Certification Questions

Q:

Why is it a bad idea to duplicate keywords in multiple Ad Groups?

Answer

Keywords in multiple ad groups compete against each other, and the keyword with the higher performance will trigger the ad in that Ad Group to run.

Report Error

View answer Workspace Report Error Discuss

0 2338
Q:

Which of the following is primary wage type ?

A. User Wage Type

B. Dialog Wage Type

C. Technical Wage Type

D. Statement Wage Type

Answer

Answer : B

Report Error

View answer Workspace Report Error Discuss

Subject: SAP HR

0 2331
Q:

Which layer ensures the trustworthly transmission of data across a physical link and is primarily concerned with physical addressing, line discipline, network topology, error notification, ordered delivery of frames, and flow control?

Answer

PDUs at the data link layer are called frames and provide physical addressing, plus other options to place packets on the network medium.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2329
Q:

You get a great deal on a refurbished laser printer. The printer is plug and play compliant and connects to your USB port. The printer is on the current Windows 2000 Hardware Compatibility List (HCL). You install the printer and run the manufacturers setup program. During the installation, you receive the error shown in the exhibit (See the exhibit below). What should you do?

A) Change the USB port setting to enable legacy Plug and Play detection. B) Configure the USB port to Disable Error Detection.
C) Connect the printer as a shared device on a non-Windows 2000 computer. D) Install the WDM-compliant device drivers using the Add New Hardware wizard.
 
Answer & Explanation Answer: D) Install the WDM-compliant device drivers using the Add New Hardware wizard.

Explanation:
Report Error

View Answer Report Error Discuss

0 2316
Q:

Project Integration Management - Processes

Describe the Inputs, Tools and Techniques, Outputs of Integrated Change Control Phase?

Answer

I. Inputs



  • Project management plan

  • Requested changes

  • Work performance information

  • Recommended preventive actions

  • Recommended corrective actions

  • Recommended defect repair

  • Deliverables


II. Tools and Techniques



  • Project management methodology

  • Project management information system

  • Expert Judgment


III. Outputs



  • Approved change requests

  • Rejected change requests

  • Project management plan(updates)

  • Project scope statement (updates)

  • Approved corrective actions

  • Approved preventive actions

  • Approved defect repair

  • Validated defect repair

  • Deliverables 

Report Error

View answer Workspace Report Error Discuss

0 2309
Q:

Which commands loads a new version of the Cisco IOS into a router?

A) copy flash ftp B) copy ftp flash
C) copy flash tftp D) copy tftp flash
 
Answer & Explanation Answer: D) copy tftp flash

Explanation:

The command copy tftp flash will allow you to copy a new IOS into flash memory on your router.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2306
Q:

 Which of the following is required for the DB2 optimizer to consider a hash join strategy?

A) Optimization level 1 or above B) Equijion predicates
C) Registry variable DB_ANTIJOIN=YES D) SORTHEAP large enough to contain the tables being joined
 
Answer & Explanation Answer: B) Equijion predicates

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

1 2306
Q:

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You enable auditing for failed logon attempts on all domain controllers. You need to ensure that a record of failed logon attempts is retained for 90 days on all domain controllers. What should you do?

A) From the Security Templates snap in, open the hisecdc template. Modify the Retain System Log setting. B) From the Security Templates snap in, open the securedc template. Modify the Retain Security Log setting.
C) Open the Default Domain Policy. Modify the Retain System Log setting. D) Open the Default Domain Controller Policy. Modify the Retain Security Log setting.
 
Answer & Explanation Answer: D) Open the Default Domain Controller Policy. Modify the Retain Security Log setting.

Explanation:
Report Error

View Answer Report Error Discuss

1 2304