Microsoft - Analyzing Data with Microsoft Power BI - DA-100 exam dumps
You have a Power BI model that contains a table named Sales. The Sales table has the three measures named Sales Last Year, Sales This Year, and Sales Difference:
Sales Last Year displays the sales from the previous calendar year. The current value is 32.89 million.
Sales This Year displays the sales from the current calendar year. The current value is 11.69 million.
Sales Difference uses the DAX formula of Sales[Last Year] – Sales[This Year].
You need to create the following visualization.
How should you configure the visualization? To answer, move the measures to match the fields in the answer area. Each measure can be used once, more than once, or not at all.
NOTE: Each correct selection is worth one point.
B. Not MasteredAccess to the full exam of DA-100 with correct answers
ABA - Certified Trust and Fiduciary Advisor - CTFA exam dumps
In which of the following cases support occur?
A. Inability to recede prior high
B. Inability to surpass prior low
C. Inability to break below prior low
D. Capacity to surpass prior highAccess to the full exam of CTFA with correct answers
ACAMS - CAMS — Certified Anti-Money Laundering Specialis - CAMS exam dumps
A remittance company received a money order from a senior political figure m the Philippines to transfer a large sum of money to a charity group in the Philippines. A review of the charity group revealed a director having dose ties with a known terrorist group primarily financed through kidnapping and extortion.
What is a key risk indicator associated with terrorism financing?
A. The sender is a Political Exposed Person (PEP) and should be subject to enhanced due diligence
B. A large sum sent by money order to a charity
C. There is no risk relating of terrorism financing when the charity group is operating legitimately in that country
D. There is a link between the charity group and a known terrorist group
Access to the full exam of CAMS with correct answers
ACFE - Certified Fraud Examiners - CFE exam dumps
By what accountant means that the financial figures presented by the company are at least as much as reflected in the statements, if not more.
A. Fraudulent statement
D. MatchingAccess to the full exam of CFE with correct answers
Adobe - Adobe Certified Expert - Adobe Experience Manager Forms Developer - 9A0-410 exam dumps
A Watched Folder is configured with the following include file pattern: *.[Nn][Ww][Qq]. Which files are allowed through?
A. Files that start with .nwq (case sensitive)
B. Files that contain .NWQ (case sensitive)
C. Files that end with .NWQ (case insensitive)
D. Files that end with .NWQ (case sensitive)Access to the full exam of 9A0-410 with correct answers
AHIMA - Registered Health Information Administrator - RHIA exam dumps
Your facility has been working to develop a strong performance improvement model and, have come up with the model shown. They ask if you see anything missing from model. You tell them they
A. are missing a step requiring regular employee input into the process.
B. are missing a step requiring reporting to the board of directors.
C. are missing a step requiring ongoing monitoring and reassessment.
D. aren't missing any steps; the model is a good one.Access to the full exam of RHIA with correct answers
AICPA - Certified Public Accountant (CPA) - CPA exam dumps
What happens when you attempt to compile and run the following code?
using namespace std;
void fun(int n)
if(n < 2)
cout << n;
A. It prints: 21
B. It prints: 012
C. It prints: 0
D. None of these
Access to the full exam of CPA with correct answers
Alfresco - Alfresco Process Services Certified Administrator (APSCA) - APSCA exam dumps
Which value for the property: msmt.async-executor.mode needs to be set in activitiapp.properties to avoid deadlocks for executed jobs in Multi-Schema Multi-Tenancy (MS-MT) environments (where a job executed for one tenant is blocking jobs for other tenants)?
D. shared-queue.Access to the full exam of APSCA with correct answers
Amazon - AWS Certified Advanced Networking - Specialty - ANS-C00 exam dumps
With AWS CloudTrail, creating multiple trails in one region allows ____ to focus on one aspect of AWS operation.
D. stakeholdersAccess to the full exam of ANS-C00 with correct answers
Amazon - AWS Certified Cloud Practitioner - CLF-C01 exam dumps
Which AWS service provides a simple way to set up a new multi-account AWS environment and govern it at scale?
A. AWS Trusted Advisor
B. AWS Security Hub
C. AWS Control Tower
D. AWS Resource Access ManagerAccess to the full exam of CLF-C01 with correct answers
Amazon - AWS Certified Data Analytics - Specialty - DAS-C01 exam dumps
A company wants to research user turnover by analyzing the past 3 months of user activities. With millions of users, 1.5 TB of uncompressed data is generated each day. A 30-node Amazon Redshift cluster with 2.56 TB of solid state drive (SSD) storage for each node is required to meet the query performance goals.
The company wants to run an additional analysis on a year’s worth of historical data to examine trends indicating which features are most popular. This analysis will be done once a week.
What is the MOST cost-effective solution?
A. Increase the size of the Amazon Redshift cluster to 120 nodes so it has enough storage capacity to hold 1 year of data. Then use Amazon Redshift for the additional analysis.
B. Keep the data from the last 90 days in Amazon Redshift. Move data older than 90 days to Amazon S3 and store it in Apache Parquet format partitioned by date. Then use Amazon Redshift Spectrum for the additional analysis.
C. Keep the data from the last 90 days in Amazon Redshift. Move data older than 90 days to Amazon S3 and store it in Apache Parquet format partitioned by date. Then provision a persistent Amazon EMR cluster and use Apache Presto for the additional analysis.
D. Resize the cluster node type to the dense storage node type (DS2) for an additional 16 TB storage capacity on each individual node in the Amazon Redshift cluster. Then use Amazon Redshift for the additional analysis.Access to the full exam of DAS-C01 with correct answers
Amazon - AWS Certified Database - Specialty - DBS-C01 exam dumps
A company is releasing a new mobile game featuring a team play mode. As a group of mobile device users play together, an item containing their statuses is updated in an Amazon DynamoDB table. Periodically, the other users’ devices read the latest statuses of their teammates from the table using the BatchGetltemn operation.
Prior to launch, some testers submitted bug reports claiming that the status data they were seeing in the game was not up-to-date. The developers are unable to replicate this issue and have asked a database specialist for a recommendation.
Which recommendation would resolve this issue?
A. Ensure the DynamoDB table is configured to be always consistent.
B. Ensure the BatchGetltem operation is called with the ConsistentRead parameter set to false.
C. Enable a stream on the DynamoDB table and subscribe each device to the stream to ensure all devices receive up-to-date status information.
D. Ensure the BatchGetltem operation is called with the ConsistentRead parameter set to true.Access to the full exam of DBS-C01 with correct answers
Amazon - AWS Certified Developer - Associate - DVA-C01 exam dumps
A developer is asked to integrate Amazon CloudWatch into an on-premises application.
How should the application access CloudWatch, according to AWS security best practices?
A. Configure AWS credentials in the application server with an AWS SDK
B. Implement and proxy API-calls through an EC2 instance
C. Store IAM credentials in the source code to enable access
D. Add the application server SSH-key to AWSAccess to the full exam of DVA-C01 with correct answers
Amazon - AWS Certified DevOps Engineer - Professional - DOP-C01 exam dumps
When running a playbook on a remote target host you receive a Python error similar to "[Errno 13] Permission denied: `/home/nick/.ansible/tmp'. What would be the most likely cause of this problem?
A. The user's home or `.ansible' directory on the Ansible system is not writeable by the user running the play.
B. The specified user does not exist on the remote system.
C. The user running `ansible-playbook' must run it from their own home directory.
D. The user's home or `.ansible' directory on the Ansible remote host is not writeable by the user running the playAccess to the full exam of DOP-C01 with correct answers
Amazon - AWS Certified Machine Learning – Specialty - MLS-C01 exam dumps
A Machine Learning Specialist prepared the following graph displaying the results of k-means for k = [1..10]:
Considering the graph, what is a reasonable selection for the optimal choice of k?
D. 10Access to the full exam of MLS-C01 with correct answers
Amazon - AWS Certified Security - Specialty - SCS-C01 exam dumps
A company has two AWS accounts: Account A and Account B. Account A has an IAM role that IAM users in Account B assume when they need to upload sensitive documents to Amazon S3 buckets in Account A.
A new requirement mandates that users can assume the role only if they are authenticated with multi-factor authentication (MFA). A security engineer must recommend a solution that meets this requirement with minimum risk and effort.
Which solution should the security engineer recommend?
A. Add an aws:MultiFactorAuthPresent condition to the role’s permissions policy.
B. Add an aws:MultiFactorAuthPresent condition to the role’s trust policy.
C. Add an aws:MultiFactorAuthPresent condition to the session policy.
D. Add an aws:MultiFactorAuthPresent condition to the S3 bucket policies.Access to the full exam of SCS-C01 with correct answers
Amazon - AWS Certified Solutions Architect – Associate - SAA-C02 exam dumps
A company is performing an AWS Well-Architected Framework review of an existing workload deployed on AWS. The review identified a public-facing website running on the same Amazon EC2 instance as a Microsoft Active Directory domain controller that was install recently to support other AWS services. A solutions architect needs to recommend a new design that would improve the security of the architecture and minimize the administrative demand on IT staff.
What should the solutions architect recommend?
A. Use AWS Directory Service to create a managed Active Directory. Uninstall Active Directory on the current EC2 instance.
B. Create another EC2 instance in the same subnet and reinstall Active Directory on it. Uninstall Active Directory.
C. Use AWS Directory Service to create an Active Directory connector. Proxy Active Directory requests to the Active domain controller running on the current EC2 instance.
D. Enable AWS Single Sign-On (AWS SSO) with Security Assertion Markup Language (SAML) 2.0 federation with the current Active Directory controller. Modify the EC2 instance's security group to deny public access to Active Directory.Access to the full exam of SAA-C02 with correct answers
Amazon - AWS Certified Solutions Architect - Professional - SAP-C01 exam dumps
A company wants to migrate an application to Amazon EC2 from VMware Infrastructure that runs in an on-premises data center. A solutions architect must preserve the software and configuration settings during the migration.
What should the solutions architect do to meet these requirements?
A. Configure the AWS DataSync agent to start replicating the data store to Amazon FSx for Windows File Server. Use the SMB share to host the VMware data store. Use VM Import/Export to move the VMs to Amazon EC2.
B. Use the VMware vSphere client to export the application as an image in Open Virtualization Format (OVF) format. Create an Amazon S3 bucket to store the image in the destination AWS Region. Create and apply an IAM role for VM Import. Use the AWS CLI to run the EC2 import command.
C. Configure AWS Storage Gateway for files service to export a Common Internet File System (CIFS) share. Create a backup copy to the shared folder. Sign in to the AWS Management Console and create an AMI from the backup copy. Launch an EC2 instance that is based on the AMI.
D. Create a managed-instance activation for a hybrid environment in AWS Systems Manager. Download and install Systems Manager Agent on the on-premises VM. Register the VM with Systems Manager to be a managed instance. Use AWS Backup to create a snapshot of the VM and create an AMI. Launch an EC2 instance that is based on the AMI.Access to the full exam of SAP-C01 with correct answers
Amazon - AWS Certified SysOps Administrator - Associate - SOA-C01 exam dumps
A company must ensure that any objects uploaded to an S3 bucket are encrypted.
Which of the following actions will meet this requirement? (Choose two.)
A. Implement AWS Shield to protect against unencrypted objects stored in S3 buckets.
B. Implement Object access control list (ACL) to deny unencrypted objects from being uploaded to the S3 bucket.
C. Implement Amazon S3 default encryption to make sure that any object being uploaded is encrypted before it is stored.
D. Implement Amazon Inspector to inspect objects uploaded to the S3 bucket to make sure that they are encrypted.
E. Implement S3 bucket policies to deny unencrypted objects from being uploaded to the buckets.Access to the full exam of SOA-C01 with correct answers
APICS - Certified Supply Chain Professional - CSCP exam dumps
- (Topic 3) Which of the following activities is forbidden in a foreign trade zone?
A. Remarking or repackaging imports to avoid fines
B. Breaking up large shipments to reduce import duties
C. Reexporting goods without paying duties
D. Conducting retail tradeAccess to the full exam of CSCP with correct answers
Apple - Apple Certified Mac Technician (ACMT) Mac OS X v10.6 Troubleshooting Exam - 9L0-062 exam dumps
Snow Leopard uses both standard _______ and ________ permissions to control a users access to files and folders. SELECT TWO
Access to the full exam of 9L0-062 with correct answers
Apple - Apple Certified Mac Technician (ACMT) Mac Service Certification Exam - 9L0-008 exam dumps
Which of the following is ALMOST CERTAINLY a software-related problem?
A. No video on display
B. Single beep at startup
C. No Internet connectivity
D. iPhoto quits when launched
Access to the full exam of 9L0-008 with correct answers
ASQ - Quality Auditor Certification - CQA exam dumps
For third-party audits, which two of the following factors should be considered by the auditor when agreeing to the amount of time needed to complete corrective action?
I. The resources available to the auditor for determining when follow-up can occur
II. The resources available to the auditee to enact the corrective action
III. The auditee's experience in project evaluation techniques
IV. The number of findings recorded during the audit
A. I and III
B. I and IV
C. II and III
D. II and IV
Access to the full exam of CQA with correct answers
ASQ - Quality Engineer Certification - CQE exam dumps
Benchmarking might be defined as any of the following EXCEPT:
A. A process for rigorously measuring your performance versus the best-in-class companies.
B. A standard of excellence or achievement against which other similar things must be measured orjudged.
C. Comparing the performance of one company to a set of standards and then to another'sperformance.
D. The search for best industry practices that lead to superior performance.
Access to the full exam of CQE with correct answers
Atlassian - Jira Project Administrator - ACP-600 exam dumps
You have gathered workflow requirements:
Sue wants to put issues ON HOLD from anywhere in the workflow.
Dave wants to restrict who can put issues ON HOLD.
You contact a Jira administrator to request appropriate workflow changes to address their requirements.
Which change do you NOT request?
A. A condition on the incoming transitions going in to ON HOLD
. A global transition to the ON HOLD status
. Outgoing transitions from the ON HOLD status
B. A security-level on the ON HOLD status
C. A new status called ON HOLDAccess to the full exam of ACP-600 with correct answers
BACB - BOARD CERTIFIED ASSISTANT BEHAVIOR ANALYST - BCaBA exam dumps
A child's behavior is being reinforced on a VR 8 schedule during intensive teaching. During the sessions, the child begins to get out of the chair. In order to address this problem, the behavior analyst should switch to which schedule?
A. VR 1 B. FR 6 C. FR 8 D. VR 4Access to the full exam of BCaBA with correct answers
BACB - The Board Certified Behavior Analyst - BCBA exam dumps
Considering the potential impact of behavioral contrast, what is a likely outcome when there is an effective program targeting compliance at school when no formal program is implemented at home? Compliance at home would be predicted to:
A. be more variable.
D. stay the same.Access to the full exam of BCBA with correct answers
BICSI - Registered Communications Distribution Designer - RCDD exam dumps
- (Topic 17) The purpose of QoS on an IP network is for:
A. FAX transmission
B. Data representation
C. Audio quality
D. Streaming video quality
E. Real time web based servicesAccess to the full exam of RCDD with correct answers
Blackberry - BlackBerry Enterprise Test Environement - BCP-221 exam dumps
Which BlackBerry device series features a SureType keyboard? (Choose one.)
A. 88xx series
B. 83xx series
C. 86xx series
D. 81xx series
E. 87xx series
Access to the full exam of BCP-221 with correct answers
Blueprism - Certified blueprism Professional Developer - APD01 exam dumps
Which of the following techniques is most suitable for extracting text from a PDF Document which is a scan of a hand written document?
A. Use Global Mouse Clicks and Global Send Keys to extract the PDF text to the Windows clipboard and use Blue Prism utilities or functions to extract the text from the clipboard
B. Use the Adobe Acrobat API to export or convert the PDF document into another format such as XML or Microsoft Word
C. Use the ‘Read Text with OCR’ option of a Blue Prism Read Stage on Regions
D. None of these optionsAccess to the full exam of APD01 with correct answers
CA Technologies - Administration of Symantec Endpoint Protection 14 - 250-428 exam dumps
Which client log shows that a client is downloading content from its designated source?
B. System Log
C. Risk Log
D. SesmLu.logAccess to the full exam of 250-428 with correct answers
CertNexus - Cybersec First Responder - CFR-310 exam dumps
Which of the following is the GREATEST risk of having security information and event management (SIEM) collect computer names with older log entries?
A. There may be duplicate computer names on the network.
B. The computer name may not be admissible evidence in court.
C. Domain Name System (DNS) records may have changed since the log was created.
D. There may be field name duplication when combining log files.Access to the full exam of CFR-310 with correct answers
Cisco - Cisco Certified CyberOps Associate - 200-201 CBROPS exam dumps
Which statement is FALSE with respect to listening ports?
A. Port 443, when set to default, is encrypted.
B. Ports can be numbered 1 to 65535.
C. The port number does not always identify the service.
D. They are closed.Access to the full exam of 200-201 CBROPS with correct answers
Cisco - Cisco Certified Network Associate - 200-301 CCNA itnv7 exam dumps
Which command would you use to see which interfaces are currently operating as trunks?
A. show interface switchports
B. show trunk interface
C. show interfaces trunk
D. show switchport trunkAccess to the full exam of 200-301 CCNA itnv7 with correct answers
Cisco - Designing Cisco Enterprise Networks (ENSLD) - 300-420 ENSLD exam dumps
By default, which VLAN is the Cisco management VLAN?
D. 1005Access to the full exam of 300-420 ENSLD with correct answers
Cisco - Implementing and Operating Cisco Data Center Core Technologies (DCCOR) - 350-601 DCCOR exam dumps
You connect a FEX to a Cisco Nexus switch. After configuration is complete, you issue the show fex 100 command on the switch and receive the following partial output: Switch#show fex 100 <output omitted>
Pinning-mode: static Max-links: 1 Fabric port for control traffic: Po100 Fabric interface state: Po100 – Interface Up. State: Active Eth1/1 – Interface Up. State: Active Eth1/2 – Interface Up. State: Active Eth2/1 – Interface Up. State: Active Eth2/2 – Interface Up. State: Active Which of the following is true?
A. The fex associate Eth2/1 command has been issued on the Po100 interface.
B. The fex associate Eth2/2 command has been issued on the Po100 interface.
C. The fex associate Eth1/1 command has been issued on the Po100 interface.
D. The fex associate 100 command has been issued on the Po100 interface.
E. The fex associate Eth1/2 command has been issued on the Po100 interface.Access to the full exam of 350-601 DCCOR with correct answers
Cisco - Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) - 350-401 ENCOR exam dumps
Which of the following information does a Type 2 LSA contain? (Select the best answer.)
A. subnet information for an entire area
B. external routes redistributed into OSPF
C. the router ID and the IP addresses for a single router
D. subnet and router information for all the routers on a segmentAccess to the full exam of 350-401 ENCOR with correct answers
Cisco - Implementing and Operating Cisco Security Core Technologies (SCOR) - 350-701 SCOR exam dumps
Which ASA deployment mode can provide separation of management on a shared appliance?
A. DMZ multiple zone mode
B. transparent firewall mode
C. multiple context mode
D. routed mode
Access to the full exam of 350-701 SCOR with correct answers
Cisco - Implementing Automation for Cisco Collaboration Solutions (CLAUI) - 300-835 exam dumps
What type of functionality is common in Webex Team REST API and Team Widgets?
A. embed video messages on a webpage
B. Embed voice messages on a webpage
C. Embed video and voice collaboration on a webpage
D. Embed WhatsApp messages on a webpageAccess to the full exam of 300-835 with correct answers
Cisco - Implementing Automation for Cisco Security Solutions (SAUI) - 300-735 SAUTO exam dumps
Which of the following is most likely to cause the greatest amount of disruption on a router? (Select the best answer.)
B. a Trojan horse
C. a worm
D. a DDoS attackAccess to the full exam of 300-735 SAUTO with correct answers
Cisco - Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) - 300-410 ENARSI exam dumps
You have configured BGP on both rtrA in AS 1 and rtrB in AS 2. There are two routes created using the network command between the two routers. One route traverses through AS 5 and AS 6 from rtrA to rtrB, while the other route traverses AS 7, AS 8, and AS 9 from rtrA to rtrB. Both routes use default values for the Weight and LOCAL_PREF attributes.
Which of the following attributes determines the BEST route between rtrA and rtrB routers?
C. Origin type
D. AS_PATHAccess to the full exam of 300-410 ENARSI with correct answers
CIW - CIW E-Commerce Specialist Certifications exam - 1D0-525 exam dumps
Which organization is responsible for regulating the process of importing and exporting goods?
C. World Bank
D. Port Authority
Access to the full exam of 1D0-525 with correct answers
CIW - CIW Internet Business Associate - 1D0-61A exam dumps
A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach?
A. Memorize the URL so you can pull up the site in any browser such as Chrome, Firefox or Internet Explorer.
B. Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.
C. Manually enter the Web address into any and all browsers on all of your devices.
D. Pull up the message with the link any time you want to view the site.
Access to the full exam of 1D0-61A with correct answers
CIW - CIW Network Technology Associate - 1D0-61C exam dumps
Which type of attack is a form of social engineering in which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic-looking but imposter Web site?
Access to the full exam of 1D0-61C with correct answers
CIW - CIW Perl Specialist - 1D0-437 exam dumps
Which statement writes data to the filehandle OUTPUT?
A. print "Here's my data.\n" > OUTPUT
B. write OUTPUT "Here's my data.\n";
C. write OUTPUT ">Here's my data.\n";
D. print OUTPUT "Here's my data.\n";
Access to the full exam of 1D0-437 with correct answers
CIW - CIW Web Design Specialist - 1D0-520 exam dumps
Consider the following XML code:
<date>January 28, 2006</date>
<name>Mr. Harold Gray</name>
236 Washington Boulevard, Suite 480
Grover, CA 90000
The preceding code will not work properly. Which of the following describes the reason for this?
A. The Date field is not specified correctly.
B. XML tags cannot use uppercase letters.
C. A tag has been inconsistently formatted.
D. The code was created by a proprietary application.
Access to the full exam of 1D0-520 with correct answers
CIW - CIW Web Foundations Associate certification exam - 1D0-610 exam dumps
Which organization is responsible for managing domain names so that each one is unique, and (once registered) cannot be used by an unauthorized individual or organization?
Access to the full exam of 1D0-610 with correct answers
CIW - User Interface Designer - 1D0-621 exam dumps
You are creating the site map for a new website project. Which of the following design methodologies of Website production (sometimes called the "five Ds") are you in?
D. DesignAccess to the full exam of 1D0-621 with correct answers
CompTIA - CompTIA A+ - 220-1001 exam dumps
Joe, a user, provides the requirements for a new gaming PC to the assigned technician. Joe wants the PC to have high-quality graphics, audio/video, and storage. In addition, the PC must be able to:
Store a large amount of data
Stream HD graphics, videos, and music
Have fast and redundant storage
Which of the following will BEST meet these requirements? (Choose two.)
A. File sharing
B. RAID array
C. Specialized audio and video card
D. Maximum RAM
F. SSDAccess to the full exam of 220-1001 with correct answers
CompTIA - CompTIA CASP+ - CAS-003 exam dumps
A systems administrator at a medical imaging company discovers protected health information (PHI) on a general-purpose file server. Which of the following steps should the administrator take NEXT?
A. Isolate all of the PHI on its own VLAN and keep it segregated at Layer 2
B. Take an MD5 hash of the server
C. Delete all PHI from the network until the legal department is consulted
D. Consult the legal department to determine the legal requirementsAccess to the full exam of CAS-003 with correct answers
Question page: 1 ... 3 4 5 6 7 8 9 10 11 12 13 ...