Certification Questions

Q:

You plan to deploy your ASP.NET application over XYZ’s intranet. The application uses data retrieved from a Microsoft SQL Server database. You want to use SQL Server connection pooling to optimize performance. You also need to protect confidential data stored on the server while minimizing administrative costs.

 

You need to configure security for your application. What should you do?

A) Use Microsoft Windows authentication in the application. Enable impersonation for users to access the SQL Server database from your application. B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.
C) Use form-based authentication in the application. Use the system administrator (sa) SQL Server login for users to access the SQL Server database from your application. D) Use form-based authentication in the application. Assign each user a separate SQL Server login to use to access the SQL Server database from your application.
 
Answer & Explanation Answer: B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.

Explanation:

We should only use one account to access the SQL Server database. This ensures that connection pooling is optimized.

 

Incorrect Answers:

A: We should only use a single account to access the SQL Server database.

C: Form-based authentication is less secure. Furthermore, running as the System Administrator with the sa login would compromise security.

D: Form-based authentication is less secure. Furthermore, creating a separate SQL Server login for each user is a daunting administrative task.

Report Error

View Answer Report Error Discuss

0 2035
Q:

What function are available during packing?

A. Proposing allowed handling units.

B. Performing multi-level packing.

C. Automatically dividing the delivery items among handling units.

D. Packing or unpacking handling units.

Answer

Answer : A , B , C, ,D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP SD

0 2035
Q:

For most large companies, in terms of ease of network administration, what is the optimum number of Active Directory domains to use on their Windows 2000 network?

A) 1 B) 2
C) 3 D) More than 3
 
Answer & Explanation Answer: A) 1

Explanation:

Using a single domain greatly simplifies the administration of your network

Report Error

View Answer Report Error Discuss

0 2027
Q:

You are experiences problems when starting Word 2010. The software just keeps on crashing and never fully loads. Your colleague has recommended that you start Word in a particular mode. What could this be?

A) Safe Mode B) Private Mode
C) Easy Mode D) Invulnerable mode
 
Answer & Explanation Answer: A) Safe Mode

Explanation:
Report Error

View Answer Report Error Discuss

2 2026
Q:

What is an Extension of Entity Type?

Answer

The collections of entities of a particular Entity Type are grouped together into an entity set.

Report Error

View answer Workspace Report Error Discuss

0 2025
Q:

imageview2

You are the administrator of network X. You decided to implement RIP in the following topology (click exhibit). You do not want R3 to receive RIP updates. What configuration changes need to be implemented?

A) Implement a passive-interface on R1 B) Nothing needs to be configured
C) Create a sub-interface on R1 D) Change the routing protocol to OSPF
 
Answer & Explanation Answer: A) Implement a passive-interface on R1

Explanation:

Explanation: To block RIP broadcasts on an interface connected to a subnet of a RIP-enabled network add the passive-interface command to the RIP Process

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

0 2025
Q:

Project Risk Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Qualitative Risk Analysis?

Answer

I. Inputs



  • Organizational process assets

  • Project scope statement 

  • Risk management plan

  • Risk register


II.  Tools and Techniques



  • Risk probability and impact assesment

  • Probability and impact matrix

  • Risk data quality assessment

  • Risk categorization 

  • Risk Urgency assessment


III. Outputs



  • Risk register (updates)

Report Error

View answer Workspace Report Error Discuss

0 2016
Q:

Project Quality Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Perform Quality Control?

Answer

I. Inputs



  • Quality management plan

  • Quality metrics 

  • Quality checklists

  • Organizational process assets

  • Work performance information

  • Approved change requests

  • Deliverables


II. Tools and Techniques



  • Cause and effect diagram

  • Control charts

  • Flow Charting

  • Histogram

  • Pareto chart

  • Run chart

  • Scatter diagram

  • Statistical sampling

  • Inspection

  • Defect repair review


III. Outputs



  • Quality control measurements

  • Validated defect repair

  • Quality baseline (updates)

  • Recommended corrective actions

  • Recommended preventive actions

  • Requested changes

  • Recommended defect repair

  • Organization process assets (updates)

  • Validated deliverables

  • Project management plan (updates)


 


 

Report Error

View answer Workspace Report Error Discuss

0 2016