Certification Questions

Q:

You have recently been promoted to a project manager for a clinical testing facility. The team is developing a new product that will cut down on testing interval requirements for a new seizure management medication. After you become involved with the project, you decide to add more research reports, which the customer did not request. This is an example of 

A) Good customer service scope B) Scope creep
C) Due diligence D) Gold Plating
 
Answer & Explanation Answer: D) Gold Plating

Explanation:

Answer A is incorrect because you are providing a service that the customer did not request; therefore, it might not be important to her and unnecessary. Answer B is incorrect because scope creep is generally an expansion of the scope of the project at the customer's request and the customer did not request these reports. Answer C is incorrect because an additional report does not always mean increased diligence with a project.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3741
Q:

What are the minimum requirements to run an ad on the Search Network?

Answer

Text ad, keyword list, and a default bid.

Report Error

View answer Workspace Report Error Discuss

10 3741
Q:

You have a portable computer named Computer1 that runs Windows 7.
You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1.


You need to configure Computer1 to meet the following requirements:
Ensure that cached files from Share1 are encrypted.
Ensure that files located in Share1 are available when Server1 is disconnected from the network.


What should you do?

A) On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline. B) On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline.
C) On Computer1, make Share1 available offline and enable encryption of offline files. D) On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive Encryption.
 
Answer & Explanation Answer: C) On Computer1, make Share1 available offline and enable encryption of offline files.

Explanation:
Report Error

View Answer Report Error Discuss

3 3735
Q:

What is the specific term for the unwanted signal interference from adjacent pairs in the cable?

A) EMI B) RFI
C) Crosstalk D) Attenuation
 
Answer & Explanation Answer: C) Crosstalk

Explanation:

The term for the unwanted signal interference from adjacent pairs in the cable is crosstalk

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3723
Q:

You are preparing to install Windows 2000 on a computer, and you want this computer to be able to dual  boot between Windows 2000 and Windows 98. Which file system should you use?

A) FAT B) NTFS
C) HPFS D) You can use either FAT or NTFS
 
Answer & Explanation Answer: A) FAT

Explanation:

If you want your computer to dual boot between Windows 2000 and windows 98, you should choose the FAT or FAT 32 file system, because Windows 98 does not support NTFS or HPFS, and Windows 2000 does not support HPFS.

Report Error

View Answer Report Error Discuss

0 3715
Q:

Which layer is responsible for keeping the data from different applications seperate on the network?

Answer

The session layer creates sessions between different host's applications.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

5 3709
Q:

Given the following network range 192.168.0.0/24. We want minimum 50 hosts on each of the available subnets. What will be the subnet mask?

A) /24 B) /25
C) /26 D) /27
 
Answer & Explanation Answer: C) /26

Explanation:

Explanation: 50 hosts require 6 bits of the last octet giving us 64 -2 = 62 possible hosts this satisfies our requirement and leaves us 2 bits over for the subnets. The default mask is /24 or 255.255.255.0 adding the 2 bits for the subnets it becomes 255.255.255.192 or /26

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

1 3704
Q:

In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?

A) All hosts have equal priority B) The two hosts that caused the collision will have equal priority
C) The host that sent the jam signal after the collision D) The host with the highest MAC address
 
Answer & Explanation Answer: A) All hosts have equal priority

Explanation:

After the expiration of the backoff algorithm , all hosts have equal priority.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3701