
Answer:C

4. An author wants to apply formatting to a list report. In Report Studio, the author clicks a column in the list, clicks Select Ancestor, and then clicks List Columns. In this situation, which of the following is true?
A. Formatting all columns will also format aggregate rows in the list.
B. Formatting all columns overrides formatting for an existing formatted column in the list.
C. Formatting all columns affects all subsequent objects added to the report page. D. Formatting all columns ensures any new columns added to the list will have the same formatting.
Answer:D

5. In Report Studio, what is a baseline?
A. A value in a list report that other values are compared against.
B. A border in a crosstab that separates measures from aggregate totals.
C. A constant value drawn on a chart to indicate major divisions in the data.
D. A break point that lets you keep part of a report stationary while you scroll. Answer: C

6. In Report Studio, which chart lets the report author plot a third measure?
A. Area
B. Bubble
C. Scatter
D. Progressive Column
Answer: B

7. In Report Studio, an author wants to change the location of the legend in the chart report. What property will accomplish this?
A. Auto Truncation
B. Axis Assignment
C. Absolute Position
D. Relative Alignment
Answer: C

8. The following report was created in Report Studio using a relational package and shows revenue by sales rep, city, and country. What will the report show if the author creates a detail filter for Revenue>500,000 and applies the filter AFTER auto aggregation?
A. Only reps who generated total revenue greater than 500,000.
B. Only cities that generated total revenue greater than 500,000.
C. Only countries that generated total revenue greater than 500,000.
D. Only reps who had individual sales transactions of greater than 500,000.
Answer:A

9. In Report Studio, an author is using a relationally modeled package and wants to filter a report to only include three specific products. If the author is not sure how to spell the product names, what is the fastest way to add the product names to the filter expression?
A. Run the report with all product names and copy the product names.
B. Use the Select Multiple Values feature to search for the product names.
C. Add the product names from the Source tab in the Available components pane.
D. Add the product names from the Data Items tab in the Available components pane. Answer: B

10. An author wants to create a filter on this report to only show Product line totals larger than 1 billion. What calculation is used to create this filter?
A. Detail filter as: Total ([Revenue] for Product line)>1000000000 Application = After auto aggregation
B. Detail filter as: Total ([Revenue])>1000000000 Scope = Product line
C. Summary filter as: [Revenue]>1000000000 Scope = Product line
D. Summary filter as: ([Revenue] for Product line>1000000000) Application = After auto aggregation
Answer: C

free Microsoft 70-350 dumps

Testking dumps recently collect some free Microsoft 70-350 dumps,i hope it's may userful for the people who take part in Microsoft 70-350 certs.
1. Your network consists of a single Active Directory domain named contoso.com. The network contains an ISA Server 2000 computer named ISA1.
All client computers have the ISA Server 2000 Firewall Client software installed. Client computers are configured to use an internal DNS server. Two Windows Server 2003 computers named App1 and App2 run a Web-based application that is used to process company data.
You configure ISA1 with protocol rules to allow HTTP, HTTPS, RDP, POP3, and SMTP access.
The list of domain names available on the Internal network on ISA1 contains the following entries:
•*.south.contoso.com
•*.north.contoso.com
•*.east.contoso.com
•*.west.contoso.com
You perform an in-place upgrade of ISA1 by using the ISA Server 2004 Migration Tool. When you use Network Monitor on ISA1, you discover that client requests for App1 and App2 are being passed through ISA1.
You need to provide a solution that will allow clients to directly access company data on App1 and App2.
What should you do?
A. Create and configure HTTP, HTTPS, RDP, POP3, and SMTP access rules on ISA1.
B. Configure an Application.ini file on the client computers.
C. Redeploy the ISA Server 2004 Firewall Client software by distributing it to the client computers by using Group Policy.
D. Add app1.contoso.com and app2.contoso.com to the list of domain names available on the Internal network on ISA1.
Answer: D

2. You are a network administrator for Litware, Inc. The network contains an ISA Server 2004 computer named ISA1. ISA1 is configured to allow outbound Internet access. A listener named DefaultHTTP is also configured to listen for requests on port 80 on the external interface.
The Internal network contains two Web sites named HR and Sales, which are used by employees. The HR Web site is stored on a Web server named Web1.litwareinc.com. The Sales Web site is stored on a Web server named Sales1.litwareinc.com. Employees access the Litware, Inc., Web site by using the URL http://www.testkingdemo.com.
You must allow employees to access both the HR Web site and the Sales Web site from the Internet. You must ensure that employees can access the HR Web site by using the URL http://www.testkingdemo.com/hr. You must also ensure that employees can access the Sales Web site by using the URL http://www.testkingdemo.com/sales.
What should you do?
A. Configure one of the Web servers to listen for HTTP requests on port 8080.
Create two server publishing rules. Create one of the rules to respond to requests on port 8080, and configure this rule to forward requests to one internal Web server. Create the other rule to use the DefaultHTTP listener, and configure this rule to forward to the other internal Web server.
B. Create one Web publishing rule by using the path /Sales/* and redirect to Web1.litwareinc.com. Create one Web publishing rule by using the path /HR/* and redirect to Sales1.litwareinc.com Configure each rule to use the DefaultHTTP listener.
C. Create two server publishing rules. Configure each rule to forward to a different internal Web server. Configure each internal Web server to listen for HTTP requests on an unused port.
D. Create one Web publishing rule by using the path /HR/* and redirect to Web1.litwareinc.com. Create one Web publishing rule by using the path /Sales/* and redirect to Sales1.litwareinc.com Configure each rule to use the DefaultHTTP listener.
Answer: D

3. Your network contains a single ISA Server 2004 computer named ISA1. ISA1 is not yet configured to allow inbound VPN access.
You deploy a new application named App1. The server component of App1 is installed on an internal server named Server1. The client component of App1 is installed on employee and partner computers. Employees and partners will establish VPN connections when they use App1 from outside the corporate network.
You identify the following requirements regarding VPN connections to the corporate network.
•Employees must be allowed access to only Server1, three file servers, and an internal Web server named Web1.
•Employees must have installed all current software updates and antivirus software before connecting to any internal resources.
•Partners must be allowed access to only Server1.
•You must not install any software other than the App1 client on any partner computers.
You need to plan the VPN configuration for the company.
What should you do?
A. Configure ISA1 to accept incoming VPN connections from partners and employees.
Enable Quarantine Control on ISA1.
Configure Quarantine Control to disconnect users after a short period of time.
use access rules to allow access to only the permitted resources.
B. Configure ISA1 to accept incoming VPN connections from partners and employees.
Enable Quarantine Control on ISA1.
Exempt partners from Quarantine Control.
use access rules to allow access to only the permitted resources.
C. Configure ISA1 to accept incoming VPN connections from partners and employees.
Enable Quarantine Control on ISA1.
Enable RADIUS authentication and user namespace mapping.
Configure a Windows Server 2003 Routing and Remote Access server as a RADIUS server.
Create a single remote access policy.
D. Add a second ISA Server 2004 computer named ISA2.
Configure ISA1 to accept VPN connections from employees. Do not enable Quarantine Control on ISA1.
Configure ISA2 to accept VPN connections from partners. Enable Quarantine Control on ISA2.
On each server, use access rules to allow access to only the permitted resources.
Answer: B

4. Your company has a main office, two branch offices, and one research office. An ISA Server array is configured for the main, and the two branch offices. All arrays are members of the same ISA Server 2004 enterprise.
A Configuration Storage server is located in the main office. Replica Configuration Storage servers are located in each branch office. Administrators at the main office administer the enterprise settings and the main office array. The administrators at each branch office administer the arrays at their respective branch offices.
You need to install a new ISA Server array in the research office. You need to ensure that only research office administrators can manage access rules for the array.
What should you do?
A. Configure a replica Configuration Storage server. Assign the research office administrators the ISA Server Array Administrator role.
B. Configure a new array in the existing enterprise. Assign the research office administrators the ISA Server Array Administrator role.
C. Configure a new array in the existing enterprise. Assign the research office administrators the ISA Server Enterprise Administrator role.
D. Configure a new Configuration Storage server in the research office. Configure it as a new enterprise. Assign the research office administrators the ISA Server Enterprise Administrator role.
Answer: D

5. You are the administrator of an ISA Server 2000 computer named ISA1. You use the ISA Server 2004 Migration Tool to perform an in-place upgrade on ISA1. You install the Firewall Client installation component on ISA1.
Client computers in the sales department run Windows NT Workstation 4.0 with Internet Explorer 5.0 and the Microsoft Proxy 2.0 Winsock Proxy client installed. All other client computers run Windows XP Professional. The ISA Server 2000 Firewall Client was installed on the Windows XP Professional computers by using Group Policy.
You discover that all client computer requests to ISA1 are being sent unencrypted.
You need to configure all client computers to communicate to ISA1 by using encryption.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Uninstall the Winsock Proxy client from the client computers in the sales department.
Run Setup.exe to install the ISA Server 2004 Firewall Client.
B. Uninstall the Winsock Proxy client from the client computers in the sales department.
Enable the Allow non-encrypted Firewall client connections setting on the Internal network.
C. Uninstall the Winsock Proxy client from the client computers in the sales department.
Enable the Require all users to authenticate setting. Configure SSL certificate authentication for all Firewall clients on the Internal network.
D. Upgrade the Firewall Client for ISA Server 2000 software on the Windows XP Professional client computers.
Configure the Windows XP Professional computers as Web Proxy clients.
E. Upgrade the Windows XP Professional client computers by assigning the ISA Server 2004 Firewall Client.
Configure the software installation package to remove older versions of the software.
Answer: AE

6. Your network consists of a single Active Directory domain. The network contains an ISA Server 2004 computer named ISA1. Client computers on the network consist of Windows XP Professional computers, UNIX workstations, and Macintosh portable computers. All client computers are domain members.
You configure ISA1 by using the Edge Firewall network template. You manually configure ISA1 with access rules to allow HTTP and HTTPS access to the Internet. You configure ISA1 to require all users to authenticate.
You need to provide Internet access for all client computers on the network while preventing unauthorized non-company users from accessing the Internet through ISA1. You also want to reduce the amount of administrative effort needed when you configure the client computers.
What should you do?
A. Configure all client computers as Web Proxy clients. Configure Basic authentication on the Internal network.
B. Configure all client computers as Web Proxy clients. Configure Basic authentication on the Local Host network.
C. Configure all client computers as SecureNAT clients. Configure Basic authentication on the Internal network.
D. Configure the Windows-based computers as Firewall clients. Configure the non-Windows-based computers as Web Proxy clients. Configure Basic authentication on the Local Host network.
Answer: A

Cisco Updates the CCSP Certification

Business and industry needs are driving the evolution and development of the security solutions deployed in today’s networks. This in turn, is driving the demand for highly trained and skilled security professional s.
According to industry analysts, security spending remains a top priority in many organizations. IDC currently forecasts this market to reach $67 billion in 2010, representing a compound annual growth rate (CAGR) of 16 percent from 2005 to 2010. A recent Forrester Research survey also found, nearly one-third of IT leaders plan to hire security staff in 2007.
To ensure Cisco certification holders are current on the latest technology trends, Cisco has updated the CCSP certification and also introduced two new specialist certifications.
Changes to the security CCSP professional certification include updates to two of the five recommended training courses as well as, introducing two new exams and courses added as curriculum electives that can be used to satisfy the exam requirements for CCSP. These new elective exams and courses will cover Implementing Cisco NAC Appliances and Implementing Cisco Security Monitoring, Analysis and Response Systems.
The Cisco Network Admission Control Specialist and the Cisco IOS Security Specialist certifications are the newest of the security specialist certifications now available. These certifications are designed for the security technologist and will validate their skills in implementing and supporting these technologies.!
In addition, Cisco is updating the security specialization requirements for channel partners. Specifically the Field Engineer requirements are changing. Exam 642-567 ASFE will be retired, as well as the Cisco Advanced Security Field Specialization. Partner engineers pursuing CCSP, which is a requirement for the Field Engineer role, must now take two additional CCSP elective exams in place of 642-567 ASFE. For those currently studying, the last day to test 642-567 ASFE will be July 30, 2007. The channel requirements for Account Manager and System Engineer remain unchanged.
If you have every considered adding a CCSP certification to your list of credentials, now is the time!
Visit the CCSP page for further details,and you can go to free testking dumps