Certification Questions

Q:

Project Risk Management

What are the Project Management Processes included in the Project Risk Management? 

Answer

The Project Risk Management Processes include the following:


Risk Management Planning - Deciding how to approach , plan, and execute the risk management activities for a project


Risk Identification - Determining which risks might affect the project and documenting their characteristics.


Qualitative Risk Analysis - Prioritizing risks for subsequent further analysis or action by assessing and combining their probability of occurrence and impact


Quantitative Risk Analysis - Numerically analyzing the effect on overall project objectives of identified risks


Risk Response Planning - Developing options and actions to enhance opportunities , and to reduce threats to project objectives.


Risk Monitoring and Control - Tracking identified risks, monitoring residual risks, identifying new risks, executing risk response plans, and evaluating their effectiveness throughout the project life cycle.

Report Error

View answer Workspace Report Error Discuss

0 2728
Q:

Pat Address Translation is also called what?

A) NAT Fast B) NAT Static
C) NAT Overload D) Overloading Static
 
Answer & Explanation Answer: C) NAT Overload

Explanation:

Another term for port Address Translation is NAT Overload because that is the keyword used to enable port address translation.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2725
Q:

Which master role causes the domain controller that performs this role to be the only domain controller in the forest that can add a new domain to the forest?

A) PDC emulator B) Schema master
C) Relative ID master D) Domain naming master
 
Answer & Explanation Answer: D) Domain naming master

Explanation:

The domain naming master is the only domain controller that can add or remove domains to/form the forest

Report Error

View Answer Report Error Discuss

0 2723
Q:

You want to prevent the creation of administrative shares on a Windows 2000 server computer. What should you do?

A) Nothing. You can't prevent the creation of administrative shares. B) Configure the Advanced options in Configure Your Server
C) Configure the Advanced settings on the View tab in Folder Options D) Use Reged32.exe or the System Policy Editor to edit the registry
 
Answer & Explanation Answer: D) Use Reged32.exe or the System Policy Editor to edit the registry

Explanation:

Edit the registry to prevent the creation of administrative shares.

Report Error

View Answer Report Error Discuss

0 2723
Q:

If there is no gain or loss on the asset retirement, the sales revenue equals to the net book value of the asset.

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP FI

0 2722
Q:

Convert the following from binary format to decimal IP address.

11001100.00110011.10101010.01010101

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

2 2718
Q:

One of the main tasks of asset accounting is to represent the asset portfolio in the detailed form of an asset history sheet.

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP FI

0 2718
Q:

Which layer is used for reliable communication between end nodes over the network and provides mechanisms for establishing , maintaining , and terminating virtual circuits; transport - fault detection and recovery; and controlling the flow of information?

Answer

The Transport layer uses virtual circuits to create a reliable connection between two hosts.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

1 2713