Certification Questions

Q:

What is frame tagging?

Answer

Frame identification (frame tagging) uniquely assigns a user-defined ID to each frame. This is sometimes reffered to as a VLAN ID or color.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 3119
Q:

Can’t update primary table’s primary key if row being modified has related rows in secondary table once referential integrity is enforced

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

0 3118
Q:

You are archiving a Security Log for later analysis in a spreadsheet. Which file type should you assign to the log when you save it?

A) .evt B) ,txt
C) .csv D) .exe
 
Answer & Explanation Answer: C) .csv

Explanation:

Saving the Security Log as a comma - delimited file is probably the best choice if you want to analyze the data later in a spreadsheet.

Report Error

View Answer Report Error Discuss

0 3113
Q:

If you do not want to enter a document with provision for updating the ledger on approval from authorized officials, you use the following functionality

A. sample document

B. recurring document

C. parked document

D. account assignment model

Answer

Answer: D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

8 3101
Q:

Data integrity constraints are used to

A) Ensure that duplicate records are not entered into the table B) Prevent users from changing the values stored in the table
C) Control who is allowed access to the data D) Improve the quality of data entered for a specific property like table column
 
Answer & Explanation Answer: D) Improve the quality of data entered for a specific property like table column

Explanation:

Integrity constraints are used to ensure accuracy and consistency of data in a relational database. Data integrity is handled in a relational database through the concept of referential integrity. Many types of integrity constraints play a role in referential integrity (RI).

 

Hence, Data integrity constraints are used to Improve the quality of data entered for a specific property i.e, table column.

Report Error

View Answer Report Error Discuss

0 3086
Q:

You are installing Windows 2000 on a computer that already has another operating system installed on it. You choose to install Windows 2000 in a different folder than the previously installed operating system. What will Windows 2000 do?

A) Abort the installation process B) Delete the previously installed operating system
C) Display an error message indicating that windows 2000 cannot be installed in a different folder D) Cause the computer to dual boot between Windows 2000 and the previously installed operating system
 
Answer & Explanation Answer: D) Cause the computer to dual boot between Windows 2000 and the previously installed operating system

Explanation:

When windows 2000 is installed in the same folder as the other operating system, Windows 2000 will delete the previously installed operating system. When Windows 2000 is installed in a different folder than the other operating system, it will automatically configure the computer to dual boot between Windows 2000 and the previously installed operating system.

Report Error

View Answer Report Error Discuss

1 3077
Q:

What device must be on your wired network when running an enterprise EAP solution?

Answer

RADIUS Server

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

1 3070
Q:

Who Creates The Project Charter?

A) Sponser B) Stake holder
C) Customer D) None
 
Answer & Explanation Answer: D) None

Explanation:

The project initiator or sponsor should be at a level that is appropriate to funding the project. They will either create the project charter or delegate that duty to the project manager.

Projects are authorized by someone external to the project such as a sponsor, PMO or portfolio steering committee.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification
Job Role: Analyst , Project Manager

10 3065