Friday, June 30, 2017

Exam RC0-N06 CompTIA Network+ Recertification Exam for Continuing Education

Eligibility Candidates MUST have:
An active Network+ CE certification earned by passing exam N10-005 or earlier.
Received an email from CompTIA containing a Private Access Code (PAC).

Exam Description
The CompTIA Network+ Recertification Exam covers these domains:

1.0 Network Architecture (17% of total)
2.0 Network Operations (15% of total)
3.0 Network Security (20% of total)
4.0 Troubleshooting (28% of total)
5.0 Industry standards, practices, and network theory (20% of total)

Number of Questions 45
Type of Questions Multiple choice questions (single and multiple response)
Length of Test 75 Minutes
Passing Score 7​20 (on a scale of 100-900)

Only candidates with an active Network+ CE certification will receive CEU credit.
Passing the exam will automatically renew your existing Network+ CE. Please allow 1-3 days for your record to be updated.
INTRODUCTION
The  CompTIA Network

Re certification  Exam is one way for CompTIA certified professionals to keep their Network+ certification active. A CompTIA Network+ certification earned on or after January 1st, 2011 is valid for three years from the date the certification was earned. The certification must be renewed within three years in order for the individual to remain certified. To remain certified, individuals may:

Re-take (and pass) the current certification exam (N10-006)
Participate in continuing education activities

Take (and pass) the Network+ recertification exam (RC0-N06)

The CompTIA Network+ Recertification Exam RC0-N06 bridges the competencies measured by the Network+ N10-005 series and the N10-006 series. The exam (RC0-N06) blueprint includes the objectives new to the N10-006 series and also assesses the highest weighted competencies that appear on the exam (i.e., the knowledge and skills rated by SMEs as most relevant for on-the-job -performance).

NOTE: Availability of RC0-N06 is LIMITED TO THOSE who have kept their Network+ certification active and have not taken and passed the current N10-006 series exam.
CompTIA Network+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives. The following CompTIA Network+ Recertification RC0-N06 exam objectives result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an entry-level IT technical support professional.

This examination blueprint includes domain weighting, test objectives, and example content. Example topics and concepts are included to clarify the test objectives and should not be construed as a
comprehensive listing of all the content of this examination.

Candidates are encouraged to use this document to guide their studies. The table below lists the domains measured by this examination and the extent to which they are represented. The CompTIA Network+ RC0-N06 exam is based on these objectives

QUESTION 1 - (Topic 1)
A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?

A. 10.0.0.1
B. 127.0.0.1
C. 172.16.1.1
D. 192.168.1.1

Answer: B

Explanation:
The loopback address is a special IP address that is designated for the software loopback interface of a computer. The loopback interface has no hardware associated with it, and it
is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which willpoint back to the computer's TCP/IP network configuration.
In IPv4, the loopback address is 127.0.0.1.
In IPv6, the loopback address is 0:0:0:0:0:0:0:1, more commonly notated as follows. ::1


QUESTION 2 - (Topic 1)
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?

A. Leases
B. Helper addresses
C. Scopes
D. Reservations

Answer: D

Explanation:
A reservation is used in DHCP to ensure that a computer always receives the same IP address. To create a reservation, you need to know the hardware MAC address ofthe network interface card that should receive the IP address.
For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always get 192.168.0.7 as its IP address, you can map the MAC address of Server1 with the IP address to configure reservation.


QUESTION 3 - (Topic 1)
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?

A. /24
B. /32
C. /28
D. /29
E. /30

Answer: E

Explanation:
An IPv4 addressconsists bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines how many bits form the network address and from that, we can calculate how many bits are used for the host addresses.
In this question, the /30 subnet mask dictates that the first 30 bits of the IP address are used for network addressing and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n - 2. The "n" in the host's formula represents the number of bits used for host addressing. If we apply the formula (22 – 2), a /30 subnet mask will provide 2 IP addresses.


QUESTION 4 - (Topic 1)
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

A. Multilayer switch
B. Access point
C. Analog modem
D. DOCSIS modem

Answer: C

Explanation:
Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By today’s standards, analog modems are very slow typically offering a maximum bandwidth Kbps.
An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computerto an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer.
An analog modem uses an RJ-11 connector to connect to a phone line (POTS)in the same way a phone does.


QUESTION 5 - (Topic 1)
A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?

A. APIPA
B. MAC
C. Static
D. Public

Answer: A

Explanation:
APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems. When a client computer is configured to use automatic addressing (DHCP), APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is unavailable.
When a client computer configured to use DHCP boots up, it first looks for a DHCP server to provide the client with IP address and subnet mask. If the client is unable to contact a DHCP server, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft. The client also configures itself with a default class Bsubnet mask .255.0.0. The client will use the self-configured IP address until a DHCP server becomes available.


QUESTION 6 - (Topic 1)
A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement?

A. Star
B. Bus
C. Ring
D. Mesh

Answer: C

Explanation:
Token Ring networks are quite rare today. Token Ring networks use the ring topology. Despite being called a Ring topology, the ring is logical and the physical network structure often forms a ‘star’ topology with all computers on the network connecting to a central multistation access unit (MAU). The MAU implements the logical ring by transmitting signals to each node in turn and waiting for the node to send them back before it transmits to the next node. Therefore, although the cables are physically connected in a star, the data path takes the form of a ring. If any computer or network cable fails in a token ring network, the remainder of the network remains functional. The MAU has the intelligence to isolate the failed segment.
To ensure that the computers need to wait to talk on the network to avoid congestions, a Token Ring network uses a ‘token’. The token continually passes around the network until a computer needs to send data. The computer then takes the token and transmits the data beforereleasing the token. Only a computer in possession of the token can transmit data onto the network.

Friday, June 2, 2017

Exam 70-346 Managing Office 365 Identities and Requirements

Published: February 17, 2014
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Japanese, Portuguese (Brazil), Spanish
Audiences: IT professionals
Technology: Microsoft Office 365
Credit toward certification: MCP, MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of June 30, 2016, this exam includes content covering the latest updates and features of Office 365. To learn more about these changes and how they affect the skills measured, please download and review the exam 70-346 change document.

Provision Office 365 (15–20%)
Provision tenants
Configure the tenant name, tenant region, initial global administrator; manage tenant subscriptions; manage the licensing model; configure tenant for new features and updates
Add and configure custom domains
Specify domain name, confirm ownership, specify domain purpose, set default domain, and move ownership of DNS to Office 365
Plan a pilot
Designate pilot users; identify workloads that don’t require migration; run the Office 365 Health, Readiness, and Connectivity Checks; run IdFix; create a test plan or use case, and connect existing email accounts for pilot users; understand service descriptions and planning to onboard users to Office 365; configure connected accounts

Plan and implement networking and security in Office 365 (15–20%)
Configure DNS records for services
Create DNS records for Exchange Online, Skype for Business Online, and SharePoint Online
Enable client connectivity to Office 365
Configure proxy to allow client access to Office 365 URLs, configure firewalls for outbound port access to Office 365, recommend bandwidth, configure Internet connectivity for clients, deploy desktop setup for previous versions of Office clients
Administer Microsoft Azure Rights Management (RM)
Activate rights management, configure Office integration with rights management, assign roles for rights management, enable recovery of protected documents
Manage administrator roles in Office 365
Implement a permission model; create or revoke assignment of administrative roles or the administrative model; determine and assign global administrator, billing administrator, user administrator, and delegated administrator; control password resets

Preparation resources
Create DNS records for Office 365 when you manage your DNS records
Assigning admin roles in Office 365

Manage cloud identities (15–20%)
Configure password management
Set expiration policy, password complexity, password resets in Administration Center
Manage user and security groups
Import users using bulk import (CSV), soft delete, Administration Center, and multi-factor authentication
Manage cloud identities with Windows PowerShell
Configure passwords to never expire, bulk update of user properties, bulk user creation, Azure Active Directory cmdlets, bulk user license management, hard delete users

Preparation resources
Password policy for Office 365
User account management
Manage Azure AD using Windows PowerShell

Implement and manage identities by using Azure AD Connect (15–20%)
Prepare on-premises Active Directory for Azure AD Connect
Plan for non-routable domain names, clean up existing objects, plan for filtering Active Directory, implement support for multiple forests
Set up Azure AD Connect tool
Implement soft match filtering and identify synchronized attributes, password sync, and installation requirements
Manage Active Directory users and groups with Azure AD Connect in place
Delete (soft delete), create, modify users and groups with Azure AD Connect in place, schedule and force synchronization

Preparation resources
Prepare for directory synchronization
Synchronize your directories

Implement and manage federated identities for single sign-on (SSO) (15–20%)

Plan requirements for Active Directory Federation Services (AD FS)
Plan namespaces and certificates, plan AD FS internal topologies and dependencies, plan WAP/AD FS proxy topologies, network requirements, multi-factor authentication, and access filtering using claims rules
Install and manage AD FS servers
Create AD FS service account, configure farm or stand-alone settings, add additional servers, convert from standard to federated domain, manage certificate lifecycle
Install and manage WAP/AD FS proxy servers
Set up perimeter network name resolution, install required Windows roles and features, set up certificates, configure WAP/AD FS proxy settings, set custom proxy forms login page, switch between federated authentication and password sync

Preparation resources

Plan your AD FS deployment
Checklist: Use AD FS to implement and manage single sign-on
Administering Office 365 Jump Start (03): DirSync, SSO, and AD FS

Monitor and troubleshoot Office 365 availability and usage (15–20%)

Analyze reports
Analyze service reports, mail protection reports, analyze Office 365 audit log reports, analyze portal email hygiene reports
Monitor service health
Monitor health using RSS feed, use service health dashboard (including awareness of planned maintenance, service updates, and historical data), Office 365 Management Pack for System Center Operations Manager, and Windows PowerShell cmdlets
Isolate service interruption
Create a service request; determine connection issues using the Microsoft Remote Connectivity Analyzer (RCA), Microsoft Lync Connectivity Analyzer tool, and Microsoft Connectivity Analyzer tool; determine availability issues using the hybrid free/busy troubleshooter; determine client configuration issues using Office 365 Client Performance Analyzer and Microsoft Support and Recovery Assistant for Office 365

Preparation resources
Reporting features and troubleshooting tools
Service health
QUESTION 1
An organization plans to migrate to Office 365.
You need to estimate the post-migration network traffic.
Which tool should you use?

A. Lync 2013 Bandwidth Calculator
B. Process Monitor
C. Microsoft Network Monitor
D. Microsoft OnRamp Readiness tool

Answer: A

Explanation:
Office 365 includes Lync 2013.
With this latest version of the Microsoft Lync Server 2010 and 2013 Bandwidth Calculator, you can enter information about your users and the Lync Server features that you want to deploy, and the Bandwidth Calculator will determine bandwidth requirements for the WAN that connects sites in your deployment. The accompanying Bandwidth Calculator User Guide describes the recommended process for estimating your WAN bandwidth needs for Lync client real-time traffic.
Reference: Lync Server 2010 and 2013 Bandwidth Calculator Version 2.0
http://blogs.technet.com/b/nexthop/archive/2013/06/07/lync-server-2010-and-2013-
bandwidth-calculator-version-2-0.aspx

QUESTION 2
A company has an Office 365 tenant that has an Enterprise E1 subscription. The company has offices in several different countries.
You need to restrict Office 365 services for existing users by location.
Which Windows PowerShell cmdlet should you run?

A. Set-MsolUser
B. Redo-MsolProvisionUser
C. Set-MsolUserLicense
D. Set-MsolUserPrincipalName
E. Convert-MsolFederatedUser
F. Set-MailUser
G. Set-LinkedUser
H. New-MsolUser

Answer: A

Explanation:
The Set-MsolUser cmdlet is used to update a user object.
Example: The following command sets the location (country) of this user. The country must be a two-letter ISO code. This can be set for synced users as well as managed users. Set-MsolUser -UserPrincipalName user@contoso.com -UsageLocation "CA"
Note:
Some organizations may want to create policies that limit access to Microsoft Office 365 services, depending on where the client resides.
Active Directory Federation Services (AD FS) 2.0 provides a way for organizations to configure these types of policies. Office 365 customers using Single Sign-On (SSO) who require these policies can now use client access policy rules to restrict access based on the location of the computer or device that is making the request. Customers using Microsoft Online Services cloud User IDs cannot implement these restrictions at this time.
Reference: Limiting Access to Office 365 Services Based on the Location of the Client https://technet.microsoft.com/en-us/library/hh526961(v=ws.10).aspx
Reference: Set-MsolUser https://msdn.microsoft.com/en-us/library/azure/dn194136.aspx