IT Certification and Training Blog

3. Microsoft Exams’ Inner Mechanics

Posted by Val Bakh on Feb 2, 2016 11:42:47 AM

How to Become a Microsoft Certified Professional

3.5. How to Pass a Microsoft Exam – Part 2

This is Part 2 of the final blog post in this series. In Part 1 , we discussed a strategy for the exam-taking process. Now we’ll talk about a few snags that you might have to overcome during the exam. Each of the remaining sections presents a specific type of problem and provides recommendations on what you should do if you encounter it.

Read More

Tags: exam tips, Val Bakh, Microsoft, pass microsoft exams

3 Microsoft Exams’ Inner Mechanics

Posted by Kelson Lawrence on May 13, 2015 10:07:00 AM

How to Become a Microsoft Certified Professional

3.4. How to Work with Boson’s ExSim-Max for Microsoft Products

In the two preceding blog posts of this series (Section 3.3 Part 1 and Part 2), we discussed how to identify legitimate practice-exam products and recognize braindumps. Another important issue in those posts was how to determine which legitimate products are better than others. In this post, we’ll take a brief tour of Boson’s ExSim-Max for Microsoft line of products.

Read More

Tags: Val Bakh, Exam Preparation Options, Boson Microsoft exams, how to become a microsoft certified professional, ExSim-Max

3. Microsoft Exams’ Inner Mechanics

Posted by Kelson Lawrence on Apr 2, 2015 9:15:00 AM

How to Become a Microsoft Certified Professional

Read More

Tags: Val Bakh, Exam Preparation Options, exam engines, how to become a microsoft certified professional, good questions, bad questions

3. Microsoft Exams’ Inner Mechanics

Posted by Kelson Lawrence on Feb 25, 2015 10:15:00 AM

How to Become a Microsoft Certified Professional

3.3. Practice Exams 101 – Part 1


By Val Bakh

In the first two blog posts of this series, we discussed Microsoft certifications and touched upon a couple of study options. It turned out that Microsoft’s online technical libraries and product documentation are no longer suitable as primary exam preparation tools. In this blog post, we’ll explore practice exam products: what they are and how to find the ones that are worth your money and effort.


3.3.1. The Ancient Adage

“Read the manual first!” is an ancient adage that has been haunting humankind since the days when we invented printing. Seems pretty obvious, doesn’t it? And still, often times, we buy some new high-tech gizmo, bring it home, unpack it, and then immediately start pushing its buttons and playing with whatever other controls it might have. But somehow it always seems to happen that we can’t make the thing do at least some of what we expect it to do. We scratch our heads, we push more buttons, and only after exhausting our creative zeal, we recall having seen a small brochure that came with the thing: the instruction manual. We dig it out from the depths of the packaging garbage and … slap our foreheads in exasperation. It turns out it was so easy and we were pushing all the wrong buttons. It’s all right here, in black and white: press Button A and then press Button B. Next time, we swear, we will read the instructions first. But by the time we buy another toy, the promise is long forgotten and the new buttons look a lot more appealing to our itchy fingers than an unobtrusive booklet, almost lost somewhere at the bottom of the box.

Read More

Tags: avoid braindumps, Val Bakh, Microsoft Exams’ Inner Mechanics, how to become a microsoft certified professional

3. Microsoft Exams’ Inner Mechanics

Posted by Kelson Lawrence on Dec 29, 2014 9:30:00 AM

 

Read More

Tags: Val Bakh, Exam Preparation Options, practice exams, how to become a microsoft certified professional, documentation

3. Microsoft Exams’ Inner Mechanics

Posted by Kelson Lawrence on Oct 22, 2014 10:11:00 AM

 

Read More

Tags: pirates, braindumps, Val Bakh, microsoft certifications, cheating, punishment, policies, how to become a microsoft certified professional

MS Windows 7 Tips and Tricks | 2.8.5. EFS – Part 3

Posted by Kelson Lawrence on Jun 27, 2014 9:13:00 AM

2.8.5. EFS – Part 3

By Val Bakh

Previously, in Parts 1 and 2 of the blog series about Encrypting File System (EFS), we introduced the main concepts and described how EFS encrypts and decrypts files, how you can share those files with your trusted colleagues, and how a data recovery agent (DRA) can recover your files if something happens to you or to your private key. In this final installment of the series about EFS, we’ll look at several typical scenarios.

Read More

Tags: Val Bakh, 2.8.5. EFS – Part 3, GPO, DRA, Default Domain Policy Group, Policy object

MS Windows 7 Tips and Tricks | 2.8.4 EFS – Part 2

Posted by Kelson Lawrence on Mar 5, 2014 8:25:00 AM

2.8.4 EFS – Part 2

By Val Bakh

In part 1 of the blog post about Encrypting File System (EFS), we described how EFS works, in common-sense terms, using a story of your attempts to secure the door of your house as a convenient example. Now let’s continue this discussion and translate that story into technical terms. We’ll also talk about certificates because they are virtually inseparable from matters related to encryption.

Read More

Tags: Val Bakh, MS Windows 7 Tips and Tricks | 2.8.4 EFS – Part 2, file encryption key, Encrypting File System

MS Windows 7 Tips and Tricks | 2.8.3 EFS – Part 1

Posted by Kelson Lawrence on Jan 9, 2014 8:39:00 AM

2.8.3 EFS – Part 1

By Val Bakh

As the world of information technology (IT) becomes more and more sophisticated with each passing day, the security of the information that we store on computers has become a major headache. But, just as we occasionally have to go to work while suffering a migraine, we have to accept the pervasive need for IT security. There’s no way around it. It’s like locking the door to your house when you are leaving for work. There’s always the risk that you might misplace your house keys during the day or leave them behind in your office, but leaving the door unlocked is no longer as viable an option as it used to be a few decades ago. Similarly, we have to secure our data. The question is, how? Data security is an extremely complex but fascinating subject area. There are many technologies and methods, which are usually implemented in conjunction with one another to form a multilayered, impregnable (keep your fingers crossed) fortress.

Read More

Tags: Val Bakh, NTFS, Encrypting File System, EFS Part 1

MS Windows Tips and Tricks | 2.8.2. Windows Firewall – Part 2

Posted by Kelson Lawrence on Oct 2, 2013 12:25:00 PM

2.8.2. Windows Firewall – Part 2

By Val Bakh

In last month’s blog post about Windows Firewall (WF), we introduced network firewalls and host-based firewalls and explained the general principles of their operation. We also became acquainted with WF, its most important general settings, and two types of rules. Now we’ll discuss both types of WF rules and examine their main settings. We will also consider an example scenario that illustrates how the two types of rules work together.

Read More

Tags: Val Bakh, Windows Firewall, WF, scope, block edge traversal, part 2, protocols and ports, programs and services, edge traversal