Certification Questions

Q:

You are a project manager for the redevelopment of the Hoover Dam. Your team has been provided with the scope statement, but it lacks many description details. Your team is concerned because the project is in the initiation phase and it wants to postpone it until it has more information. As the project manager, you recommend that

A) The team should go forward, but be caution about the lack of details and the impact upon the timeline for the project B) The project should not go forward until the stakeholders agree about the scope and purpose of the project
C) The team should verify the scope and realize that more details will be available as more project characteristics are progressively elaborated. D) The team should review the project selection criteria for the Hoover Dam project
 
Answer & Explanation Answer: C) The team should verify the scope and realize that more details will be available as more project characteristics are progressively elaborated.

Explanation:

The project details and description will usually have less detail at the beginning of the project and will increase as the characteristics are progressively elaborated. Answer A is incorrect because the team should confirm that they understand the esence of the scope of the project, even if the details might be ambiguous at the beginning of the project. Answer B is incorrect because the project should go forward; however, the team should request further clarification of what the project scope entails. Answer D is incorrect because the project selection criteria should be established before the project begins.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3367
Q:

Which of the statements are true when running the dunning program

A. we can recreate the proposal until the dunning clerk is satisfied with the result

B. after completing the dunning proposal list, dunning data is updated in the master records of respective customer/ vendor

C. we cannot delete the proposal

D. we can edit proposal

Answer

Answer : A , D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

2 3356
Q:

An administrator issues the command

A. The PC host PC1 has connectivity with a local host
B. The PC host PC1 has connectivity with a Layer 3 device
C. The PC host PC1 has a default gateway correctly configured
D. The PC host PC1 has connectivity up to Layer 5 of the OSI model
E. The PC host PC1 has the TCP/IP protocol stack correctly installed

Answer

Answer : E


Explanation:


The “ping 127.0.0.1″ command is used to troubleshoot the local network card and the TCP/IP stack to make sure is working correctly. If an ICMP echo reply is received, that shows there are connectivity to a particular host in the network.


 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 3352
Q:

Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask is 255.255.25.224?

A) Router(config)#ip classless B) Router(config)#ip version 6
C) Router(config)#ip unnumbered D) Router(config)#ip subnet-zero
 
Answer & Explanation Answer: D) Router(config)#ip subnet-zero

Explanation:

A Class C subnet mask of 255.255.255.224 is 3 bits on and 5 bits off (11100000) and provides 8 subnets, each with 30 hosts. However, if the command ip subnet-zero is not used, then only 6 subnets would be available for use.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3345
Q:

Multiple users can share a local temporary table

A) TRUE B) FALSE
Answer & Explanation Answer: B) FALSE

Explanation:

Multiple users can't share a local temporary table

Report Error

View Answer Workspace Report Error Discuss

0 3343
Q:

Can’t update primary table’s primary key if row being modified has related rows in secondary table once referential integrity is enforced

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

0 3309
Q:

You are archiving a Security Log for later analysis in a spreadsheet. Which file type should you assign to the log when you save it?

A) .evt B) ,txt
C) .csv D) .exe
 
Answer & Explanation Answer: C) .csv

Explanation:

Saving the Security Log as a comma - delimited file is probably the best choice if you want to analyze the data later in a spreadsheet.

Report Error

View Answer Report Error Discuss

0 3306
Q:

What is frame tagging?

Answer

Frame identification (frame tagging) uniquely assigns a user-defined ID to each frame. This is sometimes reffered to as a VLAN ID or color.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 3297