Tuesday, June 16, 2020

200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Exam

Certification: Cisco Certified CyberOps Associate
Duration: 120 minutes (95 - 105 questions)
Available languages: English

Exam overview
This exam tests your knowledge and skills related to:
Security concepts
Security monitoring
Host-based analysis
Network intrusion analysis
Security policies and procedures

Exam Description
The Understanding Cisco Cybersecurity Operations Fundamentals (200-201 CBROPS) exam is a 120-minute assessment that is associated with the Cisco Certified CyberOps Associate certification. The CBROPS exam tests a candidate’s knowledge and skills related to security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies and procedures. The course, Understanding Cisco Cybersecurity Operations Fundamentals, helps candidates to prepare for this exam.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.1 Describe the CIA triad

1.2 Compare security deployments

1.2.a Network, endpoint, and application security systems
1.2.b Agentless and agent-based protections
1.2.c Legacy antivirus and antimalware
1.2.d SIEM, SOAR, and log management

1.3 Describe security terms

1.3.a Threat intelligence (TI)
1.3.b Threat hunting
1.3.c Malware analysis
1.3.d Threat actor
1.3.e Run book automation (RBA)
1.3.f Reverse engineering
1.3.g Sliding window anomaly detection
1.3.h Principle of least privilege
1.3.i Zero trust
1.3.j Threat intelligence platform (TIP)

1.4 Compare security concepts

1.4.a Risk (risk scoring/risk weighting, risk reduction, risk assessment)
1.4.b Threat
1.4.c Vulnerability
1.4.d Exploit

1.5 Describe the principles of the defense-in-depth strategy

1.6 Compare access control models

1.6.a Discretionary access control
1.6.b Mandatory access control
1.6.c Nondiscretionary access control
1.6.d Authentication, authorization, accounting
1.6.e Rule-based access control
1.6.f Time-based access control
1.6.g Role-based access control

1.7 Describe terms as defined in CVSS

1.7.a Attack vector
1.7.b Attack complexity
1.7.c Privileges required
1.7.d User interaction
1.7.e Scope

1.8 Identify the challenges of data visibility (network, host, and cloud) in detection

1.9 Identify potential data loss from provided traffic profiles

1.10 Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs

1.11 Compare rule-based detection vs. behavioral and statistical detection

2.1 Compare attack surface and vulnerability

2.2 Identify the types of data provided by these technologies

2.2.a TCP dump
2.2.b NetFlow
2.2.c Next-gen firewall
2.2.d Traditional stateful firewall
2.2.e Application visibility and control
2.2.f Web content filtering
2.2.g Email content filtering

2.3 Describe the impact of these technologies on data visibility

2.3.a Access control list
2.3.b NAT/PAT
2.3.c Tunneling
2.3.d TOR
2.3.e Encryption
2.3.f P2P
2.3.g Encapsulation
2.3.h Load balancing

2.4 Describe the uses of these data types in security monitoring

2.4.a Full packet capture
2.4.b Session data
2.4.c Transaction data
2.4.d Statistical data
2.4.e Metadata
2.4.f Alert data

2.5 Describe network attacks, such as protocol-based, denial of service, distributed denial of service, and man-in-the-middle

2.6 Describe web application attacks, such as SQL injection, command injections, and cross-site scripting

2.7 Describe social engineering attacks

2.8 Describe endpoint-based attacks, such as buffer overflows, command and control (C2), malware, and ransomware

2.9 Describe evasion and obfuscation techniques, such as tunneling, encryption, and proxies

2.10 Describe the impact of certificates on security (includes PKI, public/private crossing the network, asymmetric/symmetric)

2.11 Identify the certificate components in a given scenario

2.11.a Cipher-suite
2.11.b X.509 certificates
2.11.c Key exchange
2.11.d Protocol version
2.11.e PKCS

3.1 Describe the functionality of these endpoint technologies in regard to security monitoring

3.1.a Host-based intrusion detection
3.1.b Antimalware and antivirus
3.1.c Host-based firewall
3.1.d Application-level whitelisting/blacklisting
3.1.e Systems-based sandboxing (such as Chrome, Java, Adobe Reader)

3.2 Identify components of an operating system (such as Windows and Linux) in a given scenario

3.3 Describe the role of attribution in an investigation

3.3.a Assets
3.3.b Threat actor
3.3.c Indicators of compromise
3.3.d Indicators of attack
3.3.e Chain of custody

3.4 Identify type of evidence used based on provided logs

3.4.a Best evidence
3.4.b Corroborative evidence
3.4.c Indirect evidence

3.5 Compare tampered and untampered disk image

3.6 Interpret operating system, application, or command line logs to identify an event

3.7 Interpret the output report of a malware analysis tool (such as a detonation chamber or sandbox)

3.7.a Hashes
3.7.b URLs
3.7.c Systems, events, and networking

4.1 Map the provided events to source technologies

4.1.a IDS/IPS
4.1.b Firewall
4.1.c Network application control
4.1.d Proxy logs
4.1.e Antivirus
4.1.f Transaction data (NetFlow)

4.2 Compare impact and no impact for these items

4.2.a False positive
4.2.b False negative
4.2.c True positive
4.2.d True negative
4.2.e Benign

4.3 Compare deep packet inspection with packet filtering and stateful firewall operation

4.4 Compare inline traffic interrogation and taps or traffic monitoring

4.5 Compare the characteristics of data obtained from taps or traffic monitoring and transactional data (NetFlow) in the analysis of network traffic

4.6 Extract files from a TCP stream when given a PCAP file and Wireshark

4.7 Identify key elements in an intrusion from a given PCAP file

4.7.a Source address
4.7.b Destination address
4.7.c Source port
4.7.d Destination port
4.7.e Protocols
4.7.f Payloads

4.8 Interpret the fields in protocol headers as related to intrusion analysis

4.8.a Ethernet frame
4.8.b IPv4
4.8.c IPv6
4.8.d TCP
4.8.e UDP
4.8.f ICMP
4.8.g DNS
4.8.h SMTP/POP3/IMAP
4.8.i HTTP/HTTPS/HTTP2
4.8.j ARP

4.9 Interpret common artifact elements from an event to identify an alert

4.9.a IP address (source / destination)
4.9.b Client and server port identity
4.9.c Process (file or registry)
4.9.d System (API calls)
4.9.e Hashes
4.9.f URI / URL

4.10 Interpret basic regular expressions

5.1 Describe management concepts

5.1.a Asset management
5.1.b Configuration management
5.1.c Mobile device management
5.1.d Patch management
5.1.e Vulnerability management

5.2 Describe the elements in an incident response plan as stated in NIST.SP800-61

5.3 Apply the incident handling process (such as NIST.SP800-61) to an event

5.4 Map elements to these steps of analysis based on the NIST.SP800-61

5.4.a Preparation
5.4.b Detection and analysis
5.4.c Containment, eradication, and recovery
5.4.d Post-incident analysis (lessons learned)

5.5 Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-61)

5.5.a Preparation
5.5.b Detection and analysis
5.5.c Containment, eradication, and recovery
5.5.d Post-incident analysis (lessons learned)

5.6 Describe concepts as documented in NIST.SP800-86

5.6.a Evidence collection order
5.6.b Data integrity
5.6.c Data preservation
5.6.d Volatile data collection

5.7 Identify these elements used for network profiling

5.7.a Total throughput
5.7.b Session duration
5.7.c Ports used
5.7.d Critical asset address space

5.8 Identify these elements used for server profiling

5.8.a Listening ports
5.8.b Logged in users/service accounts
5.8.c Running processes
5.8.d Running tasks
5.8.e Applications

5.9 Identify protected data in a network

5.9.a PII
5.9.b PSI
5.9.c PHI
5.9.d Intellectual property

5.10 Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain Model and Diamond Model of Intrusion

5.11 Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control)


QUESTION 1
Which type of algorithm encrypts data bit by bit?

A. block
B. asymmetric
C. stream
D. symmetric

Correct Answer: C

QUESTION 2
Which of the following is deployed on an endpoint as an agent or standalone application?

A. NIPS
B. NGFW
C. HIDS
D. NIDS

Correct Answer: C

QUESTION 3
Which of the following represents an exploitable, unpatched, and unmitigated weakness in software?

A. vulnerability
B. exploit
C. threat
D. breach

Correct Answer: A

QUESTION 4
Which of the following describes a TCP injection attack?

A. Many TCP SYN packets are captures with the same sequence number, source, and destination IP address, but different payloads.
B. there is an abnormally high volume of scanning from numerous sources
C. many TCP SYN packets are captured with the same sequence number, but different source and destination IP addresses and different payloads
D. an attacker performs actions slower than normal

Correct Answer: A

QUESTION 5
How are attributes of ownership and control of an object managed in Linux?

A. permissions
B. rights
C. iptables
D. processes

Correct Answer: A


Actualkey Cisco Certified CyberOps Associate 200-201 exam pdf, Certkingdom Cisco Certified CyberOps Associate 200-201 PDF
MCTS Training, MCITP Trainnig
Best Cisco Certified CyberOps Associate 200-201 Certification, Cisco Certified CyberOps Associate 200-201 Training at certkingdom.com

Tuesday, June 9, 2020

AZ-104 Microsoft Azure Administrator (beta) Exam

Audience Profile
Candidates for this exam should have subject matter expertise implementing, managing, and monitoring an organization’s Microsoft Azure environment.
Responsibilities for an Azure Administrator include implementing, managing, and monitoring identity, governance, storage, compute, and virtual networks in a cloud environment, plus provision, size, monitor, and adjust resources, when needed.
An Azure Administrator often serves as part of a larger team dedicated to implementing your organization's cloud infrastructure.

A candidate for this exam should have at least six months of hands-on experience administering Azure, along with a strong understanding of core Azure services, Azure workloads, security, and governance. In addition, this role should have experience using PowerShell, Azure CLI, Azure portal, and Azure Resource Manager templates.

Skills Measured
NOTE: The bullets that appear below each of the skills measured are intended to illustrate how we are assessing that skill. This list is not definitive or exhaustive.
NOTE: In most cases, exams do NOT cover preview features, and some features will only be added to an exam when they are GA (General Availability).

Manage Azure identities and governance (15-20%)
Manage Azure AD objects
. create users and groups
. manage user and group properties
. manage device settings
. perform bulk user updates
. manage guest accounts
. configure Azure AD Join
. configure self-service password reset
. NOT: Azure AD Connect; PIM

Manage role-based access control (RBAC)
. create a custom role
. provide access to Azure resources by assigning roles
o subscriptions
o resource groups
o resources (VM, disk, etc.)
. interpret access assignments
. manage multiple directories

Manage subscriptions and governance
. configure Azure policies
. configure resource locks

. apply tags

. create and manage resource groups

o move resources

o remove RGs


. manage subscriptions

. configure Cost Management

. configure management groups


Implement and manage storage (10-15%)
Manage storage accounts
. configure network access to storage accounts

. create and configure storage accounts

. generate shared access signature

. manage access keys

. implement Azure storage replication

. configure Azure AD Authentication for a storage account


Manage data in Azure Storage
. export from Azure job

. import into Azure job

. install and use Azure Storage Explorer

. copy data by using AZCopy


Configure Azure files and Azure blob storage
. create an Azure file share

. create and configure Azure File Sync service

. configure Azure blob storage


. configure storage tiers for Azure blobs


Deploy and manage Azure compute resources (25-30%)
Configure VMs for high availability and scalability
. configure high availability

. deploy and configure scale sets


Automate deployment and configuration of VMs
. modify Azure Resource Manager (ARM) template

. configure VHD template

. deploy from template

. save a deployment as an ARM template

. automate configuration management by using custom script extensions


Create and configure VMs
. configure Azure Disk Encryption

. move VMs from one resource group to another

. manage VM sizes

. add data discs

. configure networking

. redeploy VMs


Create and configure containers
. create and configure Azure Kubernetes Service (AKS)

. create and configure Azure Container Instances (ACI)

. NOT: selecting an container solution architecture or product; container registry settings


Create and configure Web Apps
. create and configure App Service

. create and configure App Service Plans

. NOT: Azure Functions; Logic Apps; Event Grid


Configure and manage virtual networking (30-35%)
Implement and manage virtual networking
. create and configure VNET peering


. configure private and public IP addresses, network routes, network interface, subnets, and virtual network


Configure name resolution
. configure Azure DNS

. configure custom DNS settings

. configure a private or public DNS zone


Secure access to virtual networks
. create security rules

. associate an NSG to a subnet or network interface

. evaluate effective security rules

. deploy and configure Azure Firewall

. deploy and configure Azure Bastion Service

. NOT: Implement Application Security Groups; DDoS


Configure load balancing
. configure Application Gateway

. configure an internal load balancer

. configure load balancing rules

. configure a public load balancer

. troubleshoot load balancing

. NOT: Traffic Manager and FrontDoor and PrivateLink


Monitor and troubleshoot virtual networking
. monitor on-premises connectivity

. use Network Performance Monitor

. use Network Watcher

. troubleshoot external networking

. troubleshoot virtual network connectivity


Integrate an on-premises network with an Azure virtual network
. create and configure Azure VPN Gateway

. create and configure VPNs

. configure ExpressRoute

. configure Azure Virtual WAN


Monitor and back up Azure resources (10-15%)
Monitor resources by using Azure Monitor
. configure and interpret metrics

o analyze metrics across subscriptions


. configure Log Analytics

o implement a Log Analytics workspace

o configure diagnostic settings


. query and analyze logs

o create a query

o save a query to the dashboard

o interpret graphs


. set up alerts and actions

o create and test alerts

o create action groups

o view alerts in Azure Monitor

o analyze alerts across subscriptions


. configure Application Insights

. NOT: Network monitoring


Implement backup and recovery
. configure and review backup reports

. perform backup and restore operations by using Azure Backup Service

. create a Recovery Services Vault

o use soft delete to recover Azure VMs


. create and configure backup policy

. perform site-to-site recovery by using Azure Site Recovery

. NOT: SQL or HANA

AZ-103/104 Comparison
Microsoft Azure Administrator

Current Skills Measured as of January 15, 2020
Updated Skills Measured List (ignore the numbering below)

Audience Profile
Candidates for this exam are Azure Administrators who manage cloud services that span storage, security, networking, and compute cloud capabilities. Candidates have a deep understanding of each service across the full IT lifecycle, and take requests for infrastructure services, applications, and environments. They make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor, and adjust resources as appropriate.
Candidates for this exam should have proficiency in using PowerShell, the Command Line Interface, Azure Portal, ARM templates, operating systems, virtualization, cloud infrastructure, storage structures, and networking.

Audience Profile
The Azure Administrator implements, manages, and monitors identity, governance, storage, computevirtual machines, and virtual networks in a cloud environment. This role focuses primarily on enabling Infrastructure as a Service (IaaS). The Azure Administrator will provision, size, monitor, and adjust resources as appropriate.
Candidates should have a minimum of six months of hands-on experience administering Azure. Candidates should have a strong understanding of core Azure services, Azure workloads, security, and governance. Candidates for this exam should have experience in using PowerShell, the Command Line Interface, Azure Portal, and ARM templates.


1. Manage Azure subscriptions and resources (15-20%)
1.1 Manage Azure subscriptions
Assign administrator permissions; configure cost center quotas and tagging; configure policies at Azure subscription level
1.2 Analyze resource utilization and consumption
6. Manage Azure Identities and Governance (15-20%)
6.1 Manage Azure AD objects
. create users and groups

. manage user and group properties

. manage device settings

. perform bulk user updates

. manage guest accounts

. configure Azure AD Join

. configure self-service password reset




Configure diagnostic settings on resources; create baseline for resources; create and test alerts; analyze alerts across subscription; analyze metrics across subscription; create action groups and action rules; monitor for unused resources; monitor spend; report on spend; utilize log queries in Azure Monitor; view alerts in Azure Monitor
1.3 Manage resource groups
Use Azure policies for resource groups; configure resource locks; configure resource policies; implement and set tagging on resource groups; move resources across resource groups; remove resource groups
1.4 Managed role based access control (RBAC)
May include but is not limited to: Create a custom role, configure access to Azure resources by assigning roles, configure management access to Azure, troubleshoot RBAC, implement RBAC policies, assign RBAC Roles
. NOT: Azure AD Connect; PIM


6.2 Manage role-based access control (RBAC)
. create a custom role

. provide access to Azure resources by assigning roles

o subscriptions

o resource groups

o resources (VM, disk, etc.)


. interpret access assignments

. manage multiple directories


6.3 Manage subscriptions and governance
. configure Azure policies

. configure resource locks

. apply tags

. create and manage resource groups

o move resources

o remove RGs


. manage subscriptions

. configure Cost Management

. configure management groups



2. Implement and manage storage (15-20%)
2.1 Create and configure storage accounts
Configure network access to the storage account; create and configure storage account; generate shared access signature; install and use Azure Storage Explorer; manage access keys; monitor activity log by using Monitor Logs; implement Azure storage replication; Implement Azure AD Authentication, manage blob storage lifecycle management
7. Implement and Manage Storage (10-15%)
7.1 Manage storage accounts
. configure network access to storage accounts

. create and configure storage accounts

. generate shared access signature

. manage access keys

. implement Azure storage replication

. configure Azure AD Authentication for a storage account


7.2 Manage data in Azure Storage


2.2 Import and export data to Azure
Create export from Azure job; create import into Azure job; configure and use Azure blob storage; configure Azure content delivery network (CDN) endpoints
2.3 Configure Azure files
Create Azure file share; create Azure File Sync service; create Azure sync group; troubleshoot Azure File Sync
2.4 Implement Azure backup
Configure and review backup reports; perform backup operation; create Recovery Services Vault; create and configure backup policy; perform a restore operation
. export from Azure job

. import into Azure job

. install and use Azure Storage Explorer

. copy data by using AZCopy


7.3 Configure Azure files and Azure blob storage
. create an Azure file share

. create and configure Azure File Sync service

. configure Azure blob storage

. configure storage tiers for Azure blobs



3. Deploy and manage virtual machines (VMs) (15-20%)
3.1 Create and configure a VM for Windows and Linux
Configure high availability; configure monitoring, networking, storage, and virtual machine size; deploy and configure scale sets
3.2 Automate deployment of VMs
Modify Azure Resource Manager (ARM) template; configure location of new VMs; configure VHD template; deploy from template; save a deployment as an ARM template; deploy Windows and Linux VMs
3.3 Manage Azure VM
Add data discs; add network interfaces; automate configuration management by using PowerShell Desired State Configuration (DSC) and VM Agent by using custom script extensions; manage
8. Deploy and Manage Azure Compute Resources (25-30%)
8.1 Configure VMs for high availability and scalability
. configure high availability

. deploy and configure scale sets


8.2 Automate deployment and configuration of VMs
. modify Azure Resource Manager (ARM) template

. configure VHD template

. deploy from template

. save a deployment as an ARM template

. automate configuration management by using custom script extensions


8.3 Create and configure VMs
. configure Azure Disk Encryption

. move VMs from one resource group to another




VM sizes; move VMs from one resource group to another; redeploy VMs
3.4 Manage VM backups
Configure VM backup; define backup policies; implement backup policies; perform VM restore; soft delete for Azure VMs; Azure Site Recovery
. manage VM sizes

. add data discs

. configure networking

. redeploy VMs


8.4 Create and configure containers
. create and configure Azure Kubernetes Service (AKS)

. create and configure Azure Container Instances (ACI)

. NOT: selecting an container solution architecture or product; container registry settings


8.5 Create and configure Web Apps
. create and configure App Service

. create and configure App Service Plans

. NOT: Azure Functions; Logic Apps; Event Grid



4. Configure and manage virtual networks (30-35%)
4.1 Create connectivity between virtual networks
Create and configure VNET peering; create and configure VNET to VNET connections; verify virtual network connectivity; create virtual network gateway
4.2 Implement and manage virtual networking
Configure private and public IP addresses, network routes, network interface, subnets, and virtual network
4.3 Configure name resolution
Configure Azure DNS; configure custom DNS settings; configure private and public
9. Configure and Manage Virtual Networking (30-35%)
9.1 Implement and manage virtual networking
. create and configure VNET peering

. configure private and public IP addresses, network routes, network interface, subnets, and virtual network


9.2 Configure name resolution
. configure Azure DNS

. configure custom DNS settings

. configure a private or public DNS zone


9.3 Secure access to virtual networks
. create security rules

. associate an NSG to a subnet or




DNS zones
4.4 Create and configure a Network Security Group (NSG)
Create security rules; associate NSG to a subnet or network interface; identify required ports; evaluate effective security rules
4.5 Implement Azure load balancer
May include but is not limited to: Configure internal load balancer, configure load balancing rules, configure public load balancer, troubleshoot load balancing
4.6 Monitor and troubleshoot virtual networking
May include but is not limited to: Monitor on-premises connectivity, use Network resource monitoring, use Network Watcher, troubleshoot external networking, troubleshoot virtual network connectivity
4.7 Integrate on premises network with Azure virtual network
May include but is not limited to: Create and configure Azure VPN Gateway, create and configure site to site VPN, configure Express Route, verify on premises connectivity, troubleshoot on premises connectivity with Azure
network interface

. evaluate effective security rules

. deploy and configure Azure Firewall

. deploy and configure Azure Bastion Service

. NOT: Implement Application Security Groups; DDoS


9.4 Configure load balancing
. configure Application Gateway

. configure an internal load balancer

. configure load balancing rules

. configure a public load balancer

. troubleshoot load balancing

. NOT: Traffic Manager and FrontDoor and PrivateLink


9.5 Monitor and troubleshoot virtual networking
. monitor on-premises connectivity

. use Network resource monitoring

. use Network Watcher

. troubleshoot external networking

. troubleshoot virtual network connectivity


9.6 Integrate an on-premises network with an Azure virtual network
. create and configure Azure VPN Gateway

. create and configure VPNs

. configure ExpressRoute

. configure Azure Virtual WAN



5. Manage identities (15-20%)
5.1 Manage Azure Active Directory (AD)
Add custom domains; Azure AD Join; configure self-service password reset;


[NO EQUIVALENT --- SEE NEW FG 5 BELOW]


manage multiple directories
5.2 Manage Azure AD objects (users, groups, and devices)
Create users and groups; manage user and group properties; manage device settings; perform bulk user updates; manage guest accounts
5.3 Implement and manage hybrid identities
Install Azure AD Connect, including password hash and pass-through synchronization; use Azure AD Connect to configure federation with on-premises Active Directory Domain Services (AD DS); manage Azure AD Connect; manage password sync and password writeback
5.4 Implement multi-factor authentication (MFA)
May include but is not limited to: Configure user accounts for MFA, enable MFA by using bulk update, configure fraud alerts, configure bypass options, configure Trusted IPs, configure verification methods



10. Monitor and back up Azure resources (10-15%)
10.1 Monitor resources by using Azure Monitor
. configure and interpret metrics

o analyze metrics across subscriptions


. configure Log Analytics

o implement a Log Analytics workspace

o configure diagnostic settings


. query and analyze logs

o create a query





o save a query to the dashboard

o interpret graphs


. set up alerts and actions

o create and test alerts

o create action groups

o view alerts in Azure Monitor

o analyze alerts across subscriptions


. configure Application Insights

. NOT: Network monitoring


10.2 Implement backup and recovery
. configure and review backup reports

. perform backup and restore operations by using Azure Backup Service

. create a Recovery Services Vault

o use soft delete to recover Azure VMs


. create and configure backup policy

. perform site-to-site recovery by using Azure Site Recovery

. NOT: SQL or HANA

QUESTION 1
You have an Azure subscription that contains an Azure Active Directory (Azure AD) tenant named
contoso.com and an Azure Kubernetes Service (AKS) cluster named AKS1.
An administrator reports that she is unable to grant access to AKS1 to the users in contoso.com.
You need to ensure that access to AKS1 can be granted to the contoso.com users.
What should you do first?

A. From contoso.com, modify the Organization relationships settings.
B. From contoso.com, create an OAuth 2.0 authorization endpoint.
C. Recreate AKS1.
D. From AKS1, create a namespace.

Correct Answer: B

QUESTION 2
You have a Microsoft 365 tenant and an Azure Active Directory (Azure AD) tenant named contoso.com.
You plan to grant three users named User1, User2, and User3 access to a temporary Microsoft SharePoint
document library named Library1.
You need to create groups for the users. The solution must ensure that the groups are deleted automatically after 180 days.
Which two groups should you create? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. an Office 365 group that uses the Assigned membership type
B. a Security group that uses the Assigned membership type
C. an Office 365 group that uses the Dynamic User membership type
D. a Security group that uses the Dynamic User membership type
E. a Security group that uses the Dynamic Device membership type

Correct Answer: AC

QUESTION 3
You recently created a new Azure subscription that contains a user named Admin1.
Admin1 attempts to deploy an Azure Marketplace resource by using an Azure Resource Manager template.
Admin1 deploys the template by using Azure PowerShell and receives the following error message: “User
failed validation to purchase resources. Error message: “Legal terms have not been accepted for this item on
this subscription. To accept legal terms, please go to the Azure portal (http://go.microsoft.com/fwlink/?
LinkId=534873) and configure programmatic deployment for the Marketplace item or create it there for the first time.”
You need to ensure that Admin1 can deploy the Marketplace resource successfully.

What should you do?
A. From Azure PowerShell, run the Set-AzApiManagementSubscription cmdlet
B. From the Azure portal, register the Microsoft.Marketplace resource provider
C. From Azure PowerShell, run the Set-AzMarketplaceTerms cmdlet
D. From the Azure portal, assign the Billing administrator role to Admin1

Correct Answer: C

QUESTION 4
You have an Azure Active Directory (Azure AD) tenant that contains 5,000 user accounts.
You create a new user account named AdminUser1.
You need to assign the User administrator administrative role to AdminUser1.
What should you do from the user account properties?

A. From the Licenses blade, assign a new license
B. From the Directory role blade, modify the directory role
C. From the Groups blade, invite the user account to a new group
Correct Answer: B

QUESTION 5
You have an Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com that contains 100 user accounts.
You purchase 10 Azure AD Premium P2 licenses for the tenant.
You need to ensure that 10 users can use all the Azure AD Premium features.
What should you do?

A. From the Licenses blade of Azure AD, assign a license
B. From the Groups blade of each user, invite the users to a group
C. From the Azure AD domain, add an enterprise application
D. From the Directory role blade of each user, modify the directory role

Correct Answer: A
Actualkey Microsoft Azure Administrator AZ-104 exam pdf, Certkingdom Microsoft Azure Administrator AZ-104 PDF

MCTS Training, MCITP Trainnig
Best Microsoft Azure Administrator AZ-104 Certification, Microsoft Azure Administrator AZ-104 Training at certkingdom.com

Monday, June 8, 2020

F5-101 Application Delivery Fundamentals

Welcome to the F5 Networks 101 - Application Delivery Fundamentals compiled Study Guide. The purpose of this guide is to help you prepare for the F5 101 - Application Delivery Fundamentals exam. The contents of this document are based on the 101 - Application Delivery Fundamentals Blueprint Guide.

This study guide provides students with some of the basic foundational knowledge required to pass the exam.

This study guide is a collection of information and therefore not a completely original work. The majority of the information is compiled from sources that are located on the Internet. All of the information locations are
referenced at the top of each topic instead of in an Appendix of this document. This was done to help the reader access the referenced information easier without having to search through a formal appendix. This
guide also references a book that should be basic reading for some of the topics on this exam.

The F5 Certified team provides an official 101 - Application Delivery Fundamentals Study Guide to all candidates. The F5 Certified Study Guide is a list of reading material that will help any student build a broad
base of general knowledge that can assist in not only their exam success but also in becoming a well-rounded systems engineer. The Resource Guide will be available to the candidate through the certification.f5.com
website once they are qualified for the Application Delivery Fundamentals exam.

There are not any pre-requisite to this exam.
This guide was prepared by an F5 employee but is not an official F5 document and is not supported by F5 Networks.

Section 1 - OSI 5
Objective - 1.01 Explain, compare, and contrast the OSI layers
Objective - 1.02 Explain Protocols and Technologies Specific to the Data Link Layer
Objective - 1.03 Explain protocols and apply technologies specific to the network layer
Objective - 1.04 Explain the features and functionality of protocols and technologies specific to the transport layer
Objective - 1.05 Explain the features and functionality of protocols and technologies specific to the application layer

Section 2 - F5 Solutions and Technology
Objective - 2.01 Articulate the role of F5 products
Objective - 2.02 Explain the purpose, use, and advantages of iRules
Objective - 2.03 Explain the purpose, use, and advantages of iApps
Objective - 2.04 Explain the purpose of and use cases for full proxy and packet forwarding/packet based architectures
Objective - 2.05 Explain the advantages and configurations of high availability (HA)

Section 3 – Load Balancing Essentials
Objective - 3.01 Discuss the purpose of, use cases for, and key considerations related to load balancing
Objective - 3.02 Differentiate between a client and server

Section 4 – Security
Objective - 4.01 Compare and contrast positive and negative security models
Objective - 4.02 Explain the purpose of cryptographic services
Objective - 4.03 Describe the purpose and advantages of authentication
Objective - 4.04 Describe the purpose, advantages, and use cases of IPsec and SSL VPN

Section 5 – Application Delivery Platforms
Objective - 5.01 Describe the purpose, advantages, use cases, and challenges associated with hardware based application delivery platforms and virtual machines
Objective - 5.02 Describe the purpose of the various types of advanced acceleration techniques

QUESTION: 1
To make complex access policies easier to manage, an administrator can create a _______ containing several policy actions, and then add instances of it within the policy? (Fill in)

A. Visual Policy Editor
B. Policy Editor
C. Visual Editor
D. Policy creator

Answer: A

QUESTION: 2
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the ________. (Fill in)

A. Deployment Wizard
B. Setup Wizard
C. Policy Wizard
D. Visual Wizard

Answer: A

QUESTION: 3
The Policy Builder benefits include:

A. Doesn't require in depth web application knowledge
B. Only requires limited ASM knowledge
C. All of the above
D. Very low administrative impact

Answer: C

QUESTION: 4
APM administrators can configure access policies granting users which two types of access?

A. CIFS access
B. Client/server access
C. Web application access
D. Proxy access
E. RDC access

Answer: D

QUESTION: 5
Which of the following is a benefit of using iRules?

A. They provide a secure connection between a client and LTM
B. They enable granular control of traffic
C. They can be used as templates for creating new applications
D. They can use Active Directory to authenticate and authorize users
E. They provide an automated way to create LTM objects

Answer: B

QUESTION: 6
APM provides access control lists at which two OSI layers? (Choose two.)

A. Layer 5
B. Layer 4
C. Layer 7
D. Layer 6
E. Layer 2

Answer: B,C

QUESTION: 7
TMOS is an F5 software module that runs on the BIG-IP platform.

A. True
B. False

Answer: B


Actualkey F5 Certification F5-101 exam pdf, Certkingdom F5 Certification F5-101 PDF
MCTS Training, MCITP Trainnig
Best F5 Certification F5-101 Certification, F5 Certification F5-101 Training at certkingdom.com


Saturday, May 23, 2020

C1000-065 IBM Cognos Analytics Developer V11.1.x Exam

Number of questions: 60
Number of questions to pass: 44
Time allowed: 90 mins
Status: Live

An IBM Certified Developer – IBM Cognos Analytics Developer V11.1.x is responsible for building advanced reports and dashboards and connecting to data and modeling meta data sources. This individual has project related experience authoring and troubleshooting complex and intermediate level reports and dashboards and is capable of participating in project implementations as an effective team member.


This exam consists of 5 sections described below. For more detail, please see the study guide on the Exam Preparation tab.

Section 1: Dashboards 22%
Explain design considerations for small form factors (mobile devices)
Describe how to create simple Dashboards
Describe how to create complex interactive Dashboards
Describe how to modify Dashboards
Demonstrate how to control Dashboard data

Section 2: Reports 32%
Describe the various data container types
Describe how to apply filters
Describe how to use prompts
Describe using conditions to control formatting layout and rendering
Describe using calculations and macros
Demonstrate presenting data graphically
Explain designing for multiple outputs
Describe using reusable objects
Explain various interactivity usages
Demonstrate understanding of relational vs dimensional reporting styles
Demonstrate understanding the use of multiple queries in a report
Demonstrate understanding the use of multiple Data sources in a report
Describe forms of report distribution and collaboration

Section 3: Data 21%
Explain connecting to the Data source
Describe the various types of Physical Data sources and their usage
Describe the various types of metadata sources and their usage
Describe using data shaping (end user data preparation)

Section: 4 Other Features 10%
Describe where the offering uses AI
Describe ways to augment with AI
Describe how to create a story for the presentation of information
Describe where Exploration is used to enhance analytics

Section 5: Troubleshooting and Performance 15%
Describe utilities that are available in the product for troubleshooting
Describe approach(s) methods to perform root cause analysis/diagnose issues

Actualkey IBM C1000-065 exam pdf, Certkingdom IBM C1000-065 PDF
MCTS Training, MCITP Trainnig
Best IBM C1000-065 Certification, IBM C1000-065 Training at certkingdom.com

Tuesday, April 26, 2016

300-460 CLDINF Implementing and Troubleshooting the Cisco Cloud Infrastructure

Exam Number 300-460 CLDINF
Associated Certifications CCNP Cloud
Duration 90 Minutes (55 - 65 questions)
Available Languages English

Exam Description
The 300-460 (CLDINF) Implementing and Troubleshooting the Cisco Cloud Infrastructure is a 90-minute, 55-65 question assessment that is associated with the CCNP Cloud Certification. This exam tests a candidate's knowledge and ability to: setup Cloud infrastructure including physical and virtual Data Centers; implement Storage infrastructure and connectivity; implement Network infrastructure and connectivity; implement Compute; troubleshoot Cloud workflows or applications; and identify infrastructure operational domains. Candidates can prepare for this assessment by taking the Implementing and Troubleshooting the Cisco Cloud Infrastructure (CLDINF v1.0) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Knowledge of Cloud Infrastructure 16%

1.1 Demonstrate practical experience of both physical and virtual Data Centers

1.1.a Validate physical connection to LAN, SAN
1.1.b Management connection
1.1.c Server ports to chassis
1.1.d Virtual fiber channel
1.1.e Domain Virtual Machine Manager (VMM)
1.1.f Configuring UCS service profiles, vNICs & templates

1.2 Setup hypervisor

2.0 Storage 21%

2.1 Implement storage infrastructure

2.1.a Block Storage
2.1.a.1 Zoning
2.1.a.2 Describe initiator and target relationship
2.1.a.3 Boot targets
2.1.a.4 Setup LUN/Volume on storage controller
2.1.b File Storage
2.1.b.1 Mount point vs. shares

2.2 Implement storage connectivity

2.2.a Configure vHBA
2.2.b Configure WWPN pool
2.2.c Configure WWN Pool
2.2.d Configure iSCSI pool
2.2.e Configure VSAN group
2.2.f Configure boot order/ boot policy
2.2.g Configure local storage / disk policy (RAID)
2.2.h Describe protected config

3.0 Network Tasks 22%

3.1 Implement network infrastructure

3.1.a Nexus 1000v / Distributed Virtual Switch (DVS)
3.1.b Virtual switch

3.2 Implement network connectivity

3.2.a vNICs
3.2.b MAC pool
3.2.c IP Management pool
3.2.d UUID pool
3.2.e Port-profiles / port groups
3.2.f VLAN group, VXLAN

4.0 Compute 23%

4.1 Implement Compute

4.1.a Virtual
4.1.a.1 Install Hypervisors
4.1.a.2 Configure templates
4.1.a.3 Configure resource pools
4.1.b Physical
4.1.b.1 Bare Metal
4.1.b.1.1 OS image / template
4.1.b.1.2 PXE boot
4.1.b.1.3 Lights out management
4.1.c UCSM
4.1.c.1 Service profiles
4.1.c.2 Boot policy

5.0 Troubleshooting knowledge of Infrastructure 18%

5.1 Troubleshoot context of workflow or applications

5.1.a Describe troubleshooting methodologies
5.1.b Templates
5.1.c Orchestration
5.1.d Provisioning

5.2 Identify operational domains

5.2.a Storage
5.2.b Networking
5.2.c Virtualization
5.2.d Compute

Friday, October 2, 2015

Looking back 30 years as a sysadmin

The profession -- and everything it involves -- has changed dramatically, but has been (and still is) a fun ride.

Looking back after spending more than 30 years as a Unix systems administrator, I have to say that's it's been quite a ride.

It certainly wasn't 30+ years of doing the same thing. Instead, the technology and the job have gone through incredible changes along the way. There were dramatic improvements in the hardware that I managed and always plenty of new tools to learn and use.

Over the years, I went from reveling in how much work I could get done on the command line to grappling with some big issues -- troubleshooting some very complicated problems and figuring out how to best protect my employers' information assets. Along the way, I worked with some amazing individuals, got laid off (once), and learned a lot about what works and doesn't work both from a technical and a career perspective.

Here are my reflections on the changes I've seen and those still to come.

How the technology has changed


In the earliest part of my career, I actually used keypunch machines -- first, when processing payrolls for client companies while working for a large New York City bank (and putting myself through college) and second, when taking my first programming class. At the bank, I built punch card "programs" to make it easier for the keypunch operators to jump to the next field for the data they were entering. At the college, the class was an introductory programming class based on Fortran. Yes, Fortran. The following semester, the keypunch machines were no more and big clunky terminals took their place.

Keypunch operators
In college I had learned languages like Fortran, LISP, ALGOL, and Pascal. And, in one class, I built a simple operating system on a PDP system using assembly language. I remember "reading" the lights on the front of the system and how exciting it was when the attached printer spit out a sheet of paper as instructed. I've used many other languages since -- like C and some Java, but I've mostly worked in scripting languages like sh, csh, bash, ksh, Python, and Perl. One of the most surprising things is how many languages have been introduced since I started in the field. The number of languages available seems to have increased maybe 20-30 times. This list from 2013 is probably no longer up-to-date: 256 Programming Languages

I remember in the early '80s having to know the topology of hard drives in order to add them to my systems. Today, the systems are able to identify peripherals with very little work on my part. The number of cylinders, heads, and sectors ... I had to describe the disk in these units for the system I was working on to be able to use the drive.
ALSO ON NETWORK WORLD: 8 ways to jumpstart your career

From the early '90s, I still have somewhere a 300 MB (yes, that's megabytes) disk that's roughly the size of a shoe box and sometimes stare at my USB ("thumb") drives, knowing that some hold as much as a terabyte. What an incredible comparison! If this trend continues, we'll soon find that dropping a storage device on the floor will mean we're no longer going to be able to find it.

I also remember backing up my servers using a reel-to-reel tape drive. The tapes were huge and they didn't hold all that much data. Some of my file systems required 3-4 of them. Today, we use robotic tape drives and tools that automate the backups and keep track of what files went to what tapes so that you can restore files from various backup tapes with ease. And some of the backup technology today uses clever "deduplication" technology to reduce the size of data dumps by avoiding storing duplicate data, often reducing the size of backups to a small fraction of their original size.

robotic tape library
Of course, almost nothing has changed the field in which I've spent the last 30+ years as much as the Internet and the web have. When I worked for the federal courts, the district courts were connecting to systems in Washington, DC using a service called "Tymnet" which used packet switching technology. My project would not only put "minicomputers" (systems about the size of a college dorm refrigerator) into the courthouses, but make it so that all activity no longer had to push bits to Washington DC and back.

The growth of the Internet made connecting to arbitrary systems around the globe not only possible but common. And the introduction of the web (nee the "world wide web") meant that I could find answers to many of my technical questions without even having to pull a book off the shelf. Today I often find myself wondering how I ever found answers to my technical questions before Google and similar web searching tools made their appearance.

How the jobs have changed
In general, the networks we manage are larger and more diverse. We won't see the AppleTalk network segments that I remember from the '80s doing their own thing, but the systems we run on our desktops and support in our data centers can be surprisingly diverse. More of the work we do is centrally managed through network services like NFS, NIS, DNS, etc.

Virtualization has become a major factor in our data centers. Many of our servers are now just segments of resources on larger servers, able to be shrunk and grown as needed to meet our demands, and easily migrated to alternate data centers as needed. On top of that, what now seems the ultimate virtualization -- moving systems and even complete data centers into the cloud -- dramatically changes what we as sysadmins are able to control and what we are responsible for.

Most of us rely on fairly versatile ticketing systems to keep track of all the problems that we are addressing and tasks waiting to be completed. We might be "just" doing systems administration, but that role has moved heavily into managing security, controlling access to a wide range of resources, analyzing network traffic, scrutinizing log files, and fixing the chinks on our cyber armor.
Security

In the early part of my career (maybe the first ten years or so), security was fairly lax. Maybe we forced our users to change their passwords every year. I remember once writing a program to pseudorandomly generate passwords by clumping two short words together, but it was nothing like what I do today. Security in those days was not a hot item and most of the people that I worked with were far more cavalier than I. When one of our speakers at a Sun User Group conference that I helped organize in the 1990s suggested that we all think like attackers, the thought seemed quite revolutionary.

This aspect of being a sysadmin has undergone more change than likely any other. Today, you're irresponsible if you're not behaving in a manner that might have seemed paranoid 20 years ago. The tools we use and the measures we go to in order to secure our systems are orders of magnitude beyond anything we would have considered back then. Passwords are longer and the systems we manage allow us to configure complexity measures. The suggested password length has gone from 7-8 characters to 12-14 and the expiration times have gone from once a year to once every three or four months for most of us.

In addition, the tools that we use have become dramatically more sophisticated. To some extent, we do become the attackers, using vulnerability testers like Nessus and Nexpose that discover the holes in our systems (hopefully before our attackers do) and sometimes even exploit them. We're also on the lookout with intrusion detection systems watching for signs of malicious activity and data loss prevention tools trying to keep our organizational "jewels" from leaking out the back door. And following a briefing with Palo Alto just yesterday, I don't imagine that I'll ever think of firewalls in the same old way again. They're moving from the perimeter of our organizations into the middle of everything we do. They're smarter, faster, and they're focused on what's happening, not just on what doors (i.e., ports) the traffic is moving through.

How our communities have changed
In 1980, the Apple II computer that sat on a desk in the corner of my dining room had my neighbors thinking that I was a complete freak. To hear them talk, you'd think I had a centrifuge on my kitchen counter. And it was not because the computer was in the dining room or because it was an Apple. It was a computer and why I would have one sitting in my house had them looking at me really funny. Yet it wasn't that many years before anyone without a home computer was considered weird. And these days, we're all pretty much using wireless networks and probably everyone in the household has their own computer. Big change -- even without mentioning all the other electronics that are practically mandated by our modern life styles.
Career choices

The downside: Compared to many IT jobs, there's not much climbing up the corporate ladder for sysadmins. As a systems administrator, you'll seldom be in the spotlight. You can easily still be a "bottom rung" (nobody reporting to you) worker after 30 years in the field. It's also hard sometimes to get a sense of value. You generally get noticed least when everything is running smoothly. Unless you resolve Big Problems, most of the people you support won't think about you very often. Maybe not even on Sysadmin Day.

Systems administrators are rarely customer-facing unless you count as customers the staff that use the systems that you keep humming along. And, even then, the big changes that you make are likely done after hours when everyone else is off duty and having a relaxing weekend or enjoying happy hour at the local pub. Do your job really well and no one will remember you're there.

The upside: The work is seldom boring and there's always something new to learn -- something breaking, some new coming through the door. Even after 30+ years, the work is anything but monotonous. And the job pays reasonably well. There's also a lot of variability in what you do and what you specialize in. You might automate all of your tasks or manage a huge data center, but there will always be something that challenges you and problems that need your attention.

Some of the significant trade-offs involve the kind of organization you work for. I worked in one company with only three employees and two independent contractors and other organizations with staffs of tens of thousands. The benefit of the smaller staff positions was getting to touch nearly everything and being involved in almost every aspect of the work. The big ones offered more chance of moving around and changing my organizational role fairly dramatically.

How much variability there is in your work depends on many factors, but I generally prefer having enough flexibility that I'm always doing something that I do easily and well and something else that is new and exciting. The mix keeps me feeling that I'm earning my keep and equipping myself for future challenges and opportunities.

The best jobs

For me, the best jobs that I've had involved my feeling that what I did was important. My stint working in the federal government was one of those because I knew that the analysts that I was supporting were helping to ensure that good decisions were being made on the national level. It was rewarding just to be a part of that.

At another (Johns Hopkins University), I managed the systems and the network for one department (Physics and Astronomy). The big plus was that I worked with some of the most brilliant people I'd ever have hoped to know -- some trying to map the cosmos and other peering into the nature of the tiniest subatomic particles -- and the students who helped out from time to time were generally amazingly competent grad students. Plus the campus was lovely, the commute reasonable, and the benefits (like being able to take free classes) pretty cool.

I also enjoyed being something of a jack of all computer trades at Web Publishing (part of IDG) where I managed the network, the systems, the servers, the backups, the web site, and eventually acquired a very capable assistant who made the job even that much more enjoyable. And we were on the forefront of online-only publications like SunWorld and JavaWorld that provided excellent information and advice to the growing communities that used this technology.

And last, but not least, working for a couple E*Trade subsidiaries in a similar "support everything" sysadmin role. Bright creative people are almost always wonderful to work with. We worked off the Embarcadero in San Francisco and managed to have some fun together even when we were working. And, hey, taking the ferry to work was the best commute imaginable!

Some of the positions that I've held over the years involved having the best possible coworkers -- people who were as committed as I was, who both learned from me and taught me more than I can ever thank them for. Others involved the kind of office politics that make it hard to remember that we're supposed to be working for the same goal -- to help our organizations be successful -- not fighting for a position under the lime light.

you're in a good place.
Money isn't everything. Even living on a sailboat in the San Francisco Bay (which I did for several years) would be Heaven for some and Hell for others. Take the time to really nail down what matters to you. Is it visibility? Recognition? A sense of accomplishment? A big salary? Flexible hours? A voice in how things are done? A stake (and a say) in the outcome of your projects?

Whatever you do, don't stop learning. Computer skills get old fast and that isn't going to change any time soon. Spend some time every day learning something new and get your hands on some tools that might lead to the next phase in your career. Check job postings from time to time even if you have no plans to change jobs -- just to keep aware of what skills are in high demand.

And put on your seatbelt. You probably can't begin to imagine how the field is going to look in another 30 years!

Best IBM Certification Training and IBM Exams Training  and more IBM exams log in to Certkingdom.com

Monday, December 3, 2012

Windows 8: Does its 1-month report card read pass or fail?

Windows 8: Does its 1-month report card read pass or fail?
The operating system is just a hair over one month old, so now is the perfect time to take stock of the software's public reception.

My, how time flies when you're swiping through live tiles. Microsoft's new-look Windows 8 launched exactly one month and one day ago, bringing the modern UI and mobile-style apps to the desktop masses on October 26th. So how has the system actually fared during its honeymoon period? Read on for the full synopsis of Windows 8 wins and losses.

Can you navigate Windows 8?

It can't be all bad. Or can it?

Stephen Sinofsky: the gorilla no longer in the room

Many eyebrows were raised on November 12A when Microsoft announced that Stephen Sinofskythe president of the Windows division, a driving force behind Windows 8, and a long-time leader at Microsoftwas leaving his post, effective immediately. The odd timing and abrupt announcement led to a rash of speculation. Was Sinofsky fired or did he quit? Was it planned? Are Windows 8 sales that bad?

Neither Microsoft nor Sinofsky will talk about their divorce, but many analysts believe Sinofsky's penchant for secretiveness and territorial mindset alienated external and internal partners alike, which proved troublesome in the new, cross-departmental world of Windows 8. It's hard to believe Microsoft would dump Sinofsky over two weeks of (possibly) poor OS sales. Regardless of the reason behind the split, Sinofsky's exitA was badly timed and led to a fresh wave of media focus on the negative aspects of Windows 8.

"I think it was unwise to fire the head of the unit during the launch cycle and during the critical 4th quarter," says Rob Enderle, the president and principal analyst of the Enderle Group. "It was a dangerous distraction."

Sinofsky's departure may have been a dangerous distraction, but headlines alone don't make or break an operating system. Indeed, sales figures define the bottom line, and Sinofksy has never been a household name. Nonetheless, the unceremonious exit of the Windows boss adds up to a net fail for Microsoft in the executive comings-and-goings department.

Windows Store: growing, but still unimpressive

As the Windows Store goes, so goes Windows 8. The fancy-schmancy modern UI and its glittering live tiles are all powered by new-style Windows 8 apps, and the only way to get these apps is through the Windows Store itself. Our pre-launch examination of Microsoft's digital wares revealed a worrisome dearth of apps, along with a serious paucity of blockbuster apps, to boot.

One month in, the Windows Store is looking a bit better. Wes Miller, an independent Microsoft analyst at Directions on Microsoft and the curator of the WinAppUpdate website, recently announced that the Windows Store finally cracked the 20,000 app barrier, with new apps showing up at a clip of roughly 500 per day, post-launch. Only around 13,000 of these titles are available in the United States, however, and Microsoft still has a long way to go before it nears the 700,000-plus app selection of the entrenched Android and Apple markets. Still, the Windows Store is growing nicely.

The quality level of those apps is still a concern, however. The last post on Miller's website is titled, "Windows Store: I'm holding out for a hero app," in which he bemoans the lack of exclusive Windows 8 apps and says flat-out, "There arent a ton of stellar apps. It's an observation that mirrors our own. Most of the available apps are ho-hum web wrappers, uninspired utilities or lackluster games.


MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 3000+
Exams with Life Time Access Membership at http://www.actualkey.com