Nsk 2013 Learning Assessment

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By TomburnsSWO
T
TomburnsSWO
Community Contributor
Quizzes Created: 1 | Total Attempts: 108
| Attempts: 109
SettingsSettings
Please wait...
  • 1/112 Questions

    What does the Creative Cloud for Teams include? (Adobe)

    • Master Collection plus other select products
    • 100 GB of storage per user
    • Technical support
    • Access to the most recent product update
    • All answers are correct
Please wait...
About This Quiz

The NSK 2013 Learning Assessment focuses on Mimecast's email security solutions, covering topics like email migration, sales cycle, and customer onboarding. It assesses knowledge crucial for sales and support roles, ensuring participants understand Mimecast's unique offerings and business benefits.

Nsk 2013 Learning Assessment - Quiz

Quiz Preview

  • 2. 

    The goal of Software Asset Management is to reduce IT costs and limit business and legal risk related to the ownership and use of software, while maximizing IT responsiveness and end-user productivity. (SAM Elite)

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Software Asset Management (SAM) is a strategic approach that helps organizations effectively manage and control their software assets. The goal of SAM is to reduce IT costs by optimizing software usage, ensuring compliance with licensing agreements, and minimizing the risk of legal penalties. By implementing SAM practices, businesses can also enhance IT responsiveness and improve end-user productivity. Therefore, the statement that the goal of SAM is to reduce IT costs and limit business and legal risk while maximizing IT responsiveness and end-user productivity is true.

    Rate this question:

  • 3. 

    Autodesk is a market leader in 3D Design, Entertainment, and Engineering Software. (Autodesk)

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Autodesk being a market leader in 3D Design, Entertainment, and Engineering Software supports the statement that the given answer "True" is correct. This implies that Autodesk holds a dominant position in the market and is highly regarded in the industry for its software solutions in these areas.

    Rate this question:

  • 4. 

    In reference to Enterprise Mobility, what does the acronym VDI stand for? (Mobility/BYOD) 

    • Virtual Device Initiation

    • Virtual Domain Interface

    • Virtual Desktop Infrastructure

    • Virtual Desktop Initiative

    Correct Answer
    A. Virtual Desktop Infrastructure
    Explanation
    VDI stands for Virtual Desktop Infrastructure. This refers to the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server. This allows users to access their desktop environment remotely from any device, providing flexibility and mobility. VDI is often used in enterprise settings to enable employees to work from different locations and devices while maintaining a consistent and secure desktop experience.

    Rate this question:

  • 5. 

    What does the acronym DLP stand for? (Security Strategies) 

    • Data Loss/Leak Prevention

    • Data Parallelism

    • Digital Light Processing

    • Discrete Logarithms Programming

    Correct Answer
    A. Data Loss/Leak Prevention
    Explanation
    The acronym DLP stands for Data Loss/Leak Prevention. This refers to a set of strategies and technologies designed to prevent sensitive data from being lost, leaked, or accessed by unauthorized individuals. DLP involves implementing measures such as encryption, access controls, and monitoring to ensure that data is protected and not exposed to potential risks or breaches.

    Rate this question:

  • 6. 

    What does the acronym NAC stand for? (Security Strategies) 

    • Netlogon Access Control

    • Network Access Control

    • Needs Assessment Committee

    • National Advisory Committee

    Correct Answer
    A. Network Access Control
    Explanation
    The acronym NAC stands for Network Access Control. Network Access Control refers to the security measures and policies implemented to manage and control access to a computer network. It ensures that only authorized users and devices can access the network and its resources, helping to protect against unauthorized access and potential security threats.

    Rate this question:

  • 7. 

    What are the benefits of virtualization? (Virtualization) 

    • Scale

    • Versioning

    • Security

    • Disaster Recovery

    • All answers are correct

    Correct Answer
    A. All answers are correct
    Explanation
    All of the options listed (Scale, Versioning, Security, Disaster Recovery) are benefits of virtualization. Scale refers to the ability to easily and quickly increase or decrease the resources allocated to virtual machines. Versioning allows for multiple versions of software or operating systems to be run simultaneously on different virtual machines. Security is enhanced through isolation and separation of virtual machines, reducing the risk of malware or unauthorized access. Disaster recovery is improved as virtual machines can be easily backed up and restored in the event of a system failure or disaster.

    Rate this question:

  • 8. 

    With the release of SQL 2012, Enterprise Edition will now be licensed based on compute capacity measured by the number of: (SQL Server 2012)

    • Cores

    • Processors

    • Virtual RAM

    Correct Answer
    A. Cores
    Explanation
    The correct answer is Cores. With the release of SQL 2012, the licensing for Enterprise Edition is now based on compute capacity measured by the number of cores. This means that the number of cores in the server will determine the licensing cost for the Enterprise Edition of SQL 2012.

    Rate this question:

  • 9. 

    What are some of the challenges our customers face today with the proliferation of devices and Enterprise Mobility? (Mobility/BYOD) 

    • Securing company data and information

    • Managing mobile devices from different vendors and different platforms

    • Developing or implementing enterprise applications that can take advantage of the mobile platform

    • Defining and deploying a corporate policy to govern the use of mobile devices

    • All answers are correct

    Correct Answer
    A. All answers are correct
    Explanation
    The correct answer is that all of the given challenges are correct. Securing company data and information is a challenge with the proliferation of devices and enterprise mobility as it becomes more difficult to protect sensitive information across multiple devices. Managing mobile devices from different vendors and platforms is also a challenge as it requires compatibility and integration efforts. Developing or implementing enterprise applications that can take advantage of the mobile platform is another challenge as it requires adapting existing systems or creating new ones. Lastly, defining and deploying a corporate policy to govern the use of mobile devices is a challenge to ensure consistent and secure usage across the organization.

    Rate this question:

  • 10. 

    Who is the CEO of Amazon? (Cloud Strategies)

    • Bill Gates

    • Steve Jobs

    • Jeff Bezos

    • Mark Zuckerberg

    Correct Answer
    A. Jeff Bezos
    Explanation
    Jeff Bezos is the correct answer because he is the CEO of Amazon. Bill Gates is the co-founder of Microsoft, Steve Jobs was the co-founder of Apple, and Mark Zuckerberg is the CEO of Facebook. However, none of them hold the position of CEO at Amazon.

    Rate this question:

  • 11. 

    Mimecast SaaS augments which of the following email environments? (Mimecast) 

    • Office 365

    • On Premise

    • Hybrid

    • All answers are correct

    Correct Answer
    A. All answers are correct
    Explanation
    Mimecast SaaS can be used to enhance and improve the email environments of Office 365, On Premise, and Hybrid setups. This means that regardless of the specific email environment being used, Mimecast SaaS can be implemented to provide additional security, archiving, and continuity features.

    Rate this question:

  • 12. 

    Mimecast solutions enable SoftwareONE to: (Mimecast)

    • Achieve non-Microsoft profit goals

    • Generate services for VARassist partners

    • Add new buying accounts

    • All answers are correct

    Correct Answer
    A. All answers are correct
    Explanation
    The given correct answer states that all answers are correct. This implies that Mimecast solutions enable SoftwareONE to achieve non-Microsoft profit goals, generate services for VARassist partners, and add new buying accounts. This suggests that Mimecast solutions are versatile and beneficial for SoftwareONE in multiple ways, allowing them to achieve their profit goals, provide services to partners, and expand their customer base.

    Rate this question:

  • 13. 

    Each System Center server management license covers up to __ physical processors. (System Center 2012)

    • 1

    • 4

    • 2

    • System Center is licensed per core

    Correct Answer
    A. 2
    Explanation
    Each System Center server management license covers up to 2 physical processors. This means that with a single license, you can manage a server with up to 2 physical processors. This is important because it helps organizations determine how many licenses they need based on the number of physical processors in their servers. In this case, the correct answer is 2.

    Rate this question:

  • 14. 

    How does Mimecast help with email migration? (Mimecast)

    • Acts as a continuity "fail safe" to ensure email flow

    • Replaces the email server

    • Automatically upgrades mail system to most recent version

    • Hosts all mail moving forward

    Correct Answer
    A. Acts as a continuity "fail safe" to ensure email flow
    Explanation
    Mimecast helps with email migration by acting as a continuity "fail safe" to ensure email flow. This means that even during the migration process, Mimecast ensures that emails continue to be delivered without any interruptions. It acts as a backup system, ensuring that no emails are lost or undelivered during the migration.

    Rate this question:

  • 15. 

    What type of special pricing does TechSmith offer? (TechSmith)

    • EDU Pricing

    • GOV Pricing

    • Non-Profit Pricing

    • All answers are correct

    Correct Answer
    A. All answers are correct
    Explanation
    TechSmith offers various types of special pricing, including EDU Pricing, GOV Pricing, and Non-Profit Pricing. This means that educational institutions, government organizations, and non-profit organizations can all take advantage of special pricing offered by TechSmith.

    Rate this question:

  • 16. 

    Which of the following Microsoft solutions can be leveraged by an enterprise to help improve mobility? (Mobility/BYOD) 

    • Windows 8 Enterprise

    • Office 2013 and/or Office 365

    • Microsoft Desktop Optimization Package

    • Surface Pro/RT

    • Microsoft System Center 2012

    • All answers are correct

    Correct Answer
    A. All answers are correct
    Explanation
    All of the listed Microsoft solutions can be leveraged by an enterprise to help improve mobility. Windows 8 Enterprise provides a mobile-friendly operating system, Office 2013 and/or Office 365 offer productivity tools that can be accessed from anywhere, Microsoft Desktop Optimization Package provides management and security features for mobile devices, Surface Pro/RT offers portable computing options, and Microsoft System Center 2012 provides centralized management for mobile devices. Therefore, all answers are correct.

    Rate this question:

  • 17. 

    Windows Server licenses purchased through volume licensing may be re-assigned every ___ days. (Windows Server 2012)

    • 30

    • 60

    • 90

    • 120

    Correct Answer
    A. 90
    Explanation
    Windows Server licenses purchased through volume licensing may be re-assigned every 90 days. This means that after 90 days, the license can be transferred to a different device or user. This flexibility allows organizations to adapt their licensing to changing needs and ensures that they can efficiently manage their Windows Server deployments.

    Rate this question:

  • 18. 

    Who is Tina Morgan?

    • SoftwareONE IBM Specialist

    • SoftwareONE Symantec Specialist

    • SoftwareONE Adobe Specialist

    • PreferredPartner Sales Rep

    Correct Answer
    A. SoftwareONE IBM Specialist
    Explanation
    Tina Morgan is a SoftwareONE IBM Specialist. This means that she specializes in IBM software and is knowledgeable and experienced in working with IBM products and services. As an IBM Specialist, Tina would likely have expertise in areas such as IBM software licensing, implementation, and support. This specialization allows her to provide specialized guidance and support to clients who are using or considering using IBM software solutions.

    Rate this question:

  • 19. 

    Today's malware may consist of up to 5 different types of technology:  Ex-filtration,  Discovery, Incursion, Reconnaissance, and Capture. (Symantec)

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Today's malware can indeed consist of up to 5 different types of technology: exfiltration, discovery, incursion, reconnaissance, and capture. These different types of technology represent various stages and techniques that malware can use to infiltrate and compromise systems. Exfiltration refers to the unauthorized transfer of data, while discovery involves identifying vulnerabilities and targets. Incursion involves gaining access to a system, reconnaissance is the gathering of information, and capture refers to the actual compromise of the system. Therefore, the statement is true.

    Rate this question:

  • 20. 

    What are the benefits of purchasing TechSmith maintenance? (TechSmith)

    • Receive one license key for all licenses

    • Purchase at a higher pricing tier and lower price point

    • Free major upgrades

    • All answers are correct

    Correct Answer
    A. All answers are correct
    Explanation
    The benefits of purchasing TechSmith maintenance include receiving one license key for all licenses, purchasing at a higher pricing tier and lower price point, and getting free major upgrades. All of these options provide advantages to customers, making them all correct answers.

    Rate this question:

  • 21. 

    Which TechSmith product takes still image captures? (TechSmith)

    • Camtasia Studio

    • Camtasia for Mac

    • Snagit

    • Camtasia Relay

    Correct Answer
    A. Snagit
    Explanation
    Snagit is the correct answer because it is a TechSmith product that is specifically designed for taking still image captures. Camtasia Studio and Camtasia for Mac are primarily used for screen recording and video editing, while Camtasia Relay is a product for recording and sharing lectures and presentations. Snagit, on the other hand, is a versatile screen capture tool that allows users to easily capture screenshots and annotate them.

    Rate this question:

  • 22. 

    What is the number one data security risk to companies? (Security Strategies) 

    • Employee negligence

    • Poor antivirus protection

    • The Cloud

    • Script kiddies

    Correct Answer
    A. Employee negligence
    Explanation
    Employee negligence is the number one data security risk to companies because employees often make mistakes or engage in careless behavior that can lead to data breaches. This can include actions such as clicking on phishing emails, using weak passwords, or mishandling sensitive information. While poor antivirus protection and the cloud can also pose security risks, employee negligence is considered the most significant threat as it can directly result in the exposure or loss of sensitive data. Script kiddies, on the other hand, refer to individuals who use pre-existing hacking tools without much expertise and are generally not considered as significant of a risk as employee negligence.

    Rate this question:

  • 23. 

    What is the software called that creates the abstraction layer in virtualization? (Virtualization) 

    • Virtualization Software

    • OpenSource

    • Hypervisor

    • Hyper Abstractor

    Correct Answer
    A. Hypervisor
    Explanation
    The software that creates the abstraction layer in virtualization is called a hypervisor. A hypervisor is responsible for managing and controlling the virtual machines, allowing multiple operating systems to run on a single physical machine. It abstracts the underlying hardware resources and provides a virtual environment for the virtual machines to operate independently.

    Rate this question:

  • 24. 

    With the release of SQL Server 2012, License Mobility is: (SQL Server 2012)

    • Included only with SQL Server 2012 Enterprise Edition

    • Included in all editions of SQL Server 2012 when purchased with Software Assurance

    • Included in all editions of SQL Server 2012 when licensed under the core-based model

    Correct Answer
    A. Included in all editions of SQL Server 2012 when purchased with Software Assurance
    Explanation
    License Mobility in SQL Server 2012 refers to the ability to transfer licenses between servers within a server farm. This allows organizations to move their SQL Server licenses to different servers as needed, providing flexibility and cost savings. The correct answer states that License Mobility is included in all editions of SQL Server 2012 when purchased with Software Assurance. This means that regardless of the edition of SQL Server 2012, if the organization has purchased Software Assurance, they will have the ability to take advantage of License Mobility.

    Rate this question:

  • 25. 

    What is the gross profit split between SoftwareONE and PreferredPartner? (IBM/PreferredPartner) 

    • 50/50

    • 70/30

    • 60/40

    • 85/15

    Correct Answer
    A. 50/50
    Explanation
    The gross profit split between SoftwareONE and PreferredPartner is 50/50. This means that both parties will receive an equal share of the gross profit.

    Rate this question:

  • 26. 

    A virtual desktop means that a user's desktop environment (the icons, wallpaper, windows, folders, etc.) is stored on a server, rather than on a local PC or other client computing device. (Mobility/BYOD) 

    • True

    • False

    Correct Answer
    A. True
    Explanation
    A virtual desktop refers to the storage of a user's desktop environment on a server rather than a local device. This allows for greater mobility and flexibility, as users can access their desktop from any device with an internet connection. It also supports the Bring Your Own Device (BYOD) trend, as users can use their personal devices to access their virtual desktop. Therefore, the statement "A virtual desktop means that a user's desktop environment is stored on a server" is true.

    Rate this question:

  • 27. 

    What are the three cloud environments? (Select three answers) (Cloud Strategies)

    • Public Cloud

    • Dynamic Cloud

    • Private Cloud

    • Hybrid Cloud

    Correct Answer(s)
    A. Public Cloud
    A. Private Cloud
    A. Hybrid Cloud
    Explanation
    The three cloud environments are Public Cloud, Private Cloud, and Hybrid Cloud. Public Cloud refers to a cloud infrastructure that is owned and operated by a third-party provider and made available to the general public. Private Cloud, on the other hand, is a cloud infrastructure that is exclusively used by a single organization, providing more control and security. Hybrid Cloud is a combination of both public and private clouds, allowing organizations to take advantage of the benefits of both environments.

    Rate this question:

  • 28. 

    Which mobile device is more secure out of the box? (Security Strategies) 

    • Apple

    • Android

    Correct Answer
    A. Apple
    Explanation
    Apple devices are generally considered to be more secure out of the box compared to Android devices. This is because Apple's iOS operating system has built-in security features such as strict app vetting process, regular security updates, and hardware encryption. Additionally, Apple's closed ecosystem and control over app distribution further enhance the security of their devices. On the other hand, Android devices have a more open ecosystem, allowing for greater customization but also making them more susceptible to malware and security vulnerabilities.

    Rate this question:

  • 29. 

    Customers with Software Assurance on SQL Server 2008 R2 Standard or Enterprise (processor licenses) will receive a base licensing grant of  __ cores per processor license. (SQL Server 2012)

    • 2

    • 1

    • 4

    • 8

    Correct Answer
    A. 4
    Explanation
    Customers with Software Assurance on SQL Server 2008 R2 Standard or Enterprise (processor licenses) will receive a base licensing grant of 4 cores per processor license. This means that for each processor license they have, they will be able to use up to 4 cores. This allows for greater scalability and performance as more cores can be utilized for processing data.

    Rate this question:

  • 30. 

    All Autodesk subscription customers have access to Autodesk 360 - Autodesk Cloud. (Autodesk)

    • True

    • False

    Correct Answer
    A. True
    Explanation
    All Autodesk subscription customers have access to Autodesk 360, which is a cloud-based platform provided by Autodesk. This platform allows users to store, share, and collaborate on their design files and projects. Therefore, the statement "All Autodesk subscription customers have access to Autodesk 360 - Autodesk Cloud" is true.

    Rate this question:

  • 31. 

    Multi-tenancy is a software architecture where a single instance of the software, operating system, or hardware serves multiple client organizations (tenants). (Cloud Strategies) 

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Multi-tenancy is a software architecture that allows multiple client organizations to use a single instance of the software, operating system, or hardware. This architecture is commonly used in cloud computing, where resources are shared among different tenants. By sharing resources, multi-tenancy enables cost savings, scalability, and efficient resource utilization. Therefore, the statement "Multi-tenancy is a software architecture where a single instance of the software, operating system, or hardware serves multiple client organizations (tenants)" is true.

    Rate this question:

  • 32. 

    How many virtualization solutions does SoftwareONE sell? (Virtualization) 

    • 1

    • 2

    • 4

    • 4+

    Correct Answer
    A. 4+
    Explanation
    SoftwareONE sells more than four virtualization solutions.

    Rate this question:

  • 33. 

    Which of the following are solutions that SoftwareONE can offer to customers for Mobile Device Management? (Mobility/BYOD) 

    • MobileIron

    • Microsoft System Center 2012

    • AirWatch

    • All answers are correct

    Correct Answer
    A. All answers are correct
    Explanation
    All of the options listed (MobileIron, Microsoft System Center 2012, and AirWatch) are solutions that SoftwareONE can offer to customers for Mobile Device Management.

    Rate this question:

  • 34. 

    Elyse Makanani is an Autodesk resource who can assist with license history reports and consolidation. (Autodesk)

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Elyse Makanani is a resource provided by Autodesk who can assist with license history reports and consolidation. This suggests that Elyse Makanani is knowledgeable in these areas and can provide support and guidance to users who require assistance with license history reports and consolidation. Therefore, the statement is true.

    Rate this question:

  • 35. 

    VDI is a commercial desktop virtualization product developed by VMware. (Mobility/BYOD) 

    • True

    • False

    Correct Answer
    A. False
    Explanation
    VDI, which stands for Virtual Desktop Infrastructure, is a commercial desktop virtualization product developed by VMware. It allows users to access their desktops remotely from any device. This technology is often used in the context of mobility and BYOD (Bring Your Own Device) initiatives, as it enables employees to work from their personal devices while still accessing their work desktop. Therefore, the statement that VDI is related to Mobility/BYOD is true, not false.

    Rate this question:

  • 36. 

    What was the Chinese government looking for when it cracked the RSA certificate? (Security Strategies) 

    • US nuclear bomb plans

    • Lockheed F35 fighter jet plans

    • Kryptonite

    • Patriot missile plans

    Correct Answer
    A. Lockheed F35 fighter jet plans
    Explanation
    The Chinese government cracked the RSA certificate in order to obtain the Lockheed F35 fighter jet plans.

    Rate this question:

  • 37. 

    What is the number one method hackers use to gain access to their targeted employees? (Security Strategies) 

    • Facebook.com

    • Twitter.com

    • LinkedIN.com

    • Match.com

    Correct Answer
    A. LinkedIN.com
    Explanation
    Hackers often use social engineering techniques to gain access to their targeted employees. LinkedIn, being a professional networking platform, provides a wealth of information about individuals, including their job titles, employers, and connections. This makes it a prime target for hackers who can use this information to craft convincing phishing emails or impersonate trusted contacts. By tricking employees into clicking on malicious links or sharing sensitive information, hackers can gain unauthorized access to systems and networks. Therefore, LinkedIn.com is the number one method hackers use to gain access to their targeted employees.

    Rate this question:

  • 38. 

    What does the acronym PCI stand for? (Security Strategies) 

    • Personal Communications Internetworking

    • Protocol Control Information

    • Programmable Communications Interface

    • Payment Card Industry Data Security Standard (PCI DSS)

    Correct Answer
    A. Payment Card Industry Data Security Standard (PCI DSS)
    Explanation
    The acronym PCI stands for Payment Card Industry Data Security Standard (PCI DSS). This is a set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment. The PCI DSS provides guidelines and requirements for businesses to follow in order to protect cardholder data and prevent fraud. It includes measures such as network security, encryption, access control, and regular monitoring and testing of security systems. Compliance with PCI DSS is mandatory for all organizations that handle payment card information.

    Rate this question:

  • 39. 

    What are the three types of cloud computing? (Cloud Strategies)

    • Software as a Service, Technology as a Service, Infrastructure as a Service

    • Infrastructure as a Service, Platform as a Service, Software as a Service

    • Technology as a Service, Infrastructure as a Service, Platform as a Service

    • Platform as a Service, Software as a Service, Technology as a Service

    Correct Answer
    A. Infrastructure as a Service, Platform as a Service, Software as a Service
    Explanation
    The three types of cloud computing are Infrastructure as a Service, Platform as a Service, and Software as a Service. Infrastructure as a Service (IaaS) provides virtualized computing resources over the internet, such as servers, storage, and networking. Platform as a Service (PaaS) offers a platform for developing, running, and managing applications without the complexity of infrastructure management. Software as a Service (SaaS) delivers software applications over the internet on a subscription basis, eliminating the need for users to install and maintain software locally.

    Rate this question:

  • 40. 

    Which of the following is a form of on-demand software distribution for specific applications? (Mobility/BYOD) 

    • Virtual Desktops

    • Application Streaming

    Correct Answer
    A. Application Streaming
    Explanation
    Application streaming is a form of on-demand software distribution for specific applications. It allows users to access and use applications without the need for installation or downloading. Instead, the application is delivered over the network and executed on the user's device in a virtualized environment. This enables users to access and use the application from any device, making it a suitable solution for mobility and BYOD (Bring Your Own Device) scenarios. Virtual Desktops, on the other hand, refer to the virtualization of an entire desktop environment, including the operating system and applications, rather than just specific applications.

    Rate this question:

  • 41. 

    System Center 2012 server management licenses are available in which of the following editions? (Select all that apply) (System Center 2012)

    • System Center 2012 Standard

    • System Center 2012 Enterprise

    • System Center 2012 Datacenter

    Correct Answer(s)
    A. System Center 2012 Standard
    A. System Center 2012 Datacenter
    Explanation
    System Center 2012 server management licenses are available in the Standard and Datacenter editions. The Standard edition is suitable for small to medium-sized businesses and provides basic server management capabilities. The Datacenter edition is designed for large enterprises and offers advanced server management features, including unlimited virtualization rights. The Enterprise edition, although mentioned in the question, is not available for System Center 2012 server management licenses.

    Rate this question:

  • 42. 

    Mimecast pays __% margin for deal registration. (Mimecast) 

    • 10

    • 12

    • 25

    • 15

    Correct Answer
    A. 25
    Explanation
    Mimecast pays a 25% margin for deal registration. This means that when a deal is registered with Mimecast, the person or company responsible for registering the deal will receive a 25% margin on the sale. This margin serves as a commission or incentive for registering and bringing in new business for Mimecast.

    Rate this question:

  • 43. 

    What is the minimum dollar amount required to register a deal with TechSmith? (TechSmith)

    • $4,000 MSRP

    • $6,000 MSRP

    • $3,000 MSRP

    • $7,000 MSRP

    Correct Answer
    A. $3,000 MSRP
    Explanation
    The minimum dollar amount required to register a deal with TechSmith is $3,000 MSRP.

    Rate this question:

  • 44. 

    With a Software as a Service solution, most of the management is the responsibility of the end customer. (Cloud Strategies)

    • True

    • False

    Correct Answer
    A. False
    Explanation
    A Software as a Service (SaaS) solution is a cloud-based software delivery model where the provider hosts and manages the software application and infrastructure. In this model, the responsibility of management, including maintenance, updates, and security, lies with the provider rather than the end customer. The end customer only needs to access the software through an internet connection and does not have to worry about the technical aspects of managing the software. Therefore, the given statement that most of the management is the responsibility of the end customer is incorrect.

    Rate this question:

  • 45. 

    To license a physical server properly under the core-based model, you must license all cores in the server with a minimum of __ cores required for each physical processor in the server. (SQL Server 2012)

    • 2

    • 1

    • 4

    • 8

    Correct Answer
    A. 4
    Explanation
    To license a physical server properly under the core-based model, you must license all cores in the server with a minimum of 4 cores required for each physical processor in the server. This means that if a server has multiple physical processors, you need to count the number of cores in each processor and license all of them. In this case, the correct answer is 4.

    Rate this question:

  • 46. 

    Where is TechSmith located? (TechSmith)

    • Lansing, MI

    • Detroit, MI

    • Grand Rapids, MI

    • Ann Arbor, MI

    Correct Answer
    A. Lansing, MI
    Explanation
    TechSmith is located in Lansing, MI.

    Rate this question:

  • 47. 

    Which of the following is NOT an IBM software product? (IBM/PreferredPartner)

    • SPSS

    • Teradata

    • Cognos

    • BigFix

    Correct Answer
    A. Teradata
    Explanation
    Teradata is not an IBM software product. Teradata is a separate company that specializes in data warehousing and analytics. While IBM offers various software products such as SPSS, Cognos, and BigFix, Teradata is not included in their portfolio.

    Rate this question:

  • 48. 

    SQL Server 2012 Enterprise Edition is available under core-based licensing and the server/cal model. (SQL Server 2012)

    • True

    • False

    Correct Answer
    A. False
    Explanation
    SQL Server 2012 Enterprise Edition is not available under the server/cal model. It is only available under core-based licensing.

    Rate this question:

  • 49. 

    What does mobility in the enterprise mean for businesses? (Select all that apply) (Mobility/BYOD) 

    • To be able to safely access and share corporate resources across mobile and corporate devices

    • To deliver enterprise products and services "taco truck" style

    • To provide the enterprise workforce with the freedom to work in an efficient and productive manner without having to physically be present in the office

    • It is a health and wellness program designed to help employees incorporate more physical activity into their daily lives

    Correct Answer(s)
    A. To be able to safely access and share corporate resources across mobile and corporate devices
    A. To provide the enterprise workforce with the freedom to work in an efficient and productive manner without having to physically be present in the office
    Explanation
    Mobility in the enterprise refers to the ability for employees to access and share corporate resources using mobile and corporate devices. This allows for increased flexibility and productivity as employees can work efficiently without being physically present in the office. It ensures that employees can safely access and share important corporate resources while maintaining security measures.

    Rate this question:

Quiz Review Timeline (Updated): Mar 11, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 11, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 02, 2013
    Quiz Created by
    TomburnsSWO
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.