Wednesday, 27 May 2015

4 new access points deliver super-fast Wi-Fi

Linksys, Xclaim, Amped and ZyXel bring 802.11ac to SMB, enterprise markets.
access points fast wifi 1

Access points put to the test
We put four new access points to the test, from Linksys, Xclaim, Amped and ZyXel, using the same test-bed and methods as our last review. The Linksys LAPAC1750PRO performed best in the throughput tests and was a feature-rich product. The Amped Wireless AP was a close second in the speed tests and is a solid business-class access point. The Xclaim unit did well given it’s only a two stream (2x2) AP. The ZyXEL unit was last in throughput, but has a number of advanced features in the areas of configuration, management and security. (Read our full review.)

Amped Wireless APR175P
Targeted at the SMB market, the Amped Wireless APR175P bills itself as a high-power long range access point. Priced at $299.99, it is a dual-band three stream (3x3) 802.11ac AP, offering theoretical data rates up to 1,300Mbps for 802.11ac. In our testing, the maximum throughput was 335.6Mbps. This is the only access point in the review that sports external antennas, which provides for either ceiling or wall mounting. In addition to the three external antenna, it has six high power amplifiers and six wireless reception (low noise) amplifiers.

This access point is the only one in the review that supports a router mode. Additionally, it's the only one that specifically touts being long range and high-power at 500mW output. The built-in controller functionality supports the central management of up to seven access points. This access point allows you to create up to 32 SSIDs with VLAN support. This unit offers load balancing and an intrusion detection system (when in router mode). It also offers an internal RADIUS server supporting the PEAP and TLS methods of 802.1X authentication, enabling the use of the Enterprise mode of WPA2 security.

Linksys LAPAC1750PRO
The Linksys LAPAC1750PRO is targeted towards small and midsized businesses (SMBs) and is priced at $499.99. It is a dual-band three stream (3x3) 802.11ac AP, offering theoretical data rates up to 1,300Mbps for 802.11ac. In our testing, it maxxed out at 436.3Mbps. Inside the unit are three 4.4 dBi internal antennas for 2.4GHz and three 5.2 dBi gain antennas for 5GHz. On the back of the unit are two PoE Gigabit Ethernet ports (one with PoE), AC power jack, and a small reset button.
access points fast wifi 5

When using the Cluster feature, you can centrally manage up to 16 access points using the built-in controller functionality. Once you enable the clustering feature on one access point, others access points will join that cluster. You can centrally change the configuration settings of the cluster via any access point in the cluster. This unit supports the use of up to 16 SSIDs with VLAN support. In addition to traditional AP mode, you can use the unit in WDS and workgroup bridge modes. Its Captive Portal feature supports guest, local, and external RADIUS authentication and can do URL redirection upon authentication. This access point supports rogue AP detection, band steering, and beamforming. It also has basic load balancing functionality.

Xclaim Xi-3
The Xclaim Xi-3 from Ruckus Wireless retails for $199 and is targeted towards small businesses and small office/home office (SOHO) environments and to the non-IT users. It's the only two stream (2x2) AP in this review, thus naturally offering lower maximum data rates than the other APs: up to 867Mbps for 802.11ac. It hit 315.7 Mbps in our testing. The Xclaim unit has a look and feel between a consumer router and a business access point. On the back/bottom of the access point you'll find one PoE LAN port, a secondary Ethernet port, small reset button, and an AC power jack. On the back/bottom of the Xclaim AP are the typical AP ports and buttons.

Unlike most other business-class products, this unit is primarily designed to be setup and managed via a mobile app, called Harmony for Xclaim. This unit only provides the traditional AP mode; no WDS or wireless bridging supported. The built-in controller functionality offers central management via the mobile app with a recommended maximum of 10 APs. You can create up to four SSIDs per access point with VLAN support. As far as advanced features, the unit has band steering, an enhanced QoS functionality called automatic traffic prioritization, and a feature called airtime fairness to help curve the negative impact from older or slower devices.

ZyXEL WAC6503D-S
The ZyXel WAC6503D-S, priced at $899, is targeted towards the enterprise-level market. It is a three stream (3x3) 802.11ac AP and offers theoretical data rates up to 1,300Mbps for 802.11ac. However, in our testing, it only reached 232.6Mbps. The unit is designed for ceiling mounting, with the smoke detector look and feel.

On the front/top of the AP you'll find seven LED status lights. On the back/bottom you'll find three Ethernet ports: PoE port for uplink, secondary LAN port, and one for console access. You'll find a small reset button and AC power jack as well.

A separate NXC Series WLAN controller is required for full central management capabilities. In addition to the regular AP mode, this access point supports WDS and a monitor mode for rogue access point detection. This ZyXEL AP supports up to 16 SSIDs with VLAN support. It has load balancing and band steering functionality. This AP series has what the company calls its Smart Antenna technology, which dynamically chooses the best of more than 700 antenna patterns to use for transmitting to individual clients

Included free of charge is the ZyXEL Wireless Optimizer (ZWO) software, which is a mapped-based Wi-Fi simulation, planning, and surveying tool.




13 must-have security tools

13 must-have security tools
The experts weigh in on their top picks for protecting enterprise networks.

Security tools
Network World asked security pros to name their No. 1, must-have, go-to security tool. We received responses from industry analysts, enterprise security practitioners, academics, and members of industry associations. Many of the experts we interviewed pointed out that there is no silver bullet when it comes to security, so your best bet is a defense in depth strategy that combines as many of these approaches as possible. Read the full story.

SysInternals and Windows GodMode
Ron Woerner, director of CyberSecurity Studies at Bellevue University: "There are certain things all network, IT, and security professionals should have in their toolbag. The most important is knowledge; i.e., where to learn more about a particular topic, technique, or tool. It’s impossible to know everything; so focus on where to get quality instruction and information."

Woerner recommends two websites: www.howtogeek.com and blogs.msdn.com/ for reference; and two toolkits: SysInternals and Windows GodMode. The former is a grouping of simple Windows tools and the latter is administration applications already available in the Control Panel.

Microsoft EMET
Yier Jin, assistant professor of computer science and electrical engineering at the University of Central Florida, says knowledge is the key. "I would say cybersecurity awareness is the one, best tool. Many breaches are caused by internal workers who lack cybersecurity awareness and; therefore, click links from spam email, which often initiates the breach. For tools, I recommend Microsoft Enhanced Mitigation Emergency Toolkit (EMET), an excellent toolkit that every company should have."

Secure@Source, Q-Radar, ArcSight, Splunk
Jeff Northrop, CTO at International Association of Privacy Professionals, uses the term data security intelligence to describe tools that help IT understand their data landscape. "Currently, we have business intelligence tools, data integration tools, data discovery tools, data encryption tools, compliance tools, and SIEM tools. All require an understanding of what data is collected; where it's located; how it's structured, categorized, and used. Most vendors operate in one or two of these areas; but a few companies have recognized a need for better information on the data they're responsible for protecting; extending their products to meet this need." Northrop lists Informatica’s Secure@Source; IBM’s Q-Radar, HP’s ArcSight, and Splunk.

Insider threat protection
Mike Papay, vice president and CISO at Northrop Grumman says, "In the context of destructive malware and insider-enabled data loss, businesses should invest in security tools that protect from the inside out. Similar to a broken windows policing strategy, security tools that can baseline, and then detect and alert on anomalies in network and client behavior helps businesses mitigate problem-activity early in the threat cycle.”
Privileged identity management

Privileged identity management
"I recommend Privileged Identity Management (PIM) tools that control the administrative password and, in some cases, shared business passwords and credentials," says Andras Cser, vice president and principal security/risk analyst at Forrester. "These tools are absolutely critical to ent data breaches by making always-on system administrator access to on-premises and cloud workloads a thing of the past. PIM tools check out and change passwords for critical workloads, which makes attackers' snooped administrator and root passwords worthless. Also, PIM (generally) enforces close monitoring and recording of all programmatic and/or human administrative access to machines."

Patch management
"There are three tools that all companies should have," says Gary Hayslip, deputy director and CISO for the City of San Diego, "patch management, data backup, and full disk encryption. These tools provide the basic cyber-hygiene foundation, which enables companies to continue to grow safely and respond to incidents. Then, as the revenue stream increases, they can add more security controls to the organization. If I had to choose just one, I'd say patch management. Having a patch management solution in place reduces risk exposure to the organization by keeping its IT assets up-to-date, which makes it harder for the bad guys. However, there's no guarantee that any, one solution will resolve all issues."

Cyphort
David Giambruno, senior vice president and CIO at Tribune Media, suggests that enterprises should move toward the concept of a software defined data center. "We're using VMware’s solution stack for its micro-segmentation capabilities—summarized as security at the element layer," he says. "Historically, this was incredibly challenging with hardware but, in the software world—where everything is a file—you can wrap everything with a security posture. Security follows wherever the element goes either internal or external. The audit-ability, operational automation, and visibility changes defensive capabilities." Giambruno deployed Cyphort for its capabilities to see east/west traffic in the cloud.

Bluebox
"One interesting new area is using technology to provide a layer between the user and SaaS solutions, so the enterprise can manage authentication and encryption and hold its keys, while maintaining close-to-full functionality with the software as a service (SaaS) solution," says Dr. John D. Johnson, global security strategist and security architect for John Deere. "There are also new solutions for cloud file storage and sync (like Box) that add encryption, data loss protection, and granular reports." For BYOD, he recommends products that keep corporate data in a container and ent it from moving, such as Bluebox, which puts a flexible walled garden around certain data and apps, and applies corporate rules.

Endpoint detection and response
Neil MacDonald, vice president and distinguished analyst at Gartner, advises clients to first remove administrative rights from Windows users, then invest in an endpoint detection and response (EDR) solution that continuously monitors and analyzes the state of the endpoint for indications of compromise. MacDonald emphasizes that EDR solutions provide continuous visibility that, when combined with continuous analytics, can help enterprises shorten the time that an attack goes undetected "For server workloads, I’d replace anti-malware scanning with an application-control solution to ent the execution of all unauthorized code, which keeps the vast majority of malware off the system and, also, reinforces good operational and change management hygiene.

FireEye
Randy Marchany, IT security lab director & security officer at Virginia Tech, says the flaw with static perimeter defense is that most organizations focus on inbound traffic rather than outbound traffic. Continuous Monitoring , also known as Network Security Monitoring or Extrusion Detection, focuses on traffic and log analysis. He recommends the FireEye Malware Detection appliance, Netflow data (which provides invaluable information that determines if internal machines have been compromised), and tools such as ARGUS Software, SiLK , the System for Internet-Level Knowledge, a collection of traffic analysis tools developed by the CERT Network Situational Awareness Team, and/or the Bro network security analyzer.

Advanced security analytics
Johna Till Johnson, CEO at Nemertes Research, recommends Advanced Security Analytics (ASA), which provide real-time insight into—and, increasingly, proactive responses to—situations that indicate a potential breach, compromise, or vulnerability. ASA merges security event/incident management and monitoring (SEIM) with analytical capabilities often derived from Big Data technologies. It also includes forensics and Intrusion Detection Systems/Intrusion ention Systems. Johnson recommends tools from vendors such as Agiliance, Blue Coat, Damballa, FireEye, Guidance, HP ArcSight, IBM, Lastline, LogRhythm, McAfee/Intel, and Splunk.

Collaboration Tools
"My vote for security's best option is collaboration tools. Yes, we have plenty of silver bullets; what we really need are more tools that allow communication and collaboration for our distributed workforce. We need to capture tribal knowledge to make staff more effective. We need to invest in tools that make staff more agile," says Rick Holland, principal security/risk analyst at Forrester Research.

Threat Intelligence
Frank Kim, CISO at the SANS Institute, believes security capabilities that detect attackers and anomalous activity are even more important in the face of advanced threats which bypass traditional, entative mechanisms. As a result, threat intelligence and robust information sharing are key aspects of modern cyber defense. But it's also about advanced analytics and the ability to mine internal and external sources of data. Building a data science capability to intelligently analyze large amounts of information provides organizations with actionable information that allows security teams to respond more quickly.



Monday, 25 May 2015

350-018 CCIE Security

350-018 CCIE Security

CCIE Security
Exam Number 350-018 CCIE Security
Associated Certifications CCIE Security
Duration 120 minutes (90 - 110 questions)

Exam Description
The Cisco CCIE® Security Written Exam (350-018) version 4.0 is a 2-hour test with 90–110 questions. This exam tests the skills and competencies of security professionals in terms of describing, implementing, deploying, configuring, maintaining, and troubleshooting Cisco network security solutions and products, as well as current industry best practices and internetworking fundamentals.

Topics include networking fundamentals and security-related concepts and best practices, as well as Cisco network security products and solutions in areas such as VPNs, intrusion prevention, firewalls, identity services, policy management, and device hardening. Content includes both IPv4 and IPv6 concepts and solutions.

The exam is closed book, and no outside reference materials are allowed.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Infrastructure, Connectivity, Communications, and Network Security 20%
1.1 Network addressing basics
1.2 OSI layers
1.3 TCP/UDP/IP protocols
1.4 LAN switching (for example, VTP, VLANs, spanning tree, and trunking)
1.5 Routing protocols (for example, RIP, EIGRP, OSPF, and BGP)
1.5.a Basic functions and characteristics
1.5.b Security features
1.6 Tunneling protocols
1.6.a GRE
1.6.b NHRP
1.6.c IPv6 tunnel types
1.7 IP multicast
1.7.a PIM
1.7.b MSDP
1.7.c IGMP and CGMP
1.7.d Multicast Listener Discovery
1.8 Wireless
1.8.a SSID
1.8.b Authentication and authorization
1.8.c Rogue APs
1.8.d Session establishment
1.9 Authentication and authorization technologies
1.9.a Single sign-on
1.9.b OTPs
1.9.c LDAP and AD
1.9.d RBAC
1.10 VPNs
1.10.a L2 vs L3
1.10.b MPLS, VRFs, and tag switching
1.11 Mobile IP networks

2.0 Security Protocols 15%
2.1 RSA
2.2 RC4
2.3 MD5
2.4 SHA
2.5 DES
2.6 3DES
2.7 AES
2.8 IPsec
2.9 ISAKMP
2.10 IKE and IKEv2
2.11 GDOI
2.12 AH
2.13 ESP
2.14 CEP
2.15 TLS and DTLS
2.16 SSL
2.17 SSH
2.18 RADIUS
2.19 TACACS+
2.20 LDAP
2.21 EAP methods (for example, EAP-MD5, EAP-TLS, EAP-TTLS, EAP-FAST, PEAP, and LEAP)
2.22 PKI, PKIX, and PKCS
2.23 IEEE 802.1X
2.24 WEP, WPA, and WPA2
2.25 WCCP
2.26 SXP
2.27 MACsec
2.28 DNSSEC

3.0 Application and Infrastructure Security 10%
3.1 HTTP
3.2 HTTPS
3.3 SMTP
3.4 DHCP
3.5 DNS
3.6 FTP and SFTP
3.7 TFTP
3.8 NTP
3.9 SNMP
3.10 syslog
3.11 Netlogon, NetBIOS, and SMB
3.12 RPCs
3.13 RDP and VNC
3.14 PCoIP
3.15 OWASP
3.16 Manage unnecessary services

4.0 Threats, Vulnerability Analysis, and Mitigation 10%
4.1 Recognize and mitigate common attacks
4.1.a ICMP attacks and PING floods
4.1.b MITM
4.1.c Replay
4.1.d Spoofing
4.1.e Backdoor
4.1.f Botnets
4.1.g Wireless attacks
4.1.h DoS and DDoS attacks
4.1.i Virus and worm outbreaks
4.1.j Header attacks
4.1.k Tunneling attacks
4.2 Software and OS exploits
4.3 Security and attack tools
4.4 Generic network intrusion prevention concepts
4.5 Packet filtering
4.6 Content filtering and packet inspection
4.7 Endpoint and posture assessment
4.8 QoS marking attacks

5.0 Cisco Security Products, Features, and Management 20%
5.1 Cisco Adaptive Security Appliance (ASA)
5.1.a Firewall functionality
5.1.b Routing and multicast capabilities
5.1.c Firewall modes
5.1.d NAT (before and after version 8.4)
5.1.e Object definition and ACLs
5.1.f MPF functionality (IPS, QoS, and application awareness)
5.1.g Context-aware firewall
5.1.h Identity-based services
5.1.i Failover options
5.2 Cisco IOS firewalls and NAT
5.2.a CBAC
5.2.b Zone-based firewall
5.2.c Port-to-application mapping
5.2.d Identity-based firewalling
5.3 Cisco Intrusion Prevention Systems (IPS)
5.4 Cisco IOS IPS
5.5 Cisco AAA protocols and application
5.5.a RADIUS
5.5.b TACACS+
5.5.c Device administration
5.5.d Network access
5.5.e IEEE 802.1X
5.5.f VSAs
5.6 Cisco Identity Services Engine (ISE)
5.7 Cisco Secure ACS Solution Engine
5.8 Cisco Network Admission Control (NAC) Appliance Server
5.9 Endpoint and client
5.9.a Cisco AnyConnect VPN Client
5.9.b Cisco VPN Client
5.9.c Cisco Secure Desktop
5.9.d Cisco NAC Agent
5.10 Secure access gateways (Cisco IOS router or ASA)
5.10.a IPsec
5.10.b SSL VPN
5.10.c PKI
5.11 Virtual security gateway
5.12 Cisco Catalyst 6500 Series ASA Services Modules
5.13 ScanSafe functionality and components
5.14 Cisco Web Security Appliance and Cisco Email Security Appliance
5.15 Security management
5.15.a Cisco Security Manager
5.15.b Cisco Adaptive Security Device Manager (ASDM)
5.15.c Cisco IPS Device Manager (IDM)
5.15.d Cisco IPS Manager Express (IME)
5.15.e Cisco Configuration Professional
5.15.f Cisco Prime

6.0 Cisco Security Technologies and Solutions 17%
6.1 Router hardening features (for example, CoPP, MPP, uRPF, and PBR)
6.2 Switch security features (for example, anti-spoofing, port, STP, MACSEC, NDAC, and NEAT)
6.3 NetFlow
6.4 Wireless security
6.5 Network segregation
6.5.a VRF-aware technologies
6.5.b VXLAN
6.6 VPN solutions
6.6.a FlexVPN
6.6.b DMVPN
6.6.c GET VPN
6.6.d Cisco EasyVPN
6.7 Content and packet filtering
6.8 QoS application for security
6.9 Load balancing and failover

7.0 Security Policies and Procedures, Best Practices, and Standards 8%
7.1 Security policy elements
7.2 Information security standards (for example, ISO/IEC 27001 and ISO/IEC 27002)
7.3 Standards bodies (for example, ISO, IEC, ITU, ISOC, IETF, IAB, IANA, and ICANN)
7.4 Industry best practices (for example, SOX and PCI DSS)
7.5 Common RFC and BCP (for example, RFC2827/BCP38, RFC3704/BCP84, and RFC5735)
7.6 Security audit and validation
7.7 Risk assessment
7.8 Change management process
7.9 Incident response framework
7.10 Computer security forensics
7.11 Desktop security risk assessment and desktop security risk management




QUESTION 1
In order to reassemble IP fragments into a complete IP datagram, which three IP header fields are
referenced by the receiver? (Choose three.)

A. don't fragment flag
B. packet is fragmented flag
C. IP identification field
D. more fragment flag
E. number of fragments field
F. fragment offset field

Answer: C,D,F

Explanation:


QUESTION 2
Which VTP mode allows the Cisco Catalyst switch administrator to make changes to the VLAN
configuration that only affect the local switch and are not propagated to other switches in the VTP
domain?

A. transparent
B. server
C. client
D. local
E. pass-through

Answer: A

Explanation:


QUESTION 3
Which type of VPN is based on the concept of trusted group members using the GDOI key
management protocol?

A. DMVPN
B. SSLVPN
C. GETVPN
D. EzVPN
E. MPLS VPN
F. FlexVPN

Answer: C

Explanation:


QUESTION 4
Based on RFC 4890, what is the ICMP type and code that should never be dropped by the firewall
to allow PMTUD?

A. ICMPv6 Type 1 – Code 0 – no route to host
B. ICMPv6 Type 1 – Code 1 – communication with destination administratively prohibited
C. ICMPv6 Type 2 – Code 0 – packet too big
D. ICMPv6 Type 3 – Code 1 – fragment reassembly time exceeded
E. ICMPv6 Type 128 – Code 0 – echo request
F. ICMPv6 Type 129 – Code 0 – echo reply

Answer: C

Explanation:


QUESTION 5
A firewall rule that filters on the protocol field of an IP packet is acting on which layer of the OSI
reference model?

A. network layer
B. application layer
C. transport layer
D. session layer

Answer: A

Explanation:

Saturday, 16 May 2015

70-341: Core Solutions of Microsoft Exchange Server 2013

70-341: Core Solutions of Microsoft Exchange Server 2013
Published: 15 January 2013
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Microsoft Exchange Server 2013
Credit towards certification: MCP, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

From July 2014, the questions on this exam include content covering Microsoft Exchange Server 2013 Service Pack 1.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Plan, install, configure and manage transport (25%)

Plan a high availability solution for common scenarios

Set up redundancy for intra-site scenarios; plan for SafetyNet; plan for shadow redundancy; plan for redundant MX records

Design a transport solution

Design inter-site mail flow; design inter-org mail flow; plan for Domain Secure/TLS; design Edge transport; design message hygiene solutions; design shared namespace scenarios

Configure and manage transport

Configure Edge servers; configure Send/Receive connectors; configure transport rules; configure accepted domains; configure email policies; configure Address Rewriting

Troubleshoot and monitor transport

Interpret message tracking logs and protocol logs; troubleshoot a shared namespace environment; troubleshoot SMTP mail flow; given a failure scenario, predict mail flow and identify how to recover; troubleshoot Domain Secure/TLS; troubleshoot the new transport architecture

Configure and manage hygiene

Manage content filtering; manage recipient filtering; manage SenderID; manage connection filtering; manage Spam Confidence Level (SCL) thresholds; manage anti-malware

Preparation resources

Transport high availability
Use an Edge Transport Server in Exchange 2013
Hygiene management

Install, configure and manage the mailbox role (25%)

Plan the mailbox role

Plan for database size and storage performance requirements; plan for virtualisation requirements and scenarios; plan mailbox role capacity and placement; design public folder placement strategy; validate storage by running JetStress

Configure and manage the mailbox role

Create and configure Offline Address Book (OAB); create and configure public folders; deploy mailbox server roles; design and create hierarchical address lists

Deploy and manage high availability solutions for the mailbox role

Create and configure a Database Availability Group (DAG); identify failure domains; manage DAG networks; configure proper placement of a file share witness; manage mailbox database copies

Monitor and troubleshoot the mailbox role

Troubleshoot database replication and replay; troubleshoot database copy activation; troubleshoot mailbox role performance; troubleshoot database failures; monitor database replication and content indexing

Develop backup and recovery solutions for the mailbox role and public folders

Manage lagged copies; determine most appropriate backup solution/strategy; perform a dial tone restore; perform item-level recovery; recover the public folder hierarchy; recover a mailbox server role

Create and configure mail-enabled objects

Configure resource mailboxes and scheduling; configure team mailboxes; configure distribution lists; configure moderation; configure a linked mailbox

Manage mail-enabled object permissions

Configure mailbox folder permissions; configure mailbox permissions; set up room mailbox delegates; set up team mailbox membership; set up auto-mapping; determine when to use Send As and Send On Behalf permissions

Preparation resources

Mailbox server
Database availability groups
Perform a dial tone recovery

Plan, install, configure and manage client access (25%)

Plan, deploy and manage a Client Access Server (CAS)

Design to account for differences between legacy CAS and Exchange CAS/CAF; configure Office web application

Plan and configure namespaces and client services

Design namespaces for client connectivity; configure URLs; plan for certificates; configure authentication methods; implement auto-discover for a given namespace

Deploy and manage mobility solutions

Deploy OWA for Devices; configure OWA policies; configure mobile device mailbox policies; configure Allow Block Quarantine (ABQ); deploy and manage Office Apps

Implement load balancing

Configure namespace load balancing; configure Session Initiation Protocol (SIP) load balancing; plan for differences between layer seven and layer four load balancing methods; configure Windows Network Load Balancing (WNLB)

Troubleshoot client connectivity

Troubleshoot Outlook Anywhere connectivity; troubleshoot POP/IMAP; troubleshoot authentication; troubleshoot web services; troubleshoot AutoDiscover; troubleshoot mobile devices

Preparation resources

Client access server
Clients and mobile
Load balancing

Design and manage an Exchange infrastructure (25%)

Plan for impact of Exchange on Active Directory services

Plan the number of domain controllers; plan placement of Global Catalogue (GC); determine DNS changes required for Exchange; prepare domains for Exchange; evaluate impact of schema changes required for Exchange; plan around Active Directory site topology

Administer Exchange workload management

Configure user workload policies; configure system workload policies; monitor system workload events; monitor user workload events

Plan and manage Role Based Access Control (RBAC)

Determine appropriate RBAC roles and cmdlets; limit administration using existing role groups; evaluate differences between RBAC and Active Directory split permissions; configure a custom-scoped role group; configure delegated setup

Design an appropriate Exchange solution for a given SLA

Plan for updates; plan for change management; design a solution that meets SLA requirements around scheduled downtime; design a solution that meets SLA requirements around RPO/RTO; design a solution that meets SLA requirements around message delivery

Preparation resources

Prepare Active Directory and domains
Exchange workload management
Planning for role-based access control




QUESTION 1
You need to prepare the environment for the implementation of phase 1.
What changes must be made to the environment before you can install Exchange Server 2013?

A. The operating system or service pack level of TexDC1 needs to be upgraded.
B. The Windows 2008 R2 domain controllers in Washington and Boston need to be upgraded.
C. A server running Exchange Server 2007 or Exchange Server 2010 needs to be installed in
Texas.
D. The PDC emulator role needs to be transferred to a domain controller in Washington or Boston.

Answer: A

Explanation:


QUESTION 2
You are evaluating whether the proposed Exchange solution will meet the current and future
capacity requirements.
You want to gather statistics about the current Exchange environment.
Which of the following tools would you use to determine the number of emails sent to and received
by the current users?

A. Remote Server Administration Tools.
B. Microsoft Exchange Server Profile Analyzer.
C. Microsoft Exchange Server Deployment Assistant.
D. ESEUtil.exe.
E. Microsoft Exchange Server Jetstress.

Answer: B

Explanation:


QUESTION 3
You need to apply the required size restriction to the mailboxes in the new environment.
Which of the following commands should you run?

A. Get-MailboxDatabase | Set-MailboxDatabase –ProhibitSendReceiveQuota
B. Get-MailboxDatabase | Set-Mailbox –ProhibitSendReceiveQuota
C. Get-Mailbox | Set-Mailbox –ProhibitSendReceiveQuota
D. Get-MailboxDatabase | Get-Mailbox | Set-Mailbox –ProhibitSendReceiveQuota

Answer: A

Explanation:


QUESTION 4
You are evaluating whether the proposed Exchange solution will meet the current and future
capacity requirements.
You want to gather statistics about the current Exchange environment.
Which of the following tools would you use to determine the number of IOPS (Input/Output
Operations Per Second) required for the mailbox database storage?

A. ESEUtil.exe.
B. Microsoft Exchange Server Jetstress.
C. Microsoft Exchange Server Deployment Assistant.
D. Exchange Mailbox Server Role Requirements Calculator.
E. SQL Server Analysis Services.

Answer: D

Explanation:


QUESTION 5
You need to install and configure anti-spam and antimalware filtering.
Which servers should you install the anti-spam agents and enable the anti-spam and antimalware
filtering? (Choose two).

A. You should install the anti-spam agents on the Client Access Servers only.
B. You should install the anti-spam agents on the Mailbox serversonly.
C. You should install the anti-spam agents on the Client Access Servers and the Mailbox Servers.
D. You should enable antimalware filtering on the Client Access Serversonly.
E. You should enable antimalware filtering on the Mailbox serversonly.
F. You enable antimalware filtering on the Client Access Servers and the Mailbox Servers.

Answer: B,E

Explanation: