Certification Questions

Q:

Project Integration Management - Processes

Describe the Inputs, Tools and Techniques, Outputs of Develop Preliminary Project Scope Statement phase?

Answer

I. Inputs



  • Project Charter

  • Project Statement of work

  • Enterprise environmental factors

  • Organizational process assets


II. Tools and Techniques



  • Project management methodology

  • Project management information system

  • Expert Judgment


III. Outputs



  • Preliminary project scope statement 

Report Error

View answer Workspace Report Error Discuss

0 2279
Q:

You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed.

 

The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy.

 

You need to implement security in the assembly. What should you do?

A) Implement declarative security and execute the permission demand to allow access to the file system and Windows registry. B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
C) Implement imperative security and execute the permission demand to allow access to the file system and Windows registry. D) Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.
 
Answer & Explanation Answer: B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.

Explanation:

You can use declarative code access security to request permissions for the entire assembly. SecurityAction flags that can be specified in an assembly-wide directive. When SecurityAction.RequestMinimum is specified, it makes a request to the common language runtime to be granted the requested permission. If the requested permission is not granted by the security policy, the assembly will not execute. A  Security Action.RequestOptional is similar, but the assembly will still run even if the requested permission is not granted. Specifying security Action. RequestRefuse requests that the assembly be denied the specified permission.

 

You must use the Assembly (assembly) directive when specifying these actions as follows: 

 

Option A:

There are only three Security actionAttributes targets for an assembly: RequestMinimumAssembly, RequestOptionalAssembly, and RequestRefuseAssembly. 

 

 Option C, D:

Imperative security does not work well to configure security for an entire assembly. In imperative security, permission to execute is demanded at run time.

Report Error

View Answer Report Error Discuss

1 2277
Q:

In the case of the valuation of time wage types, if the RTE or AMT field contains an amount, the wage type is transferred to the internal table...

A. RF.

B. OT.

C. KX.

D. CT.

Answer

Answer : B

Report Error

View answer Workspace Report Error Discuss

Subject: SAP HR

0 2276
Q:

Project Human Resource Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Acquire Project Team?

Answer

I. Inputs



  • Enterprise environmental factors

  • Organizational process assets

  • Roles and responsibilities 

  • Project organization charts

  • Staffing management plan


II. Tools and Techniques



  • Pre-assignment

  • Negotiation

  • Acquisition

  • Virtual teams


III. Outputs



  • Project staff assignments

  • Resource availability

  • Staffing management plan (updates)

Report Error

View answer Workspace Report Error Discuss

0 2271
Q:

For most large companies, in terms of ease of network administration, what is the optimum number of Active Directory domains to use on their Windows 2000 network?

A) 1 B) 2
C) 3 D) More than 3
 
Answer & Explanation Answer: A) 1

Explanation:

Using a single domain greatly simplifies the administration of your network

Report Error

View Answer Report Error Discuss

0 2263
Q:

In thefollowing output, what type of NAT is being used?

ip nat pool todd-nat 170.168.10,10 170.168.10.20 netmask 255.255.255.0

Answer

Dynamic NAT

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2261
Q:

A solution developer needs to configure the HTTP listener of an Integration Server on a Linux Server.

Which operating system privileges does the developer need to modify Integration node
properties and properties of integration node resources?

A) root user B) mqm
C) mqbrks D) mqm and mqbrks
 
Answer & Explanation Answer: A) root user

Explanation:
Report Error

View Answer Report Error Discuss

14 2259
Q:

[CO-OM-OPA] When creating an overhead cost order, the settlement rule must be entered in the control data. Which settlement receivers are available for internal orders?

A. Asset
B. Cost center
C.Orders
D. General ledger accounts
E. Vendor

Answer

Answer : A , B , C , D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP CO

0 2258