Exam page:   1     2     3     4     5     6     7  

Microsoft - Analyzing Data with Microsoft Power BI - DA-100 exam dumps

You have a Power BI model that contains tables named Sales and Customers. The Sales and Customers tables are shown in the exhibit:

There is a relationship between the Sales and Customers tables.

The Sales table contains more than one million records. You want to import a sample of the data from the Sales table. What action could you take?

A. In the Power BI model, create a calculated table.

B. In the Power Query Editor, transform the Sales table.

C. In the Power Query Editor, filter the Sales table by Sales_Date.

D. In the Power Query Editor, create a column by using Column From Examples.

  Access to the full exam of DA-100 with correct answers  


ABA - Certified Trust and Fiduciary Advisor - CTFA exam dumps

A form of EMH which states that security prices fully reflect all publicly available information is known as:

A. Strong form

B. Week form

C. Semi strong form

D. None of these

  Access to the full exam of CTFA with correct answers  


ACAMS - CAMS — Certified Anti-Money Laundering Specialis - CAMS exam dumps
After an institution files an STR with regard to a particular account, a law enforcement agent requests the institution to keep the account open until advised otherwise by law enforcement.
What steps should the institution take?
A. The institution should close the account in order not to be caught in the middle of a law enforcement investigation
B. The institution should follow the request of the law enforcement agent and keep the account open
C. The institution should request a written letter From the law enforcement ( agency signed by an appropriate authorized signature
D. The institution should keep the account open only if doing so comports with the bank's own AML procedures
  Access to the full exam of CAMS with correct answers  


ACFE - Certified Fraud Examiners - CFE exam dumps

Which of the following is NOT standard of generally accepted accounting principles?

A. Conservatism

B. Cost

C. Full disclosure

D. Quality control

  Access to the full exam of CFE with correct answers  


Adobe - Adobe Certified Expert - Adobe Experience Manager Forms Developer - 9A0-410 exam dumps

All expressions evaluate to false. Which element within a condition block can be used to populate data?

A. Static

B. Final

C. Default

D. Case

  Access to the full exam of 9A0-410 with correct answers  


AHIMA - Registered Health Information Administrator - RHIA exam dumps

In preparation for conversion to a computerized patient record, a committee at your facility is defining each of the data elements in a patient record to determine which elements should be required and to set parameters for each element. The committee is working on the data

A. edits.

B. reasonableness.

C. dictionary.

D. feasibility.

  Access to the full exam of RHIA with correct answers  


AICPA - Certified Public Accountant (CPA) - CPA exam dumps
What happens when you attempt to compile and run the following code?
#include  
#include  
using namespace std;
class B;
class A {
int age;
public:
A () { age=5; };
friend class B;
};
class B {
string name;
public:
B () { name="Bob"; };
void Print(A ob) {
cout << name << ob.age;
}
};
int main () {
A a;
B b;
Print(a);
return 0;
}
A. It prints: Bob5
B. It prints: Bob
C. It prints: 5
D. None of these
  Access to the full exam of CPA with correct answers  


Alfresco - Alfresco Process Services Certified Administrator (APSCA) - APSCA exam dumps

Which configuration setting enables Multi-Schema Multi-Tenancy?

A. tenancy.model=isolated

B. multischema.enabled=true

C. schema.type=multi

D. tenant.schema=isolated

  Access to the full exam of APSCA with correct answers  


Amazon - AWS Certified Advanced Networking - Specialty - ANS-C00 exam dumps

You have a web application (app.mycompany.com) running on an EC2 instance with a single elastic network interface in a subnet in a VPC. Because of a network redesign, you need to move the web application to a different subnet in the same Availability Zone.

Which of the following migration strategies meets the requirements?

A. Create an elastic network interface in the new subnet. Attach this interface to the instance, and detach the old interface.

B. Launch a new instance in the subnet via an AMI created from the instance, and redirect new connections to this new instance using DNS. Decommission the old instance.

C. Make an API call to change the subnet association of the elastic network interface.

D. Change the IP addresses manually to another subnet within the server operating system.

  Access to the full exam of ANS-C00 with correct answers  


Amazon - AWS Certified Cloud Practitioner - CLF-C01 exam dumps

A company has enabled billing alerts in its AWS account and wants to receive a notification through Amazon Simple Notification Service (Amazon SNS) whenever its monthly bill exceeds a set amount.

Which AWS service or tool should the company use to achieve this?

A. Amazon CloudWatch

B. Cost Explorer

C. AWS Cost and Usage Report

D. AWS Pricing Calculator

  Access to the full exam of CLF-C01 with correct answers  


Amazon - AWS Certified Data Analytics - Specialty - DAS-C01 exam dumps

A company uses Amazon Redshift as its data warehouse. A new table has columns that contain sensitive data. The data in the table will eventually be referenced by several existing queries that run many times a day.

A data analyst needs to load 100 billion rows of data into the new table. Before doing so, the data analyst must ensure that only members of the auditing group can read the columns containing sensitive data.

How can the data analyst meet these requirements with the lowest maintenance overhead?

A. Load all the data into the new table and grant the auditing group permission to read from the table. Load all the data except for the columns containing sensitive data into a second table. Grant the appropriate users read-only permissions to the second table.

B. Load all the data into the new table and grant the auditing group permission to read from the table. Use the GRANT SQL command to allow read-only access to a subset of columns to the appropriate users.

C. Load all the data into the new table and grant all users read-only permissions to non-sensitive columns. Attach an IAM policy to the auditing group with explicit ALLOW access to the sensitive data columns.

D. Load all the data into the new table and grant the auditing group permission to read from the table. Create a view of the new table that contains all the columns, except for those considered sensitive, and grant the appropriate users read-only permissions to the table.

  Access to the full exam of DAS-C01 with correct answers  


Amazon - AWS Certified Database - Specialty - DBS-C01 exam dumps

A company is using Amazon Aurora PostgreSQL for the backend of its application. The system users are complaining that the responses are slow. A database specialist has determined that the queries to Aurora take longer during peak times. With the Amazon RDS Performance Insights dashboard, the load in the chart for average active sessions is often above the line that denotes maximum CPU usage and the wait state shows that most wait events are IO:XactSync.

What should the company do to resolve these performance issues?

A. Add an Aurora Replica to scale the read traffic.

B. Scale up the DB instance class.

C. Modify applications to commit transactions in batches.

D. Modify applications to avoid conflicts by taking locks.

  Access to the full exam of DBS-C01 with correct answers  


Amazon - AWS Certified Developer - Associate - DVA-C01 exam dumps

A developer is trying to get data from an Amazon DynamoDB table called demoman-table. The developer configured the AWS CLI to use a specific IAM user’s credentials and executed the following command: The command returned errors and no rows were returned.

What is the MOST likely cause of these issues?

A. The command is incorrect; it should be rewritten to use put-item with a string argument.

B. The developer needs to log a ticket with AWS Support to enable access to the demoman-table.

C. Amazon DynamoDB cannot be accessed from the AWS CLI and needs to be called via the REST API.

D. The IAM user needs an associated policy with read access to demoman-table.

  Access to the full exam of DVA-C01 with correct answers  


Amazon - AWS Certified DevOps Engineer - Professional - DOP-C01 exam dumps

What are the bare minimum requirements for a valid Ansible playbook?

A. The hosts, connection type, fact gathering, vars and tasks.

B. The hosts declaration and tasks

C. A YAML file with a single line containing `---'.

D. At least one play with at least a hosts declaration

  Access to the full exam of DOP-C01 with correct answers  


Amazon - AWS Certified Machine Learning – Specialty - MLS-C01 exam dumps

A machine learning specialist works for a fruit processing company and needs to build a system that categorizes apples into three types. The specialist has collected a dataset that contains 150 images for each type of apple and applied transfer learning on a neural network that was pretrained on ImageNet with this dataset.

The company requires at least 85% accuracy to make use of the model.

After an exhaustive grid search, the optimal hyperparameters produced the following:

68% accuracy on the training set

67% accuracy on the validation set

What can the machine learning specialist do to improve the system’s accuracy?

A. Upload the model to an Amazon SageMaker notebook instance and use the Amazon SageMaker HPO feature to optimize the model’s hyperparameters.

B. Add more data to the training set and retrain the model using transfer learning to reduce the bias.

C. Use a neural network model with more layers that are pretrained on ImageNet and apply transfer learning to increase the variance.

D. Train a new model using the current neural network architecture.

  Access to the full exam of MLS-C01 with correct answers  


Amazon - AWS Certified Security - Specialty - SCS-C01 exam dumps

A company is undergoing a layer 3 and layer 4 DDoS attack on its web servers running on AWS.

Which combination of AWS services and features will provide protection in this scenario? (Choose three.)

A. Amazon Route 53

B. AWS Certificate Manager (ACM)

C. Amazon S3

D. AWS Shield

E. Elastic Load Balancer

F. Amazon GuardDuty

  Access to the full exam of SCS-C01 with correct answers  


Amazon - AWS Certified Solutions Architect – Associate - SAA-C02 exam dumps

An ecommerce company is running a multi-tier application on AWS. The front-end and backend tiers both run on Amazon EC2. and the database runs on Amazon RDS for MySQL. The backend tier communicates with the RDS instance. There are frequent calls to return identical datasets from the database that are causing performance slowdowns.

Which action should be taken to improve the performance of the backend?

A. Implement Amazon SNS to store the database calls.

B. Implement Amazon ElastiCache to cache the large datasets.

C. Implement an RDS for MySQL read replica to cache database calls.

D. Implement Amazon Kinesis Data Firehose to stream the calls to the database.

  Access to the full exam of SAA-C02 with correct answers  


Amazon - AWS Certified Solutions Architect - Professional - SAP-C01 exam dumps

A company runs an application in the cloud that consists of a database and a website. Users can post data to the website, have the data processed, and have the data sent back to them in an email. Data is stored in a MySQL database running on an Amazon EC2 instance. The database is running in a VPC with two private subnets. The website is running on Apache Tomcat in a single EC2 instance in a different VPC with one public subnet. There is a single VPC peering connection between the database and website VPC.

The website has suffered several outages during the last month due to high traffic.

Which actions should a solutions architect take to increase the reliability of the application? (Choose two.)

A. Place the Tomcat server in an Auto Scaling group with multiple EC2 instances behind an Application Load Balancer.

B. Provision an additional VPC peering connection.

C. Migrate the MySQL database to Amazon Aurora with one Aurora Replica.

D. Provision two NAT gateways in the database VPC.

E. Move the Tomcat server to the database VPC.

F. Create an additional public subnet in a different Availability Zone in the website VPC.

  Access to the full exam of SAP-C01 with correct answers  


Amazon - AWS Certified SysOps Administrator - Associate - SOA-C01 exam dumps

A new website will run on Amazon EC2 instances behind an Application Load Balancer. Amazon Route 53 will be used to manage DNS records.

What type of record should be set in Route 53 to point the website’s apex domain name (for example, “company.com”) to the Application Load Balancer?

A. CNAME

B. SOA

C. TXT

D. ALIAS

  Access to the full exam of SOA-C01 with correct answers  


APICS - Certified Supply Chain Professional - CSCP exam dumps

- (Topic 3) A firm has captured the following information for a product family:

The cash-to-cash cycle time is how many days?

A. 41 B. 44 C. 62 D. 74

  Access to the full exam of CSCP with correct answers  


Apple - Apple Certified Mac Technician (ACMT) Mac OS X v10.6 Troubleshooting Exam - 9L0-062 exam dumps
A user finds that she cannot access the Movies, Pictures, and Downloads folders in her home directory. The Finder displays the message: "The folder "Downloads" can?? be opened because you don?? have permission to see its contents." How can the user quickly and easily correct these permissions issues with her personal data?
A. Open the Disk Utility and run repair disk permissions.
B. Erase their hard drive and restore from a Time Machine backup.
C. Open the Terminal and use command line tools to correct the permissions.
D. Use Reset Password utility on the Snow Leopard Install DVD to reset home directory permissions and ACLs.
  Access to the full exam of 9L0-062 with correct answers  


Apple - Apple Certified Mac Technician (ACMT) Mac Service Certification Exam - 9L0-008 exam dumps
A customer claims that her Mac mini, with an AirPort Extreme card installed, cannot connect to her AirPort Express network at home. Her configuration includes an Apple Cinema Display resting on top of the Mac mini, and a functioning AirPort Express Base Station 20 feet away. Which of the following choices is the most likely cause of this problem?

A. The AirPort Express Base Station is too far away.
B. The Mac mini must be upgraded to Mac OS X v10.4.7 first.
C. AirPort reception is affected by the display on top of the Mac mini.
D. The AirPort Express Base Station is not compatible with the Mac mini.
  Access to the full exam of 9L0-008 with correct answers  


ASQ - Quality Auditor Certification - CQA exam dumps
An auditee has responded to all requests for corrective action in a timely manner. Which of the following is the next step for the auditor?
A. Close all those findings in which the response is accompanied by adequate objective evidence.
B. Evaluate the adequacy of the responses.
C. Schedule a follow-up audit to verify corrective action.
D. Schedule a follow-up audit for critical items and schedule verification for other routine items at the next scheduled audit.
  Access to the full exam of CQA with correct answers  


ASQ - Quality Engineer Certification - CQE exam dumps
The first and most important step, in establishing a good corporate quality plan is

A. Determining customer requirements.
B. Determining manufacturing process capabilities.
C. Evaluation vendor quality systems.
D. Ensuring quality participation in design review.
  Access to the full exam of CQE with correct answers  


Atlassian - Jira Project Administrator - ACP-600 exam dumps

You want a dashboard to display the following information:

the number of issues in progress the number of issues per assignee the number of issues per issue type the number of issues created in the last 30 days

Additionally, it should only display data from a specific project.

Which system gadget will definitely NOT meet the requirements?

A. Created vs. Resolved Chart

B. Pie Chart

C. Issues in progress

D. Issue Statistics

E. Two Dimensional Filter Statistics

  Access to the full exam of ACP-600 with correct answers  


BACB - BOARD CERTIFIED ASSISTANT BEHAVIOR ANALYST - BCaBA exam dumps

To definitively identify effective reinforcers for an individual, it is necessary to:

A. complete a reinforcer assessmen

B. complete a preference assessmen

C. ascertain what reinforcers the individual has access t

D. interview people who know the individual wel

  Access to the full exam of BCaBA with correct answers  


BACB - The Board Certified Behavior Analyst - BCBA exam dumps

In a token economy, what type of reinforcers are the tokens themselves?

A. conditional reinforcers

B. generalized conditioned reinforcers

C. generalized unconditioned reinforcers

D. unconditional reinforcers

  Access to the full exam of BCBA with correct answers  


BICSI - Registered Communications Distribution Designer - RCDD exam dumps

- (Topic 17) Which layer of the OSI model covers physical cable connections?

A. Layer 1 B. Layer 3 C. Layer 5 D. Layer 7

  Access to the full exam of RCDD with correct answers  


Blackberry - BlackBerry Enterprise Test Environement - BCP-221 exam dumps
Which file should be edited to enable advanced logging in BlackBerry Desktop Manager? (Choose one.)

A. Dmtrace.log
B. Jvm.log
C. Tiff.log
D. iloptcfg.cfg
E. Sync.log
  Access to the full exam of BCP-221 with correct answers  


Blueprism - Certified blueprism Professional Developer - APD01 exam dumps

Which of the following Element Types is it possible to read an image from?

1. Win32

2. Active Accessibility 3. HTML 4. Java

A. 1 only

B. 2 only

C. All of the above

D. None of the above

  Access to the full exam of APD01 with correct answers  


CA Technologies - Administration of Symantec Endpoint Protection 14 - 250-428 exam dumps

An administrator receives a browser certificate warning when accessing the Symantec Endpoint Protection Manager (SEPM) Web console.

Where can the administrator obtain the certificate?

A. SEPM Web Access

B. SEPM SecureID Authentication

C. SEPM console Admin Tasks

D. SEPM console Licenses section

  Access to the full exam of 250-428 with correct answers  


CertNexus - Cybersec First Responder - CFR-310 exam dumps

Various logs are collected for a data leakage case to make a forensic analysis. Which of the following are MOST important for log integrity? (Choose two.)

A. Hash value

B. Time stamp

C. Log type

D. Modified date/time

E. Log path

  Access to the full exam of CFR-310 with correct answers  


Cisco - Cisco Certified CyberOps Associate - 200-201 CBROPS exam dumps

Which evidence is always considered the best evidence?

A. hearsay

B. indirect

C. direct

D. corroborative

  Access to the full exam of 200-201 CBROPS with correct answers  


Cisco - Cisco Certified Network Associate - 200-301 CCNA itnv7 exam dumps

Which two statements are TRUE of default routes? (Choose two.)

A. Default routes are used for routing packets destined only for networks that are listed in the routing table.

B. Default routes are used for routing packets destined for networks that are not listed in the routing table.

C. Default routes should not be used in a stub network.

D. Default routes are ideal for use in stub networks.

E. Network security is increased by using default routes.

  Access to the full exam of 200-301 CCNA itnv7 with correct answers  


Cisco - Designing Cisco Enterprise Networks (ENSLD) - 300-420 ENSLD exam dumps

You are the network administrator in your company. You have executed the following commands on the Fa0/1 interface of a switch named swtA:

Over a period of time, different hosts are connected to the Fa0/1 switch port of swtA. The MAC addresses of the hosts that were connected to the Fa0/1 port and the order in which they connected are as follows:

After a few days, you notice that the Fa0/1 port is in the shutdown state.

Which of the following MAC addresses causes the Fa0/1 port to shut down?

A. 2222.2222.2222

B. 3333.3333.3333

C. 4444.4444.4444

D. 5555.5555.5555

  Access to the full exam of 300-420 ENSLD with correct answers  


Cisco - Implementing and Operating Cisco Data Center Core Technologies (DCCOR) - 350-601 DCCOR exam dumps

You are examining the following command-line output on a Nexus 7000 Series switch:

vdc_id vdc_name state mac

1 sales active A8:CC:D8:D8:65:F4 2 acctg active 7F:52:92:26:29:CF 3 prod active 7B:05:CA:ED:41:E1 Which of the following have you most likely issued?

A. the show vdc command in the default VDC

B. the show vdc command in a nondefault VDC

C. the show vdc detail command in a nondefault VDC

D. the show vdc membership command in a nondefault VDC

E. the show vdc detail command in the default VDC

  Access to the full exam of 350-601 DCCOR with correct answers  


Cisco - Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) - 350-401 ENCOR exam dumps

In what order will a Rapid-PVST+ switch port pass through the port states? (Select the best answer.)

A. blocking, spanning, listening, forwarding

B. discarding, learning, forwarding

C. blocking, listening, learning, forwarding

D. learning, discarding, forwarding

E. blocking, learning, listening, forwarding

F. Ports enter the forwarding state immediately

  Access to the full exam of 350-401 ENCOR with correct answers  


Cisco - Implementing and Operating Cisco Security Core Technologies (SCOR) - 350-701 SCOR exam dumps

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)

A. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS

B. Cisco FTDv with one management interface and two traffic interfaces configured

C. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises

D. Cisco FTDv with two management interfaces and one traffic interface configured

E. Cisco FTDv configured in routed mode and IPv6 configured

  Access to the full exam of 350-701 SCOR with correct answers  


Cisco - Implementing Automation for Cisco Collaboration Solutions (CLAUI) - 300-835 exam dumps

Which of the following are the benefits of XAPI over websockets (xows)? (Choose two).

A. No difference between sync and async responses

B. Message contains complete JSON document without the need to mix xml and text

C. Subtle difference between async and sync messages

D. Message contains Java beans without the need to parse data during HTTPS request

E. automatic re-authentication for every request.

  Access to the full exam of 300-835 with correct answers  


Cisco - Implementing Automation for Cisco Security Solutions (SAUI) - 300-735 SAUTO exam dumps

Which of the following IPS detection types does not require regularly updated definition files? (Select the best answer.)

A. patternbased

B. profilebased

C. signaturebased

D. reputationbased

  Access to the full exam of 300-735 SAUTO with correct answers  


Cisco - Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) - 300-410 ENARSI exam dumps

An OSPF area contains the following networks:

165.164.8.0 255.255.254.0 165.164.10.0 255.255.254.0 165.164.12.0 255.255.254.0 165.164.14.0 255.255.254.0

How can the route to these networks be summarized?

A. 165.164.8.0 255.255.240.0

B. 165.164.8.0 255.255.248.0

C. 165.164.10.0 255.255.252.0

D. 165.164.14.0 255.255.240.0

  Access to the full exam of 300-410 ENARSI with correct answers  


CIW - CIW E-Commerce Specialist Certifications exam - 1D0-525 exam dumps
You have just started a new business. In order to accept credit card payments on your Web site, what should you do first?
A. Enable SSL/TLS on the Web server.
B. Set up a certificate server to authenticate customers.
C. Set up an Internet merchant account to process transactions.
D. Configure your payment gateway to work with your e-commerce server.
  Access to the full exam of 1D0-525 with correct answers  


CIW - CIW Internet Business Associate - 1D0-61A exam dumps
Emelia and Lola have created a new software application that allows messaging site subscribers to analyze the message statistics in order to more easily assess and interact with followers. They have decided to license this software according to the GNU GPL Version 3. What does this license allow them to do with their software?
A. They can only sell this software through a not-for-profit company.
B. They can sell this software, but only if they make the software code available on a public server.
C. The software enters the public domain for free use and can be altered by other programmers, who must then make their changes freely available as well.
D. The software enters the public domain for free use, but any changes made in the future can be kept secret, allowing them to profitably sell the modified software.
  Access to the full exam of 1D0-61A with correct answers  


CIW - CIW Network Technology Associate - 1D0-61C exam dumps
Which security issue is most closely associated with wireless networks?
A. Spoofing
B. Wardriving
C. Eavesdropping
D. Man-in-the-middle
  Access to the full exam of 1D0-61C with correct answers  


CIW - CIW Perl Specialist - 1D0-437 exam dumps
Which of the following accurately describes the roles of the Database Interface Module (DBI) and the Database Driver Module (DBD)?

A. DBI transmits instructions to a database; DBD directs method calls to DBI.
B. DBD transmits instructions to a database; DBI directs method calls to DB
D.
C. DBI makes available database-specific code; DBD transmits method calls to DBI.
D. DBD makes available database-specific code; DBI translates method calls to DB
D.
  Access to the full exam of 1D0-437 with correct answers  


CIW - CIW Web Design Specialist - 1D0-520 exam dumps
Marcos is writing a client-side JavaScript that asks the user to type a dollar amount that will be used to compute a loan payment amount. Which of the following methods can Marcos use to ask the user for input?
A. alert(Please enter the loan amount.);
B. msgbox(Please enter the loan amount.);
C. prompt(Please enter the loan amount., );
D. input(Please enter the loan amount., Loan Calculation);
  Access to the full exam of 1D0-520 with correct answers  


CIW - CIW Web Foundations Associate certification exam - 1D0-610 exam dumps
A paradigm shift has occurred in the way that small businesses use software applications. Companies increasingly choose hosted solutions with a monthly subscription fee and outsourced system maintenance, instead of purchasing software and hardware that must be maintained by internal resources.
This business model is commonly referred to as:
A. Scalability.
B. Grid computing.
C. Crowd sourcing.
D. Software as a Service.
  Access to the full exam of 1D0-610 with correct answers  


CIW - User Interface Designer - 1D0-621 exam dumps

You have developed a web page to provide some information about your company. You've organized sections within the <body> of the page, by using the <header></header>, <footer></footer> and <nav></nav> tags. What kind of elements are these?

A. Semantic elements

B. Style elements

C. Form elements

D. Basic elements

  Access to the full exam of 1D0-621 with correct answers  


CompTIA - CompTIA A+ - 220-1001 exam dumps

A technician will be installing a workstation with virtualization software. On which of the following system requirements should the technician focus? (Choose two.)

A. BD-R

B. GPU

C. RAM

D. LAN

E. SATA

F. CPU

  Access to the full exam of 220-1001 with correct answers  


CompTIA - CompTIA CASP+ - CAS-003 exam dumps

The security administrator of a small firm wants to stay current on the latest security vulnerabilities and attack vectors being used by crime syndicates and nation-states. The information must be actionable and reliable. Which of the following would BEST meet the needs of the security administrator?

A. Software vendor threat reports

B. White papers

C. Security blogs

D. Threat data subscription

  Access to the full exam of CAS-003 with correct answers  




Question page:   1   ...   6     7     8     9     10     11     12     13     14     15     16   ...