Documente Academic
Documente Profesional
Documente Cultură
In late 2005, Microsoft shocked the certification world by announcing that their
extraordinarily successful and lucrative educational program, the Microsoft Certified
System Engineer, was going to be replaced by an entirely new certification series –
the Microsoft Certified Information Technology Professional.
In spite of the general confusion following Microsoft’s decision to scrap their MCSE
program, there was a method to the madness. For one, Microsoft hoped to clarify
the confusion surrounding the word “engineer.” In other countries, including most
of Europe, in order to classify as an engineer, you had to possess a professional
engineer’s license – not just an MCSE. In the US, a similar problem was developing,
whereby IT professionals would call themselves engineers upon completion of the
program, when in fact their job role signified something else entirely.
The ultimate answer to this was to create a new series of role based certifications
that would specify a person’s actual job, instead of a generalized title. Microsoft
picked four different titles for the adjustment. The Microsoft Certified Information
Technology Professional includes:
• Server Administrator
• Enterprise Administrator
• Database Administrator
• Database Programmer
By the end of this document, you should fully understand what the MCITP is, how
you can get it and how it will help enhance your career.
Database Database
Server Enterprise
Developer Administrator
Administrator Administrator
(70-443) (70-444)
(70-646) (70-647)
(70-451) (70-450)
Server 2008
Server 2008 Server 2008 Windows
Applications
Active Network Vista
SQL Server 2005 / SQL Server 2008 Infrastructure,
Directory Infrastructure Configuration
(70-431) Configuring
(70-640) (70-642) (70-620)
(70-643)
Microsoft Microsoft
MCTS MCITP Certified Certified
Master Architect
MCITP Server and Enterprise Administrator Coverage 70-431 / 70-452 Sample Question
SQL Server 2005 components make it possible for SQL Server 2005 to
support large-scale transaction processing, data warehousing, e-commerce
The figure to the right applications, and business intelligence solutions. In order to grasp how SQL
shows the various Server 2005 supports this broad range of functionality, you need to know
MCITP
aspects of Windows about SQL Server components. Which of the following statements about SQL
Server 2008
Server and the portions Server components are correct?
of them that are
MCITP 70-640 Sample Question
covered by the topics
SQL Server
we are discussing in Simon is the network administrator for his company, a shipping company
2005 / 2008
this guide. with offices all over the world. Simon is in charge of the network at
Not Covered the Chicago office which has over 300 workstations and 30 servers. All
Note: Exchange is not workstations are running Windows Vista and all servers are running Windows
covered in the Server
Enterprise or SQL Server 2008 Enterprise.
Certifications.
Every computer and every user has a specific certificate assigned to them
for network access, VPN access, EFS, and so on. A CRL is published through
Active Directory, but the list has grown very large within the last month. This
CRL list contains every revoked certificate that has ever been published by
the CA.
IIS SQL 2005 Simon wants to start publishing interim lists through Active
Directory. What type of list does Simon need to publish in
Operating Active Directory?
Exchange
System
Terminal Active
Services Directory
70-443 / 70-451 Sample Question Which of the following actions should you perform in order to accomplish
your goal?
Using a rollback tran, which of the following results would provide the most
efficient logging of the changes made to the sco.com.commerce structure?
70-647 Sample Question
70-444 / 70-450 Sample Question Using multiple forms of virtualization, there are many ways to setup a network
address. If you are working in an environment where it’s required for you
You are a database developer for the Hogwart’s University. Due to to be able to uniquely address a machine in order to retrieve services from
unauthorized changes to a database table in the Students database, several up, what type of shared network connection must be established in order to
views have been broken. You are tasked with creating a method of identifying facilitate this?
exactly when, and by who, any changes to database tables are made. What
should you do?
Prereqs
DNS
Endpoints
DDNS
W
Partners
NDDNS
in
SQ Log Shipping
do
SDDNS
L2 Database Snapshots
w
ADMT v3.1
00
sS
Insert/Update/Delete
UGMC
5 Exceptions
er
AD LDS
/S
ve
Monitoring 70-431
70-640 AD RMS
QL
r
XML Data
20
RODC
DHCP
20 Services/Queues/Contracts
08
AD FS
GPO
Routing
IPSEC
08 Publisher/Distributor
TSQL
ADMX Central Store
DNS Zones Backups
Admin Templates Capacity Requirements
Remote Access
Backup/Recovery Instances
NAP
AD CS Physical Storage
WEP/WPA/WPA2
DFS TS Gateway SQL Versions
70-646
Server Administrator
70-640 70-642 in two exams total
or 70-647
70-624
Enterprise
70-640 70-642 70-643
Administrator
in two exams total