Certification Questions

Q:

Which Cisco 802.1d extension stops BPDU from being transmitted out a port?

Answer

PortFast

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2202
Q:

You want to add an additional paging file to your Windows 2000 Server computer. Which tool should you use?

A) System B) Folder Options
C) Windows Explorer D) Add/Remove Programs
 
Answer & Explanation Answer: A) System

Explanation:

The System application is used to create, configure, and manage paging files.

Report Error

View Answer Report Error Discuss

0 2199
Q:

Project Quality Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Perform Quality Control?

Answer

I. Inputs



  • Quality management plan

  • Quality metrics 

  • Quality checklists

  • Organizational process assets

  • Work performance information

  • Approved change requests

  • Deliverables


II. Tools and Techniques



  • Cause and effect diagram

  • Control charts

  • Flow Charting

  • Histogram

  • Pareto chart

  • Run chart

  • Scatter diagram

  • Statistical sampling

  • Inspection

  • Defect repair review


III. Outputs



  • Quality control measurements

  • Validated defect repair

  • Quality baseline (updates)

  • Recommended corrective actions

  • Recommended preventive actions

  • Requested changes

  • Recommended defect repair

  • Organization process assets (updates)

  • Validated deliverables

  • Project management plan (updates)


 


 

Report Error

View answer Workspace Report Error Discuss

0 2196
Q:

You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed.

 

The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy.

 

You need to implement security in the assembly. What should you do?

A) Implement declarative security and execute the permission demand to allow access to the file system and Windows registry. B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
C) Implement imperative security and execute the permission demand to allow access to the file system and Windows registry. D) Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.
 
Answer & Explanation Answer: B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.

Explanation:

You can use declarative code access security to request permissions for the entire assembly. SecurityAction flags that can be specified in an assembly-wide directive. When SecurityAction.RequestMinimum is specified, it makes a request to the common language runtime to be granted the requested permission. If the requested permission is not granted by the security policy, the assembly will not execute. A  Security Action.RequestOptional is similar, but the assembly will still run even if the requested permission is not granted. Specifying security Action. RequestRefuse requests that the assembly be denied the specified permission.

 

You must use the Assembly (assembly) directive when specifying these actions as follows: 

 

Option A:

There are only three Security actionAttributes targets for an assembly: RequestMinimumAssembly, RequestOptionalAssembly, and RequestRefuseAssembly. 

 

 Option C, D:

Imperative security does not work well to configure security for an entire assembly. In imperative security, permission to execute is demanded at run time.

Report Error

View Answer Report Error Discuss

1 2194
Q:

For materials that require batch control, the batch number can be specified in:

A. The billing document.

B. The picking overview screen.

C. At post goods issue.

D. The sales order line item.

Answer

Answer : B , C , D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP SD

0 2193
Q:

imageview2

You are the administrator of network X. You decided to implement RIP in the following topology (click exhibit). You do not want R3 to receive RIP updates. What configuration changes need to be implemented?

A) Implement a passive-interface on R1 B) Nothing needs to be configured
C) Create a sub-interface on R1 D) Change the routing protocol to OSPF
 
Answer & Explanation Answer: A) Implement a passive-interface on R1

Explanation:

Explanation: To block RIP broadcasts on an interface connected to a subnet of a RIP-enabled network add the passive-interface command to the RIP Process

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

0 2190
Q:

[CO-OM-OPA] When creating an overhead cost order, the settlement rule must be entered in the control data. Which settlement receivers are available for internal orders?

A. Asset
B. Cost center
C.Orders
D. General ledger accounts
E. Vendor

Answer

Answer : A , B , C , D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP CO

0 2188
Q:

Identify the fields in the Data Link portion of an Ethernet frame?

Answer

The fields in the Data Link portion of a frame include the Preamble, Start Frame Delimiter, Destination MAC address, Source MAC address, Length or Type, Data, and Frame Check Sequence.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2187