Certification Questions

Q:

What is the Classs A Private IP address space?

Answer

10.0.0.0 through 10.255.255.255

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2100
Q:

Project Communications Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Communications planning?

Answer

I. Inputs



  • Enterprise environmental factors

  • Organizational process assets

  • Project scope statement

  • Project management plan


                   - Constraints


                   - Assumptions


II. Tools and Techniques



  • Communications requirements analysis

  • Communications technology


III. Outputs



  • Communications management plan

Report Error

View answer Workspace Report Error Discuss

0 2096
Q:

You develop a Windows-based application that enables to enter product sales. You add a subroutine named XYZ.

 

You discover that XYZ sometimes raises an IOException during execution. To address this problem you create two additional subroutines named LogError and CleanUp. These subroutines are governed by the following rules:

• LogError must be called only when XYZ raises an exception.
• CleanUp must be called whenever XYZ is complete.

 

 You must ensure that your application adheres to these rules. Which code segment should you use?

A) try { XYZ(); LogError(); } catch (Exception e) { CleanUp(e); } B) try { XYZ(); } catch (Exception e) { LogError(e); CleanUp(); }
C) try { XYZ(); } catch (Exception e) { LogError(e); } finally { CleanUp(); } D) try { XYZ(); } catch (Exception e) { CleanUp(e); } finally { LogError(); }
 
Answer & Explanation Answer: C) try { XYZ(); } catch (Exception e) { LogError(e); } finally { CleanUp(); }

Explanation:

We must use a try…catch…finally construct. First we run the Comapany() code in the try block.Then we use the LogError() subroutine in the catch statement since all exceptions are handled here. Lastly we put the CleanUp() subroutine in the finally statement since this code will be executed regardless of whether an exception is thrown or not.

Report Error

View Answer Report Error Discuss

0 2092
Q:

Out of the 5 phases of the ASAP methodology, for which phase does the Solution Manager NOT provide any tasks (or taskgroups).

A. Evaluation phase

B. Final Preparation phase

C. Business Blueprint

D. Project preparation phase

Answer

Answer : B

Report Error

View answer Workspace Report Error Discuss

2 2086
Q:

Project Scope Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Scope Definition ?

Answer

I.Inputs



  • Organizational process assets 

  • Project charter

  • Preliminary project scope statement

  • Project scope management plan

  • Approved change requests


II. Tools and Techniques



  • Product analysis

  • Alternatives identification

  • Expert judgment

  • Stakeholder analysis


III. Outputs



  • Project scope statement

  • Requested changes

  • Project scope management plan(updates)


 

Report Error

View answer Workspace Report Error Discuss

0 2084
Q:

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). On a file server, you have a shared folder named Data. The Data folder has the permissions shown in the following table:

You need to ensure that members of a group named Sales can modify content in the Data share. Sales group members must only be allowed to delete files that they create. Which additional permission should you assign to the Sales group?

A) On the Data folder, allow the Write permission. B) On the Data folder, allow the Modify permission.
C) On the Data share, allow the Change permission. D) On the Data share, allow the Full Control permission.
 
Answer & Explanation Answer: A) On the Data folder, allow the Write permission.

Explanation:
Report Error

View Answer Report Error Discuss

2 2079
Q:

Which process ensures that the components of the computer are connected properly ?

A) Booting B) Saving
C) Processing D) Editing
 
Answer & Explanation Answer: A) Booting

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCENT
Job Role: Analyst

10 2078
Q:

Project Risk Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Risk Identification?

Answer

I. Inputs



  • Enterprise environmental factors

  • Organizational process assets

  • Project scope statement

  • Risk management plan

  • Project management plan


II. Tools and Techniques



  • Documentation reviews

  • Information gathering techniques

  • Checklist analysis

  • Assumptions analysis

  • Diagramming techniques


III. Outputs



  • Risk register

Report Error

View answer Workspace Report Error Discuss

0 2070