Certification Questions

Q:

Which common usage scenario is missing from the list of usage scenarios below? Implement SAP solution, Monitor SAP solutions, Manage Service Desk, Link to SAP Services, Upgrade SAP solutions

A. Manage change Requests
B. Monitor Service Desk
C. Link to change Request
D. Implement SAP Services

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

4 3081
Q:

Which of the statements are true when running the dunning program

A. we can recreate the proposal until the dunning clerk is satisfied with the result

B. after completing the dunning proposal list, dunning data is updated in the master records of respective customer/ vendor

C. we cannot delete the proposal

D. we can edit proposal

Answer

Answer : A , D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

2 3072
Q:

A Transparent DBMS

A) Keep its logical structure hidden from users B) Can access control
C) Keeps its physical structure hidden from users D) Can not hide sensitive information from users
 
Answer & Explanation Answer: C) Keeps its physical structure hidden from users

Explanation:

DBMS :: Database Managemet System.

A DBMS which keeps its physical structure hidden from the user is known as a transparent DBMS.

Report Error

View Answer Report Error Discuss

2 3052
Q:

Two workers have established wireless communication directly between their wireless laptops. What type of wireless topology has been created by these employees?

A) BSS B) SSID
C) IBSS D) ESS
 
Answer & Explanation Answer: C) IBSS

Explanation:

Two wireless hosts directly connected wirelessly is no different then two hosts connecting with a crossover cable. They are both ad-hoc networks, but in wireless, we call this an independent Basic Service Set(IBSS).

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3051
Q:

Two connected routers are configured only with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?

A) The updated information will be added to the existing routing table B) The update will be ignored and no further action will occur
C) The updated information will replace the existing routing table entry D) The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence
 
Answer & Explanation Answer: B) The update will be ignored and no further action will occur

Explanation:

When a routing update is received by a router, the router first checks the administrative distance (AD) and always chooses the route with the lowest AD. However, if two routes are received and they both have the same AD and differing metrics , then the router will choose the one route with the lowest metrics or , in RIP's case, hop count.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3047
Q:

A sales area is composed of...

A. Division

B. Sales organization

C. Distribution channel

D. Plant

Answer

Answer : A , B , C

Report Error

View answer Workspace Report Error Discuss

Subject: SAP SD

0 3043
Q:

Project Procurement Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Contract Administration?

Answer

I. Inputs



  • Contract

  • Contract management plan

  • Selected sellers

  • Performance reports

  • Approved change requests

  • Work performance information


II. Tools and Techniques



  • Contract change control system

  • Buyer-conducted performance review

  • Inspections and audits

  • Performance reporting

  • Payment system

  • Claims administration

  • Records management system

  • Information technology


III. Outputs



  • Contract documentation 

  • Requested changes

  • Recommended corrective actions

  • Organizational process assets (updates)

  • Project management plan (updates)


                 - Procurement management plan


                 - Contract management plan

Report Error

View answer Workspace Report Error Discuss

0 3035
Q:

You have a computer named Computer1 that runs Windows 7. You need to ensure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network. What should you do?

A) From Windows Firewall with Advanced Security, create a new rule. B) From the local Group Policy, modify the application control policies.
C) From Windows Firewall, modify the Allowed Programs and Features list. D) From Network and Sharing Center, modify the Advanced Sharing settings.
 
Answer & Explanation Answer: A) From Windows Firewall with Advanced Security, create a new rule.

Explanation:
Report Error

View Answer Report Error Discuss

0 3035