Certification Questions

Q:

John is a system administrator for a renowned travel agency.The agency is planning to upgrade its computer systems to Windows XP Professional.Most of the computers are networked but some computers do not have CD-ROM drives.How can John upgrade the computer systems without CD-ROM drives to Windows XP Professional?

A) can attach a portable tape backup unit to each computer and install the operating system from it. B) can use the windows installer program to push out the operating system.
C) can perfom the installation over a network share. D) can not install windows XP Professional unless he installs a CD-ROM drive in the computer systems that do not have them.
 
Answer & Explanation Answer: C) can perfom the installation over a network share.

Explanation:
Report Error

View Answer Report Error Discuss

0 2295
Q:

What command would you use to set an access list on a VTY line?

Answer

line vty 0 4


access - class 110 in 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2293
Q:

Project Life Cycle

What is the Project Life Cycle?

Answer

Project managers or the organization can divide projects into phases to provide better management control with appropriate links to the ongoing operations of the performing organization. Collectively, these phases are known as the project life cycle.

Report Error

View answer Workspace Report Error Discuss

0 2290
Q:

Which operations are periodic invoicing plans suitable for?

A. Magazine subscriptions

B. Credit card settlements

C. Rental payments

D. Telephone bills

Answer

Answer : A , C


 


Explanation: Periodic invoicing plans are not suitable for telephone bills and credit card
settlements as these are for a different amount each month.

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

1 2289
Q:

You want to add an additional paging file to your Windows 2000 Server computer. Which tool should you use?

A) System B) Folder Options
C) Windows Explorer D) Add/Remove Programs
 
Answer & Explanation Answer: A) System

Explanation:

The System application is used to create, configure, and manage paging files.

Report Error

View Answer Report Error Discuss

0 2288
Q:

Which Windows 2000 tool can you use to initiate the transfer of images from a digital camera to your Windows 2000 computer?

A) Imaging B) Wireless Link
C) Scanners and Cameras D) Sounds and Multimedia
 
Answer & Explanation Answer: A) Imaging

Explanation:

The Imaging application (Start => Programs => Accessories => Imaging) is the only windows 2000 application that can be used to initiate image transfer. You can use Wireless Link to configure how Windows 2000 will handle received image files, but you can't use Wireless Link to initiate the image transfer.

Report Error

View Answer Report Error Discuss

0 2288
Q:

What can you expect if you raise your bids?

Answer

More conversions and a higher CPA, in general.

Report Error

View answer Workspace Report Error Discuss

0 2287
Q:

You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed.

 

The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy.

 

You need to implement security in the assembly. What should you do?

A) Implement declarative security and execute the permission demand to allow access to the file system and Windows registry. B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
C) Implement imperative security and execute the permission demand to allow access to the file system and Windows registry. D) Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.
 
Answer & Explanation Answer: B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.

Explanation:

You can use declarative code access security to request permissions for the entire assembly. SecurityAction flags that can be specified in an assembly-wide directive. When SecurityAction.RequestMinimum is specified, it makes a request to the common language runtime to be granted the requested permission. If the requested permission is not granted by the security policy, the assembly will not execute. A  Security Action.RequestOptional is similar, but the assembly will still run even if the requested permission is not granted. Specifying security Action. RequestRefuse requests that the assembly be denied the specified permission.

 

You must use the Assembly (assembly) directive when specifying these actions as follows: 

 

Option A:

There are only three Security actionAttributes targets for an assembly: RequestMinimumAssembly, RequestOptionalAssembly, and RequestRefuseAssembly. 

 

 Option C, D:

Imperative security does not work well to configure security for an entire assembly. In imperative security, permission to execute is demanded at run time.

Report Error

View Answer Report Error Discuss

1 2281