Certification Questions

Q:

A company that you previously worked for is seeking new employees and you are trying to exolain the culture to a potential candidate. The company has strict policies, supervisory control, and rules. Team members are not encouraged to be individualistic nor offer feedback to upper management. Many times, the team feels its input is not valuable or implemented. This explanation describes a company that utilizes what employee management theory?

A) Meridith and Mann's Autocratic Management Theory B) Deming's Zero Defects Theory
C) Kerzner's Earned value Theory D) DMcGregor's X Theory
 
Answer & Explanation Answer: D) DMcGregor's X Theory

Explanation:

Answer A is incorrect because Meridith and Mann did not develop an autocratic management theory.Answer B is incorrect because Deming's theories did not involve any of the X and Y theories that were developed by McGregor. Answer C is incorrect because Earned value is not related to X or Y management theories.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3775
Q:

Which among the following keys are used to identify each row of the table uniquely?

A) Primary key B) Unique key
C) Partial key D) None of the above
 
Answer & Explanation Answer: A) Primary key

Explanation:

Primary key helps us to identify a row uniquely in a relation

Report Error

View Answer Report Error Discuss

2 3770
Q:

During the Payroll run, master data and time data changes that affect the payroll past, payroll present and payroll future are not permitted.

A) TRUE B) FALSE
Answer & Explanation Answer: B) FALSE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP HR

1 3764
Q:

What are the minimum requirements to run an ad on the Search Network?

Answer

Text ad, keyword list, and a default bid.

Report Error

View answer Workspace Report Error Discuss

10 3762
Q:

You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do your network?

A) Add more routers B) Use the auto secure command
C) Implement IDS/IPS D) Configure Naggle
 
Answer & Explanation Answer: C) Implement IDS/IPS

Explanation:

Implementing Intrusion Detection Service and Intrusion prevention Service (IDS/IPS) will help notify you and stop attacks in real time.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 3760
Q:

What happens when the Quality Score of a keyword is increased?

Answer

The ad may earn a higher average position.

Report Error

View answer Workspace Report Error Discuss

9 3758
Q:

Where is a Web Intelligence variable stored?

A. In the document

B. In the Central Management Server (CMS)

C. In the Metadata Cube

D. In the cell

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

2 3757
Q:

What is one benefit of My Client Center?

Answer

A dashboard that provides summaries of different metrics for all of your clients’ accounts.

Report Error

View answer Workspace Report Error Discuss

8 3753