|
Question 1. According to EEOC guidelines, a candidate for a position may be asked questions about which of the following during a job interview? A. Past salaries B. Draft status C. Past experience D. Citizenship Answer: C Question 2. Effective techniques to prevent sexual harassment and discrimination are LEAST likely to include A. conducting awareness training for all employees B. encouraging employees to "think before they act" C. treating others with respect and professionalism D. reassigning problem employees Answer: D Question 3. Reengineering is BEST described as which of the following? A. Continual improvement in activities B. Permanent structural changes C. Positive and directed process changes D. Business organized with a "flatter" structure Answer: B Question 4. Collective bargaining is the process of negotiating a labor agreement between A. management and employees B. white and blue collar employees C. union representatives and employer representatives D. supervisory personnel and union members Answer: C Question 5. During an interview, an applicant with promising credentials states that he has limited range of motion in his arms. You become concerned about the candidate's ability to meet the job's physical demands, which include substantial use of a computer for order processing. Which of the following is the MOST appropriate action you can take to address your concerns? A. Check with his current or previous employer to ascertain how they handled the candidate's job requirements B. Rewrite the job description to remove the computer-related tasks C. Ask an ergonomics expert to check employee workstations to be sure they do not aggravate any problems D. Inform all finalists for the position that the follow-up interview will include a performance test on computer usage Answer: D Question 6. A purchasing operation from another division within your organization will be combined with the group you manage. Among the employees who have accepted transfers to your department is a person who uses a wheelchair. You are concerned about whether the work environment will pose a hindrance to the employee's job performance. Which of the following actions pertaining to this matter is MOST appropriate? A. Contacting the employee's current manager to determine what changes (if any) were necessary to accommodate the employee B. Checking with the human resources department for information about office furniture suitable for wheelchair users C. Inviting the employee to tour the office with you to discuss any concerns the employee may have D. Asking another employee who has an office nearby a main hallway to switch offices with the new employee Answer: C Question 7. In general, the orientation of new employees does NOT include A. introducing the new person to the job and the organization B. easing feelings of insecurity in the new employee C. discussing characteristics of fellow employees D. describing the organization's history, products, and operations Answer: C Question 8. In 1972, the Equal Employment Opportunity Act expanded the coverage of Title VII of the Federal Civil Rights Act of 1964 to include A. coverage to firms with 15 or more employees B. organizations employing disabled workers C. suppliers bidding on state and local government contracts D. the prohibition of age-based discrimination Answer: A Question 9. Using peer appraisals for employee evaluations is LEAST likely to be effective under which of the following circumstances? A. In a competitive environment B. When there are frequent reviews C. When evaluating team performance D. When the department deals with many suppliers Answer: A Question 10. Which of the following would be MOST helpful in promoting purchasing personnel efficiency? A. Setting performance standards for departmental staff B. Setting performance standards for suppliers C. Determining the percentage of overdue orders D. Benchmarking the number of change orders issued Answer: A Question 11. Which of the following is LEAST likely to be considered in a purchasing department evaluation? A. Contributions to profitability B. Quality C. Inventory investment D. Forms design Answer: D Question 12. Which of the following postulates that managers can attain the greatest level of employee motivation by determining the most desirable outcomes? A. Expectancy theory B. Theory Z C. Motivation-Hygiene theory D. Scientific management Answer: A Question 13. A purchasing manager for a dental products manufacturer implements a policy to resolve quality problems with suppliers by inserting penalty clauses within purchase orders. Whenever a supplier fails to deliver 100% defect-free parts, the penalty clause is put into effect, whereby accounts payable is instructed to withhold 30% of the invoiced amount. If the supplier corrects the problem and returns the parts without defects, the withheld amount is reduced to 10%, to cover the additional inspection costs and administration. The organization legal department learns of the penalty clause policy and advises against it. Which of the following is the BEST course of action in this situation? A. Omit the penalty clause and, instead, work with suppliers to develop problem solving and continuous improvement efforts B. Omit the penalty clause and, instead, find suppliers who are willing to invest in e-commerce Application Service Providers C. Track all rejects and tie the rejection rate percentage directly to the penalty clause, so as to be more specific and contingent upon the exact number of rejects D. Use the penalty clause policy as designed by the purchasing manager Answer: A Question 14. When purchasing responsibility is assigned by project, purchasers must A. be product specialists B. be versatile in switching to different product markets C. have technical backgrounds D. have many years of professional experience Answer: B Question 15. Smith is a purchasing manager at a telecommunications company. She heads a task force formed to respond to charges by a government agency about alleged illegal purchasing practices by her firm. Upon investigation, the task force is convinced that the allegations are unfounded. As head of the task force, Smith should offer to management the opportunity to A. present the findings to the government agency B. inform the press about the task force's findings C. develop an ad to explain the company's viewpoint D. initiate a libel suit against the government agency Answer: A
|
Question 1. ITCertKeys.com has an IPv6 network which has 25 segments. As an administrator, you deploy a server on IPv6 network. What should you do to make sure that the server can communicate with systems on all segments of the IPv6 network? A. Configure the IPv6 address on the server as 0000::2c0:d11f:fec8:3124/64 B. Configure the IPv6 address on the server as ff80::2c0:d11f:fec8:3124/64 C. Configure the IPv6 address on the server as fe80::2c0:d11f:fec8:3124/64 D. Configure the IPv6 address on the server as fd00:: 2c0:d11f:fec8:3124/8. Answer: D Question 2. You are a network administrator at ITCertKeys.com. You have upgraded all servers in the company to Windows Server 2008. ITCertKeys.com wants you to configure IPv6 addresses on all computers in the network. A global address prefix is assigned to you. The prefix is 3FFA:FF2B:4D:B000::/41. ITCertKeys.com has four departments. You have to assign a subnet to each department. In this way, which subnetted address prefix will you assign to the fourth department? A. 3FFA:FF2B:4D:C800::/43 B. 3FFA:FF2B:4D:B400::/43 C. 3FFA:FF2B:4D:C000::/43 D. 3FFA:FF2B:4D:F000::/45 E. None of the above Answer: A Explanation The option 3FFA:FF2B:4D: C800::/43 is correct. The subnetting in IPv6 is performed by determining the number of bits used for subnetting and the itemization of the new subnetted address prefixes. Usually the number of bits for subnetting is s, where 2^s = number of subnets to be created. In this scenario 2^s = 4 and therefore s=2. Then the itemizations of the new subnetted address prefixes are done. In this scenario, the correct subnetted address prefix is 3FFA:FF2B:4D:C800::/43. So option A is the correct answer. Question 3. Exhibit: ITCertKeys has decided to re-design its public network. The network will employ an IPv4 addressing. The range would be 129.108.10.0/21. The network must be configured in segments as shown in the exhibit. You have to configure the subnets for each segment in the network. You need to ensure that your solution must support all computers in each segment. Which network addresses should you assign to achieve this task? A. Segment A: 129.108.10.109/22, Segment B: 129.108.10.0/23, Segment C: 129.108.10.0/24, Segment D: 129.108.10.109/25 B. Segment A: 129.108.10.0/22, Segment B: 129.108.10.0/23, Segment C: 129.108.10.0/24, Segment D: 129.108.10.128/26 C. Segment A: 129.108.10.0/22, Segment B: 129.108.10.128/23, Segment C: 129.108.10.0/192, Segment D: 129.108.10.224/25 D. Segment A: 129.108.10.128/22, Segment B: 129.108.10.192/23, Segment C: 129.108.10.224/24, Segment D: 129.108.10.0/26 E. None of the above Answer: B Question 4. ITCertKeys network is configured to use Internet Protocol version (Ipv6). You installed a Dynamic Host Configuration Protocol (DHCP) server on a server named ITCertKeysDHCP1 running Windows 2008 server. You want to ensure that neither IP address nor other configuration settings are automatically allocated to DHCP clients on a subnet that does not use DHCPv6 from ITCertKeysDHCP1. How should you configure the Managed Address Configuration flag, and the other Stateful Configuration flag in the route advertisements? A. Set both Managed Address Configuration and Other Stateful Configuration flag to 0 B. Set both Managed Address Configuration and Other Stateful Configuration flag to 1 C. Set both Managed Address Configuration to 0 and Other Stateful Configuration flag to 1 D. Set both Managed Address Configuration to 1 and Other Stateful Configuration flag to Answer: A Explanation: This setting will ensure host will receive neither an IP address nor additional configuration information. Question 5. You have upgraded hardware of DNS servers in your network. You also added two new domain controllers to the domain. All client computers use DHCP. Users are not able to logon to domain after the upgrade of DNS servers. What should you do to ensure that users are able to log on to the domain? A. Restart the Netlogon service on the new DNS servers B. Run ipconfig/registerdns at the command prompt of new DNS servers C. Reconfigure the DHCP scope option 006 DNS name Servers with the new DNS servers IP addresses D. Configure the network settings for workstations to Disable NetBIOS over TCP/IP E. None of the above Answer: C Explanation: To ensure that the users are able to log on to the domain, you should reconfigure the DHCP scope option 006 DNS name Server with the new DNS servers IP addresses. Question 6. Exhibit: ITCertKeys company network consists of Windows 2008 server computers and Windows Vista client computers. You have the following eight Internet Protocol version 6 (Ipv6) sub netted address prefixes. Please refer to the exhibit. What would be the original prefix length for the global address prefix 3FFE:FFFF:0:C000:: ? A. 51 B. 52 C. 53 D. 54 E. None of the above Answer: A Explanation: The original prefix length for the globe address prefix 3FFE:FFFF:0:C000:: is 51. The eight Ipv6 subnetted address prefixes are the result of 3 bit subnetting of the global address prefix 3FFE:FFFF:0:C000::/51. To perform 3-bit subnetting of the global address prefix 3FFE:FFFF:0:C000::/51 we use the following calculations: Hexadecimal value of the subnet ID being subnetted, F = oxC000 Subnetting bits, s = 3 Question 7. ITCertKeys Company has IPV6 network. The IPV6 network has 25 segments. You deployed a new Windows 2008 server on the IPV6 network. What should you do to ensure that the server could communicate with systems on all segments of the IPV6 network? A. Configure the IPV6 address as fd00::2b0:d0ff:fee9:4143/8 B. Configure the IPV6 address as fe80::2b0: d0ff:fee9:4143/64 C. Configure the IPV6 address as ff80::2b0: d0ff:fee9:4143/64 D. Configure the IPV6 address as 0000::2b0: d0ff:fee9:4143/64 E. None of the above Answer: A Explanation: To ensure that the server communicates with systems on all segments of the IPV6 network, you need to configure the IPV6 address as fd00::2b0:d0ff:fee9:4143 /8 because this address is the local unicast address type and is not routed on the Internet. It is generally filtered inbound. Reference: IPv6 Unicast Address Information http://www.netcraftsmen.net/welcher/papers/ipv6part02.html Question 8. You are an administrator at ITCertKeys.com. ITCertKeys.com has opened a new Branch office at a new location. Windows Server 2008 is implemented on the servers. The initial network has 20 computers. You are asked to configure an appropriate IP addressing scheme in the network. Which network address should you use to accomplish this task? A. 192.10.100.0/26 B. 192.10.100.0/30 C. 192.10.100.0/29 D. 192.10.100.0./31 E. None of the above Answer: A Explanation To configure an appropriate IP addressing scheme in the network, you should use 192.10.100.0/57. In this scenario, 50 computers have to be configured in a network. Network address is calculated as follows: 1. Class A networks has a default subnet mask of 255.0.0.0 and use 0-127 as their first octet 2. Class B networks has a default subnet mask of 255.255.0.0 and it can use 128-191 as their first octet 3. Class C networks has a default subnet mask of 255.255.255.0 and it can 192-223 as their first octet You need to configure the network address to accommodate at least 50 hosts per subnet. To calculate the number of host bits, use the formula: 2^n-2 where n=32 bits. To configure 50 hosts, you need 192.10.100/26 network address which has maximum 62 hosts per subnet. The formula to calculate the hosts per subnet is: 32-26= 6 2^6-2= 62 So according to this calculation, network address 192.10.100/26 will be able to accommodate 50 hosts per subnet. We have deducted 6 bits from the total of 32 bits. Question 9. You are an enterprise administrator for ITCertKeys. The corporate network of the company consists of servers that run Windows Server 2008 and client computers that run Windows XP Service Pack 2 (SP2), Windows 2000 Professional, or Windows Vista. The company has decided to use IPv6 protocol on its network. Which of the following options would you choose to ensure that all client computers can use the IPv6 protocol? A. Run the IPv6.exe tool on all the client computers. B. Upgrade the Windows 2000 Professional computers to Windows XP SP2. C. Upgrade all Windows 2000 Professional computers with Service Pack 4. D. Install the Active Directory Client extension (DSClient.exe) on all the client computers. Answer: B Explanation: To ensure that all computers can use the IPv6 protocol, you need to upgrade the Windows 2000 Professional computers to Windows XP SP2. IPv6 protocol is far superior to IPv4 protocol in terms of security, complexity, and quality of service (QoS). Therefore, all the new operating systems started using IPv6 protocol. The older operating systems such as Windows 2000 professional does not support Ipv6 therefore this needs to be upgraded to either Windows XP or Windows Vista. You can now get versions of Windows that fully support most aspects of IPv6 (namely Windows XP and Windows Server 2003) and you will soon be able to get versions of Windows that not only fully support IPv6 but also provide enhanced performance for IPv6 networking. Reference: IPv6 Support in Microsoft Windows/ Windows 2000 http://www.windowsnetworking.com/articles_tutorials/IPv6-Support-Microsoft-Windows.html Question 10. You are an enterprise administrator for ITCertKeys. The company consists of a head office and two Branch offices. The corporate network of ITCertKeys consists of a single Active Directory domain called ITCertKeys.com. The computers in the Branch office locations use IPv4 and IPv6 protocols. Each Branch office is protected by a firewall that performs symmetric NAT. Which of the following options would you choose to allow peer-to-peer communication between all Branch offices? A. Configure the use of Teredo in the firewall. B. Configure the external interface of the firewall with a global IPv6 address. C. Configure the internal interface of the firewall with a link local IPv6 address. D. Configure dynamic NAT on the firewall. Answer: A Explanation: To allow peer-to-peer communication between all Branch offices where each location is protected by a firewall that performs symmetric NAT, you need to configure the firewall to allow the use of Teredo. Teredo is an IPv6 transition technology that provides address assignment and host-to-host automatic tunneling for unicast IPv6 traffic when IPv6/IPv4 hosts are located behind one or multiple IPv4 network address translators (NATs). Teredo in Windows Vista and Windows Server "Longhorn" will work if one of the peers is behind a symmetric NAT and the other is behind a cone or restricted NAT. Reference: Teredo Overview http://technet.microsoft.com/en-us/liBRary/bb457011(TechNet.10).aspx
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.