Certification Questions

Q:

For employees who do not use time recording, actual times for processing type M can also be recorded using the ... infotype.

A. Interval

B. Wage

C. Identity

D. Overtime

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP HR

0 1985
Q:

Before you can create cost centers, you must first create a _______ heirarchy.

A. Logical

B. Optimum

C. Complete

D. Standard

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP CO

0 1984
Q:

What is the Classs A Private IP address space?

Answer

10.0.0.0 through 10.255.255.255

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 1983
Q:

A manager in your office received a new Windows 2000 Professional laptop computer. You have been asked to configure offline files for the manager to work on documents at home. You enable offline files, and have the manager log off of the network. During the logoff process, the expected synchronization of offline files does not occur. You have the manager log back on to the network. What can you do to correct the problem?

A) Enable file and print sharing. When the manager logs off, the files will synchronize. B) Manually synchronize all offline files.
C) On the server, make all files available offline. When the manager logs off, the files will synchronize. D) Do nothing. Windows 2000 Professional does not tell you when Synchronization happens.
 
Answer & Explanation Answer: C) On the server, make all files available offline. When the manager logs off, the files will synchronize.

Explanation:
Report Error

View Answer Report Error Discuss

0 1983
Q:

Project Risk Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Risk Identification?

Answer

I. Inputs



  • Enterprise environmental factors

  • Organizational process assets

  • Project scope statement

  • Risk management plan

  • Project management plan


II. Tools and Techniques



  • Documentation reviews

  • Information gathering techniques

  • Checklist analysis

  • Assumptions analysis

  • Diagramming techniques


III. Outputs



  • Risk register

Report Error

View answer Workspace Report Error Discuss

0 1980
Q:

Project Communications Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Manage stakeholders?

Answer

I. Inputs



  • Communications management plan 

  • Organizational process assets


II. Tools and Techniques



  • Communications methods

  • Issue logs


III. Outputs



  • Resolved issues

  • Approved change requests

  • Approved corrective actions 

  • Organizational process assets (updates)

  • Project management plan (updates)

Report Error

View answer Workspace Report Error Discuss

0 1977
Q:

Project Scope Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Scope Planning ?

Answer

I. Inputs



  • Enterprise environmental factors

  • Organizational process assets

  • Project charter

  • Priliminary project scope statement


II. Tools and Techniques



  • Expert Judgment

  • Templates, forms, standards


III. Outputs



  • Project scope management plan

Report Error

View answer Workspace Report Error Discuss

0 1962
Q:

You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed.

 

The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy.

 

You need to implement security in the assembly. What should you do?

A) Implement declarative security and execute the permission demand to allow access to the file system and Windows registry. B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
C) Implement imperative security and execute the permission demand to allow access to the file system and Windows registry. D) Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.
 
Answer & Explanation Answer: B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.

Explanation:

You can use declarative code access security to request permissions for the entire assembly. SecurityAction flags that can be specified in an assembly-wide directive. When SecurityAction.RequestMinimum is specified, it makes a request to the common language runtime to be granted the requested permission. If the requested permission is not granted by the security policy, the assembly will not execute. A  Security Action.RequestOptional is similar, but the assembly will still run even if the requested permission is not granted. Specifying security Action. RequestRefuse requests that the assembly be denied the specified permission.

 

You must use the Assembly (assembly) directive when specifying these actions as follows: 

 

Option A:

There are only three Security actionAttributes targets for an assembly: RequestMinimumAssembly, RequestOptionalAssembly, and RequestRefuseAssembly. 

 

 Option C, D:

Imperative security does not work well to configure security for an entire assembly. In imperative security, permission to execute is demanded at run time.

Report Error

View Answer Report Error Discuss

1 1962