Thursday, 28 April 2016

300-465 CLDDES Designing the Cisco Cloud

Exam Number 300-465 CLDDES
Associated Certifications CCNP Cloud
Duration 90 Minutes (55 - 65 questions)
Available Languages English
Register Pearson VUE
Exam Policies Read current policies and requirements
Exam Tutorial Review type of exam questions

Exam Description
The 300-465 (CLDDES) Designing the Cisco Cloud is a 90-minute, 55-65 question assessment that is associated with the CCNP Cloud Certification. This exam tests a candidate's knowledge and ability to: translate requirements into cloud/automation process designs; design Private Cloud infrastructures; design Public Cloud infrastructures, design Cloud Security Policies; and design Virtualization and Virtual Network Services. Candidates can prepare for this assessment by taking the Designing the Cisco Cloud (CLDDES v1.0) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Translate Requirements into Automation Designs 22%

1.1 Gather business requirements

1.1.a Identify key business requirements for cloud/automation
1.1.b Choose appropriate cloud implementation to meet business requirements

1.2 Describe automation as a foundation of cloud design

1.3 Design appropriate automation tasks to meet requirements

1.3.a Design infrastructure container automation within UCS Director
1.3.b Design catalog
1.3.c Define infrastructure container
1.3.d Design workflow and services

1.4 Design Prime Services Catalog store front for UCS Director

1.5 Design Application and Platform as a Service using Stack Designer

1.6 Select the appropriate solution to automate private or hybrid clouds

1.6.a Cisco Enablement Platform
1.6.b UCS Director
1.6.c Cisco Intelligent Automation for Cloud (CIAC)

2.0 Design a Private Cloud Infrastructure 22%

2.1 Compare and contrast the various private cloud integrated infrastructures

2.1.a Flexpod
2.1.b VBlock
2.1.c Virtual System Specifications (VSPEX)

2.2 Given a set of requirements, determine when to use file or block storage

2.3 Select the methods of accessing storage

2.3.a Determine connectivity types
2.3.b Determine access rights

2.4 Determine the thin/thick provisioning methods for a given environment

2.5 Determine the appropriate methods of interconnecting private clouds

2.6 Determine when to use the appropriate solution to automate network services

3.0 Design a Hybrid Cloud Infrastructure 16%

3.1 Compare and contrast the various public cloud architectures

3.2 Select the methodology to connect to public clouds

3.3 Select the appropriate solution to automate hybrid cloud provisioning

4.0 Design a Cloud Security Policy 20%

4.1 Describe best practices for securing cloud infrastructure

4.2 Describe best practices for securing cloud services

4.3 Design a secure multi tenant environment

4.4 Design a security policy to protect a private cloud

4.5 Design a security policy to protect a hybrid cloud

5.0 Virtualization and Virtual Network Services for Private and Hybrid Clouds 20%

5.1 Describe the advantages, disadvantages and features of different hypervisors

5.1.a Resource scheduling
5.1.b DR
5.1.c HA

5.2 Describe the use of cloud automation tools to facilitate physical to virtual or virtual to virtual migrations

5.2.a Workflows
5.2.a.1 Cisco Enablement Platform
5.2.a.2 UCS Director
5.2.a.3 Virtual Application Container Services (VACS)
5.2.b Compare benefits and limitation of Virtual Machines

5.3 Select the appropriate virtual network and security services to meet requirements

5.4 Describe context aware infrastructure and workflow identity

5.4.a Methodologies
5.4.b Components
5.4.c Use cases

5.5 Describe workload mobility

5.5.a Describe VM migration: move VMs from any hypervisor to any public cloud and back
5.5.b Describe VM conversion
5.5.c Describe use cases

5.6 Describe the ability to automate VM life cycle

5.6.a Describe workflow creation using Intercloud Fabric Director and Prime Services Catalog


Monday, 18 April 2016

300-208 SISAS Implementing Cisco Secure Access Solutions

Exam Number 300-208 SISAS
Associated Certifications CCNP Security
Duration 90 minutes (65 - 75 questions)
Available Languages English, Japanese

Exam Description
The Implementing Cisco Secure Access Solutions (SISAS) (300-208) exam tests whether a network security engineer knows the components and architecture of secure access, by utilizing 802.1X and Cisco TrustSec. This 90-minute exam consists of 65–75 questions and assesses knowledge of Cisco Identity Services Engine (ISE) architecture, solution, and components as an overall network threat mitigation and endpoint control solutions. It also includes the fundamental concepts of bring your own device (BYOD) using posture and profiling services of ISE. Candidates can prepare for this exam by taking the Implementing Cisco Secure Access Solutions (SISAS) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Identity Management/Secure Access 33%
1.1 Implement device administration

1.1.a Compare and select AAA options
1.1.b TACACS+
1.1.c RADIUS
1.1.d Describe Native AD and LDAP

1.2 Describe identity management
1.2.a Describe features and functionality of authentication and authorization
1.2.b Describe identity store options (i.e., LDAP, AD, PKI, OTP, Smart Card, local)
1.2.c Implement accounting

1.3 Implement wired/wireless 802.1X
1.3.a Describe RADIUS flows
1.3.b AV pairs
1.3.c EAP types
1.3.d Describe supplicant, authenticator, and server
1.3.e Supplicant options
1.3.f 802.1X phasing (monitor mode, low impact, closed mode)
1.3.g AAA server
1.3.h Network access devices

1.4 Implement MAB
1.4.a Describe the MAB process within an 802.1X framework
1.4.b Flexible authentication configuration
1.4.c ISE authentication/authorization policies
1.4.d ISE endpoint identity configuration
1.4.e Verify MAB Operation

1.5 Implement network authorization enforcement
1.5.a dACL
1.5.b Dynamic VLAN assignment
1.5.c Describe SGA
1.5.d Named ACL
1.5.e CoA

1.6 Implement Central Web Authentication (CWA)
1.6.a Describe the function of CoA to support web authentication
1.6.b Configure authentication policy to facilitate CWA
1.6.c URL redirect policy
1.6.d Redirect ACL
1.6.e Customize web portal
1.6.f Verify central web authentication operation

1.7 Implement profiling
1.7.a Enable the profiling services
1.7.b Network probes
1.7.c IOS Device Sensor
1.7.d Feed service
1.7.e Profiling policy rules
1.7.f Utilize profile assignment in authorization policies
1.7.g Verify profiling operation

1.8 Implement guest services
1.8.a Managing sponsor accounts
1.8.b Sponsor portals
1.8.c Guest portals
1.8.d Guest Policies
1.8.e Self registration
1.8.f Guest activation
1.8.g Differentiated secure access
1.8.h Verify guest services operation

1.9 Implement posture services
1.9.a Describe the function of CoA to support posture services
1.9.b Agent options
1.9.c Client provisioning policy and redirect ACL
1.9.d Posture policy
1.9.e Quarantine/remediation
1.9.f Verify posture service operation

1.10 Implement BYOD access
1.10.a Describe elements of a BYOD policy
1.10.b Device registration
1.10.c My devices portal
1.10.d Describe supplicant provisioning

2.0 Threat Defense 10%
2.1 Describe TrustSec Architecture
2.1.a SGT Classification - dynamic/static
2.1.b SGT Transport - inline tagging and SXP
2.1.c SGT Enforcement - SGACL and SGFW
2.1.d MACsec

3.0 Troubleshooting, Monitoring and Reporting Tools 7%

3.1 Troubleshoot identity management solutions

3.1.a Identify issues using authentication event details in Cisco ISE
3.1.b Troubleshoot using Cisco ISE diagnostic tools
3.1.c Troubleshoot endpoint issues
3.1.d Use debug commands to troubleshoot RADIUS and 802.1X on IOS switches and wireless controllers
3.1.e Troubleshoot backup operations

4.0 Threat Defense Architectures 17%

4.1 Design highly secure wireless solution with ISE

4.1.a Identity Management
4.1.b 802.1X
4.1.c MAB
4.1.d Network authorization enforcement
4.1.e CWA
4.1.f Profiling
4.1.g Guest Services
4.1.h Posture Services
4.1.i BYOD Access

5.0 Identity Management Architectures 33%

5.1 Device administration
5.2 Identity Management
5.3 Profiling
5.4 Guest Services
5.5 Posturing Services
5.6 BYOD Access

QUESTION 1
With which two appliance-based products can Cisco Prime Infrastructure integrate to perform centralized management? (Choose two.)

A. Cisco Managed Services Engine
B. Cisco Email Security Appliance
C. Cisco Wireless Location Appliance
D. Cisco Content Security Appliance
E. Cisco ISE

Answer: A,E


QUESTION 2
Which two fields are characteristics of IEEE 802.1AE frame? (Choose two.)

A. destination MAC address
B. source MAC address
C. 802.1AE header in EtherType
D. security group tag in EtherType
E. integrity check value
F. CRC/FCS

Answer: C,E


QUESTION 3
Which three statements about the Cisco wireless IPS solution are true? (Choose three.)

A. It enables stations to remain in power-save mode, except at specified intervals to receive data from the access point.
B. It detects spoofed MAC addresses.
C. It identifies potential RF jamming attacks.
D. It protects against frame and device spoofing.
E. It allows the WLC to failover because of congestion.

Answer: B,C,D


QUESTION 4
In AAA, what function does authentication perform?

A. It identifies the actions that the user can perform on the device.
B. It identifies the user who is trying to access a device.
C. It identifies the actions that a user has previously taken.
D. It identifies what the user can access.

Answer: B


QUESTION 5
Which two EAP types require server side certificates? (Choose two.)

A. EAP-TLS
B. PEAP
C. EAP-MD5
D. LEAP
E. EAP-FAST
F. MSCHAPv2

Answer: A,B

Tuesday, 12 April 2016

Exam Ref 70-398 Planning for and Managing Devices in the Enterprise

Prepare for Microsoft Exam 70-398—and help demonstrate your real-world mastery of planning and designing cloud and hybrid identities and supporting identity infrastructure for managing devices. Designed for experienced IT pros ready to advance their status, this Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Specialist level.

Focus on the skills measured on the exam:
• Design for cloud/hybrid identity
• Design for device access and protection
• Design for data access and protection
• Design for remote access
• Plan for apps
• Plan updates and recovery

This Microsoft Exam Ref:
• Organizes its coverage by skill measured on the exam
• Features Thought Experiments to help you assess your readiness for the exam
• Assumes you have experience with desktop and device administration, Windows networking technologies, Active Directory, and Microsoft Intune

About This Course
This course is intended to be a quick-paced introduction to the key concepts and components that make up the management of Windows 10 devices using Enterprise Mobility Suite (EMS) which includes Microsoft Azure AD Premium, Azure Rights Management Services (or RMS), and Microsoft Intune. The majority of your time will be spent working directly with the products inside a preconfigured lab environment. And, although we have provided overview information for each of the technologies and pointers to additional resources should you want to know more, we believe you will gain a better understanding of the workings of device management through seeing and doing… hands on.

You will work your way through the online labs to become familiar with:

Implementing Hybrid Identity
Managing an Active Directory Hybrid Environment
Managing Inventory
Preparing the Microsoft Intune Service for Device Enrollment
Data access and protection using Azure RMS

Each lab includes the following:
Procedures for the individual lab tasks for each exercise
Access to a Windows 10 and Windows Server 2012 R2 Domain Controller for performing “hands-on” lab exercises
Short “how-to” videos for viewing each and every task should you get stuck and need to see how it’s done, and get moving again

The point is... you can try the labs on your own, at your own pace, but we recommend you view the individual demo videos for those times when you might need a little bit of help, for example entering a command string, or navigating across the Azure and Intune UI. What’s probably not a bad idea is to do a quick scan of the demos to familiarize yourself with the lab content prior to working hands-on… it’s your call, whatever works for you.

To give you an idea of how these labs work let’s look at one of the first labs entitled Automatic Microsoft Intune Enrollment of Azure AD Joined Windows 10 Systems… in that lab you get started using a Windows 10 virtual machine to setup and enable Azure AD and Enterprise Mobility Suite and then do some client join activities to Azure AD. So, once you’ve completed the lab, you’ll be able to:

Create an Azure AD instance
Activate an Enterprise Mobility Suite trial
Configure automatic Microsoft Intune enrollment during Azure AD join
Configure device join options in Azure AD
Configure Microsoft Intune subscription as the Mobile Device Management Authority
Join a Windows 10 client computer to Azure AD
Verify that a Windows 10 client is managed by Microsoft Intune

Prerequisites
This course is intended for IT professionals who administer and support Windows 7, 8.x, and 10 PCs, devices, users and associated network and security resources. The networks with which these professionals typically work are configured as a Windows Server domain-based environment with managed access to the Internet and cloud services. They are also skilled in working with iOS and Android devices.

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Design for cloud/hybrid identity (15–20%)
Plan for Azure Active Directory (AD) identities
Design Azure AD identities; Active Directory integration; Azure Multi-Factor Authentication; user self-service from the Azure Access Panel; Azure AD reporting; company branding; design Azure AD Premium features, such as Cloud App discovery, group-based application access, self-service group management, advanced security reporting, and password reset with write-back
Design for Active Directory synchronization with Azure AD Connect
Design single sign-on, Active Directory Integration scenarios, and Active Directory synchronization tools; plan for Azure AD Synchronization Services; design for Connect Health

Design for device access and protection (15–20%)
Plan for device enrollment
Design device inventory, mobile device management authority, device management prerequisites, and device enrollment profiles
Plan for the Company Portal
Customize the Company Portal and company terms and conditions; design configuration policies, compliance policies, conditional access policies, Exchange ActiveSync policies, and policy conflicts
Plan protection for data on devices
Design for protection of data in email and SharePoint when accessing them from mobile devices, design for protection of data of applications by using encryption, design for full and selective wipes

Design for data access and protection (15–20%)
Plan shared resources
Design for file and disk encryption and BitLocker encryption; design for the Network Unlock feature; configure BitLocker policies; design for the Encrypting File System (EFS) recovery agent; manage EFS and BitLocker certificates, including backup and restore
Plan advanced audit policies
Design for auditing using Group Policy and AuditPol.exe, create expression-based audit policies, design for removable device audit policies
Plan for file and folder access
Design for Windows Server Dynamic Access Control, Web Application Proxy, and Azure Rights Management service (RMS)

Design for remote access (15–20%)

Plan for remote connectivity
Design remote authentication, configure Remote Desktop settings, design VPN connections and authentication, enable VPN reconnect, configure broadband tethering
Plan for mobility options
Design for offline file policies, power policies, Windows to Go, sync options, and Wi-Fi direct

Plan for apps (15–20%)
Manage RemoteApp
Design RemoteApp and Desktop Connections settings, configure Group Policy Objects (GPOs) for signed packages, subscribe to the Azure RemoteApp and Desktop Connections feeds, export and import Azure RemoteApp configurations, support iOS and Android, configure Remote Desktop Web Access for Azure RemoteApp distribution
Plan app support and compatibility
Design for desktop app compatibility using Application Compatibility Toolkit (ACT), including shims and compatibility database; design desktop application co-existence using Hyper-V, Azure RemoteApp, and App-V; install and configure User Experience Virtualization (UE-V); plan for desktop apps using Microsoft Intune

Plan updates and recovery (15–20%)

Plan for system recovery
Design for the recovery drive, system restore, refresh or recycle, driver rollback, and restore points
Plan file recovery
Design for previous versions of files and folders, design File History, recover files from OneDrive
Plan device updates
Design update settings and Windows Update policies, manage update history, roll back updates, design for Windows Store apps updates

Monday, 4 April 2016

Exam Prep: 70-341 and 70-342 - MCSE: Messaging (Microsoft Exchange Server 2013)

Exam Prep: 70-341 and 70-342 - MCSE: Messaging (Microsoft Exchange Server 2013)

This Exam Prep session is designed for people experienced with Exchange Server 2013 and who are interested in taking the 70-341 (Core Solutions of Microsoft Exchange Server 2013) and 70-342 (Advanced Solutions of Microsoft Exchange Server 2013) exams. These exams are required for the new MCSE: Messaging certification. Attendees of this session can expect to review the topics covered in these exams in a fast-paced format, as well as receive some valuable test taking techniques. Attendees will leave with an understanding of how Microsoft certification works, the key topics covered in the exams, and an exhaustive look at resources for getting ready for the exam. The session is led by a Microsoft Certified Trainer (MCT), experienced in delivering sessions on these topics.

New book: Exam Ref 70-342 Advanced Solutions of Microsoft Exchange Server 2013
Prepare for Microsoft Exam 70-342—and demonstrate your real-world mastery of advanced Microsoft Exchange Server 2013 solution design, configuration, implementation, management, and support. Designed for experienced IT professionals ready to advance, Exam Ref focuses on critical-thinking and decision-making acumen needed for success at the MCSE level.

Focus on the expertise measured by these objectives:
· Configure, manage, and migrate Unified Messaging
· Design, configure, and manage site resiliency
· Design, configure, and manage advanced security
· Configure and manage compliance, archiving, and discovery solutions
· Implement and manage coexistence, hybrid scenarios, migration, and federation

This Microsoft Exam Ref:
· Organizes its coverage by exam objectives
· Features strategic, what-if scenarios to challenge you
· Provides exam preparation tips written by two Exchange Server MVPs
· Assumes you have at least three years of experience managing Exchange Servers and have responsibilities for an enterprise Exchange messaging environment

Skills measured

This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.
Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.
If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Starting July 2014, the questions on this exam include content covering Microsoft Exchange Server 2013 Service Pack 1.

Configure, manage, and migrate Unified Messaging (20%)
Configure Unified Messaging (UM)
Configure an IP gateway; configure a UM call router; create and configure an auto attendant; configure a call answering rule; design UM for high availability; create a dial plan
Manage Unified Messaging
Assign a dial plan to a user; move users between dial plans; enable and disable UM features for a user; set up protected voice mail; configure UM mailbox policy; manage UM language packs
Troubleshoot Unified Messaging
Troubleshoot and configure Mutual Transport Layer Security (MTLS); monitor calls and call statistics; troubleshoot and configure Quality of Service (QoS); troubleshoot SIP communication
Migrate Unified Messaging
Prepare to migrate; plan a migration strategy; plan a coexistence strategy; move UM mailboxes between sites; redirect the SIP gateway to Exchange; decommission the legacy system

Preparation resources
Deploy Exchange 2013 UM
Exchange Server 2013 and Unified Messaging - Part 1 - deploying and configuring
UM reports procedures

Design, configure, and manage site resiliency (22%)

Manage a site-resilient Database Availability Group (DAG)
Plan and implement Datacenter Activation Coordination (DAC); given customer node requirements, recommend quorum options; plan cross-site DAG configuration; configure DAG networks
Design, deploy, and manage a site-resilient CAS solution
Plan site-resilient namespaces; configure site-resilient namespace URLs; perform steps for site *over; plan certificate requirements for site failovers; predict client behavior during a *over
Design, deploy, and manage site resilience for transport
Configure MX records for failover scenarios; manage resubmission and reroute queues; plan and configure Send/Receive connectors for site resiliency; perform steps for transport *over
Troubleshoot site-resiliency issues
Resolve quorum issues; troubleshoot proxy redirection issues; troubleshoot client connectivity; troubleshoot mail flow; troubleshoot data center activation; troubleshoot DAG replication

Preparation resources
Microsoft Exchange Server 2013: Managing high availability and site resilience
Planning for high availability and site resilience
Database availability groups

Design, configure, and manage advanced security (21%)
Select an appropriate security strategy
Evaluate role-based access control (RBAC); evaluate BitLocker; evaluate smart cards; evaluate Information Rights Management (IRM); evaluate S/MIME; evaluate Domain Secure/TLS
Deploy and manage IRM with Active Directory Rights Management Services (AD RMS)
Create an AD RMS template; create transport protection rules; create Outlook protection rules; configure transport decryption; configure IRM for discovery; configure pre-licensing for client access
Configure and interpret mailbox and administrative auditing
Configure mailbox audit logging; configure administrative audit logging; configure mailbox access logging; interpret all audit logs
Troubleshoot security-related issues
Determine certificate validity; ensure proper Certificate Revocation List (CRL) access and placement; ensure private key availability; troubleshoot failed IRM protection; troubleshoot RBAC

Preparation resources
Information Rights Management
Mailbox audit logging

Configure and manage compliance, archiving, and discovery solutions (20%)
Configure and manage an archiving solution
Set up online archiving (Office 365); create archive policies; set up on-premises archiving; plan storage for an archiving solution
Design and configure Data Loss Prevention (DLP) solutions
Set up pre-built rules; set up custom rules; design a DLP solution to meet business requirements; set up custom policies
Configure and administer Message Records Management (MRM)
Design retention policies; configure retention policies; create and configure custom tags; assign policies to users; configure the Managed Folder Assistant; remove and delete tags
Perform eDiscovery
Plan and delegate RBAC roles for eDiscovery; enable a legal/litigation hold; perform a query-based InPlace hold; design and configure journaling; perform multi-mailbox searches in Exchange Administration Center (EAC); evaluate how to integrate InPlace federated searches with Microsoft SharePoint
Implement a compliance solution
Design and configure transport rules for ethical walls; configure MailTips; create, configure, and deploy message classifications; design and configure transport rules to meet specified compliance requirements

Preparation resources

Exchange Server 2013: Archive with elegance
Microsoft Exchange Server 2013 data loss prevention
Messaging records management

Implement and manage coexistence, hybrid scenarios, migration, and federation (18%)
Establish coexistence with Exchange Online
Deploy and manage hybrid configuration; evaluate limitations of the Hybrid Configuration Wizard; configure requirements for single sign-on (SSO); design and configure Active Directory Federation Services (ADFS)
Deploy and manage Exchange federation
Manage federation trusts with Microsoft federation gateways; manage hybrid deployment OAuth-based authentication; manage sharing policies; design certificate and firewall requirements; manage organization relationships
Implement on-premises coexistence with legacy systems
Plan namespaces for coexistence; configure proxy redirect; plan firewall configuration for coexistence; plan for mail flow requirements
Set up a cross-forest coexistence solution
Set up cross-forest availability; design certificate and firewall requirements; set up cross-forest mail flow; design and configure AutoDiscover; set up shared namespaces
Migrate legacy systems
Determine transition paths to Exchange; migrate public folders; migrate mailboxes; upgrade policies; plan to account for discontinued features; transition and decommission server roles
Troubleshoot issues associated with hybrid scenarios, coexistence, migration, and federation
Troubleshoot transport; troubleshoot Exchange federation trust and organization relationships; troubleshoot client access; troubleshoot SSO/AD FS; troubleshoot DirSync; troubleshoot cross-forest availability

Preparation resources
Exchange Server 2013 hybrid deployments
Configure the Availability service for cross-forest topologies
Public Folder procedures