Certification Questions

Q:

What protocol is required by Internet Information Services(IIS), the indexing Service, and Certificate Services?

A) TCP/IP B) NWLink IPX/SPX/NetBIOS Compatible Transport protocol
C) NetBEUI D) RIP Version 2 for Internet Protocol
 
Answer & Explanation Answer: A) TCP/IP

Explanation:

When you think Internet (or anything Internet - related), think TCP/IP

Report Error

View Answer Report Error Discuss

0 1948
Q:

imageview2

You are the administrator of network X. You decided to implement RIP in the following topology (click exhibit). You do not want R3 to receive RIP updates. What configuration changes need to be implemented?

A) Implement a passive-interface on R1 B) Nothing needs to be configured
C) Create a sub-interface on R1 D) Change the routing protocol to OSPF
 
Answer & Explanation Answer: A) Implement a passive-interface on R1

Explanation:

Explanation: To block RIP broadcasts on an interface connected to a subnet of a RIP-enabled network add the passive-interface command to the RIP Process

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

0 1948
Q:

You plan to deploy your ASP.NET application over XYZ’s intranet. The application uses data retrieved from a Microsoft SQL Server database. You want to use SQL Server connection pooling to optimize performance. You also need to protect confidential data stored on the server while minimizing administrative costs.

 

You need to configure security for your application. What should you do?

A) Use Microsoft Windows authentication in the application. Enable impersonation for users to access the SQL Server database from your application. B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.
C) Use form-based authentication in the application. Use the system administrator (sa) SQL Server login for users to access the SQL Server database from your application. D) Use form-based authentication in the application. Assign each user a separate SQL Server login to use to access the SQL Server database from your application.
 
Answer & Explanation Answer: B) Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.

Explanation:

We should only use one account to access the SQL Server database. This ensures that connection pooling is optimized.

 

Incorrect Answers:

A: We should only use a single account to access the SQL Server database.

C: Form-based authentication is less secure. Furthermore, running as the System Administrator with the sa login would compromise security.

D: Form-based authentication is less secure. Furthermore, creating a separate SQL Server login for each user is a daunting administrative task.

Report Error

View Answer Report Error Discuss

0 1946
Q:

You are the database administrator of a SQL Server 2000 computer. The server contains your company's Accounts database. Hundreds of users access the database each day.Because you have had power interruptions in the past, you want to protect the physical integrity of the Accounts database. You do not want to slow down server operations.What should you do?

A) Create a database maintenance plan to check database integrity and make repairs each night. B) Enable the torn page detection database option for each database.
C) Disablewrite caching on all disk controllers. D) Ensure that write caching disk controllers have battery backups.
 
Answer & Explanation Answer: D) Ensure that write caching disk controllers have battery backups.

Explanation:

The scenario states that power interruptions have occurred in the past. By buying a battery backup solution for the disk controllers the power interruption problem would be prevented.

Report Error

View Answer Report Error Discuss

0 1945
Q:

For most large companies, in terms of ease of network administration, what is the optimum number of Active Directory domains to use on their Windows 2000 network?

A) 1 B) 2
C) 3 D) More than 3
 
Answer & Explanation Answer: A) 1

Explanation:

Using a single domain greatly simplifies the administration of your network

Report Error

View Answer Report Error Discuss

0 1941
Q:

You are experiences problems when starting Word 2010. The software just keeps on crashing and never fully loads. Your colleague has recommended that you start Word in a particular mode. What could this be?

A) Safe Mode B) Private Mode
C) Easy Mode D) Invulnerable mode
 
Answer & Explanation Answer: A) Safe Mode

Explanation:
Report Error

View Answer Report Error Discuss

1 1941
Q:

You develop an enterprise application, called XYZApplication that includes a Windows Form presentation layer, middle-tier components for business logic and data access, and a Microsoft SQL Server database.


You are in the process of creating a middle-tier component that will execute the data access routines in your application. When data is passed to this component, the component will call several SQL Server stored procedures to perform database updates. All of these procedure calls run under the control of a single transaction.


The code for the middle-tier component will implement the following objects:
SqlConnection cn = new SqlConnection();
SqlTransaction tr;


If two users try to update the same data concurrently, inconsistencies such as phantom reads will occur. You must now add code to your component to specify the highest possible level of protection against such inconsistencies.
Which code segment should you use?

A) tr = cn.BeginTransaction(?ReadCommitted?); B) tr = cn.BeginTransaction(IsolationLevel.ReadCommitted);
C) tr = cn.BeginTransaction(IsolationLevel.Serializable); D) tr = cn.BeginTransaction(?Serializable?);
 
Answer & Explanation Answer: C) tr = cn.BeginTransaction(IsolationLevel.Serializable);

Explanation:

Serializable is the highest isolation transaction level. It provide the highest possible level of protection against concurrent data errors. The correct syntax to begin a transaction with this transaction isolation level is: cn.BeginTransaction(IsolationLevel.Serializable)

Report Error

View Answer Report Error Discuss

1 1941
Q:

Project Risk Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Risk Management Planning?

Answer

I. Inputs



  • Enterprise environmental factors

  • Organizational process assets

  • Project Scope statement

  • Project Management plan


II. Tools and Techniques



  • Planning meetings and analysis


III. Outputs



  • Risk Management Plan

Report Error

View answer Workspace Report Error Discuss

0 1938