Certification Questions

Q:

Your company has a policy of having every software project reviewed and approved by the Architecture Review Board prior to the construction  phase of a project. you are currently in the process of activity sequencing. This is a example of what?

A) Gatekeeping B) Milestone
C) New scope for the project D) Project integration
 
Answer & Explanation Answer: B) Milestone

Explanation:

The approval by the Architecture Review Board is a milestone you want to include in activity sequencing so that you can ensure the requirements for meeting the review board's approval are met.  Answer A is tempting because the question references phase-end activities; however, it is not an example of gatekeeping because the project is not being authorized to continue based only on the architecture review.Gatekeeping often involves the review of other factors as well. Answer C is incorect because the requirement of a review board approval does not afect scope. Answer D is incorrect because project integration planning involves project plan development, execution, and integrated change control, which are not related to a review board.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

2 5030
Q:

A process that specifies how formal verification and acceptance of the completed project deliverables will be obtained is a part of which plan?

A) Project integration plan. B) WBS development plan.
C) Configuration management plan. D) Scope management plan.
 
Answer & Explanation Answer: D) Scope management plan.

Explanation:

“The work involved in performing the five processes of Project Scope Management is preceded by a planning effort by the project management team. This planning effort is part of the Develop Project Management Plan process, which produces a scope management plan that provides guidance on how project scope will be defined, documented, verified, managed, and controlled. The scope management plan may be formal or informal, highly detailed, or broadly framed, based upon the needs of the project.”

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

2 5014
Q:

The schedule performance index (SPI) is calculated as

A) Planned Value (PV) divided by Earned Value (EV) B) Earned Value(EV) divided by Planned Value (PV)
C) Project duration divided by Earned Value divided by Planned Value (Duration/(EV/PV)) D) Earned Value (EV) minus Planned Value (PV)
 
Answer & Explanation Answer: B) Earned Value(EV) divided by Planned Value (PV)

Explanation:

Answer A is reversed. Answer C is sometimes mistakenly used to forecast project completion (it’s invalid because it does not take into consideration which completed tasks are on the critical path). Answer D is the definition of Schedule Variance. 

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 5009
Q:

What is the purpose of the DHCP server?

A - to provide storage for email
B - to translate URLs to IP addresses
C - to translate IPv4 addresses to MAC addresses
D - to provide an IP configuration information to hosts

Answer

Answer : D


Explanation:The main purpose of the DHCP server is to provide IP configuration parameters to hosts such as the default gateway, domain name, Domain Name System – DNS .

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

3 4999
Q:

The Acme Corporation is implementing dail-up services to enable remote-office employees to connect to the local network. The company uses multiple routed protocols,needs authentication of users connecting to the network, and since some calls will be long distance, needs callback support. Which of the following protocols is the best choice for these remote services? 

A) 802.1 B) Frame Relay
C) HDLC D) PPP
 
Answer & Explanation Answer: D) PPP

Explanation:

PPP is your only option because HDLC and Frame RElay do not support these types of business requirements. PPP provides dynamic addressing , authentication using PAP or CHAP, and callback services.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4971
Q:

The primary goal of financial management is to

A) Expand their share of the market B) Maximize the current value per share of the existing stock
C) Examining whether costs are reasonable or unreasonable D) All the above
 
Answer & Explanation Answer: B) Maximize the current value per share of the existing stock

Explanation:

The primary goals of financial management dwell on both short-term and long-term activities that seek to maximize value creation from scarce financial resources. And then the primary goal of financial management is to Maximize the current value per share of the existing stock.

 

All businesses aim to maximize their profits, minimize their expenses and maximize their market share. Here is a look at each of these goals.

 

Financial management is a process that enables a business to plan, direct, organize, monitor and control its current and future financial resources and events. It involves applying the basic principles of management in financial activities such as purchases, sales, capital expansion, inventory valuation, financial reporting, and profit distribution.

Report Error

View Answer Report Error Discuss

Filed Under: SAP FI
Exam Prep: Bank Exams , CAT
Job Role: Analyst , Bank Clerk , Bank PO

4 4967
Q:

If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?

A) access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet B) access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet
C) access - list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23 D) access - list 100 deny 192.168.10.0 0.0.0.255 any eq 23
 
Answer & Explanation Answer: C) access - list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23

Explanation:

The extended access list ranges are 100 - 199 and 2000 - 2699, so the access-list number of 100 is valid. Telnet uses TCP, so the protocol TCP is valid. Now you just need to look for the source and destination address. only the third option has the correct sequence of parameters. Option B may work, but the question specifically states "only" to network 192.168.10.0, and the wildcard in option B is too broad.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4951
Q:

As a Cisco technician, you need to know EIGRP protocol very well. Which of the following is true about EIGRP successor routes? (Choose two)

A. A successor route is used by EIGRP to forward traffic to a destination
B. Successor routes are stored in the neighbor table following the discovery process
C. Successor routes are flagged as "active" in the routing table
D. A successor route may be backed up by a feasible successor route

Answer

Answer : A  D


 


Explanation:


A and D are correct because successor route is the best and primary route to a remote network. A successor route is used by EIGRP to forward traffic to a destination and is stored in the routing table. Its backed up by a feasible successor route in case the primary route fails, that is stored in the topology table.


B is incorrect because neighbor table only contains a list of directly connected EIGRP routers that have an adjacency with this router, it doesn't contain successor routes.


C is incorrect because successor routes found in the routing table are not flagged as "active”

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

3 4926