The Pass4itsure Exam questions answers covers all the knowledge points of the real exam. We update our product frequently so our customer can always have the latest version of the brain dumps.
Thursday, December 28, 2017
[Helpful] 100% Pass Guarantee Cisco 400-101 Dumps CCIE Routing and Switching Study Guide Actual Questions Free Shared
100% pass Guarantee Cisco 400-101 dumps study guide, real Cisco 400-101 dumps actual questions for sale, pass CCIE Routing and Switching Written Exam.With the complete collection of questions and answers, Pass4itsure has assembled to take you through 828 Q&As to your Cisco 400-101 dumps exam preparation. In the past few years, Cisco 400-101 dumps has become an influenced computer skills certification dumps.
But how to pass Cisco 400-101 dumps quickly and simply? Our Pass4itsure can always help you solve this problem quickly. In Pass4itsure Pass4itsure provide the Cisco https://www.pass4itsure.com/400-101.html dumps latest exam to help you pass the dumps successfully.
[Pass4itsure Cisco 300-101 Dumps From Google Drive]: https://drive.google.com/open?id=0BwxjZr-ZDwwWWDdYaFM0SVFwMTA
[Pass4itsure Cisco 400-101 Dumps From Google Drive]: https://drive.google.com/open?id=0BwxjZr-ZDwwWczJDVzl1SUJLWms
Cisco Exam Pass4itsure 400-101 Dumps PDF Blog Series:
QUESTION NO: 32
Which of the following methods determines the principle name of the current user and returns the jav a.security.Principal object in the HttpServletRequest interface?
A. getUserPrincipal()
B. isUserInRole()
C. getRemoteUser()
D. getCallerPrincipal()
400-101 exam Answer: A
Explanation: The getUserPrincipal() method determines the principle name of the current user and returns the java.security.Principal object. The java.security.Principal object contains the remote user name. The value of the getUserPrincipal() method returns null if no user is authenticated. Answer: C is incorrect. The getRemoteUser() method returns the user name that is used for the client authentication. The value of the getRemoteUser() method returns null if no user is authenticated. Answer: B is incorrect. The isUserInRole() method determines whether the remote user is granted a specified user role. The value of the isUserInRole() method returns true if the remote user is granted the specified user role; otherwise it returns false. Answer: D is incorrect. The getCallerPrincipal() method is used to identify a caller using a java.security.Principal object. It is not used in the HttpServletRequest interface.
QUESTION NO: 33
The NIST Information Security and Privacy Advisory Board (ISPAB) paper "Perspectives on Cloud Computing and Standards" specifies potential advantages and disdvantages of virtualization. Which of the following disadvantages does it include? Each correct answer represents a complete solution. Choose all that apply.
A. It increases capabilities for fault tolerant computing using rollback and snapshot features.
B. It increases intrusion detection through introspection.
C. It initiates the risk that malicious software is targeting the VM environment.
D. It increases overall security risk shared resources.
E. It creates the possibility that remote attestation may not work.
F. It involves new protection mechanisms for preventing VM escape, VM detection, and VM-VM interference.
G. It increases configuration effort because of complexity and composite system.
Answer: C,D,E,F,G
Explanation: The potential security disadvantages of virtualization are as follows: It increases configuration effort because of complexity and composite system. It initiates the problem of how to prevent overlap while mapping VM storage onto host files. It introduces the problem of virtualizing the TPM. It creates the possibility that remote attestation may not work. It initiates the problem of detecting VM covert channels. It involves new protection mechanisms for preventing VM escape, VM detection, and VM-VM interference. It initiates the possibility of virtual networking configuration errors. It initiates the risk that malicious software is targeting the VM environment. It increases overall security risk shared resources, such as networks, clipboards, clocks, printers, desktop management, and folders. Answer: A and B are incorrect. These are not the disadvantages of virtualization, as described in the NIST Information Security and Privacy Advisory Board (ISPAB) paper "Perspectives on Cloud Computing and Standards".
QUESTION NO: 34
Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.
A. Physical
B. Technical
C. Administrative
D. Automatic
400-101 dumps Answer: A,B,C
Explanation: Security guards, locks on the gates, and alarms come under physical access control. Policies and procedures implemented by an organization come under administrative access control. IDS systems, encryption, network segmentation, and antivirus controls come under technical access control. Answer: D is incorrect. There is no such type of access control as automatic control.
QUESTION NO: 35
What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process? Each correct answer represents a complete solution. Choose all that apply.
A. Initiate IA implementation plan
B. Develop DIACAP strategy
C. Assign IA controls.
D. Assemble DIACAP team
E. Register system with DoD Component IA Program.
F. Conduct validation activity.
Answer: A,B,C,D,E
Explanation: The Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) is a process defined by the United States Department of Defense (DoD) for managing risk. The subordinate tasks of the Initiate and Plan IA C&A phase are as follows: Register system with DoD Component IA Program. Assign IA controls. Assemble DIACAP team. Develop DIACAP strategy. Initiate IA implementation plan. Answer: F is incorrect. Validation activities are conducted in the second phase of the DIACAP process, i.e., Implement and Validate Assigned IA Controls.
QUESTION NO: 36
Which of the following attacks causes software to fail and prevents the intended users from accessing software?
A. Enabling attack
B. Reconnaissance attack
C. Sabotage attack
D. Disclosure attack
400-101 pdf Answer: C
Explanation: A sabotage attack is an attack that causes software to fail. It also prevents the intended users from accessing software. A sabotage attack is referred to as a denial of service (DoS) or compromise of availability. Answer: B is incorrect. The reconnaissance attack enables an attacker to collect information about software and operating environment. Answer: D is incorrect. The disclosure attack exposes the revealed data to an attacker. Answer: A is incorrect. The enabling attack delivers an easy path for other attacks.
QUESTION NO: 37
FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls have been implemented?
A. Level 2
B. Level 3
C. Level 5
D. Level 1
E. Level 4
Answer: B
Explanation: The following are the five levels of FITSAF based on SEI's Capability Maturity Model(CMM):
Level 1: The first level reflects that an asset has documented a security policy.
Level 2: The second level shows that the asset has documented procedures and controls to implement the policy.
Level 3: The third level indicates that these procedures and controls have been implemented.
Level 4: The fourth level shows that the procedures and controls are tested and reviewed.
Level 5: The fifth level is the final level and shows that the asset has procedures and controls fully integrated into a comprehensive program.
QUESTION NO: 38
Which of the following is a name, symbol, or slogan with which a product is identified?
A. Trademark
B. Copyright
C. Trade secret
D. Patent
400-101 vce Answer: A
Explanation: A trademark is a name, symbol, or slogan with which a product is identified. Its uniqueness makes the product noticeable among the same type of products. For example, Pentium and Athlon are brand names of the CPUs that are manufactured by Intel and AMD, respectively. The trademark law protects a company's trademark by making it illegal for other companies to use it without taking prior permission of the trademark owner. A trademark is registered so that others cannot use identical or similar marks. Answer: C is incorrect. A trade secret is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known. It helps a business to obtain an economic advantage over its competitors or customers. In some jurisdictions, such secrets are referred to as confidential information or classified information. Answer: B is incorrect. A copyright is a form of intellectual property, which secures to its holder the exclusive right to produce copies of his or her works of
original expression, such as a literary work, movie, musical work or sound recording, painting, photograph, computer program, or industrial design, for a defined, yet extendable, period of time. It does not cover ideas or facts. Copyright laws protect intellectual property from misuse by other individuals. Answer: D is incorrect. A patent is a set of exclusive rights granted to anyone who invents any new and useful machine, process, composition of matter, etc. A patent enables the inventor to legally enforce his right to exclude others from using his invention.
QUESTION NO: 39
Della work as a project manager for BlueWell Inc. A threat with a dollar value of $250,000 is expected to happen in her project and the frequency of threat occurrence per year is 0.01. What will be the annualized loss expectancy in her project?
A. $2,000
B. $2,500
C. $3,510
D. $3,500
Answer: B
Explanation: The annualized loss expectancy in her project will be $2,500. Annualized loss expectancy (ALE) is the annually expected financial loss to an organization from a threat. The annualized loss expectancy (ALE) is the product of the annual rate of occurrence (ARO) and the single loss expectancy (SLE). It is mathematically expressed as follows: ALE = Single Loss
Expectancy (SLE) * Annualized Rate of Occurrence (ARO) Here, it is as follows:
ALE = SLE * ARO
= 250,000 * 0.01
= 2,500
Answer: D, C, and A are incorrect. These are not valid answers.
QUESTION NO: 40
Which of the following coding practices are helpful in simplifying code? Each correct answer represents a complete solution. Choose all that apply.
A. Programmers should use multiple small and simple functions rather than a single complex function.
B. Software should avoid ambiguities and hidden assumptions, recursions, and GoTo statements.
C. Programmers should implement high-consequence functions in minimum required lines of code and follow proper coding standards.
C. Processes should have multiple entry and exit points.
400-101 exam Answer: A,B,C
Explanation: The various coding practices that are helpful in simplifying the code are as follows: Programmers should implement high-consequence functions in minimum required lines of code and follow the proper coding standards. Software should implement the functions that are defined in the software specification. Software should avoid ambiguities and hidden assumptions, recursion, and GoTo statements. Programmers should use multiple small and simple functions rather than a complex function. The processes should have only one entry point and minimum exit points. Interdependencies should be minimum so that a process module or component can be disabled when it is not needed, or replaced when it is found insecure or a better alternative is available, without disturbing the software operations. Programmers should use object-oriented techniques to keep the code simple and small. Some of the object-oriented techniques are object inheritance, encapsulation, and polymorphism. Answer: D is incorrect. Processes should have only one entry point and the minimum number of exit points.
QUESTION NO: 41
Which of the following methods does the Java Servlet Specification v2.4 define in the HttpServletRequest interface that control programmatic security? Each correct answer represents a complete solution. Choose all that apply.
A. getCallerIdentity()
B. isUserInRole()
C. getUserPrincipal()
D. getRemoteUser()
Answer: B,C,D
Explanation: The various methods of the HttpServletRequest interface are as follows: getRemoteUser(): It returns the user name that is used for the client authentication. The value of the getRemoteUser() method returns null if no user is authenticated. isUserInRole(): It determines whether the remote user is granted a specified user role. The value of the isUserInRole() method returns true if the remote user is granted the specified user role; otherwise it returns false. getUserPrincipal(): It determines the principle name of the current user and returns the java.security.Principal object. The java.security.Principal object contains the remote user name. The value of the getUserPrincipal() method returns null if no user is authenticated. Answer: A is incorrect. It is not defined in the HttpServletRequest interface. The getCallerIdentity() method is used to obtain the java.security.Identity of the caller.
QUESTION NO: 42
You are the project manager of the CUL project in your organization. You and the project team are assessing the risk events and creating a probability and impact matrix for the identified risks. Which one of the following statements best describes the requirements for the data type used in qualitative risk analysis?
A. A qualitative risk analysis encourages biased data to reveal risk tolerances.
B. A qualitative risk analysis required unbiased stakeholders with biased risk tolerances.
C. A qualitative risk analysis requires accurate and unbiased data if it is to be credible.
D. A qualitative risk analysis requires fast and simple data to complete the analysis.
400-101 dumps Answer: C
Explanation: Of all the choices only this answer is accurate. The PMBOK clearly states that the data must be accurate and unbiased to be credible. Answer: D is incorrect. This is not a valid statement about the qualitative risk analysis data. Answer: A is incorrect. This is not a valid statement about the qualitative risk analysis data. Answer: B is incorrect. This is not a valid statement about the qualitative risk analysis data.
The Cisco 400-101 dumps contains the latest studied materials of the dumps supplied by IT experts.At the time of writing this summary of the Cisco 400-101 dumps, the dumps is still in Beta as it was just recently published. This means there are not any dumps guide books, or practice dumpss available yet. To study for this dumps, you will need to rely mostly on the Cisco https://www.pass4itsure.com/400-101.html dumps documentation for the different technologies covered on this exam.
Read More: http://www.absoluteeventsuk.com/updated-cisco-400-101-dumps-ccie-routing-and-switching-exam/
Read More Youtube: https://youtu.be/PyNCK41BG10
Thursday, December 21, 2017
[Helpful] Download Latest Cisco 300-370 Dumps WITSHOOT Youtube Study Guide With The Knowledge And Skills
Pass4itsure Cisco 300-370 dumps pdf guide, download latest Cisco 300-370 dumps cert with the knowledge and skills, pass Troubleshooting Cisco Wireless Enterprise Networks.With the complete collection of questions and answers, Pass4itsure has assembled to take you through 60 Q&As to your Cisco 300-370 dumps exam preparation. With the development of the world, technology is becoming more and more advanced (https://www.Pass4itsure.com/300-370.html dumps preparation), there are many bad people who are trying to get benefits from illegal behaviors, and the hackers are typical among them, who are trying to make profits by stealing personal information.
Our company has taken this into consideration at the very beginning (300-370 study guide), so Pass4itsure have designed a sound system for the transaction in the internet as Pass4itsure as a reliable payment platform in order to protect the privacy of our customers in a comprehensive way.
[Cisco 300-370 Dumps From Google Drive]: https://drive.google.com/open?id=0BwxjZr-ZDwwWVVhaZUpnZWRvOHM
[Microsoft 70-765 Dumps From Google Drive]: https://drive.google.com/open?id=0BwxjZr-ZDwwWV3l0WFp4azdOVlU
Cisco Exam Pass4itsure 300-370 Dumps PDF Blog Series:
QUESTION NO: 77
Primary customers are those individuals or groups that sponsor the audit. All of the following are examples of primary customers EXCEPT:
A. University and research groups.
B. Local/city governments.
C. National governments.
D. Regional/state governments.
300-370 exam Answer: A
QUESTION NO: 78
Measurement criteria are considered relevant when they relate directly to the mission, goals, and objectives of the customer. All of the following are some possible examples of measurement criteria that could be used in performance audits EXCEPT:
A. Legal or contractual requirements for specific performance (e.g., efficiency standards, quality standards or goals for outcomes to be achieved by a program).
B. Benchmark performance by comparable public or private sector operations.
C. Customers feedback will be given the first and foremost importance.
D. Ad hoc criteria asserted by the auditors, such as comparisons to performance for a prior period, comparison of performance among branch offices or similar organizational divisions.
Answer: C
QUESTION NO: 79
All of the following is the terminologies used to refer to audits of performance EXCEPT:
A. Operational audit and program audit.
B. Management audit and value for-money audit
C. Comprehensive audit and broad-scope audit
D. Control audit
Answer: D
QUESTION NO: 80
Program audits are designed to assess whether a program, activity, or function is achieving the desired results or benefits established by the legislature or other authorizing body. Program audits consider all of the following effectiveness issues EXCEPT:
A. Whether the program is achieving its intended objectives and is making its intended impact on stakeholders.
B. Whether the organization has adequate systems for planning, managing, and monitoring to achieve its goals and objectives.
C. Reported measures of economy and efficiency that are valid and reliable.
D. Whether the program duplicates, overlaps, or conflicts with another program.
300-370 dumps Answer: C
QUESTION NO: 81
Management controls are the plans, methods, and procedures adopted by management for measuring, reporting, and monitoring program performance. All of the following are objectives of management control EXCEPT:
A. Program operations
B. controlled operations
C. Compliance with laws and regulations.
D. Validity and reliability of data.
Answer: B
QUESTION NO: 82
_____________involves interviews, observations, and inspections appropriate to the audit objectives. Auditors often design tests of specific management controls based on information gained in previous audits:
A. Market control management
B. Bureaucratic control management
C. Clan control
D. Testing management controls
300-370 pdf Answer: D
QUESTION NO: 83
An assessment of management controls can influence all of the following elements of the audit
program EXCEPT:
A. Objectives:
B. Structure
C. Methodology.
D. Scope
Answer: B
QUESTION NO: 84
Which of the following parameters is NOT used for calculating the capacity of the hard disk?
A. Bytes per sector
B. Number of heads
C. Total number of sectors
D. Number of platters
300-370 vce Answer: D
QUESTION NO: 85
In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?A. Discretionary Access Control (DAC)
B. Access Control List (ACL)
C. Mandatory Access Control (MAC)
D. Role Based Access Control (RBAC)
Answer: C
QUESTION NO: 86
Adam works as a professional Computer Hacking Forensic Investigator. He has been called by the FBI to examine data of the hard disk, which is seized from the house of a suspected terrorist. Adam decided to acquire an image of the suspected hard drive. He uses a forensic hardware tool, which is capable of capturing data from IDE, Serial ATA, SCSI devices, and flash cards. This tool can also produce MD5 and CRC32 hash while capturing the data. Which of the following tools is Adam using?
A. Wipe MASSter
B. ImageMASSter 4002i
C. ImageMASSter Solo-3
D. FireWire DriveDock
300-370 exam Answer: C
QUESTION NO: 87
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the BlackBerry, which is suspected to be used to hide some important information. Which of the following is the first step taken to preserve the information in forensic investigation of the BlackBerry?
A. Keep BlackBerry in 'ON' state.
B. Remove the storage media.
C. Eliminate the ability of the device to receive the push data.
D. Turn off the BlackBerry.
Answer: C
QUESTION NO: 88
All of the following are the Aspects of control activities that would help an auditor assess vulnerability EXCEPT:
A. Planning about future events
B. Inadequate performance monitoring by high-level management and prolonged understaffing.
C. Lack of competence and integrity of management and staff.
D. Acceptance of audit findings and corrective action taken.
300-370 dumps Answer: A
QUESTION NO: 89
Which of The following two approaches can be used to evaluate management controls in Performance audits please choose the correct option?
A. measurement based approach
B. Targeted approach
C. Planning based approach
D. Comprehensive approach
Answer: C
QUESTION NO: 90
The goal of the comprehensive approach is to identify potential significant control weaknesses for further review. All of the following are the general steps in the process EXCEPT:
A. Document and evaluate work processes and controls.
B. Acceptance of audit findings and corrective action taken.
C. Select a sample of transactions and determine if processes and controls are functioning as intended.
D. Determine or estimate the effect of control weakness of program goals and objectives.
300-370 pdf Answer: C
QUESTION NO: 91
In what ways Performance auditors provide information to government policymakers please choose the correct option
A. By not performing investigative work.
B. Developing conclusions about the economy, efficiency, and effectiveness of government programs and making recommendations for improvement.
C. by giving informal reports
D. Developing methods and approaches to evaluate a new or a proposed program.Answer: B,D
QUESTION NO: 92
The purpose of ___________audits of is to issue an opinion on the fairness of the financial statements and to evaluate the following assertions (explicit or implicit) by management:
A. Income statement
B. Financial statements
C. Ban reconciliation statement
D. Both A & B
300-370 vce Answer: B
Our operation system will encrypt all of the information of our customers automatically as soon as they pay for our Cisco 300-370 dumps actual questions in the Pass4itsure website, so it is really unnecessary for you to worry about your personal information in our Pass4itsure.com. Cisco https://www.Pass4itsure.com/300-370.html dumps Study guide from Pass4itsyre allows you to succeed on the dumps the first time and is the only self-study resource approved by Cisco.
Read More: http://www.passcertguide.com/latest-cisco-ccnp-300-370-dumps-witshoot-pdf/
Read More Youtube: https://youtu.be/EecAMLxqles
Our company has taken this into consideration at the very beginning (300-370 study guide), so Pass4itsure have designed a sound system for the transaction in the internet as Pass4itsure as a reliable payment platform in order to protect the privacy of our customers in a comprehensive way.
[Cisco 300-370 Dumps From Google Drive]: https://drive.google.com/open?id=0BwxjZr-ZDwwWVVhaZUpnZWRvOHM
[Microsoft 70-765 Dumps From Google Drive]: https://drive.google.com/open?id=0BwxjZr-ZDwwWV3l0WFp4azdOVlU
Cisco Exam Pass4itsure 300-370 Dumps PDF Blog Series:
QUESTION NO: 77
Primary customers are those individuals or groups that sponsor the audit. All of the following are examples of primary customers EXCEPT:
A. University and research groups.
B. Local/city governments.
C. National governments.
D. Regional/state governments.
300-370 exam Answer: A
QUESTION NO: 78
Measurement criteria are considered relevant when they relate directly to the mission, goals, and objectives of the customer. All of the following are some possible examples of measurement criteria that could be used in performance audits EXCEPT:
A. Legal or contractual requirements for specific performance (e.g., efficiency standards, quality standards or goals for outcomes to be achieved by a program).
B. Benchmark performance by comparable public or private sector operations.
C. Customers feedback will be given the first and foremost importance.
D. Ad hoc criteria asserted by the auditors, such as comparisons to performance for a prior period, comparison of performance among branch offices or similar organizational divisions.
Answer: C
QUESTION NO: 79
All of the following is the terminologies used to refer to audits of performance EXCEPT:
A. Operational audit and program audit.
B. Management audit and value for-money audit
C. Comprehensive audit and broad-scope audit
D. Control audit
Answer: D
QUESTION NO: 80
Program audits are designed to assess whether a program, activity, or function is achieving the desired results or benefits established by the legislature or other authorizing body. Program audits consider all of the following effectiveness issues EXCEPT:
A. Whether the program is achieving its intended objectives and is making its intended impact on stakeholders.
B. Whether the organization has adequate systems for planning, managing, and monitoring to achieve its goals and objectives.
C. Reported measures of economy and efficiency that are valid and reliable.
D. Whether the program duplicates, overlaps, or conflicts with another program.
300-370 dumps Answer: C
QUESTION NO: 81
Management controls are the plans, methods, and procedures adopted by management for measuring, reporting, and monitoring program performance. All of the following are objectives of management control EXCEPT:
A. Program operations
B. controlled operations
C. Compliance with laws and regulations.
D. Validity and reliability of data.
Answer: B
QUESTION NO: 82
_____________involves interviews, observations, and inspections appropriate to the audit objectives. Auditors often design tests of specific management controls based on information gained in previous audits:
A. Market control management
B. Bureaucratic control management
C. Clan control
D. Testing management controls
300-370 pdf Answer: D
QUESTION NO: 83
An assessment of management controls can influence all of the following elements of the audit
program EXCEPT:
A. Objectives:
B. Structure
C. Methodology.
D. Scope
Answer: B
QUESTION NO: 84
Which of the following parameters is NOT used for calculating the capacity of the hard disk?
A. Bytes per sector
B. Number of heads
C. Total number of sectors
D. Number of platters
300-370 vce Answer: D
QUESTION NO: 85
In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?A. Discretionary Access Control (DAC)
B. Access Control List (ACL)
C. Mandatory Access Control (MAC)
D. Role Based Access Control (RBAC)
Answer: C
QUESTION NO: 86
Adam works as a professional Computer Hacking Forensic Investigator. He has been called by the FBI to examine data of the hard disk, which is seized from the house of a suspected terrorist. Adam decided to acquire an image of the suspected hard drive. He uses a forensic hardware tool, which is capable of capturing data from IDE, Serial ATA, SCSI devices, and flash cards. This tool can also produce MD5 and CRC32 hash while capturing the data. Which of the following tools is Adam using?
A. Wipe MASSter
B. ImageMASSter 4002i
C. ImageMASSter Solo-3
D. FireWire DriveDock
300-370 exam Answer: C
QUESTION NO: 87
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the BlackBerry, which is suspected to be used to hide some important information. Which of the following is the first step taken to preserve the information in forensic investigation of the BlackBerry?
A. Keep BlackBerry in 'ON' state.
B. Remove the storage media.
C. Eliminate the ability of the device to receive the push data.
D. Turn off the BlackBerry.
Answer: C
QUESTION NO: 88
All of the following are the Aspects of control activities that would help an auditor assess vulnerability EXCEPT:
A. Planning about future events
B. Inadequate performance monitoring by high-level management and prolonged understaffing.
C. Lack of competence and integrity of management and staff.
D. Acceptance of audit findings and corrective action taken.
300-370 dumps Answer: A
QUESTION NO: 89
Which of The following two approaches can be used to evaluate management controls in Performance audits please choose the correct option?
A. measurement based approach
B. Targeted approach
C. Planning based approach
D. Comprehensive approach
Answer: C
QUESTION NO: 90
The goal of the comprehensive approach is to identify potential significant control weaknesses for further review. All of the following are the general steps in the process EXCEPT:
A. Document and evaluate work processes and controls.
B. Acceptance of audit findings and corrective action taken.
C. Select a sample of transactions and determine if processes and controls are functioning as intended.
D. Determine or estimate the effect of control weakness of program goals and objectives.
300-370 pdf Answer: C
QUESTION NO: 91
In what ways Performance auditors provide information to government policymakers please choose the correct option
A. By not performing investigative work.
B. Developing conclusions about the economy, efficiency, and effectiveness of government programs and making recommendations for improvement.
C. by giving informal reports
D. Developing methods and approaches to evaluate a new or a proposed program.Answer: B,D
QUESTION NO: 92
The purpose of ___________audits of is to issue an opinion on the fairness of the financial statements and to evaluate the following assertions (explicit or implicit) by management:
A. Income statement
B. Financial statements
C. Ban reconciliation statement
D. Both A & B
300-370 vce Answer: B
Our operation system will encrypt all of the information of our customers automatically as soon as they pay for our Cisco 300-370 dumps actual questions in the Pass4itsure website, so it is really unnecessary for you to worry about your personal information in our Pass4itsure.com. Cisco https://www.Pass4itsure.com/300-370.html dumps Study guide from Pass4itsyre allows you to succeed on the dumps the first time and is the only self-study resource approved by Cisco.
Read More: http://www.passcertguide.com/latest-cisco-ccnp-300-370-dumps-witshoot-pdf/
Read More Youtube: https://youtu.be/EecAMLxqles
Thursday, December 14, 2017
[Helpful] Best Cisco 400-351 Dumps Demos Video Study Are The Best Materials
Pass4itsure Cisco 400-351 dumps demo, helpful Cisco 400-351 dumps Are The Best Materials,Pass CCIE Wireless Written Exam.With the complete collection of questions and answers, Pass4itsure has assembled to take you through 261 Q&As to your Cisco 400-351 dumps exam preparation. There are many methods to pass Cisco 400-351 dumps pdf, but the method provided by our Pass4itsure can be the most efficient.
You can quickly feel your ability has enhanced when you are using Cisco 400-351 dumps pdf simulation software made by our IT elite. Cisco https://www.pass4itsure.com/400-351.html dumps pdf will be updates every once in a while to ensure you use the latest materials, Pass4itsure provide one-year free update of our software for you a that you can be rest assured to use it.
[Cisco 400-351 Dumps From Google Drive]: https://drive.google.com/open?id=0BwxjZr-ZDwwWbVlmaEVvUmZqT2c
[Microsoft 70-767 Dumps From Google Drive]: https://drive.google.com/open?id=0BwxjZr-ZDwwWaWpOOFpVd3ZyMTg
Cisco Exam Pass4itsure 400-351 Dumps PDF Blog Series:
QUESTION 94
In forecasting purchases of inventory for a firm, all of the following are useful except
A. Knowledge of the behavior of business cycles.
B. Internal allocations of costs to different segments of the firm.
C. Information on the seasonal variations in demand.
D. Econometric modeling.
400-351 exam Correct Answer: B
Explanation
Explanation/Reference:
Explanation:
Internal allocations of costs relate to costs already incurred, that is. to sunk costs. Sunk costs are not relevant to decision making, for example, to forecasting future purchases.
QUESTION 95
A widely used approach that managers use to recognize uncertainty about individual items and to obtain an immediate financial estimate of the consequences of possible prediction errors is:
A. Expected value analysis.
B. Learning curve analysis.
C. Sensitivity analysis.
D. Regression analysis.
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
After a problem has been formulated into any mathematical model, it may be subjected to sensitivity analysis. Sensitivity analysis examines how the model's outcomes change as the parameters change.
QUESTION 96
An international nonprofit organization finances medical research. The majority of its revenue and support comes from fundraising activities, investments, and specific grants from an initial sponsoring corporation. The organization has been in operation over 15 years and has a small internal audit department. The organization has just finished a major fundraising drive that raised US $500 million for the current fiscal period. The following are selected data from recent financial statements (US dollar figures in millions): The auditor wishes to determine if the change in investment income during the current year was due to (a) changes in investment strategy, (b) changes in portfolio mix, or (c) other factors. Which of the following analytical review procedures should the auditor use?
A. Simple linear regression that compares investment income changes over the past 5 years to determine the nature of the changes.
B. Ratio analysis that compares changes in the investment portfolio on a monthly basis.
C. Trend analysis that compares the changes in investment income as a percentage of total assets and of investment assets over the past 5 years.
D. Multiple regression analysis that includes independent variables related to the nature of the investment portfolio and market conditions.
400-351 dumps Correct Answer: D
Explanation
Explanation/Reference:
Explanation:
Regression analysis develops an equation to explain the behavior of a dependent variable (for example, investment income) in terms of one or more independent variables (for example, market risk and the risks of particular investments). Multiple regression analysis is the best approach because it allows the auditor to regress the change in investment income on more than one independent variable.
QUESTION 97
Which of the following is not an appropriate time series forecasting technique?
A. Least squares.
B. Exponential smoothing.
C. The Delphi technique.
D. Moving averages.
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
The Delphi technique is an approach in which the manager solicits opinions on a problem from experts, summarizes the opinions, and feeds the summaries back to the experts (without revealing any of the participants to each other). The process is reiterated until the opinions converge on an optimal solution. Thus, the Delphi technique is a qualitative, not a quantitative, method.
QUESTION 98
A company in the process of analyzing inventory safety stock levels is having difficulty because demand vanes widely from one week to the next. However, it has been discovered that demand occurs according to a probability distribution. Which of the following is a stochastic model that the company could use in this situation?
A. Markov process.
B. Linear programming.
C. Regression analysis.
D. Critical path network analysis.
400-351 pdf Correct Answer: A
Explanation
Explanation/Reference:
Explanation:
A stochastic model is probabilistic. Markov processes quantify the likelihood of a future event based on the current state of the process.
QUESTION 99
A company experiences both variable usage rates and variable lead times for its inventory items. The probability distributions for both usage and lead times are known. A technique the company could use for determining the optimal safety stock levels for an inventory item is:
A. Queuing theory.
B. Linear programming.
C. Decision tree analysis.
D. Monte Carlo simulation.
Correct Answer: D
Explanation
Explanation/Reference:
Explanation:
Simulation is a technique for experimenting with mathematical models using a computer. Monte Carlo simulation is a technique to generate the individual values for a random variable. A random number generator is used to produce numbers with a uniform probability distribution. The second step of the Monte Carlo process then transforms the random numbers into values consistent with the desired distribution. The performance of a model under conditions of uncertainty may be investigated by randomly selecting values for each of the variables in the model based on the probability distribution of each variable and then calculating the value of the solution. Advantages of Monte Carlo simulation are that time can be compressed, alternative policies can be considered, and complex systems can be analyzed.
QUESTION 100
A bank is designing an on-the-job training program for its branch managers. The bank would like to design the program so that participants can complete it as quickly as possible. The training program requires that certain activities be completed before others. For example, a participant cannot make credit loan decisions without first having obtained experience in the loan department. An appropriate scheduling technique for this training program is:
A. PERT/CPM.
B. Linear programming.
C. Queuing theory.
D. Sensitivity analysis.
400-351 vce Correct Answer: A
Explanation
Explanation/Reference:
Explanation:
PERT/CPM is a network technique for scheduling interrelated time series activities and identifying any critical paths in the series of activities The critical path is the longest path through the network.
QUESTION 101
A Gantt chart:
A. Shows the critical path for a project.
B. Is used for determining an optimal product mix.
C. Shows only the activities along the critical path of a network.
D. Does not necessarily show the critical path through a network.
Correct Answer: D
Explanation
Explanation/Reference:
Explanation:
The major advantage of a Gantt chart is its simplicity: It requires no special tools or mathematics. However, it depicts only the interrelationships between tasks in a limited way. Thus, trying to identify a project's critical path from a Gantt chart may not be feasible.
QUESTION 102
In the Gantt chart below, shaded bars represent completed portions of activities, bars depicted with broken lines represent uncompleted portions, and blank bars
represent activities notyet begun. As of week 8, the Gantt chart shows that the project is:
A. Complete.
B. Ahead of schedule.
C. On schedule.
D. Behind schedule.
400-351 exam Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
Activities B and C are the only activities that should be underway during week 8. Since bothareunderway and on schedule, the project is on schedule.
QUESTION 103
When using PERT (Program Evaluation Review Technique), the expected time for an activity when given an optimistic time (a), a pessimistic time (b),andamostlikelytime(m) is calculated by which one of the following formulas?
A. (b-a) + 2
B. (a+b) + 2
C. (a+4m+b) + 6
D. (4abm) + 6
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
PERT was developed to aid managers in controlling large, complex projects. PERT analysis includes probabilistic estimates of activity completion times. Three time estimates are made: optimistic, most likely, and pessimistic. The time estimates for an activity are assumed to approximate a beta probability distribution. PERT approximates the mean of the beta distribution by dividing the sum of the optimistic time, the pessimistic time, and four times the most likely time by six.
QUESTION 104
The process of adding resources to shorten selected activity times on the critical path in project scheduling is called:
A. Crashing.
B. The Delphi technique.
C. ABC analysis.
D. A branch-and-bound solution.
400-351 dumps Correct Answer: A
Explanation
Explanation/Reference:
Explanation:
Crashing is the process of adding resources to shorten activity times on the critical path in project scheduling.
QUESTION 105
The network diagram and the corresponding activity cost chart for a manufacturing project at Networks, Inc., are presented below. The numbers in the diagram are the expected times (in days) to perform each activity in the project. The expected time of the critical path is:
A. 12.0 days
B. 13.0 days
C. 11.5 days
D. 11.0 days
Correct Answer: B
Explanation
Explanation/Reference:
Explanation:
The critical path is the longest path. The longest path in the diagram is A-D-E, which requires 13 days (5.5 + 7.5) based on expected times.
QUESTION 106
To keep costs at a minimum and decrease the completion time by 1-1/2 days, Networks, Inc. should crash activity(ies):
A. ADandAB
B. DE
C. AD
D. ABandCE
400-351 pdf Correct Answer: A
Explanation
Explanation/Reference:
Explanation:
The critical (longest) path is A-D-E, which has an expected time of 13 days (5.5 + 7.5). However, to decrease the project's completion time by 1.5 days, paths A-B C-E (4.5 + 1.0 + 6.5 = 12 days) and A- B-D-E (4.5 + .5 + 7.5= 12.5 days) as well as A-D-E must also be shortened. Hence, A-D-E must be reduced by 1.5 days. AB-C-E by .5 day, and A-B-D-E by 1.0 day. The only way to decrease A-D-E by 1.5 days is to crash activity AD (5.5 expected time - 4.0 crash time = 1.5 days). Crashing DE results in a 1.0-day saving (7.5-6.5) only. Crashing AB is theefficient way to reduce both A-B-C-E and A-B-D-E by the desired amount of time because it is part of both paths. The incremental cost of crashing AB is US $1,000 (US $4,000 crash cost - US $3,000 normal cost) to shorten the completion time by 1.0 day (4.5 - 3.5). The alternatives for decreasing both A-B-C-E and A-B-D-E are more costly.
Pass4itsure are providing Cisco 400-351 dumps free demo for customers before they decide to buy our practice material. Free demos are so critical that it can see the Cisco 400-351 dumps practice material' direct quality. Before your purchase, you can freely download the Cisco https://www.pass4itsure.com/400-351.html dumps free demo. There are CCIE Wireless Written Exam dumps questions, not having all the questions.
Read More: http://www.certificationpdf.com/new-cisco-ccie-wireless-400-351-dumps-exam/
Read More Youtube: https://youtu.be/ZT0UYbdC7FU
You can quickly feel your ability has enhanced when you are using Cisco 400-351 dumps pdf simulation software made by our IT elite. Cisco https://www.pass4itsure.com/400-351.html dumps pdf will be updates every once in a while to ensure you use the latest materials, Pass4itsure provide one-year free update of our software for you a that you can be rest assured to use it.
[Cisco 400-351 Dumps From Google Drive]: https://drive.google.com/open?id=0BwxjZr-ZDwwWbVlmaEVvUmZqT2c
[Microsoft 70-767 Dumps From Google Drive]: https://drive.google.com/open?id=0BwxjZr-ZDwwWaWpOOFpVd3ZyMTg
Cisco Exam Pass4itsure 400-351 Dumps PDF Blog Series:
QUESTION 94
In forecasting purchases of inventory for a firm, all of the following are useful except
A. Knowledge of the behavior of business cycles.
B. Internal allocations of costs to different segments of the firm.
C. Information on the seasonal variations in demand.
D. Econometric modeling.
400-351 exam Correct Answer: B
Explanation
Explanation/Reference:
Explanation:
Internal allocations of costs relate to costs already incurred, that is. to sunk costs. Sunk costs are not relevant to decision making, for example, to forecasting future purchases.
QUESTION 95
A widely used approach that managers use to recognize uncertainty about individual items and to obtain an immediate financial estimate of the consequences of possible prediction errors is:
A. Expected value analysis.
B. Learning curve analysis.
C. Sensitivity analysis.
D. Regression analysis.
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
After a problem has been formulated into any mathematical model, it may be subjected to sensitivity analysis. Sensitivity analysis examines how the model's outcomes change as the parameters change.
QUESTION 96
An international nonprofit organization finances medical research. The majority of its revenue and support comes from fundraising activities, investments, and specific grants from an initial sponsoring corporation. The organization has been in operation over 15 years and has a small internal audit department. The organization has just finished a major fundraising drive that raised US $500 million for the current fiscal period. The following are selected data from recent financial statements (US dollar figures in millions): The auditor wishes to determine if the change in investment income during the current year was due to (a) changes in investment strategy, (b) changes in portfolio mix, or (c) other factors. Which of the following analytical review procedures should the auditor use?
A. Simple linear regression that compares investment income changes over the past 5 years to determine the nature of the changes.
B. Ratio analysis that compares changes in the investment portfolio on a monthly basis.
C. Trend analysis that compares the changes in investment income as a percentage of total assets and of investment assets over the past 5 years.
D. Multiple regression analysis that includes independent variables related to the nature of the investment portfolio and market conditions.
400-351 dumps Correct Answer: D
Explanation
Explanation/Reference:
Explanation:
Regression analysis develops an equation to explain the behavior of a dependent variable (for example, investment income) in terms of one or more independent variables (for example, market risk and the risks of particular investments). Multiple regression analysis is the best approach because it allows the auditor to regress the change in investment income on more than one independent variable.
QUESTION 97
Which of the following is not an appropriate time series forecasting technique?
A. Least squares.
B. Exponential smoothing.
C. The Delphi technique.
D. Moving averages.
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
The Delphi technique is an approach in which the manager solicits opinions on a problem from experts, summarizes the opinions, and feeds the summaries back to the experts (without revealing any of the participants to each other). The process is reiterated until the opinions converge on an optimal solution. Thus, the Delphi technique is a qualitative, not a quantitative, method.
QUESTION 98
A company in the process of analyzing inventory safety stock levels is having difficulty because demand vanes widely from one week to the next. However, it has been discovered that demand occurs according to a probability distribution. Which of the following is a stochastic model that the company could use in this situation?
A. Markov process.
B. Linear programming.
C. Regression analysis.
D. Critical path network analysis.
400-351 pdf Correct Answer: A
Explanation
Explanation/Reference:
Explanation:
A stochastic model is probabilistic. Markov processes quantify the likelihood of a future event based on the current state of the process.
QUESTION 99
A company experiences both variable usage rates and variable lead times for its inventory items. The probability distributions for both usage and lead times are known. A technique the company could use for determining the optimal safety stock levels for an inventory item is:
A. Queuing theory.
B. Linear programming.
C. Decision tree analysis.
D. Monte Carlo simulation.
Correct Answer: D
Explanation
Explanation/Reference:
Explanation:
Simulation is a technique for experimenting with mathematical models using a computer. Monte Carlo simulation is a technique to generate the individual values for a random variable. A random number generator is used to produce numbers with a uniform probability distribution. The second step of the Monte Carlo process then transforms the random numbers into values consistent with the desired distribution. The performance of a model under conditions of uncertainty may be investigated by randomly selecting values for each of the variables in the model based on the probability distribution of each variable and then calculating the value of the solution. Advantages of Monte Carlo simulation are that time can be compressed, alternative policies can be considered, and complex systems can be analyzed.
QUESTION 100
A bank is designing an on-the-job training program for its branch managers. The bank would like to design the program so that participants can complete it as quickly as possible. The training program requires that certain activities be completed before others. For example, a participant cannot make credit loan decisions without first having obtained experience in the loan department. An appropriate scheduling technique for this training program is:
A. PERT/CPM.
B. Linear programming.
C. Queuing theory.
D. Sensitivity analysis.
400-351 vce Correct Answer: A
Explanation
Explanation/Reference:
Explanation:
PERT/CPM is a network technique for scheduling interrelated time series activities and identifying any critical paths in the series of activities The critical path is the longest path through the network.
QUESTION 101
A Gantt chart:
A. Shows the critical path for a project.
B. Is used for determining an optimal product mix.
C. Shows only the activities along the critical path of a network.
D. Does not necessarily show the critical path through a network.
Correct Answer: D
Explanation
Explanation/Reference:
Explanation:
The major advantage of a Gantt chart is its simplicity: It requires no special tools or mathematics. However, it depicts only the interrelationships between tasks in a limited way. Thus, trying to identify a project's critical path from a Gantt chart may not be feasible.
QUESTION 102
In the Gantt chart below, shaded bars represent completed portions of activities, bars depicted with broken lines represent uncompleted portions, and blank bars
represent activities notyet begun. As of week 8, the Gantt chart shows that the project is:
A. Complete.
B. Ahead of schedule.
C. On schedule.
D. Behind schedule.
400-351 exam Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
Activities B and C are the only activities that should be underway during week 8. Since bothareunderway and on schedule, the project is on schedule.
QUESTION 103
When using PERT (Program Evaluation Review Technique), the expected time for an activity when given an optimistic time (a), a pessimistic time (b),andamostlikelytime(m) is calculated by which one of the following formulas?
A. (b-a) + 2
B. (a+b) + 2
C. (a+4m+b) + 6
D. (4abm) + 6
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
PERT was developed to aid managers in controlling large, complex projects. PERT analysis includes probabilistic estimates of activity completion times. Three time estimates are made: optimistic, most likely, and pessimistic. The time estimates for an activity are assumed to approximate a beta probability distribution. PERT approximates the mean of the beta distribution by dividing the sum of the optimistic time, the pessimistic time, and four times the most likely time by six.
QUESTION 104
The process of adding resources to shorten selected activity times on the critical path in project scheduling is called:
A. Crashing.
B. The Delphi technique.
C. ABC analysis.
D. A branch-and-bound solution.
400-351 dumps Correct Answer: A
Explanation
Explanation/Reference:
Explanation:
Crashing is the process of adding resources to shorten activity times on the critical path in project scheduling.
QUESTION 105
The network diagram and the corresponding activity cost chart for a manufacturing project at Networks, Inc., are presented below. The numbers in the diagram are the expected times (in days) to perform each activity in the project. The expected time of the critical path is:
A. 12.0 days
B. 13.0 days
C. 11.5 days
D. 11.0 days
Correct Answer: B
Explanation
Explanation/Reference:
Explanation:
The critical path is the longest path. The longest path in the diagram is A-D-E, which requires 13 days (5.5 + 7.5) based on expected times.
QUESTION 106
To keep costs at a minimum and decrease the completion time by 1-1/2 days, Networks, Inc. should crash activity(ies):
A. ADandAB
B. DE
C. AD
D. ABandCE
400-351 pdf Correct Answer: A
Explanation
Explanation/Reference:
Explanation:
The critical (longest) path is A-D-E, which has an expected time of 13 days (5.5 + 7.5). However, to decrease the project's completion time by 1.5 days, paths A-B C-E (4.5 + 1.0 + 6.5 = 12 days) and A- B-D-E (4.5 + .5 + 7.5= 12.5 days) as well as A-D-E must also be shortened. Hence, A-D-E must be reduced by 1.5 days. AB-C-E by .5 day, and A-B-D-E by 1.0 day. The only way to decrease A-D-E by 1.5 days is to crash activity AD (5.5 expected time - 4.0 crash time = 1.5 days). Crashing DE results in a 1.0-day saving (7.5-6.5) only. Crashing AB is theefficient way to reduce both A-B-C-E and A-B-D-E by the desired amount of time because it is part of both paths. The incremental cost of crashing AB is US $1,000 (US $4,000 crash cost - US $3,000 normal cost) to shorten the completion time by 1.0 day (4.5 - 3.5). The alternatives for decreasing both A-B-C-E and A-B-D-E are more costly.
Pass4itsure are providing Cisco 400-351 dumps free demo for customers before they decide to buy our practice material. Free demos are so critical that it can see the Cisco 400-351 dumps practice material' direct quality. Before your purchase, you can freely download the Cisco https://www.pass4itsure.com/400-351.html dumps free demo. There are CCIE Wireless Written Exam dumps questions, not having all the questions.
Read More: http://www.certificationpdf.com/new-cisco-ccie-wireless-400-351-dumps-exam/
Read More Youtube: https://youtu.be/ZT0UYbdC7FU
Saturday, December 9, 2017
[Helpful] High Success Rate Cisco 210-451 Dumps Free CLDFND Exam Test Is Your Best Choice
High success rate Cisco 210-451 dumps free exam test prep is your best choice, pass Understanding Cisco Cloud Fundamentals. With the complete collection of questions and answers, Pass4itsure has assembled to take you through 60 Q&As to your Cisco 210-451 dumps exam preparation. Pass4itsure all want to pass the Cisco https://www.pass4itsure.com/210-451.html dumps at the first attempt. Because the dumps fee is so expensive and the preparation of Cisco 210-451 dumps test really need much time and energy investment.
[2017 New Cisco 210-451 Dumps From Google Drive]: https://drive.google.com/open?id=0BwxjZr-ZDwwWeFJLMDBQaDMyM1E
[2017 New Microsoft 70-764 Dumps From Google Drive]: https://drive.google.com/open?id=0BwxjZr-ZDwwWb05wVEFoVWk4UE0
Cisco Exam Pass4itsure 210-451 Dumps PDF Blog Series:
QUESTION 84
An organization has over 5,000 employees and a union has been trying to persuade the employees to join their union. Before the employees can vote in a union election, what percentage of the employee population must sign an authorization card for the union?A. Ten percent
B. Thirty percent
C. Fifty percent
D. Eighty percent
210-451 exam Correct Answer: B
ExplanationExplanation/Reference:
Explanation:
References:
QUESTION 85
Heather's organization works with a labor union work force. Heather has heard rumors that the union has been trying to create a hot cargo agreement with a supplier. What is a hot cargo agreement?
A. It forces suppliers to join the union.
B. It's a threat that the union will slow down processing orders for non-union shops.
C. It's an agreement that an employer will stop doing business with a non-union business.
D. It's an agreement to rush orders for union-based businesses.
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
References:
QUESTION 86
Management and union representatives are working through a collective bargaining agreement. What term is used in this process to describe arbitration that is used to resolve conflicts around contract language in the collective bargaining agreement?
A. Decisions
B. Interest arbitration
C. Ad hoc arbitration
D. Permanent arbitration
210-451 dumps Correct Answer: B
Explanation
Explanation/Reference:
Explanation:
References:
QUESTION 87
Which of the following union security clauses requires that all employees join the union within a grace period specified by the contract?
A. Agency shop clause
B. Maintenance of membership clause
C. Union shop clause
D. Closed shop clause
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
Answer option C is correct.The union shop clause requires that all employees join the union within a grace period specified by the contract.Answer option
A is incorrect. The agency shop clause specifies that all employees must either join the union or pay union dues if they choose not to join the union.Answer option
B is incorrect. The maintenance of membership clause allows employees to choose whether to join the union, but once they join, they must remain members until the expiration of the contract.Answer option
D is incorrect. The closed shop clause requires that all new hires be members of the union before they are hired.
QUESTION 88
Which of the following occurs when employees stop working and stay in the building?
A. Strike
B. Lockout
C. Wildcat strike
D. Sit-down strike
210-451 pdf Correct Answer: D
Explanation
Explanation/Reference:
Explanation:
Answer option D is correct.A sit-down strike occurs when employees stop working and stay in the building.This is considered as an unlawful strike.Answer option A is incorrect. A strike occurs when the union decides to stop working.Answer option B is incorrect. A lockout occurs when management shuts down operations to keep the union from working.Answer option C is incorrect. A wildcat strike occurs in violation of a contract clause prohibiting strikes during the term of the contract.
QUESTION 89
Beth is a HR Professional for her organization and she's discussing the risk of growing her organization's business. What is risk and why would it be considered in HR for organizational growth?
A. Risk is an uncertain event or condition that can have a positive or negative effect on the goals of an organization.
B. Risk is an adverse event that can halt, hinder, or hurt the objectives of a business.
C. Risk is a negative event that an organization must consider when adding new employees to grow a company.
D. Risk is an uncertain event or condition that may help or hinder an organization. Adding employees can help positive risks or amplify negative risk events.
Correct Answer: D
Explanation
Explanation/Reference:
Explanation:
References:
QUESTION 90
The Occupational Safety and Health Act of 1970 grants employees the right to do all of the following except which one?
A. Be advised of potential safety hazards.
B. Speak privately to an OSHA inspector during an inspection.
C. Observe the employer when measuring and monitoring workplace hazards.
D. View detailed reports of all workplace accidents.
210-451 vce Correct Answer: D
Explanation
Explanation/Reference:
Explanation:
Answer option D is correct.Employees have the right to review accident reports without information that identifies the employees involved in the accident. See Chapter 8 for more information.
QUESTION 91
As an HR Professional you must be familiar with several acts of congress, laws, and regulations that address risks in the workplace. Which of the following laws was the first to establish consistent safety standards for workers?
A. USA Patriot Act
B. Mine Safety and Health Act
C. Occupational Safety and Health Act
D. Homeland Security Act
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
References:
QUESTION 92
As an HR Professional you should be familiar with OSHA forms for maintaining employee records. OSHA form 301 is used to document the incident that caused the work-related injury or illness. How long is an organization required to keep the form on record?
A. One year from the date of the incident
B. 90 days following the year of the incident
C. Five years following the year of the incident
D. Three years following the year of the incident
210-451 exam Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
References:
QUESTION 93
Lucas has asked his manager to take time off from work because of a holiday his religion celebrates. Fran agrees but tells Lucas that he will be inspecting his project work to ensure that the work is accurate and not suffering because of the requested time off. This is an example of what?
A. Perpetuating past discrimination
B. Religious persecution in the workforce
C. Disparate treatment
D. Quality control
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
References:
QUESTION 94
One type of risk, HR Professionals must be aware of and combat is job stress. Which of the following is the best definition of job stress?
A. Stress is the degree of physical, emotional, and mental strain upon a worker from the demands and constraints of employment.
B. Stress is the lack of exercise, sleep, and good diet combined with work demands that are beyond the scope of a person's capabilities.
C. Stress is a harmful physical and emotional response that occurs when the requirements of the job don't match the capabilities, resources, or needs of the worker.
D. Stress is pressure from requirements in a workplace that are beyond the scope of job satisfaction.
210-451 dumps Correct Answer: C
ExplanationExplanation/Reference:
Explanation:
References:
QUESTION 95
Which of the following contains legal provisions for giving compensation to surviving dependents if a work related injury or illness results in the employee's death?
A. OSHA
B. BLBA
C. FECA
D. FLSA
Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
Answer option C is correct.Federal Employees Compensation Act (FECA) is a law that provides rules for compensation benefits to federal employees for work-related injuries or illnesses. FECA contains legal provision for giving compensation to their surviving dependents if a work-related injury or illness results in the employee's death. Answer option A is incorrect. OSHA stands for Occupational Safety and Health Administration. OSHA is an agency of the United States Department of Labor. It was created by Congress
of the United States under the Occupational Safety and Health Act, signed by President Richard M. Nixon, on December 29, 1970. Its mission is to prevent work-related injuries, illnesses, and occupational fatality by issuing and enforcing standards for workplace safety and health. The agency is headed by a Deputy Assistant Secretary of Labor. OSHA issues guidelines and regulations for the safe use of a computer. Answer option B is incorrect. The Black Lung Benefits Act (BLBA) is a law that provides benefits to coal miners who have been disabled by pneumoconiosis as a result of their work in the mines. Benefits are also paid to surviving dependents if the miner dies from the disease. Answer option D is incorrect. The Fair Labor Standards Act (FLSA) defines a list of jobs not suitable for children between the ages of 16 and 18.
QUESTION 96
Richard, who works at the customer service counter in an auto-supply store, told his manager that because of chronic back pain, it is difficult for him stand for long periods and asked for an accommodation.The manager isn't sure, based on the essential job functions, how an accommodation can be provided. You advise the manager to begin the interactive process with the employee. What should the manager do to begin this process?
A. Ask Richard how his back was injured.
B. Provide a stool for Richard to use at the counter.
C. Ask Richard whether he has any suggestions for an accommodation.
D. Ask Richard to meet with HR to resolve the problem.
210-451 pdf Correct Answer: C
Explanation
Explanation/Reference:
Explanation:
Answer option C is correct.To assess the reasonableness of a requested accommodation, employers should ask employees to describe their limitations, how those limitations affect their performance of essential job functions, and whether they have suggestions for an accommodation that would allow them to perform the functions. See Chapter 8 for more information.
Read More Youtube: https://youtu.be/22_cabYvM1w
Subscribe to:
Posts (Atom)
-
100% Free Cisco 642-385 pdf with updated and accurate questions answers for passing the exam https://www.pass4itsure.com/642-385.html Cho...
-
Are you ready to pass the Cisco 700-038 exam? 700-038 dumps that need to be updated, come get them! https://www.pass4itsure.com/700-038.htm...
-
This is a free 300-435 Study Guide for the Cisco Automating and Programming Cisco Enterprise Solutions (ENAUTO) certification exam! It inclu...