Which of the following would be the benefit of saving a project binder in a centralized location?
A. Provides an opportunity for another project manager to review the binder and make corrections.
B. Provides an opportunity for team members to review their contributions.
C. Provides other project managers the opportunity to review the project information.
D. Provides stakeholders the opportunity to modify the change request forms.
In the OSI model, which of the following layers would be the cause of a session time-out while browsing the web?
A. Layer 2
B. Layer 3
C. Layer 5
D. Layer 7
The Intel® Server Board S5520UR has two different headers through which front panel signals can be routed. Which of the following documents would a server technician use to identify the pin- out of each header?
A. The Technical Product Specification
B. The Service Guide
C. The Quick Start Guide
D. The Spare Parts and Configuration Guide
A technician is setting up an older PC to use as an EMR/EHR access terminal and tries to install a USB keyboard that was working fine on another newer machine. The keyboard does not connect with the older PC. Which of the following is the BEST solution to get the keyboard to work on this PC?
A. Replace the motherboard
B. Update the operating system
C. Use a USB to PS/2 connector
D. Install a USB 2.0 adapter card
Which statements are true regarding configuring multiple buffer pools in the Database Buffer Cache that is using only the standard block size? (Choose all that apply.)
A. Both the KEEP and RECYCLE pools must be configured.
B. The RECYCLE pool needs to be configured before dropping an object.
C. The DEFAULT pool needs to be removed if multiple buffer pools are being configured.
D. Either the KEEP pool or the RECYCLE pool can be configured along with the DEFAULT pool.
Users in your development database complain that they are getting the following error while trying to execute a query on the SALES_HISTORY table:
ERROR at line 1:
ORA-00942: table or view does not exist
While investigating the reason, you find that a hardware failure occured, resulting in the loss of one of the available disk drives used by the database. While waitinig for a replacement drive, the DBA removed the un-needed data from the database and during the removl the SALES_HISTORY table was dropped accidentally.
Within few minutes a second hardware failure corrupted another disk drive, resulting in the loss of the current online redo log files and the logical back ups of the database. The redo log files were not multiplexed and the current redo log file is not yet archived. Which recovery method would you follow to recover the SALES_HISTORY table?
A. Open Database complete recovery
B. Cancel-Based incomplete recovery
C. Change-Based incomplete recovery
D. Closed Database complete recovery
E. recovery using the backup control file
Click the Exhibit button. An administrator has deployed a new virtual machine on an ESXi 5.x host. Users are complaining of poor performance on the application running on the virtual machine. Performance tools display the results shown in the exhibit. Which two tasks might improve the user experience? (Choose two.)
A. Add a vCPU to the virtual machine
B. Remove CPU affinity on the advanced CPU setting of the virtual machine
C. Migrate the virtual machine to another ESXi host
D. Remove the limit on the CPU settings of the virtual machine
Which two steps are part of the View Composer installation process? (Choose two.)
A. select the Enable View Composer checkbox in the View Administrator
B. install the View Composer on the vCenter Server system
C. register View Composer service on the Windows system
D. configure ODBC connection to the View Composer database
Which two actions must an administrator take before deleting a vApp network? (Choose two)
A. Disconnect the vShield Edge device.
B. Shut down all VMs within the vApp.
C. Shut down all connected VMs.
D. Disconnect all connected VMs.
Which of the following ports support hot swapping?
Each correct answer represents a complete solution. Choose two.
C. IEEE 1394
Answer: D and C
A small business currently has four separate servers, three of which perform low-overhead tasks with small memory footprints. How could the company BEST reduce power consumption among these four servers, while not sacrificing functionality?
A. Enable each server’s Cool ‘n’ Quiet and/orSpeedStep functionality so that processing power is conserved.
B. Enforce auto-shutdown routines on all four servers for after-hours power saving while the office is closed.
C. Consolidate the four servers onto the best two, combining them logically by tasks and memory consumption.
D. Consolidate the four servers onto the most powerful machine using virtualization.
Which of the following is NOT a parallel port mode?
You are working with a team that will be bringing in new computers to a sales department at a company. The sales team would like to keep not only their old files, but system settings as well on the new PC’s. What should you do?
A. Do a system backup (complete) on each old machine, then restore it onto the new machines.
B. Copy the files and the Windows Registry to a removable media then copy it onto the new machines.
C. Use the User State Migration tool to move the system settings and files to the new machines.
D. Use the Disk Management tool to move everything to the new computer.
Which of the following tools allows an administrator to determine the MAC address of another computer?
Which of the following items are valid placements for an MDM solution? (Select TWO).
B. Cellular tower
C. Access point
A zone data collector ___________ . (Choose the correct option to complete the sentence.)
A. handles ICA traffic for the zone
B. writes information to the data store
C. is responsible for maintaining server load evaluator information
D. makes sure all XML traffic is routed between the servers in the zone
What is the role of the pool management service?
A. Clones virtual machines
B. Turns virtual machines on and off
C. Streams the virtual machine to the users
D. Assigns users to the correct virtual machine
Scenario: Nether Tech Inc. is planning to implement Provisioning Services for deployment of images to their XenApp servers and XenDesktop workstations. The architect has created the design for the Provisioning Services environment, making the following design decisions for the Provisioning Services environment:
One Provisioning Services farm will be created: PVSFARM.
Two Provisioning Services servers will be installed and configured for High Availability: PVS01 and PVS02.
One site will be created: Nether Tech Inc.
Two Device Collections will be configured:
XenApp and XenDesktop. A central store will be defined and located on the SAN; all vDisks will be added to this store.
The local hard drive of the XenApp servers will be used to store the write cache. TCP Large Send Offload will be enabled on the NICs. A specified user account will be used as Provisioning Services service account.
Each Provisioning Services server will have four NICs; two teamed and connected with the “General use subnet” (per the design document) and the other two NICs, disabled. An Active Directory group policy object (GPO) will be configured and linked to the XenApp and XenDesktop organizational units to disable Active Directory Machine Account Password Management. Online and offline applications will be used to minimize changes to the vDisk. Offline applications will be pre-deployed to desktops and XenApp servers for faster access to the applications by users. According to the design decisions from the architect, which decision does NOT follow best practices?
A. One site will be created.
B. TCP Large Send Offload will be enabled on the NICs.
C. The local hard drive of theXenApp servers is used to store the write cache.
D. Online and offline applications will be used to minimize changes to thevDisk.
E. Offline applications will be pre-deployed to desktops andXenApp servers for faster access to the
application by users.
What is a risk analysis used for?
A. A risk analysis is used to express the value of information for an organization in monetary terms.
B. A risk analysis is used to clarify to management their responsibilities.
C. A risk analysis is used in conjunction with security measures to reduce risks to an acceptable level.
D. A risk analysis is used to ensure that security measures are deployed in a cost-effective and timely fashion.
Which of the following are reasons that Home Working can reduce your carbon footprint?
a) It reduces the travel needed to attend meetings.
b) It reduces the paperwork needed for meetings.
c) It reduces the space needed within the office.
d) It reduces the power consumed during meetings.
A. b and c only.
B. a and d only.
C. a and c only.
D. c and d only.