Certification Questions

Q:

Before you can create cost centers, you must first create a _______ heirarchy.

A. Logical

B. Optimum

C. Complete

D. Standard

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP CO

0 2055
Q:

For employees who do not use time recording, actual times for processing type M can also be recorded using the ... infotype.

A. Interval

B. Wage

C. Identity

D. Overtime

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP HR

0 2054
Q:

You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed.

 

The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy.

 

You need to implement security in the assembly. What should you do?

A) Implement declarative security and execute the permission demand to allow access to the file system and Windows registry. B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
C) Implement imperative security and execute the permission demand to allow access to the file system and Windows registry. D) Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.
 
Answer & Explanation Answer: B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.

Explanation:

You can use declarative code access security to request permissions for the entire assembly. SecurityAction flags that can be specified in an assembly-wide directive. When SecurityAction.RequestMinimum is specified, it makes a request to the common language runtime to be granted the requested permission. If the requested permission is not granted by the security policy, the assembly will not execute. A  Security Action.RequestOptional is similar, but the assembly will still run even if the requested permission is not granted. Specifying security Action. RequestRefuse requests that the assembly be denied the specified permission.

 

You must use the Assembly (assembly) directive when specifying these actions as follows: 

 

Option A:

There are only three Security actionAttributes targets for an assembly: RequestMinimumAssembly, RequestOptionalAssembly, and RequestRefuseAssembly. 

 

 Option C, D:

Imperative security does not work well to configure security for an entire assembly. In imperative security, permission to execute is demanded at run time.

Report Error

View Answer Report Error Discuss

1 2053
Q:

Project Integration Management - Processes

Describe the Inputs, Tools and Techniques, Outputs of Monitor and Control Project Work phase?

Answer

I. Inputs



  • Project management plan

  • Work performance information

  • Rejected Change requests


II. Tools and Techniques



  • Project management methodology

  • Project management information system

  • Earned value technique

  • Expert Judgment


III. Outputs



  • Recommended corrective actions

  • Recommended preventive actions

  • Forecasts

  • Recommended defect repair

  • Requested changes 

Report Error

View answer Workspace Report Error Discuss

1 2052
Q:

You are creating an ASP.NET application for XYZ. The company data is stored in a Microsoft SQL Server 6.5 database. Your application generates accounting summary reports based on transaction tables that contain million of rows.


You want your application to return each summary report as quickly as possible. You need to configure your application to connect to the database and retrieve the data in a away that achieves this goal.


What should you do?

A) Use a SqlConnection object to connect to the database, and use a SqlCommand object to run a stored procedure that returns the data. B) Use an OleDbConnection object to connect to the database, and use an OleDbCommand object to run a stored procedure that returns the data.
C) Configure SQL Server to support HTTP access, and create an XML template to run a stored procedure that returns the data in XML format. D) Use COM interop to create an ADODB.Connection object, and use an ADODB.Command object to run a SQL statement that returns the data.
 
Answer & Explanation Answer: B) Use an OleDbConnection object to connect to the database, and use an OleDbCommand object to run a stored procedure that returns the data.

Explanation:

We need to use an OleDBConnection to connect to SQL Server Version 6.5 (or earlier). 

 

Incorrect Answers:

 

A: We could use a SqlConnection object only if the SQL Server were SQL Server 7.0, 2000 or later.

 

C: HTTP functionality is not required in this scenario. It would introduce unnecessary overhead.

 

D: ADODB is a legacy standard and should not be used here

Report Error

View Answer Report Error Discuss

1 2050
Q:

You want to move the Philadelphia OU from the acme1.com domain to the acme2.com domain. Which tool should you use?

A) MoveTree.exe B) The move command -line utility
C) Server Extensions Administrator D) Active Directory Domains and Trusts
 
Answer & Explanation Answer: A) MoveTree.exe

Explanation:

Use MoveTree.exe to move Active Directory objects from one domain to another.

Report Error

View Answer Report Error Discuss

0 2048
Q:

A solution developer needs to configure the HTTP listener of an Integration Server on a Linux Server.

Which operating system privileges does the developer need to modify Integration node
properties and properties of integration node resources?

A) root user B) mqm
C) mqbrks D) mqm and mqbrks
 
Answer & Explanation Answer: A) root user

Explanation:
Report Error

View Answer Report Error Discuss

14 2045
Q:

You are a Web developer for XYZ. You create an ASP.NET application that accesses sales and marketing data. The data is stored in a Microsoft SQL Server 2000 database on a server named XYZ01.


The company purchases a factory automation software application. The application is installed on XYZ01, where it creates a second instance of SQL Server 2000 named Factory and a database named FactoryDB. You connect to FactoryDB by using Windows Integrated authentication.


You want to add a page to your ASP.NET application to display inventory data from  FactoryDB. You use a SqlConnection object to connect to the database. You need to create a connection string to FactoryDB in the instance of SQL Server named Factory on XYZ01. Which string should you use?

A) ?Server=XYZ01;Data Source=Factory; Initial Catalog=FactoryDB;Integrated Security=SSPI? B) ?Server=XYZ01;Data Source=Factory; Database=FactoryDB;Integrated Security=SSP1?
C) ?Data Source=XYZ01\Factory; Initial Category=Factory; Integrated Security=SSP1? D) ?Data Source=XYZ01\Factory; Database=FactoryDB; Integrated Security=SSP1?
 
Answer & Explanation Answer: D) ?Data Source=XYZ01\Factory; Database=FactoryDB; Integrated Security=SSP1?

Explanation:

The Data Source attribute of the connection string contains the name, instance or network address of the instance of SQL Server to which to connect. In this scenario we are to connect to the Factory Instance on XYZ01 so we use XYZ01\Factory as data source. To specify the database we should either use the Database or the Initial Catalog attribute. Here we use Database=FactoryDB.

 

Incorrect Answers:

 

A, B: There is no Server attribute in the connection string. Instead we should use the Data Source attribute to specify the server and the instance.

 

C: There is no Initial Category attribute in the connection string. We can use Database or the Initial Catalog attribute to specify the database.

Report Error

View Answer Report Error Discuss

0 2043