Monday 5 August 2013

Subject-Oriented Data

Subject-Oriented Data
 In operational systems. We store data by individual applications. In the data sets for an order processing application, we keep the data for that particular application. These data sets provide the data for a function for entering orders, checking stock, verifying customer’s credit. And assigning die order for shipment. But these data sets contain only the data that is needed for those functions relating to this particular application. We will have some data sets containing data about individual orders, customers. Stock status, and de-tailed transactions, but all of these are structured around the processing of data.

Similarly. For banking, institution, data sets lot a consumer loans application contains data for that particular application. Data sets for other distinct applications of checking. Accounts and savings accounts relate to those specific applications. Again, in an insurance company, different data sets support individual appikailo115 such as automobile insurance, life insurance. and workers' compensation insurance.

In every industry, data sets are organized around individual applications to support those particular operational systems. These individual data sets have to provide data for the specific applications to perform the specific functions efficiently. Therefore, the data sets for each application need to be organized around that specific application. 

In striking contrast, in the data warehouse, data is stored by subjects, not by applications. If data is stored by business subjects, what arc business subjects'? Business subjects differ from enterprise to enterprise. These are the subjects critical for the enterprise. For a manufacturing company, sales, shipments, and inventory are critical business subjects. For a retail store, sales at the check-out counter are a critical subject.

Figure 2-I distinguishes between how data is stored in operational systems and in the data warehouse. In the operational systems shown, data for each application is organized separately by application: order processing, consumer loans. Costumer billing, accounts receivable, claims processing, and savings accounts. For example. Claim is a critical business subject for an insurance company. Claims under automobile insurance policies are processed in the Auto Insurance application. Claims data for automobile insurance is organized in that application. Similarly, claims data for workers' compensation insurance is organized in the Workers' Comp Insurance application. But in the data warehouse for an insurance company, claims data are organized around the subject of claims and not by individual applications of Auto Insurance Workers' comp.

Tuesday 25 June 2013

70-412 Question 6

Your network contains three Active Directory forests. Each forest contains an Active Directory Rights Management Services (AD RMS) root cluster. All of the users in all of the forests must be able to access protected content from any of the forests. You need to identify the minimum number of AD RMS trusts required. How many trusts should you identify?
 

A. 2
B. 3
C. 4
D. 6

Correct Answer: D
Section: (none)


Explanation
Explanation/Reference:

70-412 Question 5

70-412 Question 5

Your network contains an Active Directory domain named contoso.com. The domain contains four servers. The servers are configured as shown in the following table.


You plan to deploy an enterprise certification authority (CA) on a server named Servers. Server5 will be used to issue certificates to domain-joined computers and workgroup computers. You need to identify which server you must use as the certificate revocation list (CRL) distribution point for Server5. Which server should you identify?

A. Server1
B. Server3
C. Server4
D. Server2

Correct Answer: B
Section: (none)


Explanation
Explanation/Reference:

CRL is published to a web site

70-412 Question 4

70-412 Question 4

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012. Server1 has the IP Address Management (IPAM) Server feature installed. IPAM is configured currently for Group Policy-based provisioning. You need to change the IPAM provisioning method on Server1. What should you do?

A. Run the ipamgc.exe command.
B. Run the Set-IPAMConfiguration cmdlet.
C. Reinstall the IP Address Management (IPAM) Server feature.
D. Delete IPAM Group Policy objects (GPOs) from the domain.

Correct Answer: C
Section: (none)


Explanation
Explanation/Reference:

You cannot change the provisioning method after completing the initial setup.



70-412 Question 3

70-412 Question 3
Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1. Server1 has the IP Address Management (IPAM) Server feature installed. On DC1, you configure Windows Firewall to allow all of the necessary inbound ports for IPAM. On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.) You need to ensure that you can use IPAM on Server1 to manage DNS on DC1. What should you do?


A. Modify the outbound firewall rules on Server1.
B. Add Server1 to the Remote Management Users group.
C. Add Server1 to the Event Log Readers group.
D. Modify the inbound firewall rules on Server1.

Correct Answer: C
Section: (none)


Explanation
Explanation/Reference:

Since no exhibit, the guess here is it's not using the GPO to manage the Event Log Readers group--evidenced by the fact that the firewall was configured manually instead of with the GPO. If the GPO was being used then the IPAM server would be in the Event Log Readers group due to restricted group settings in the GPO as shown below:


In the above example, the IPAM server is as member of the VDI\IPAMUG group.

70-412 Question 2

70-412 Question 2
Your network contains an Active Directory domain named contoso.com. The domain contains servers named Server1 and Server2 that run Windows Server 2012. Server1 has the IP Address Management (IPAM) Server feature installed. You install the IPAM client on Server2. You open Server Manager on Server2 as shown in the exhibit. (Click the Exhibit button.)


You need to manage IPAM from Server2. What should you do first?

A. On Server2, open Computer Management and connect to Server1.
B. On Server1, add the Server2 computer account to the IPAM ASM Administrators group.
C. On Server2, add Server1 to Server Manager.
D. On Server1, add the Server2 computer account to the IPAM MSM Administrators group.

Correct Answer: C
Section: (none)

Explanation
Explanation/Reference:

70-412 Question 1

70-412 Question 1
You have a server named Server 1 that runs Windows Server 2012. Server1 has five network adapters. Three of the network adapters are connected to a network named LAN1. 


The two other network adapters are connected to a network named LAN2. You create a network adapter team named Team1 from two of the adapters connected to LAN1. 

You create a network adapter team named Team2 from the two adapters connected to LAN2. A company policy states that all server IP addresses must be assigned by using a reserved address in DHCP. 

You need to identify how many DHCP reservations you must create for Server1. How many reservations should you identify?

A. 2
B. 3
C. 5
D. 7

Correct Answer: B
Section: (none)

Explanation

Explanation/Reference:


3 adapter on LAN 1
2 adapters on LAN 2
2 adapters on LAN 1 used in a team, so that's 3 - 2 leaving 1.
2 adapaters on LAN 2 used in a team, so that's 2 - 2 leaving 0.
1 team on LAN 1 + 1 team on LAN 2 + remaining adapter on LAN 1 = 3.