Certification Questions

Q:

Project Risk Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Risk Identification?

Answer

I. Inputs



  • Enterprise environmental factors

  • Organizational process assets

  • Project scope statement

  • Risk management plan

  • Project management plan


II. Tools and Techniques



  • Documentation reviews

  • Information gathering techniques

  • Checklist analysis

  • Assumptions analysis

  • Diagramming techniques


III. Outputs



  • Risk register

Report Error

View answer Workspace Report Error Discuss

0 1899
Q:

You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed.

 

The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy.

 

You need to implement security in the assembly. What should you do?

A) Implement declarative security and execute the permission demand to allow access to the file system and Windows registry. B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
C) Implement imperative security and execute the permission demand to allow access to the file system and Windows registry. D) Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.
 
Answer & Explanation Answer: B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.

Explanation:

You can use declarative code access security to request permissions for the entire assembly. SecurityAction flags that can be specified in an assembly-wide directive. When SecurityAction.RequestMinimum is specified, it makes a request to the common language runtime to be granted the requested permission. If the requested permission is not granted by the security policy, the assembly will not execute. A  Security Action.RequestOptional is similar, but the assembly will still run even if the requested permission is not granted. Specifying security Action. RequestRefuse requests that the assembly be denied the specified permission.

 

You must use the Assembly (assembly) directive when specifying these actions as follows: 

 

Option A:

There are only three Security actionAttributes targets for an assembly: RequestMinimumAssembly, RequestOptionalAssembly, and RequestRefuseAssembly. 

 

 Option C, D:

Imperative security does not work well to configure security for an entire assembly. In imperative security, permission to execute is demanded at run time.

Report Error

View Answer Report Error Discuss

1 1898
Q:

You want to monitor and configure your organization's removable media, including a tape library and optical discs. Which Windows 2000 tool can you use to do this?

A) Remote Storage B) Sounds and Multimedia
C) Imaging D) Removable Storage
 
Answer & Explanation Answer: D) Removable Storage

Explanation:

Removable Storage is the Windows 2000 tool used to manage removable media. Remote Storage is not the correct answer here because it is used  to manage nonremovable (fixed) media on a Windows 2000 computer

Report Error

View Answer Report Error Discuss

0 1897
Q:

What needs to be done to make the queries work after changes are made to an InfoProvider?

A. Re-Generate the queries.

B. Nothing can be done.

C. Delete and re-create the queries.

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

0 1897
Q:

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). On a file server, you have a shared folder named Data. The Data folder has the permissions shown in the following table:

You need to ensure that members of a group named Sales can modify content in the Data share. Sales group members must only be allowed to delete files that they create. Which additional permission should you assign to the Sales group?

A) On the Data folder, allow the Write permission. B) On the Data folder, allow the Modify permission.
C) On the Data share, allow the Change permission. D) On the Data share, allow the Full Control permission.
 
Answer & Explanation Answer: A) On the Data folder, allow the Write permission.

Explanation:
Report Error

View Answer Report Error Discuss

2 1888
Q:

[CO-OM-CCA] Assessment is designed for what?

A. It classifies the specific activities provided y a cost center along cost allocation lines.

B. Allocation of primary and secondary costs from a sender to receiver controlling objects.

C. Allocation of amounts within CO across company codes.

D. Activating plan integration with Orders and projects.

Answer

Answer : B

Report Error

View answer Workspace Report Error Discuss

Subject: SAP CO

0 1884
Q:

Project Scope Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Scope Planning ?

Answer

I. Inputs



  • Enterprise environmental factors

  • Organizational process assets

  • Project charter

  • Priliminary project scope statement


II. Tools and Techniques



  • Expert Judgment

  • Templates, forms, standards


III. Outputs



  • Project scope management plan

Report Error

View answer Workspace Report Error Discuss

0 1883
Q:

Which of the following are displayed in File Explorer ?

A) Only OneDrive B) Only Storage locations
C) Both A & B D) Hardware devices such as monitors, printers, and cameras
 
Answer & Explanation Answer: C) Both A & B

Explanation:

Storage locations and OneDrive are both displayed in File Explorer.

Report Error

View Answer Report Error Discuss

9 1878