Tuesday 11 December 2018

H12-722 HCNP-Security-CSSN (Huawei Certified Network Professional - Constructing Service Security Network)

1. Huawei H12-722 HCNP-Security-CSSN Certification Exam
This document mainly introduces H12-722 HCNP-Security-CSSN exam outline, For other exam outlines, please refer to the related training materials or Huawei Online Learning Website: http://support.huawei.com/learning.

Certification Exam Code Exam Name Duration Pass Score/
Total Score
HCNP-Security H12-722 HCNP-Security-CSSN
(Huawei Certified Network Professional - Constructing Service Security Network) 90 min 600/1000

2. HCNP-Security-CSSN Exam Outline

2.1 Exam Content
HCNP-Security-CSSN exam covers content security filtering technology, Web security, intrusion detection and prevention technology, anti-virus technology, network attack prevention technology, big data and cloud security technology.

2.2 Key PointsContent security filtering technology
1.File Blocking Technology
2.Data Filtering Technology
3.Mail Filtering Technology
4.Application Behavior Control Technology

Web Security Protection
1.Basic Web Principles
2.URL Filtering Technology
3.Web Application System Protection
4.Malicious Web Page Detection Technology

Intrusion Detection and Prevention Technology
1.Principles of Intrusion Detection Technology
2.Intrusion prevention system
3.NIP Principle and Configuration
4.FW Intrusion and Prevention Features

Antivirus Technology
1.Principles of Antivirus Technology
2.Applications of antivirus gateways technology

Network Attack Defense Technology
1.Principles of Single-Packet Attack Defense
2.Principles of Traffic Attack Defense

Big Data and Cloud Security Technology
1.Cloud Security Overview
2.Cloud Security Technology and Solution

Note:
The exam content provided here serves only as a general guide to candidates. Other contents not mentioned here may also be included in the actual exam.

2.3 Reference
Huawei Certified HCNP-Security-CSSN Training Materials(V3.0)
Huawei Certified HCNP-Security-CSSN Lab Guide(V3.0)

2.4 Recommended Training Program
HCNP-Security-CSSN Training

Monday 10 December 2018

AZ-300 Microsoft Azure Architect Technologies (beta)

Languages: English
Audiences: IT professionals
Technology: Microsoft Azure

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Deploy and Configure Infrastructure (25-30%)
Analyze resource utilization and consumption
May include but not limited to: Configure diagnostic settings on resources; create baseline for resources; create and rest alerts; analyze alerts across subscription; analyze metrics across subscription; create action groups; monitor for unused resources; monitor spend; report on spend; utilize Log Search query functions; view alerts in Log Analytics
Create and configure storage accounts
May include but not limited to: Configure network access to the storage account; create and configure storage account; generate shared access signature; install and use Azure Storage Explorer; manage access keys; monitor activity log by using Log Analytics; implement Azure storage replication
Create and configure a Virtual Machine (VM) for Windows and Linux
May include but not limited to: Configure high availability; configure monitoring, networking, storage, and virtual machine size; deploy and configure scale sets
Automate deployment of Virtual Machines (VMs)
May include but not limited to: Modify Azure Resource Manager (ARM) template; configure location of new VMs; configure VHD template; deploy from template; save a deployment as an ARM template; deploy Windows and Linux VMs
Create connectivity between virtual networks
May include but not limited to: Create and configure VNET peering; create and configure VNET to VNET; verify virtual network connectivity; create virtual network gateway
Implement and manage virtual networking
May include but not limited to: Configure private and public IP addresses, network routes, network interface, subnets, and virtual network
Manage Azure Active Directory (AD)
May include but not limited to: Add custom domains; configure Azure AD Identity Protection, Azure AD Join, and Enterprise State Roaming; configure self-service password reset; implement conditional access policies; manage multiple directories; perform an access review
Implement and manage hybrid identities
May include but not limited to: Install and configure Azure AD Connect; configure federation and single sign-on; manage Azure AD Connect; manage password sync and writeback

Implement Workloads and Security (20-25%)
Migrate servers to Azure
May include but not limited to: Migrate by using Azure Site Recovery (ASR); migrate using P2V; configure storage; create a backup vault; prepare source and target environments; backup and restore data; deploy Azure Site Recovery (ASR) agent; prepare virtual network
Configure serverless computing
May include but not limited to: Manage a Logic App resource; manage Azure Function app settings; manage Event Grid; manage Service Bus
Implement application load balancing
May include but not limited to: Configure application gateway and load balancing rules; implement front end IP configurations; manage application load balancing
Integrate on premises network with Azure virtual network
May include but not limited to: Create and configure Azure VPN Gateway; create and configure site to site VPN; configure Express Route; verify on premises connectivity; manage on-premise connectivity with Azure
Manage role-based access control (RBAC)
May include but not limited to: Create a custom role; configure access to Azure resources by assigning roles; configure management access to Azure; troubleshoot RBAC; implement RBAC policies; assign RBAC roles
Implement Multi-Factor Authentication (MFA)
May include but not limited to: Enable MFA for an Azure tenant; configure user accounts for MFA; configure fraud alerts; configure bypass options; configure trusted IPs; configure verification methods; manage role-based access control (RBAC); implement RBAC policies; assign RBAC Roles; create a custom role; configure access to Azure resources by assigning roles; configure management access to Azure

Architect Cloud Technology Solutions (5-10%)
Select an appropriate compute solution
May include but not limited to: Leverage appropriate design patterns; select appropriate network connectivity options; design for hybrid topologies
Select an appropriate integration solution
May include but not limited to: Address computational bottlenecks, state management, and OS requirements; provide for web hosting if applicable; evaluate minimum number of nodes
Select an appropriate storage solution
May include but not limited to: Validate data storage technology capacity limitations; address durability of data; provide for appropriate throughput of data access; evaluate structure of data storage; provide for data archiving, retention, and compliance

Create and Deploy Apps (5-10%)
Create web applications by using PaaS
May include but not limited to: Create an Azure app service web app by using Azure CLI, PowerShell, and other tools; create documentation for the API by using open source and other tools; create an App Service Web App for containers; create an App Service background task by using WebJobs
Create app or service that runs on Service Fabric
May include but not limited to: Develop a stateful Reliable Service and a stateless Reliable Service; develop an actor-based Reliable Service; write code to consume Reliable Collections in your service
Design and develop applications that run in containers
May include but not limited to: Configure diagnostic settings on resources; create a container image by using a Docker file; create an Azure Container Service (ACS/AKS) cluster by using the Azure CLI and Azure Portal; publish an image to the Azure Container Registry; implement an application that runs on an Azure Container Instance; implement container instances by using Azure Container Service (ACS/AKS), Azure Service Fabric, and other tools; manage container settings by using code

Implement Authentication and Secure Data (5-10%)
Implement authentication
May include but not limited to: Implement authentication by using certificates, forms-based authentication, tokens, Windows-integrated authentication; implement multi-factor authentication by using Azure AD options
Implement secure data solutions
May include but not limited to: Encrypt and decrypt data at rest; encrypt data with Always Encrypted; implement Azure Confidential Compute and SSL/TLS communications; manage cryptographic keys in the Azure Key Vault

Develop for the Cloud (20-25%)
Develop long-running tasks
May include but not limited to: Implement large-scale, parallel, and high-performance apps by using batches; implement resilient apps by using queues; implement code to address application events by using web hooks; address continuous processing tasks by using web jobs
Configure a message-based integration architecture
May include but not limited to: Configure an app or service to send emails, Event Grid, and the Azure Relay Service; create and configure a Notification Hub, an Event Hub, and a Service Bus; configure queries across multiple products; configure an app or service with Microsoft Graph
Develop for asynchronous processing
May include but not limited to: Implement parallelism, multithreading, processing, durable functions, Azure logic apps, interfaces with storage, interfaces to data access, and appropriate asynchronous compute models
Develop for autoscaling
May include but not limited to: Implement autoscaling rules and patterns (schedule, operational/system metrics, code that addresses singleton application instances, and code that addresses transient state
Implement distributed transactions
May include but not limited to: Identify tools to implement distributed transactions (e.g., ADO.NET, elastic transactions, multi-database transactions); manage transaction scope; manage transactions across multiple databases and servers
Develop advanced cloud workloads
May include but not limited to: Develop solutions by using intelligent algorithms that identify items from images and videos; develop solutions by using intelligent algorithms related to speech, natural language processing, Bing Search, and recommendations and decision making; create and integrate bots; integrate machine learning solutions in an app; create and implement IoT solutions

Preparation options

Instructor-led training

Who should take this exam?

Candidates for this exam are Azure Solution Architects who advise stakeholders and translates business requirements into secure, scalable, and reliable solutions.

Candidates should have advanced experience and knowledge across various aspects of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data management, budgeting, and governance. This role requires managing how decisions in each area affects an overall solution.

Candidates must be proficient in Azure administration, Azure development, and DevOps, and have expert-level skills in at least one of those domains.
QUESTION: 1
You need to access user claims in the e-commerce web app. What should you do first?

A. Write custom code to make a Microsoft Graph API call from the e commerce web app.
B. Assign the Contributor RBAC role to the e-commerce web app by using the Resource Manager create role assignment API
C. Update the e-commerce web app to read the HTTP request header values.
D. Using the Azure CU, enable Cross-origin resource sharing (CORS) from the e-commerce checkout API to the e-commerce web

Answer: A
QUESTION: 2
You need to meet the scaling requirements for Policy Service.
What should you store in Azure Redis Cache?

A. ViewState
B. HttpContext.tems
C. Session state
D. TempData

Answer: C

QUESTION: 3
You need to configure AG1.
What should you create?

A. a basic routing rule
B. a multi-site listener
C. a basic listener
D. a URL path-based routing rule

Answer: C
MCTS Training, MCITP Trainnig

Friday 7 December 2018

H12-723 HCNP-Security-CTSS (Huawei Certified Network Professional - Constructing Terminal Security System)

H12-723 HCNP-Security-CTSS (Huawei Certified Network Professional - Constructing Terminal Security System)

1. Huawei H12-723 HCNP-Security-CTSS Certification Exam
This document mainly introduces H12-723 HCNP-Security-CTSS exam outline, For other exam outlines, please refer to the related training materials or Huawei Online Learning Website: http://support.huawei.com/learning.

Certification Exam Code Exam Name Duration Pass Score/
Total Score
HCNP-Security H12-723-ENU HCNP-Security-CTSS
(Huawei Certified Network Professional - Constructing Terminal Security System) 90 min 600/1000

2. HCNP-Security-CTSS Exam Outline

2.1 Exam Content
HCNP-Security-CTSS exam covers the concept of terminal security, Agile Controller-Campus system installation planning and deployment, terminal authentication system, WLAN network security technology, terminal security troubleshooting and security system operation and maintenance.

2.2 Key Points
Terminal Security Overview
1.Necessity of terminal security
2.Design Roadmap of the Terminal Security Solution
3.Introduction to the Terminal Security System
4.Security system maintenance solution

WLAN Security Technology
1.WLAN Security Threats
2.Principles of WIDS/WIPS System
3.WLAN User Access Security
4.CAWAP Encryption and User Authorization Management

Terminal Security System Deployment
5.Agile Controller-Campus Installation
6.Start the Agile Controller-Campus for the First Time
7.High-Reliability Deployment of the Agile Controller-Campus

User Authentication Technology
1.802.1X Authentication Technology
2.MAC Authentication Technology
3.SACG Authentication Technology
4.Portal Authentication Technology

Security System Operation and Maintenance
1.User Management Technology
2.Agile Network Technology
3.eSight Service Management

Note:
The exam content provided here serves only as a general guide to candidates. Other contents not mentioned here may also be included in the actual exam.

2.3 Reference
Huawei Certified HCNP-Security-CTSS Training Materials(V3.0)
Huawei Certified HCNP-Security-CTSS Lab Guide(V3.0)

2.4 Recommended Training Program
HCNP-Security-CTSS Training