Certification Questions

Q:

Project Time Management - Processes

Describe the Inputs, Tools and Techniques, Outputs of Schedule Control ?

Answer

I. Inputs



  • Schedule management plan

  • Schedule baseline

  • Performance reports

  • Approved change requests


II. Tools and Techniques



  • Progress reporting

  • Schedule change control system

  • Performance measurement

  • Project management software

  • Variance analysis

  • Schedule comparision bar charts


III. Outputs



  • Schedule model data (updates)

  • Schedule baseline (updates)

  • Performance measurements

  • Requested changes

  • Recommended corrective actions

  • Organizational process assets (updates)

  • Activity list (updates)

  • Activity attributes (updates)

  • Project management plan (updates)

Report Error

View answer Workspace Report Error Discuss

0 2145
Q:

Project Scope Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Scope control ?

Answer

I. Inputs



  • Project scope statement

  • Work breakdown structure

  • WBS dictionary

  • Project scope management plan

  • Performance reports

  • Approved change requests

  • Work performance information


II. Tools and Techniques



  • Change control system

  • Variance analysis

  • Replanning

  • Configuration management system


III. Outputs



  • Project scope statement(updates)

  • Work breakdown structure(updates)

  • WBS dictionary (updates)

  • Scope baseline (updates)

  • Requested changes

  • Recommended  corrective action

  • Organizational process assets (updates)

  • Project management plan (updates)

Report Error

View answer Workspace Report Error Discuss

0 2145
Q:

You plan to deploy your ASP.NET application over XYZ’s intranet. The application uses data retrieved from a Microsoft SQL Server database. You want to use SQL Server connection pooling to optimize performance. You also need to protect confidential data stored on the server while minimizing administrative costs.

 

You need to configure security for your application. What should you do?

A) Use Microsoft Windows authentication in the application. Enable impersonation for users to access the SQL Server database from your application. B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.
C) Use form-based authentication in the application. Use the system administrator (sa) SQL Server login for users to access the SQL Server database from your application. D) Use form-based authentication in the application. Assign each user a separate SQL Server login to use to access the SQL Server database from your application.
 
Answer & Explanation Answer: B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.

Explanation:

We should only use one account to access the SQL Server database. This ensures that connection pooling is optimized.

 

Incorrect Answers:

A: We should only use a single account to access the SQL Server database.

C: Form-based authentication is less secure. Furthermore, running as the System Administrator with the sa login would compromise security.

D: Form-based authentication is less secure. Furthermore, creating a separate SQL Server login for each user is a daunting administrative task.

Report Error

View Answer Report Error Discuss

0 2144
Q:

Project Life Cycle

What is the Project Life Cycle?

Answer

Project managers or the organization can divide projects into phases to provide better management control with appropriate links to the ongoing operations of the performing organization. Collectively, these phases are known as the project life cycle.

Report Error

View answer Workspace Report Error Discuss

0 2143
Q:

Project Risk Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Qualitative Risk Analysis?

Answer

I. Inputs



  • Organizational process assets

  • Project scope statement 

  • Risk management plan

  • Risk register


II.  Tools and Techniques



  • Risk probability and impact assesment

  • Probability and impact matrix

  • Risk data quality assessment

  • Risk categorization 

  • Risk Urgency assessment


III. Outputs



  • Risk register (updates)

Report Error

View answer Workspace Report Error Discuss

0 2141
Q:

When should a DSO be used?

A. When Data needs to be overwritten.

B. When highly granular data is required in reports

C. All of the above.

Answer

Answer : C

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

1 2140
Q:

You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed.

 

The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy.

 

You need to implement security in the assembly. What should you do?

A) Implement declarative security and execute the permission demand to allow access to the file system and Windows registry. B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
C) Implement imperative security and execute the permission demand to allow access to the file system and Windows registry. D) Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.
 
Answer & Explanation Answer: B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.

Explanation:

You can use declarative code access security to request permissions for the entire assembly. SecurityAction flags that can be specified in an assembly-wide directive. When SecurityAction.RequestMinimum is specified, it makes a request to the common language runtime to be granted the requested permission. If the requested permission is not granted by the security policy, the assembly will not execute. A  Security Action.RequestOptional is similar, but the assembly will still run even if the requested permission is not granted. Specifying security Action. RequestRefuse requests that the assembly be denied the specified permission.

 

You must use the Assembly (assembly) directive when specifying these actions as follows: 

 

Option A:

There are only three Security actionAttributes targets for an assembly: RequestMinimumAssembly, RequestOptionalAssembly, and RequestRefuseAssembly. 

 

 Option C, D:

Imperative security does not work well to configure security for an entire assembly. In imperative security, permission to execute is demanded at run time.

Report Error

View Answer Report Error Discuss

1 2138
Q:

Project Human Resource Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Human Resource Planning?

Answer

I. Inputs



  • Enterprise Environmental factors

  • Organizational process assets

  • Project management plan


                  - Activity resource requirements


II. Tools and Techniques



  • Organization charts and position descriptions 

  • Networking

  • Organizational theory


III. Outputs



  • Roles and responsibilities

  • Project organization charts

  • Staffing management plan

Report Error

View answer Workspace Report Error Discuss

0 2137