uCertify (July 14, 2009) uCertify, a leading provider of exam preparation software for IT certification exams, is offering a huge discount of 50% on its Network+ (N10-003) and Security+ (SY0-101) PrepKits. CompTIA has announced the retirement of the Network+ version 2007 (N10-003) and Security+ (SY0-101) certification exams. These exams will be available until July 31, 2009. According to CompTIA, although these exams are being retired, the certification status of candidates will not change. So, the candidates who have been preparing for these exams for a long time are advised to take the exam as early as possible.

uCertify is offering a discount of 50% on both PrepKits. To get a glimpse of these PrepKits, you can download its free demo version (which contains 15 free practice questions) from:

For Security+ (SY0-101) certification PrepKit: https://www.ucertify.com/exams/CompTIA/SY0-101.html

For Network+ (N10-003) certification PrepKit: https://www.ucertify.com/exams/CompTIA/N10-003.html

Continue reading

Installing and Configuring SQL Server 2005

  • In order to change collation settings, reinstall SQL Server 2005 on a server with the same collation settings as another server.
  • In order to install SQL Server 2005 on a computer on which SQL Server 2000 is already installed, install SQL Server 2005 as a named instance.
  • Members of db_access role can assign permissions to other users to enable them to access and query the database.
  • RAID-0, also known as disk striping, is made up of a disk set in which data is divided into blocks and spread equally in each disk. It provides best performance because data read and data write operations are not limited to a single disk, but to a set of disks. It does not provide data redundancy. Data once lost cannot be recovered.
  • The Service Broker can be attached to a database by using the FOR ATTACH clause of the CREATE DATABASE statement.
  • If a snapshot of a database is present on the same computer on which the database is present, the database cannot be deleted.
  • In order to connect to the DAC, specify ADMIN: server_name in the Connect to the Server dialog box.
  • The login information stored in the master database.
  • In order to secure data that is data transmitted over a network, set the value of the ForceEncryption option on a server to Yes.
  • In order to enable a user to connect to the database, a DBA should add the user to that database.
  • The db_ddladmin fixed database role allows its members to add, modify, or drop objects in the database. Members of the db_ddladmin role can issue DDL statements (e.g. CREATE, ALTER, and DROP) in the database.
  • Member of db_ddladmin role have the permission to execute the T-SQL statements.
  • The sysadmin role allows a user to view the security log.
  • Continue reading

Developing applications that use system types and collections

  • Use the CausesValidation property of the ImageButton class to set a value to indicate whether validation is performed on a Web server control when an ImageButton control is clicked.
  • Installation packages are created for deploying a Web application by using a Web Setup project. A merge module project is used for components to be added to the application.
  • Use the Web Setup project and Deployment project to create installation packages for the deployment of Web-based applications such as XML Web services, Web applications etc., to a Web server.
  • Use a RequiredFieldValidator control to check whether or not an input control contains a value.
  • Use a RegularExpressionValidator control to check whether or not the value entered into a form field matches the pattern specified by a regular expression.
  • Use the validation error messages to be displayed on a Web page in a message box by setting the ShowMessageBox property of the ValidationSummary control to true. By setting the ValidationSummary property of the ValidationSummary control to false, the validation summary will not be displayed on the Web page.
  • Create and sort an array of data using the System namespace.
  • Continue reading

Developing applications that use system types and collections

  • Use the CausesValidation property of the ImageButton class to set a value to indicate whether validation is performed on a Web server control when an ImageButton control is clicked.
  • Installation packages are created for deploying a Web application by using a Web Setup project. A merge module project is used for components to be added to the application.
  • Use the Web Setup project and Deployment project to create installation packages for the deployment of Web-based applications such as XML Web services, Web applications etc., to a Web server.
  • Use a RequiredFieldValidator control to check whether or not an input control contains a value.
  • Use a RegularExpressionValidator control to check whether or not the value entered into a form field matches the pattern specified by a regular expression.
  • Continue reading

General Security Concepts

  • Kerberos is an industry standard authentication protocol used to verify user or host identity.
  • Role-based access control (RBAC) is an access control model. In this model, a user can access resources according to his role in the organization.
  • Mandatory Access Control (MAC) is a model that uses a predefined set of access privileges for an object of the system.
  • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
  • Certificate-based authentication is the most secure method of authentication. It provides stronger key for encryption as compared to Digest authentication and sends encrypted passwords across the network. This prevents unauthorized users from intercepting the passwords.
  • Anonymous authentication is generally used for public Internet Web sites. Using this method, a user can establish a connection with a Web server without providing username and password.
  • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
  • Password Authentication Protocol (PAP) transmits user credentials as plaintext.
  • A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.
  • Continue reading

Q. What is the prerequisite for taking the test SY0-101?

A. There is no prerequisite for taking the test SY0-101. However, it is recommended that CompTIA Security+ candidates should have at least two years on-the-job networking experience, with an emphasis on security. The CompTIA Network+ certification is also recommended for taking the test.

Q. What certificate does test SY0-101 provide?

A. Passing the test SY0-101 provides Security+ certification.

Q. How many questions are asked in the test SY0-101?

A. This test consists of multiple-choice questions. There are no case study type questions and the test is not adaptive. You will be required to attempt approximately 100 questions.

Q. What is the duration of the test?

Continue reading