Certification Questions

Q:

Convert the following from decimal IP address to binary format.

192.168.10.15

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2603
Q:

Your network consists of a single Active Directory domain named contoso.com. The functional level of the domain is Windows Server 2003. You have a file server named Server1 that is used to store users' home folders and profiles. On Server1, you create a folder named D:data and share the folder as UserData. You create a new user account named TemplateUser in Active Directory. You need to ensure that each user account you create by copying TemplateUser is configured to have a unique home folder stored in the UserData share. Which home folder path should you specify?

A) D:\data\%homedrive% B) D:\data\%username%
C) \\server1\userdata\%homedrive% D) \\server1\userdata\%username%
 
Answer & Explanation Answer: D) \\server1\userdata\%username%

Explanation:
Report Error

View Answer Report Error Discuss

2 2602
Q:

What is the purpose of specifying a planning horizon?

A.  Only materials manifesting a planning-relevant change within the planning horizon are taken into account in the MRP run (where NETPL is used).
B.  To specify whether forecasts are included in the material requirement calculation.

C. To specify that only externally procured (and not internally procured) items are included in the net change MRP run.

D. To specify whether a NETCH (net change in complete horizon) or a NETPL (net change in planning horizon) will take place in the next MRP run.

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

3 2599
Q:

You are considering upgrading a Windows NT Workstation 4.0 computer on your network to Windows 2000 Professional. The computer has 12 applications installed in addition to the operating system. All the applications are compatible with Windows 2000. The end user would benefit from the additional features Windows 2000 provides. What action should you take? 

A) Upgrade the Windows NT Workstation 4.0 computer to Windows 2000 Server B) Upgrade the Windows NT Workstation 4.0 computer to Windows 2000 Professional
C) Perform a clean install of Windows 2000 Professional on the Windows NT Workstation 4.0 computer D) Don't upgrade the Windows NT Workstation 4.0 computer, but install the Directory Service Client on it instead
 
Answer & Explanation Answer: B) Upgrade the Windows NT Workstation 4.0 computer to Windows 2000 Professional

Explanation:

Upgrading the computer to Windows 2000 Professional is probably the best choice given that the current operating system is Windows NT Workstation 4.0 (which upgrades easily to Windows 2000 Professional) and the fact that the computer has 12 additional applications installed on it that would need to be reinstalled and reconfigured if a clean install was performed.

Report Error

View Answer Report Error Discuss

0 2596
Q:

Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?

A) The Linux command mt B) The Linux command cpio
C) The OS/400 command RST option(*print) D) The OS/400 command DSPTAP option(*savrst)
 
Answer & Explanation Answer: B) The Linux command cpio

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

1 2593
Q:

Dfferent Valuation approaches are used to valuate the asset Portfolio and transactions in Asset accounting. Choose the correct Example from the list given below.

A.Financial statement according to local requirement.

B.Balance sheets for tax purposes

C.Internal accounting (Cost accounting)

D.Parellel financial reporting, for example, creating consolidated balance sheet according to IAS, US GAAP and so on.

Answer

Answer : A ,B ,C ,D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

0 2592
Q:

How can you describe an operational level agreement (OLA) ?

A) It is a legally binding contract outlining services delivered to an IT service provider that underpin a service that provider delivers to its customers. B) It is a written agreement between a supplier and the IT customer(s), defining the key service targets and responsibilities of both parties.
C) It contains targets that underpin those within an SLA to ensure that targets will not be breached by failure of the supporting activity. D) It is an agreement between a supplier and another part of the same organization that assists with the provision of services.
 
Answer & Explanation Answer: D) It is an agreement between a supplier and another part of the same organization that assists with the provision of services.

Explanation:

An agreement between an IT service provider and another part of the same organization. An OLA supports the IT service provider's delivery of services to customers. The OLA defines the goods or services to be provided and the responsibilities of both parties.

 

* For an example there be an OLA - between the IT service provider and a acquiring department to obtain hardware in discussed times - between the Service Desk and a support group to provide Incident resolution in accepted times.

Report Error

View Answer Report Error Discuss

7 2590
Q:

Project Risk Management

What are the Project Management Processes included in the Project Risk Management? 

Answer

The Project Risk Management Processes include the following:


Risk Management Planning - Deciding how to approach , plan, and execute the risk management activities for a project


Risk Identification - Determining which risks might affect the project and documenting their characteristics.


Qualitative Risk Analysis - Prioritizing risks for subsequent further analysis or action by assessing and combining their probability of occurrence and impact


Quantitative Risk Analysis - Numerically analyzing the effect on overall project objectives of identified risks


Risk Response Planning - Developing options and actions to enhance opportunities , and to reduce threats to project objectives.


Risk Monitoring and Control - Tracking identified risks, monitoring residual risks, identifying new risks, executing risk response plans, and evaluating their effectiveness throughout the project life cycle.

Report Error

View answer Workspace Report Error Discuss

0 2590