Wednesday, 20 July 2016

Exam 70-494 Recertification for MCSD: Web Applications

Published: August 1, 2014
Languages: English, Japanese
Audiences: Developers
Technology: ASP.NET MVC
Credit toward certification: MCP, MCSD

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Design the application architecture
Plan the application layers
Plan data access; plan for separation of concerns; appropriate use of models, views, and controllers; choose between client-side and server side processing; design for scalability
Design a distributed application
Design a hybrid application (on-premises versus off-premises, including Azure), plan for session management in a distributed environment, plan web farms
Design and implement the Azure role life cycle
Identify and implement Start, Run, and Stop events; identify startup tasks (IIS configuration [app pool], registry configuration, third-party tools)
Configure state management
Choose a state management mechanism (in-process and out of process state management), plan for scalability, use cookies or local storage to maintain state, apply configuration settings in web.config file, implement sessionless state (for example, QueryString)
Design a caching strategy
Implement page output caching (performance oriented), implement data caching, implement HTTP caching, implement Azure caching
Design and implement a WebSocket strategy
Read and write string and binary data asynchronously (long-running data transfers), choose a connection loss strategy, decide a strategy for when to use WebSockets, implement SignalR

Design and develop the user experience
Plan an adaptive UI layout
Plan for running applications in browsers on multiple devices (screen resolution, CSS, HTML), plan for mobile web applications
Design and implement MVC controllers and actions
Apply authorization attributes, global filters, and authentication filters; specify an override filter; implement action behaviors; implement action results; implement model binding

Troubleshoot and debug web applications
Test a web application
Create and run unit tests (for example, use the Assert class), create mocks; create and run web tests, including using Browser Link; debug a web application in multiple browsers and mobile emulators
Debug an Azure application
Collect diagnostic information by using Azure Diagnostics API and appropriately implement on demand versus scheduled; choose log types (for example, event logs, performance counters, and crash dumps); debug an Azure application by using IntelliTrace, Remote Desktop Protocol (RDP), and remote debugging; interact directly with remote Azure websites using Server Explorer

Design and implement security
Configure authentication
Authenticate users; enforce authentication settings; choose between Windows, Forms, and custom authentication; manage user session by using cookies; configure membership providers; create custom membership providers; configure ASP.NET Identity
Configure and apply authorization
Create roles, authorize roles by using configuration, authorize roles programmatically, create custom role providers, implement WCF service authorization
Design and implement claims-based authentication across federated identity stores
Implement federated authentication by using Azure Access Control Service; create a custom security token by using Windows Identity Foundation; handle token formats (for example, oAuth, OpenID, Microsoft Account, Google, Twitter, and Facebook) for SAML and SWT tokens

Accessing data
Choose data access technologies
Choose a technology (ADO.NET, Entity Framework, WCF Data Services, Azure storage) based on application requirements

Querying and manipulating data by using Entity Framework
Query and manipulate data by using the Entity Framework
Query, update, and delete data by using DbContext; build a query that uses deferred execution; implement lazy loading and eager loading; create and run compiled queries; query data by using Entity SQL; perform asynchronous operations using Entity Framework; map a stored procedure
Query and manipulate data by using Data Provider for Entity Framework
Query and manipulate data by using Connection, DataReader, and Command from the System.Data.EntityClient namespace; perform synchronous and asynchronous operations; manage transactions (API); programmatically configure a Data Provider
Query data by using LINQ to Entities
Query data by using LINQ operators (for example, project, skip, aggregate, filter, and join); log queries and database commands; implement query boundaries (IQueryable vs. IEnumerable); implement async query
Create an Entity Framework data model
Structure the data model using table per type, table per class, table per hierarchy; choose and implement an approach to manage a data model (code first vs. model first vs. database first); implement POCO objects; describe a data model by using conceptual schema definitions, storage schema definition, mapping language (CSDL, SSDL, MSL), and Custom Code First Conventions

Designing and implementing WCF Services
Configure WCF services by using configuration settings
Configure service behaviors; configure service endpoints; configure bindings including WebSocket bindings; specify a service contract; expose service metadata (XSDs, WSDL, and metadata exchange endpoint); configure message compression and encoding
Secure a WCF service
Implement message level security, implement transport level security; implement certificates; design and implement multiple authentication modes

Creating and consuming Web API-based services
Design a Web API
Define HTTP resources with HTTP actions; plan appropriate URI space, and map URI space using routing; choose appropriate HTTP method (get, put, post, delete) to meet requirements; choose appropriate format (Web API formats) for responses to meet requirements; plan when to make HTTP actions asynchronous; design and implement routes
Implement a Web API
Accept data in JSON format (in JavaScript, in an AJAX callback); use content negotiation to deliver different data formats to clients; define actions and parameters to handle data binding; use HttpMessageHandler to process client requests and server responses; implement dependency injection, along with the dependency resolver, to create more flexible applications; implement action filters and exception filters to manage controller execution; implement asynchronous and synchronous actions; implement streaming actions; implement SignalR; test Web API web services
Secure a Web API
Implement HTTPBasic authentication over SSL; implement Windows Auth; prevent cross-site request forgery (XSRF); design, implement, and extend authorization and authentication filters to control access to the application; implement Cross Origin Request Sharing (CORS); implement SSO by using OAuth 2.0; configure multiple authentication modes on a single endpoint
Host and manage Web API
Host Web API in an ASP.NET app; self-host a Web API in your own process (a Windows service) including Open Web Interface for .NET (OWIN); host services in an Azure worker role; restrict message size; configure the host server for streaming
Consume Web API web services
Consume Web API services by using HttpClient synchronously and asynchronously; send and receive requests in different formats (JSON/HTML/etc.); request batching

Deploying web applications and services
Choose a deployment strategy for an Azure web application
Perform an in-place upgrade and VIP swap; configure an upgrade domain; create and configure input and internal endpoints; specify operating system configuration; deploy applications using Azure Web Site
Configure a web application for deployment
Switch from production/release mode to debug mode; use SetParameters to set up an IIS app pool; set permissions and passwords; enable and monitor ASP.NET App Suspend; configure WCF endpoints (including HTTPS protocol mapping), bindings, and behaviors; transform web.config by using XSLT (for example, across development, test, and production/release environments); configure Azure configuration settings
Create, configure, and publish a web package
Create an IIS InstallPackage; configure the build process to output a web package; apply pre- and post- condition actions to ensure that transformations are correctly applied; include appropriate assets (web content, certificates)
Share assemblies between multiple applications and servers
Prepare the environment for use of assemblies across multiple servers (interning); sign assemblies by using a strong name; deploy assemblies to the global assembly cache; implement assembly versioning; create an assembly manifest; configure assembly binding redirects (for example, from MVC4 to MVC5)
QUESTION 1
You need to choose the appropriate data access strategy for the college textbook area of the web application.
Which data access technology should you implement?

A. WCF Data Services
B. ADO.NET
C. Entity Data Model (EDM)
D. LINQ to SQL

Answer: D


QUESTION 2
You need to choose the appropriate data access technology for the children's book area of the web application.
Which data access technology should you choose?

A. ADO.NET Entity Framework
B. Web Service
C. LINQ to SQL
D. WCF Data Services

Answer: A

QUESTION 3
You are developing an ASP.NET MVC application that is secured using SSL. You are ready to deploy the application to production.
The deployment package must include the installation of the SSL certificate.
You need to configure the deployment package to meet the requirement.
What should you do?

A. In the Package/Publish settings of the project, select the All Files in this project folder option.
B. In the Build Events settings of the project, configure a pre-build event to include the SSL certificate.
C. Create a web publish pipeline target file with a custom web deploy target.
D. In the Signing dialog box, choose Sign the assembly and select the appropriate entry from the Choose a strong name key file list.

Answer: C


QUESTION 4
You need to choose the appropriate data access technology for the cookbook area of the web application. Which data access technology should you choose?

A. Entity Framework
B. ADO.NET
C. LINQ to SQL
D. WCF Data Services

Answer: D

Tuesday, 19 July 2016

600-511 NPDESACI Designing with Cisco Network Programmability for ACI

Exam Number 600-511 NPDESACI
Last day to test: November 20, 2016
Associated Certifications Cisco Network Programmability Design Specialist
Duration 90 Minutes (55 - 65 questions)
Available Languages English
Register Pearson VUE

This exam tests a candidate's ability to use network applications expertise to translate customer requirements into a policy-based, application centric network infrastructure.

The Designing with Cisco ACI Network Programmability (600-511) exam is a 90- minute (1.5 hours) exam with 55-65 questions. This exam tests a candidate's ability to use network applications expertise to translate customer requirements into a policy-based, application-centric network infrastructure.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Understanding Business Requirements 24%

1.1 Gathering business requirements

1.1.a Understand business requirements
1.1.b Understand current infrastructure
1.1.c Understand who the vested parties are and how they define policy and application
1.1.d Document existing application interaction

1.2 Risk and Impact Analysis

1.2.a Take the requirements and perform a risk assessment and impact analysis to narrow down the possible design choices

1.3 Ongoing communications to finalize the business requirements

1.3.a Identify the design choice that meets the business, risk, and customer requirements

2.0 Translating Business Requirements Into Technical Requirements 19%

2.1 Mapping of business requirements

2.1.a Map existing applications to Cisco ACI constructs
2.1.b Map existing network services to Cisco ACI Fabric
2.1.c Create application network profiles that map to the business requirements
2.1.d Identify which applications can expect to see improvements in the areas of performance, security/compliance, visibility, and speed of service delivery
2.1.e Determine methods of representing the improvements expected – quantitative metrics and qualitative metrics

2.2 Perform software modeling and analysis

2.2.a Identify tools that can be used to build application network profiles
2.2.b Identify best practices for building application network profiles for legacy applications
2.2.c Identify best practices for building application network profiles for greenfield applications

2.3 Perform network modeling and analysis (capacity and performance)

2.3.a Analyze the current infrastructure inventory and capacity to meet the requirements
2.3.b Assess the delta between the requirements and the current infrastructure to implement the application

2.4 Translating service level agreements (SLAs) and operational level agreements (OLAs) into technical requirements

2.4.a Plan or design to account for business interruption of various lengths or scopes

3.0 Positioning Application Centric Infrastructure Value Proposition 29%

3.1 Policy based infrastructure management

3.1.a Identify opportunities to automate tasks that are manual today
3.1.b Identify architectural bottlenecks in the current infrastructure that are roadblocks in introducing programmability and automation
3.1.c Is there uniformity in policy across the entire infrastructure or are there policy silos and policy gaps?
3.1.d Describe programming model and APIs available to automate network functions required to deploy applications

3.2 Enhance visibility and control

3.2.a Identify lack of comprehensive visibility and control over resource allocation for applications today and highlight how Cisco ACI can address this limitation
3.2.b Identify number of points of management to see if Cisco ACI can reduce the number to dramatically bring in value addition
3.2.c Identify application performance features that increase scalability or provide optimal traffic steering
3.2.d Describe available tools to provide comprehensive application-level visibility

3.3 Security and compliance

3.3.a Identify any compliance and auditing requirements and highlight key security features of Cisco Application Centric Infrastructure (policy-based forwarding, auditing, forensics across physical and virtual devices)

4.0 Define High-Level System Architecture 28%

4.1 Software architecture and design

4.1.a Take a set of software requirements or details about a solution and generate (identify, pick, choose) a design document (class hierarchy, object model, Entity Relationship (ER) diagram)

4.2 Infrastructure architecture and design (physical and virtual)

4.2.a Take a set of infrastructure requirements or details about a solution and generate (identify, pick, choose) a design document (configuration or design change)

4.3 Identify different integration/interoperability points between different systems

4.3.a Understand the differences (compare and contrast) between different integration interfaces (knows what to use when and why)

4.4 Migrate existing network to Cisco ACI


QUESTION 1
Which two benefits are achieved through database sharding within the Cisco APIC cluster?
(Choose two.)

A. active-standby high availability
B. scalability
C. compression
D. reliability
E. load balancing

Answer: B,D

Explanation:


QUESTION 2
Which overlay protocol does Cisco AVS for vSphere use to allow the ACI fabric to extend over an
existing network infrastructure?

A. GRE
B. IPsec
C. NVGRE
D. VXLAN
E. OTV

Answer: D

Explanation:


QUESTION 3
Which three main problems was a host overlay system designed to address? (Choose three.)

A. workload mobility
B. simplified and automated workload provisioning
C. multitenancy at scale
D. integrate physical and virtual networking
E. increase visibility to traffic flows
F. better root cause analysis capabilities
G. consolidate IT infrastructure teams

Answer: A,B,C

Explanation:


QUESTION 4
Which two benefits of ACI help improve the time required to deploy an application? (Choose two.)

A. enabling software developers to create development environments similar to production
B. eliminating the need for expensive Layer 4 to Layer 7 service appliances
C. eliminating IP addressing from software stacks
D. evolving the IT model from manual workflows to an application model that automates
deployment, operations, and visibility

Answer: A,D

Explanation:

Monday, 11 July 2016

600-509 Integrating Business Applications with Network Programmability

Exam Number 600-509 NPIBA
Associated Certifications Cisco Business Application Engineer Specialist
Duration 75 Minutes (55 - 65 questions)
Available Languages English
Register Pearson VUE

This exam tests a candidate's ability to use the programmability of an open infrastructure to develop and deploy business applications. It also tests how well the candidate can build an application with API capabilities to collect information from the network when needed.

The Integrating Business Applications with Network Programmability (NPIBA) exam (600-509) is a 75-minute assessment with 55-65 questions. This exam tests a candidate's ability to use the programmability of an open infrastructure to develop and deploy business applications. It also tests how well the candidate can build an application with API capabilities to collect information from the network when needed.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific version of the exam. In order to better reflect the contents of the exam, the guidelines below may change at any time without notice.

1.0 Fundamentals of Networking 35%

1.1 Describe the operation of IP data networks

1.1.a Describe the purpose and functions of network devices
1.1.b Identify common applications and their impact on the network

1.2 Identify basic LAN switching technologies

1.2.a VLANs
1.2.b Network segmentation and basic traffic management

1.3 Describe IP addressing (IPv4 / IPv6)

1.3.a Basic principles of IP address
1.3.b Subnets and prefixes

1.4 Describe IP routing

1.4.a Understands the basic routing concepts
1.4.a [i] Differentiate between routing and routing protocols
1.4.a [ii] Static vs. Dynamic routing
1.4.a [iii] IP routing table
1.4.b Understands the difference between routing and switching

1.5 Describe network data security

1.5.a TLS basics
1.5.b Certificates
1.5.c User/host authentication

1.6 Troubleshoot host IP configuration

1.7 Describe network virtualization

1.8 Describe network assurance technologies

1.8.a Quality of service
1.8.b Load balancing
1.8.c Network proximity
1.8.d Network availability

1.9 Describe application-aware networks

2.0 Business Goals 20%

2.1 Define the business outcome for the application

2.2 Document requirements in terms of deployment, lifecycle management, level of service

2.3 Describe application consumption models

2.3.a Understanding and describing clients for the application from the business perspective
2.3.b Understanding the multiple service level requirements
2.3.c Multitenant environment and implications on application deployment (gold or silver)
2.3.d Security considerations in different consumption models (firewall or certificates)

2.4 Describe the business benefits of making applications network

2.4.a Describe the actions that can be taken based on the information from the network

2.5 Identify challenges with making an application network aware

3.0 Network Programmability Concepts 22%

3.1 Describe the function of a controller

3.2 Compare and contrast controllers

3.2.a APIC
3.2.b APIC-EM
3.2.c Open SDN controller

4.0 API Services 27%

4.1 Identify how APIs can be used to achieve business goals

4.2 Leverage APIs in a business application

Friday, 8 July 2016

600-504 NPENG Implementing Cisco Network Programmability

Exam Number 600-504 NPENG
Associated Job Role Network Programmability Engineer Specialist
Network Programmability; Support Specialist Certification
Duration 90 minutes (55 – 65 questions)
Available Languages English
This exam tests the ability of network engineers to deploy network applications in the programmable environment and make sure that they work. The exam also tests the ability to implement an open network infrastructure designed by network designers and architects. Successful candidates will demonstrate that they can deploy, install, and troubleshoot network infrastructures and applications.
The Implementing Cisco Network Programmability (600-504) (NPENG) exam is a 90-minute (1.5 hour) exam with 55‒65 questions. This exam tests the ability of network engineers to deploy network applications into the programmable environment and ensure that they work successfully. The exam also tests the ability to implement an open network infrastructure designed by the network designers and architects. Successful candidates will demonstrate that they can deploy, install, and troubleshoot network infrastructures and applications. Candidates can prepare for this exam by taking the Implementing Cisco Network Programmability course.
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
1.0 Requirements Collection and Analysis 16%

1.1 Understand the architecture of the application being deployed
1.2 Understand the external interfaces for the application (N&S bound API, GUI interface, CLI)
1.3 Understand relevant standards bodies for network programmability
1.4 Understands open source concepts and engagement models
1.5 Understand the environment in which the application is being deployed
2.0 Deployment Design Development 19%

2.1 Understand the pros and cons of different deployment models and configurations
2.2 Document in detail how the application is deployed and configured
2.3 Understand the best practices to deploy the end product
2.4 Understand the lab validation and testing
3.0 Configuration and Implementation 29%

3.1 Fluent in the installation and configuration of the application being deployed
3.2 Fluent in the configuration of the network and other dependent services the application is using
3.3 Understanding the base lining process
3.4 Staging and verification
4.0 Troubleshooting 20%

4.1 Troubleshoot the functionality and performance of the application
4.2 Interface with developers on improving application serviceability and quality
4.3 Network troubleshooting
4.4 Network virtualization
4.5 Automation/orchestration
4.6 Application and operating system
4.7 Storage
4.8 Be able to determine the real-time impact of the deployed application on the IT infrastructure
4.0 Operation and Optimization 16%

5.1 Tuning
5.2 Ability to optimize and tune the application specific to the environment
5.3 Monitoring and instrumentation
5.4 Change management

QUESTION 1
Which two statements about RFC6020 are true? (Choose two.)
A. YANG is a data modeling language.
B. YANG is a protocol to configure network devices.
C. YANG is used by OF-CONFIG.
D. YANG is used by BGP-LS.
E. YANG is an object-oriented programming language.
Answer: A,C
Explanation:

QUESTION 2
Applications compiled by Java are better adaptive to different operating systems like Windows and
Linux than applications compiled by C compiler.
Which option describes why Java applications are more independent from the OS than C applications?
A. Java has a DLL to abstract the difference of OS.
B. Java compiler is smarter than C compiler.
C. Java compiler creates byte code that is run on Java VM, and Java VM is prepared for each OS.
D. This is an urban legend. No difference between Java and C.
Answer: A
Explanation: