Certification Questions

Q:

You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed.

 

The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy.

 

You need to implement security in the assembly. What should you do?

A) Implement declarative security and execute the permission demand to allow access to the file system and Windows registry. B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
C) Implement imperative security and execute the permission demand to allow access to the file system and Windows registry. D) Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.
 
Answer & Explanation Answer: B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.

Explanation:

You can use declarative code access security to request permissions for the entire assembly. SecurityAction flags that can be specified in an assembly-wide directive. When SecurityAction.RequestMinimum is specified, it makes a request to the common language runtime to be granted the requested permission. If the requested permission is not granted by the security policy, the assembly will not execute. A  Security Action.RequestOptional is similar, but the assembly will still run even if the requested permission is not granted. Specifying security Action. RequestRefuse requests that the assembly be denied the specified permission.

 

You must use the Assembly (assembly) directive when specifying these actions as follows: 

 

Option A:

There are only three Security actionAttributes targets for an assembly: RequestMinimumAssembly, RequestOptionalAssembly, and RequestRefuseAssembly. 

 

 Option C, D:

Imperative security does not work well to configure security for an entire assembly. In imperative security, permission to execute is demanded at run time.

Report Error

View Answer Report Error Discuss

1 2138
Q:

A solution developer needs to configure the HTTP listener of an Integration Server on a Linux Server.

Which operating system privileges does the developer need to modify Integration node
properties and properties of integration node resources?

A) root user B) mqm
C) mqbrks D) mqm and mqbrks
 
Answer & Explanation Answer: A) root user

Explanation:
Report Error

View Answer Report Error Discuss

14 2137
Q:

Which Event Viewer log can you use to view the results of auditing?

A) Application Log B) Security Log
C) System Log D) Directory Service Log
 
Answer & Explanation Answer: B) Security Log

Explanation:

Audited events are written to the Security Log in Event Viewer.

Report Error

View Answer Report Error Discuss

0 2134
Q:

Which tab should you use to change the page orientation of a report?

A. Select the report tab; in Report Manager, select the Properties tab and select the Page Orientation

B. Click File Page Setup and select Page Orientation

C. In InfoView Preferences, change the default page orientation

D. Select the report page; in Report Manager, select the Properties tab and select the Page Orientation

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

7 2129
Q:

You want to configure a static IP address on a Windows 2000 Server  computer on which you want to install the DNS Server service and Active Directory. What tool should you use to configure the static IP address?

A) IPconfig.exe B) DNS administrative tool
C) Active Directory Users and Computers D) Network and Dial-up connections folder
 
Answer & Explanation Answer: D) Network and Dial-up connections folder

Explanation:

A static IP address is specified by configuring the Local Area Connection in the Network and Dial - up Connections folder.

Report Error

View Answer Report Error Discuss

0 2128
Q:

Project Scope Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Scope Verification ?

Answer

I. Inputs



  • Project scope statement

  • WBS dictionary

  • Project scope management plan

  • Deliverables


II. Tools and Techniques



  • Inspection


III. Outputs



  • Accepted  deliverables

  • Requested changes

  • Recommended corrective actions

Report Error

View answer Workspace Report Error Discuss

0 2126
Q:

You would like to use the command line to end an application that a Terminal Services client is running. What command can you use?

A) Tscon B) Tsprof
C) Tsend D) Tskill
 
Answer & Explanation Answer: D) Tskill

Explanation:

Tskill ends a process. Since you want to stop an application, this is the command you would use.

Report Error

View Answer Report Error Discuss

0 2123
Q:

Individual calcualtion methods which can be assigned to Depreciation key.

A. Declining balance methods
B. Maximum amounts methods
C. Multilevel methods
D. Period control Methods

Answer

Answer : A ,B , C ,D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

0 2123