Tuesday, June 16, 2020

200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) Exam

Certification: Cisco Certified CyberOps Associate
Duration: 120 minutes (95 - 105 questions)
Available languages: English

Exam overview
This exam tests your knowledge and skills related to:
Security concepts
Security monitoring
Host-based analysis
Network intrusion analysis
Security policies and procedures

Exam Description
The Understanding Cisco Cybersecurity Operations Fundamentals (200-201 CBROPS) exam is a 120-minute assessment that is associated with the Cisco Certified CyberOps Associate certification. The CBROPS exam tests a candidate’s knowledge and skills related to security concepts, security monitoring, host-based analysis, network intrusion analysis, and security policies and procedures. The course, Understanding Cisco Cybersecurity Operations Fundamentals, helps candidates to prepare for this exam.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.1 Describe the CIA triad

1.2 Compare security deployments

1.2.a Network, endpoint, and application security systems
1.2.b Agentless and agent-based protections
1.2.c Legacy antivirus and antimalware
1.2.d SIEM, SOAR, and log management

1.3 Describe security terms

1.3.a Threat intelligence (TI)
1.3.b Threat hunting
1.3.c Malware analysis
1.3.d Threat actor
1.3.e Run book automation (RBA)
1.3.f Reverse engineering
1.3.g Sliding window anomaly detection
1.3.h Principle of least privilege
1.3.i Zero trust
1.3.j Threat intelligence platform (TIP)

1.4 Compare security concepts

1.4.a Risk (risk scoring/risk weighting, risk reduction, risk assessment)
1.4.b Threat
1.4.c Vulnerability
1.4.d Exploit

1.5 Describe the principles of the defense-in-depth strategy

1.6 Compare access control models

1.6.a Discretionary access control
1.6.b Mandatory access control
1.6.c Nondiscretionary access control
1.6.d Authentication, authorization, accounting
1.6.e Rule-based access control
1.6.f Time-based access control
1.6.g Role-based access control

1.7 Describe terms as defined in CVSS

1.7.a Attack vector
1.7.b Attack complexity
1.7.c Privileges required
1.7.d User interaction
1.7.e Scope

1.8 Identify the challenges of data visibility (network, host, and cloud) in detection

1.9 Identify potential data loss from provided traffic profiles

1.10 Interpret the 5-tuple approach to isolate a compromised host in a grouped set of logs

1.11 Compare rule-based detection vs. behavioral and statistical detection

2.1 Compare attack surface and vulnerability

2.2 Identify the types of data provided by these technologies

2.2.a TCP dump
2.2.b NetFlow
2.2.c Next-gen firewall
2.2.d Traditional stateful firewall
2.2.e Application visibility and control
2.2.f Web content filtering
2.2.g Email content filtering

2.3 Describe the impact of these technologies on data visibility

2.3.a Access control list
2.3.b NAT/PAT
2.3.c Tunneling
2.3.d TOR
2.3.e Encryption
2.3.f P2P
2.3.g Encapsulation
2.3.h Load balancing

2.4 Describe the uses of these data types in security monitoring

2.4.a Full packet capture
2.4.b Session data
2.4.c Transaction data
2.4.d Statistical data
2.4.e Metadata
2.4.f Alert data

2.5 Describe network attacks, such as protocol-based, denial of service, distributed denial of service, and man-in-the-middle

2.6 Describe web application attacks, such as SQL injection, command injections, and cross-site scripting

2.7 Describe social engineering attacks

2.8 Describe endpoint-based attacks, such as buffer overflows, command and control (C2), malware, and ransomware

2.9 Describe evasion and obfuscation techniques, such as tunneling, encryption, and proxies

2.10 Describe the impact of certificates on security (includes PKI, public/private crossing the network, asymmetric/symmetric)

2.11 Identify the certificate components in a given scenario

2.11.a Cipher-suite
2.11.b X.509 certificates
2.11.c Key exchange
2.11.d Protocol version
2.11.e PKCS

3.1 Describe the functionality of these endpoint technologies in regard to security monitoring

3.1.a Host-based intrusion detection
3.1.b Antimalware and antivirus
3.1.c Host-based firewall
3.1.d Application-level whitelisting/blacklisting
3.1.e Systems-based sandboxing (such as Chrome, Java, Adobe Reader)

3.2 Identify components of an operating system (such as Windows and Linux) in a given scenario

3.3 Describe the role of attribution in an investigation

3.3.a Assets
3.3.b Threat actor
3.3.c Indicators of compromise
3.3.d Indicators of attack
3.3.e Chain of custody

3.4 Identify type of evidence used based on provided logs

3.4.a Best evidence
3.4.b Corroborative evidence
3.4.c Indirect evidence

3.5 Compare tampered and untampered disk image

3.6 Interpret operating system, application, or command line logs to identify an event

3.7 Interpret the output report of a malware analysis tool (such as a detonation chamber or sandbox)

3.7.a Hashes
3.7.b URLs
3.7.c Systems, events, and networking

4.1 Map the provided events to source technologies

4.1.a IDS/IPS
4.1.b Firewall
4.1.c Network application control
4.1.d Proxy logs
4.1.e Antivirus
4.1.f Transaction data (NetFlow)

4.2 Compare impact and no impact for these items

4.2.a False positive
4.2.b False negative
4.2.c True positive
4.2.d True negative
4.2.e Benign

4.3 Compare deep packet inspection with packet filtering and stateful firewall operation

4.4 Compare inline traffic interrogation and taps or traffic monitoring

4.5 Compare the characteristics of data obtained from taps or traffic monitoring and transactional data (NetFlow) in the analysis of network traffic

4.6 Extract files from a TCP stream when given a PCAP file and Wireshark

4.7 Identify key elements in an intrusion from a given PCAP file

4.7.a Source address
4.7.b Destination address
4.7.c Source port
4.7.d Destination port
4.7.e Protocols
4.7.f Payloads

4.8 Interpret the fields in protocol headers as related to intrusion analysis

4.8.a Ethernet frame
4.8.b IPv4
4.8.c IPv6
4.8.d TCP
4.8.e UDP
4.8.f ICMP
4.8.g DNS
4.8.h SMTP/POP3/IMAP
4.8.i HTTP/HTTPS/HTTP2
4.8.j ARP

4.9 Interpret common artifact elements from an event to identify an alert

4.9.a IP address (source / destination)
4.9.b Client and server port identity
4.9.c Process (file or registry)
4.9.d System (API calls)
4.9.e Hashes
4.9.f URI / URL

4.10 Interpret basic regular expressions

5.1 Describe management concepts

5.1.a Asset management
5.1.b Configuration management
5.1.c Mobile device management
5.1.d Patch management
5.1.e Vulnerability management

5.2 Describe the elements in an incident response plan as stated in NIST.SP800-61

5.3 Apply the incident handling process (such as NIST.SP800-61) to an event

5.4 Map elements to these steps of analysis based on the NIST.SP800-61

5.4.a Preparation
5.4.b Detection and analysis
5.4.c Containment, eradication, and recovery
5.4.d Post-incident analysis (lessons learned)

5.5 Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-61)

5.5.a Preparation
5.5.b Detection and analysis
5.5.c Containment, eradication, and recovery
5.5.d Post-incident analysis (lessons learned)

5.6 Describe concepts as documented in NIST.SP800-86

5.6.a Evidence collection order
5.6.b Data integrity
5.6.c Data preservation
5.6.d Volatile data collection

5.7 Identify these elements used for network profiling

5.7.a Total throughput
5.7.b Session duration
5.7.c Ports used
5.7.d Critical asset address space

5.8 Identify these elements used for server profiling

5.8.a Listening ports
5.8.b Logged in users/service accounts
5.8.c Running processes
5.8.d Running tasks
5.8.e Applications

5.9 Identify protected data in a network

5.9.a PII
5.9.b PSI
5.9.c PHI
5.9.d Intellectual property

5.10 Classify intrusion events into categories as defined by security models, such as Cyber Kill Chain Model and Diamond Model of Intrusion

5.11 Describe the relationship of SOC metrics to scope analysis (time to detect, time to contain, time to respond, time to control)


QUESTION 1
Which type of algorithm encrypts data bit by bit?

A. block
B. asymmetric
C. stream
D. symmetric

Correct Answer: C

QUESTION 2
Which of the following is deployed on an endpoint as an agent or standalone application?

A. NIPS
B. NGFW
C. HIDS
D. NIDS

Correct Answer: C

QUESTION 3
Which of the following represents an exploitable, unpatched, and unmitigated weakness in software?

A. vulnerability
B. exploit
C. threat
D. breach

Correct Answer: A

QUESTION 4
Which of the following describes a TCP injection attack?

A. Many TCP SYN packets are captures with the same sequence number, source, and destination IP address, but different payloads.
B. there is an abnormally high volume of scanning from numerous sources
C. many TCP SYN packets are captured with the same sequence number, but different source and destination IP addresses and different payloads
D. an attacker performs actions slower than normal

Correct Answer: A

QUESTION 5
How are attributes of ownership and control of an object managed in Linux?

A. permissions
B. rights
C. iptables
D. processes

Correct Answer: A


Actualkey Cisco Certified CyberOps Associate 200-201 exam pdf, Certkingdom Cisco Certified CyberOps Associate 200-201 PDF
MCTS Training, MCITP Trainnig
Best Cisco Certified CyberOps Associate 200-201 Certification, Cisco Certified CyberOps Associate 200-201 Training at certkingdom.com

Tuesday, June 9, 2020

AZ-104 Microsoft Azure Administrator (beta) Exam

Audience Profile
Candidates for this exam should have subject matter expertise implementing, managing, and monitoring an organization’s Microsoft Azure environment.
Responsibilities for an Azure Administrator include implementing, managing, and monitoring identity, governance, storage, compute, and virtual networks in a cloud environment, plus provision, size, monitor, and adjust resources, when needed.
An Azure Administrator often serves as part of a larger team dedicated to implementing your organization's cloud infrastructure.

A candidate for this exam should have at least six months of hands-on experience administering Azure, along with a strong understanding of core Azure services, Azure workloads, security, and governance. In addition, this role should have experience using PowerShell, Azure CLI, Azure portal, and Azure Resource Manager templates.

Skills Measured
NOTE: The bullets that appear below each of the skills measured are intended to illustrate how we are assessing that skill. This list is not definitive or exhaustive.
NOTE: In most cases, exams do NOT cover preview features, and some features will only be added to an exam when they are GA (General Availability).

Manage Azure identities and governance (15-20%)
Manage Azure AD objects
. create users and groups
. manage user and group properties
. manage device settings
. perform bulk user updates
. manage guest accounts
. configure Azure AD Join
. configure self-service password reset
. NOT: Azure AD Connect; PIM

Manage role-based access control (RBAC)
. create a custom role
. provide access to Azure resources by assigning roles
o subscriptions
o resource groups
o resources (VM, disk, etc.)
. interpret access assignments
. manage multiple directories

Manage subscriptions and governance
. configure Azure policies
. configure resource locks

. apply tags

. create and manage resource groups

o move resources

o remove RGs


. manage subscriptions

. configure Cost Management

. configure management groups


Implement and manage storage (10-15%)
Manage storage accounts
. configure network access to storage accounts

. create and configure storage accounts

. generate shared access signature

. manage access keys

. implement Azure storage replication

. configure Azure AD Authentication for a storage account


Manage data in Azure Storage
. export from Azure job

. import into Azure job

. install and use Azure Storage Explorer

. copy data by using AZCopy


Configure Azure files and Azure blob storage
. create an Azure file share

. create and configure Azure File Sync service

. configure Azure blob storage


. configure storage tiers for Azure blobs


Deploy and manage Azure compute resources (25-30%)
Configure VMs for high availability and scalability
. configure high availability

. deploy and configure scale sets


Automate deployment and configuration of VMs
. modify Azure Resource Manager (ARM) template

. configure VHD template

. deploy from template

. save a deployment as an ARM template

. automate configuration management by using custom script extensions


Create and configure VMs
. configure Azure Disk Encryption

. move VMs from one resource group to another

. manage VM sizes

. add data discs

. configure networking

. redeploy VMs


Create and configure containers
. create and configure Azure Kubernetes Service (AKS)

. create and configure Azure Container Instances (ACI)

. NOT: selecting an container solution architecture or product; container registry settings


Create and configure Web Apps
. create and configure App Service

. create and configure App Service Plans

. NOT: Azure Functions; Logic Apps; Event Grid


Configure and manage virtual networking (30-35%)
Implement and manage virtual networking
. create and configure VNET peering


. configure private and public IP addresses, network routes, network interface, subnets, and virtual network


Configure name resolution
. configure Azure DNS

. configure custom DNS settings

. configure a private or public DNS zone


Secure access to virtual networks
. create security rules

. associate an NSG to a subnet or network interface

. evaluate effective security rules

. deploy and configure Azure Firewall

. deploy and configure Azure Bastion Service

. NOT: Implement Application Security Groups; DDoS


Configure load balancing
. configure Application Gateway

. configure an internal load balancer

. configure load balancing rules

. configure a public load balancer

. troubleshoot load balancing

. NOT: Traffic Manager and FrontDoor and PrivateLink


Monitor and troubleshoot virtual networking
. monitor on-premises connectivity

. use Network Performance Monitor

. use Network Watcher

. troubleshoot external networking

. troubleshoot virtual network connectivity


Integrate an on-premises network with an Azure virtual network
. create and configure Azure VPN Gateway

. create and configure VPNs

. configure ExpressRoute

. configure Azure Virtual WAN


Monitor and back up Azure resources (10-15%)
Monitor resources by using Azure Monitor
. configure and interpret metrics

o analyze metrics across subscriptions


. configure Log Analytics

o implement a Log Analytics workspace

o configure diagnostic settings


. query and analyze logs

o create a query

o save a query to the dashboard

o interpret graphs


. set up alerts and actions

o create and test alerts

o create action groups

o view alerts in Azure Monitor

o analyze alerts across subscriptions


. configure Application Insights

. NOT: Network monitoring


Implement backup and recovery
. configure and review backup reports

. perform backup and restore operations by using Azure Backup Service

. create a Recovery Services Vault

o use soft delete to recover Azure VMs


. create and configure backup policy

. perform site-to-site recovery by using Azure Site Recovery

. NOT: SQL or HANA

AZ-103/104 Comparison
Microsoft Azure Administrator

Current Skills Measured as of January 15, 2020
Updated Skills Measured List (ignore the numbering below)

Audience Profile
Candidates for this exam are Azure Administrators who manage cloud services that span storage, security, networking, and compute cloud capabilities. Candidates have a deep understanding of each service across the full IT lifecycle, and take requests for infrastructure services, applications, and environments. They make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor, and adjust resources as appropriate.
Candidates for this exam should have proficiency in using PowerShell, the Command Line Interface, Azure Portal, ARM templates, operating systems, virtualization, cloud infrastructure, storage structures, and networking.

Audience Profile
The Azure Administrator implements, manages, and monitors identity, governance, storage, computevirtual machines, and virtual networks in a cloud environment. This role focuses primarily on enabling Infrastructure as a Service (IaaS). The Azure Administrator will provision, size, monitor, and adjust resources as appropriate.
Candidates should have a minimum of six months of hands-on experience administering Azure. Candidates should have a strong understanding of core Azure services, Azure workloads, security, and governance. Candidates for this exam should have experience in using PowerShell, the Command Line Interface, Azure Portal, and ARM templates.


1. Manage Azure subscriptions and resources (15-20%)
1.1 Manage Azure subscriptions
Assign administrator permissions; configure cost center quotas and tagging; configure policies at Azure subscription level
1.2 Analyze resource utilization and consumption
6. Manage Azure Identities and Governance (15-20%)
6.1 Manage Azure AD objects
. create users and groups

. manage user and group properties

. manage device settings

. perform bulk user updates

. manage guest accounts

. configure Azure AD Join

. configure self-service password reset




Configure diagnostic settings on resources; create baseline for resources; create and test alerts; analyze alerts across subscription; analyze metrics across subscription; create action groups and action rules; monitor for unused resources; monitor spend; report on spend; utilize log queries in Azure Monitor; view alerts in Azure Monitor
1.3 Manage resource groups
Use Azure policies for resource groups; configure resource locks; configure resource policies; implement and set tagging on resource groups; move resources across resource groups; remove resource groups
1.4 Managed role based access control (RBAC)
May include but is not limited to: Create a custom role, configure access to Azure resources by assigning roles, configure management access to Azure, troubleshoot RBAC, implement RBAC policies, assign RBAC Roles
. NOT: Azure AD Connect; PIM


6.2 Manage role-based access control (RBAC)
. create a custom role

. provide access to Azure resources by assigning roles

o subscriptions

o resource groups

o resources (VM, disk, etc.)


. interpret access assignments

. manage multiple directories


6.3 Manage subscriptions and governance
. configure Azure policies

. configure resource locks

. apply tags

. create and manage resource groups

o move resources

o remove RGs


. manage subscriptions

. configure Cost Management

. configure management groups



2. Implement and manage storage (15-20%)
2.1 Create and configure storage accounts
Configure network access to the storage account; create and configure storage account; generate shared access signature; install and use Azure Storage Explorer; manage access keys; monitor activity log by using Monitor Logs; implement Azure storage replication; Implement Azure AD Authentication, manage blob storage lifecycle management
7. Implement and Manage Storage (10-15%)
7.1 Manage storage accounts
. configure network access to storage accounts

. create and configure storage accounts

. generate shared access signature

. manage access keys

. implement Azure storage replication

. configure Azure AD Authentication for a storage account


7.2 Manage data in Azure Storage


2.2 Import and export data to Azure
Create export from Azure job; create import into Azure job; configure and use Azure blob storage; configure Azure content delivery network (CDN) endpoints
2.3 Configure Azure files
Create Azure file share; create Azure File Sync service; create Azure sync group; troubleshoot Azure File Sync
2.4 Implement Azure backup
Configure and review backup reports; perform backup operation; create Recovery Services Vault; create and configure backup policy; perform a restore operation
. export from Azure job

. import into Azure job

. install and use Azure Storage Explorer

. copy data by using AZCopy


7.3 Configure Azure files and Azure blob storage
. create an Azure file share

. create and configure Azure File Sync service

. configure Azure blob storage

. configure storage tiers for Azure blobs



3. Deploy and manage virtual machines (VMs) (15-20%)
3.1 Create and configure a VM for Windows and Linux
Configure high availability; configure monitoring, networking, storage, and virtual machine size; deploy and configure scale sets
3.2 Automate deployment of VMs
Modify Azure Resource Manager (ARM) template; configure location of new VMs; configure VHD template; deploy from template; save a deployment as an ARM template; deploy Windows and Linux VMs
3.3 Manage Azure VM
Add data discs; add network interfaces; automate configuration management by using PowerShell Desired State Configuration (DSC) and VM Agent by using custom script extensions; manage
8. Deploy and Manage Azure Compute Resources (25-30%)
8.1 Configure VMs for high availability and scalability
. configure high availability

. deploy and configure scale sets


8.2 Automate deployment and configuration of VMs
. modify Azure Resource Manager (ARM) template

. configure VHD template

. deploy from template

. save a deployment as an ARM template

. automate configuration management by using custom script extensions


8.3 Create and configure VMs
. configure Azure Disk Encryption

. move VMs from one resource group to another




VM sizes; move VMs from one resource group to another; redeploy VMs
3.4 Manage VM backups
Configure VM backup; define backup policies; implement backup policies; perform VM restore; soft delete for Azure VMs; Azure Site Recovery
. manage VM sizes

. add data discs

. configure networking

. redeploy VMs


8.4 Create and configure containers
. create and configure Azure Kubernetes Service (AKS)

. create and configure Azure Container Instances (ACI)

. NOT: selecting an container solution architecture or product; container registry settings


8.5 Create and configure Web Apps
. create and configure App Service

. create and configure App Service Plans

. NOT: Azure Functions; Logic Apps; Event Grid



4. Configure and manage virtual networks (30-35%)
4.1 Create connectivity between virtual networks
Create and configure VNET peering; create and configure VNET to VNET connections; verify virtual network connectivity; create virtual network gateway
4.2 Implement and manage virtual networking
Configure private and public IP addresses, network routes, network interface, subnets, and virtual network
4.3 Configure name resolution
Configure Azure DNS; configure custom DNS settings; configure private and public
9. Configure and Manage Virtual Networking (30-35%)
9.1 Implement and manage virtual networking
. create and configure VNET peering

. configure private and public IP addresses, network routes, network interface, subnets, and virtual network


9.2 Configure name resolution
. configure Azure DNS

. configure custom DNS settings

. configure a private or public DNS zone


9.3 Secure access to virtual networks
. create security rules

. associate an NSG to a subnet or




DNS zones
4.4 Create and configure a Network Security Group (NSG)
Create security rules; associate NSG to a subnet or network interface; identify required ports; evaluate effective security rules
4.5 Implement Azure load balancer
May include but is not limited to: Configure internal load balancer, configure load balancing rules, configure public load balancer, troubleshoot load balancing
4.6 Monitor and troubleshoot virtual networking
May include but is not limited to: Monitor on-premises connectivity, use Network resource monitoring, use Network Watcher, troubleshoot external networking, troubleshoot virtual network connectivity
4.7 Integrate on premises network with Azure virtual network
May include but is not limited to: Create and configure Azure VPN Gateway, create and configure site to site VPN, configure Express Route, verify on premises connectivity, troubleshoot on premises connectivity with Azure
network interface

. evaluate effective security rules

. deploy and configure Azure Firewall

. deploy and configure Azure Bastion Service

. NOT: Implement Application Security Groups; DDoS


9.4 Configure load balancing
. configure Application Gateway

. configure an internal load balancer

. configure load balancing rules

. configure a public load balancer

. troubleshoot load balancing

. NOT: Traffic Manager and FrontDoor and PrivateLink


9.5 Monitor and troubleshoot virtual networking
. monitor on-premises connectivity

. use Network resource monitoring

. use Network Watcher

. troubleshoot external networking

. troubleshoot virtual network connectivity


9.6 Integrate an on-premises network with an Azure virtual network
. create and configure Azure VPN Gateway

. create and configure VPNs

. configure ExpressRoute

. configure Azure Virtual WAN



5. Manage identities (15-20%)
5.1 Manage Azure Active Directory (AD)
Add custom domains; Azure AD Join; configure self-service password reset;


[NO EQUIVALENT --- SEE NEW FG 5 BELOW]


manage multiple directories
5.2 Manage Azure AD objects (users, groups, and devices)
Create users and groups; manage user and group properties; manage device settings; perform bulk user updates; manage guest accounts
5.3 Implement and manage hybrid identities
Install Azure AD Connect, including password hash and pass-through synchronization; use Azure AD Connect to configure federation with on-premises Active Directory Domain Services (AD DS); manage Azure AD Connect; manage password sync and password writeback
5.4 Implement multi-factor authentication (MFA)
May include but is not limited to: Configure user accounts for MFA, enable MFA by using bulk update, configure fraud alerts, configure bypass options, configure Trusted IPs, configure verification methods



10. Monitor and back up Azure resources (10-15%)
10.1 Monitor resources by using Azure Monitor
. configure and interpret metrics

o analyze metrics across subscriptions


. configure Log Analytics

o implement a Log Analytics workspace

o configure diagnostic settings


. query and analyze logs

o create a query





o save a query to the dashboard

o interpret graphs


. set up alerts and actions

o create and test alerts

o create action groups

o view alerts in Azure Monitor

o analyze alerts across subscriptions


. configure Application Insights

. NOT: Network monitoring


10.2 Implement backup and recovery
. configure and review backup reports

. perform backup and restore operations by using Azure Backup Service

. create a Recovery Services Vault

o use soft delete to recover Azure VMs


. create and configure backup policy

. perform site-to-site recovery by using Azure Site Recovery

. NOT: SQL or HANA

QUESTION 1
You have an Azure subscription that contains an Azure Active Directory (Azure AD) tenant named
contoso.com and an Azure Kubernetes Service (AKS) cluster named AKS1.
An administrator reports that she is unable to grant access to AKS1 to the users in contoso.com.
You need to ensure that access to AKS1 can be granted to the contoso.com users.
What should you do first?

A. From contoso.com, modify the Organization relationships settings.
B. From contoso.com, create an OAuth 2.0 authorization endpoint.
C. Recreate AKS1.
D. From AKS1, create a namespace.

Correct Answer: B

QUESTION 2
You have a Microsoft 365 tenant and an Azure Active Directory (Azure AD) tenant named contoso.com.
You plan to grant three users named User1, User2, and User3 access to a temporary Microsoft SharePoint
document library named Library1.
You need to create groups for the users. The solution must ensure that the groups are deleted automatically after 180 days.
Which two groups should you create? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

A. an Office 365 group that uses the Assigned membership type
B. a Security group that uses the Assigned membership type
C. an Office 365 group that uses the Dynamic User membership type
D. a Security group that uses the Dynamic User membership type
E. a Security group that uses the Dynamic Device membership type

Correct Answer: AC

QUESTION 3
You recently created a new Azure subscription that contains a user named Admin1.
Admin1 attempts to deploy an Azure Marketplace resource by using an Azure Resource Manager template.
Admin1 deploys the template by using Azure PowerShell and receives the following error message: “User
failed validation to purchase resources. Error message: “Legal terms have not been accepted for this item on
this subscription. To accept legal terms, please go to the Azure portal (http://go.microsoft.com/fwlink/?
LinkId=534873) and configure programmatic deployment for the Marketplace item or create it there for the first time.”
You need to ensure that Admin1 can deploy the Marketplace resource successfully.

What should you do?
A. From Azure PowerShell, run the Set-AzApiManagementSubscription cmdlet
B. From the Azure portal, register the Microsoft.Marketplace resource provider
C. From Azure PowerShell, run the Set-AzMarketplaceTerms cmdlet
D. From the Azure portal, assign the Billing administrator role to Admin1

Correct Answer: C

QUESTION 4
You have an Azure Active Directory (Azure AD) tenant that contains 5,000 user accounts.
You create a new user account named AdminUser1.
You need to assign the User administrator administrative role to AdminUser1.
What should you do from the user account properties?

A. From the Licenses blade, assign a new license
B. From the Directory role blade, modify the directory role
C. From the Groups blade, invite the user account to a new group
Correct Answer: B

QUESTION 5
You have an Azure Active Directory (Azure AD) tenant named contoso.onmicrosoft.com that contains 100 user accounts.
You purchase 10 Azure AD Premium P2 licenses for the tenant.
You need to ensure that 10 users can use all the Azure AD Premium features.
What should you do?

A. From the Licenses blade of Azure AD, assign a license
B. From the Groups blade of each user, invite the users to a group
C. From the Azure AD domain, add an enterprise application
D. From the Directory role blade of each user, modify the directory role

Correct Answer: A
Actualkey Microsoft Azure Administrator AZ-104 exam pdf, Certkingdom Microsoft Azure Administrator AZ-104 PDF

MCTS Training, MCITP Trainnig
Best Microsoft Azure Administrator AZ-104 Certification, Microsoft Azure Administrator AZ-104 Training at certkingdom.com

Monday, June 8, 2020

F5-101 Application Delivery Fundamentals

Welcome to the F5 Networks 101 - Application Delivery Fundamentals compiled Study Guide. The purpose of this guide is to help you prepare for the F5 101 - Application Delivery Fundamentals exam. The contents of this document are based on the 101 - Application Delivery Fundamentals Blueprint Guide.

This study guide provides students with some of the basic foundational knowledge required to pass the exam.

This study guide is a collection of information and therefore not a completely original work. The majority of the information is compiled from sources that are located on the Internet. All of the information locations are
referenced at the top of each topic instead of in an Appendix of this document. This was done to help the reader access the referenced information easier without having to search through a formal appendix. This
guide also references a book that should be basic reading for some of the topics on this exam.

The F5 Certified team provides an official 101 - Application Delivery Fundamentals Study Guide to all candidates. The F5 Certified Study Guide is a list of reading material that will help any student build a broad
base of general knowledge that can assist in not only their exam success but also in becoming a well-rounded systems engineer. The Resource Guide will be available to the candidate through the certification.f5.com
website once they are qualified for the Application Delivery Fundamentals exam.

There are not any pre-requisite to this exam.
This guide was prepared by an F5 employee but is not an official F5 document and is not supported by F5 Networks.

Section 1 - OSI 5
Objective - 1.01 Explain, compare, and contrast the OSI layers
Objective - 1.02 Explain Protocols and Technologies Specific to the Data Link Layer
Objective - 1.03 Explain protocols and apply technologies specific to the network layer
Objective - 1.04 Explain the features and functionality of protocols and technologies specific to the transport layer
Objective - 1.05 Explain the features and functionality of protocols and technologies specific to the application layer

Section 2 - F5 Solutions and Technology
Objective - 2.01 Articulate the role of F5 products
Objective - 2.02 Explain the purpose, use, and advantages of iRules
Objective - 2.03 Explain the purpose, use, and advantages of iApps
Objective - 2.04 Explain the purpose of and use cases for full proxy and packet forwarding/packet based architectures
Objective - 2.05 Explain the advantages and configurations of high availability (HA)

Section 3 – Load Balancing Essentials
Objective - 3.01 Discuss the purpose of, use cases for, and key considerations related to load balancing
Objective - 3.02 Differentiate between a client and server

Section 4 – Security
Objective - 4.01 Compare and contrast positive and negative security models
Objective - 4.02 Explain the purpose of cryptographic services
Objective - 4.03 Describe the purpose and advantages of authentication
Objective - 4.04 Describe the purpose, advantages, and use cases of IPsec and SSL VPN

Section 5 – Application Delivery Platforms
Objective - 5.01 Describe the purpose, advantages, use cases, and challenges associated with hardware based application delivery platforms and virtual machines
Objective - 5.02 Describe the purpose of the various types of advanced acceleration techniques

QUESTION: 1
To make complex access policies easier to manage, an administrator can create a _______ containing several policy actions, and then add instances of it within the policy? (Fill in)

A. Visual Policy Editor
B. Policy Editor
C. Visual Editor
D. Policy creator

Answer: A

QUESTION: 2
To make complex access policies easier to manage, an administrator can create a policy containing several policy actions, and then add instances of it within the policy using the ________. (Fill in)

A. Deployment Wizard
B. Setup Wizard
C. Policy Wizard
D. Visual Wizard

Answer: A

QUESTION: 3
The Policy Builder benefits include:

A. Doesn't require in depth web application knowledge
B. Only requires limited ASM knowledge
C. All of the above
D. Very low administrative impact

Answer: C

QUESTION: 4
APM administrators can configure access policies granting users which two types of access?

A. CIFS access
B. Client/server access
C. Web application access
D. Proxy access
E. RDC access

Answer: D

QUESTION: 5
Which of the following is a benefit of using iRules?

A. They provide a secure connection between a client and LTM
B. They enable granular control of traffic
C. They can be used as templates for creating new applications
D. They can use Active Directory to authenticate and authorize users
E. They provide an automated way to create LTM objects

Answer: B

QUESTION: 6
APM provides access control lists at which two OSI layers? (Choose two.)

A. Layer 5
B. Layer 4
C. Layer 7
D. Layer 6
E. Layer 2

Answer: B,C

QUESTION: 7
TMOS is an F5 software module that runs on the BIG-IP platform.

A. True
B. False

Answer: B


Actualkey F5 Certification F5-101 exam pdf, Certkingdom F5 Certification F5-101 PDF
MCTS Training, MCITP Trainnig
Best F5 Certification F5-101 Certification, F5 Certification F5-101 Training at certkingdom.com


Saturday, May 23, 2020

C1000-065 IBM Cognos Analytics Developer V11.1.x Exam

Number of questions: 60
Number of questions to pass: 44
Time allowed: 90 mins
Status: Live

An IBM Certified Developer – IBM Cognos Analytics Developer V11.1.x is responsible for building advanced reports and dashboards and connecting to data and modeling meta data sources. This individual has project related experience authoring and troubleshooting complex and intermediate level reports and dashboards and is capable of participating in project implementations as an effective team member.


This exam consists of 5 sections described below. For more detail, please see the study guide on the Exam Preparation tab.

Section 1: Dashboards 22%
Explain design considerations for small form factors (mobile devices)
Describe how to create simple Dashboards
Describe how to create complex interactive Dashboards
Describe how to modify Dashboards
Demonstrate how to control Dashboard data

Section 2: Reports 32%
Describe the various data container types
Describe how to apply filters
Describe how to use prompts
Describe using conditions to control formatting layout and rendering
Describe using calculations and macros
Demonstrate presenting data graphically
Explain designing for multiple outputs
Describe using reusable objects
Explain various interactivity usages
Demonstrate understanding of relational vs dimensional reporting styles
Demonstrate understanding the use of multiple queries in a report
Demonstrate understanding the use of multiple Data sources in a report
Describe forms of report distribution and collaboration

Section 3: Data 21%
Explain connecting to the Data source
Describe the various types of Physical Data sources and their usage
Describe the various types of metadata sources and their usage
Describe using data shaping (end user data preparation)

Section: 4 Other Features 10%
Describe where the offering uses AI
Describe ways to augment with AI
Describe how to create a story for the presentation of information
Describe where Exploration is used to enhance analytics

Section 5: Troubleshooting and Performance 15%
Describe utilities that are available in the product for troubleshooting
Describe approach(s) methods to perform root cause analysis/diagnose issues

Actualkey IBM C1000-065 exam pdf, Certkingdom IBM C1000-065 PDF
MCTS Training, MCITP Trainnig
Best IBM C1000-065 Certification, IBM C1000-065 Training at certkingdom.com