Sunday, February 16, 2020

CRISC Certified in Risk and Information Systems Control Exam

ISACA’s Certified in Risk and Information Systems Control (CRISC) certification indicates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls. Gain instant recognition and credibility with CRISC and boost your career!

THE CRISC DIFFERENCE
Whether you are seeking a new career opportunity or striving to grow within your current organization, a CRISC certification proves your expertise in these work-related domains

PREPARE FOR THE EXAM
Set yourself up to succeed on exam day. Whether you prefer to prep on your own time or want the additional guidance and interaction that comes with live instruction, we have the right CRISC test prep solutions for you.

Course Description
The CRISC Online Review Course is an online preparation course that prepares learners to pass the CRISC certification exam using proven instructional design techniques and interactive activities.The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice.

The course incorporates video, interactive eLearning modules, downloadable, interactive workbooks, downloadable job aids, case study activities, and pre-and post-course assessments. Learners will be able to navigate the course at their own pace, following a recommended structure, or target preferred job practice areas. Learners may also start and stop the course based on their study schedule, picking up exactly where they left off the next time they access the course.

Learning Objectives:

At the completion of this course you will be able to:
Identify the IT risk management strategy in support of business objectives and alignment with the Enterprise Risk Management (ERM) strategy.
Analyze and evaluate IT risk to determine the likelihood and impact on business objectives to enable risk-based decision making.
Determine risk response options and evaluate their efficiency and effectiveness to manage risk in alignment with business objectives.
Continuously monitor and report on IT risk and controls to relevant stakeholders to ensure the continued efficiency and effectiveness of the IT risk management strategy and its alignment with business objectives.

Included Materials:
Video
Interactive Content
Downloadable workbooks and job aids
Case study activities
Practice exam

Ideal For:
Professionals preparing to become CRISC certified
Risk practitioners
Students or recent graduates

Cancellation/Refund Policy
All purchases of online learning courses are final. Access to the online learning courses and materials is immediate upon purchasing; therefore no refunds or exchanges will be provided. Prices subject to change without notice.

Enterprise Training
Online review courses are also available for purchase through our enterprise sales team for larger organizations. Visit the Enterprise Training page and reach out to an associate for more information.

QUESTION 1
Which of the following is the MOST important reason to maintain key risk indicators (KRIs)?

A. In order to avoid risk
B. Complex metrics require fine-tuning
C. Risk reports need to be timely
D. Threats and vulnerabilities change over time

Correct Answer: D

Explanation:
Threats and vulnerabilities change over time and KRI maintenance ensures that KRIs continue to effectively
capture these changes.
The risk environment is highly dynamic as the enterprise's internal and external environments are constantly
changing. Therefore, the set of KRIs needs to be changed over time, so that they can capture the changes in
threat and vulnerability.
Incorrect Answers:
A: Risk avoidance is one possible risk response. Risk responses are based on KRI reporting, but is not the
reason for maintenance of KRIs.
B: While most key risk indicator (KRI) metrics need to be optimized in respect to their sensitivity, the most
important objective of KRI maintenance is to ensure that KRIs continue to effectively capture the changes in
threats and vulnerabilities over time. Hence the most important reason is that because of change of threat and
vulnerability overtime.
C: Risk reporting timeliness is a business requirement, but is not a reason for KRI maintenance.

QUESTION 2
You are the project manager of a HGT project that has recently finished the final compilation process. The
project customer has signed off on the project completion and you have to do few administrative closure
activities. In the project, there were several large risks that could have wrecked the project but you and your
project team found some new methods to resolve the risks without affecting the project costs or project
completion date. What should you do with the risk responses that you have identified during the project's
monitoring and controlling process?

A. Include the responses in the project management plan.
B. Include the risk responses in the risk management plan.
C. Include the risk responses in the organization's lessons learned database.
D. Nothing. The risk responses are included in the project's risk register already.

Correct Answer: C

Explanation:
The risk responses that do not exist up till then, should be included in the organization's lessons learned
database so other project managers can use these responses in their project if relevant.

Incorrect Answers:
A: The responses are not in the project management plan, but in the risk response plan during the project and
they'll be entered into the organization's lessons learned database.
B: The risk responses are included in the risk response plan, but after completing the project, they should be
entered into the organization's lessons learned database.
D: If the new responses that were identified is only included in the project's risk register then it may not be
shared with project managers working on some other project.

QUESTION 3
You are the project manager of GHT project. You have identified a risk event on your project that could save
$100,000 in project costs if it occurs. Which of the following statements BEST describes this risk event?

A. This risk event should be mitigated to take advantage of the savings.
B. This is a risk event that should be accepted because the rewards outweigh the threat to the project.
C. This risk event should be avoided to take full advantage of the potential savings.
D. This risk event is an opportunity to the project and should be exploited.

Correct Answer: D

Explanation:
This risk event has the potential to save money on project costs, so it is an opportunity, and the appropriate
strategy to use in this case is the exploit strategy. The exploit response is one of the strategies to negate risks
or threats appear in a project. This strategy may be selected for risks with positive impacts where the
organization wishes to ensure that the opportunity is realized. Exploiting a risk event provides opportunities for
positive impact on a project. Assigning more talented resources to the project to reduce the time to completion
is an example of exploit response.

Incorrect Answers:
A, C: Mitigation and avoidance risk response is used in case of negative risk events, and not in positive risk
events. Here in this scenario, as it is stated that the event could save $100,000, hence it is a positive risk
event. Therefore should not be mitigated or avoided.
B: To accept risk means that no action is taken relative to a particular risk; loss is accepted if it occurs. But as
this risk event bring an opportunity, it should me exploited and not accepted.

QUESTION 4
You are the project manager of a large construction project. This project will last for 18 months and will cost
$750,000 to complete. You are working with your project team, experts, and stakeholders to identify risks
within the project before the project work begins. Management wants to know why you have scheduled so
many risk identification meetings throughout the project rather than just initially during the project planning.
What is the best reason for the duplicate risk identification sessions?

A. The iterative meetings allow all stakeholders to participate in the risk identification processes throughout the project phases.
B. The iterative meetings allow the project manager to discuss the risk events which have passed the project and which did not happen.
C. The iterative meetings allow the project manager and the risk identification participants to identify newly discovered risk events throughout the project.
D. The iterative meetings allow the project manager to communicate pending risks events during project execution.

Correct Answer: C

Explanation:
Risk identification is an iterative process because new risks may evolve or become known as the project progresses through its life cycle.

Incorrect Answers:
A: Stakeholders are encouraged to participate in the risk identification process, but this is not the best choice.
B: Risk identification focuses on discovering new risk events, not the events which did not happen.
D: The primary reason for iterations of risk identification is to identify new risk events.

QUESTION 5
You are the risk official in Bluewell Inc. You are supposed to prioritize several risks. A risk has a rating for
occurrence, severity, and detection as 4, 5, and 6, respectively. What Risk Priority Number (RPN) you would give to it?

A. 120
B. 100
C. 15
D. 30

Correct Answer: A

Explanation:
Steps involving in calculating risk priority number are as follows:
Identify potential failure effects
Identify potential causes
Establish links between each identified potential cause
Identify potential failure modes
Assess severity, occurrence and detection
Perform score assessments by using a scale of 1 -10 (low to high rating) to score these assessments.
Compute the RPN for a particular failure mode as Severity multiplied by occurrence and detection.
RPN = Severity * Occurrence * Detection
Hence,
RPN = 4 * 5 * 6
= 120
Incorrect Answers:
B, C, D: These are not RPN for given values of severity, occurrence, and detection.
QUESTION 6
Which of the following is the MOST important use of KRIs?
A. Providing a backward-looking view on risk events that have occurred
B. Providing an early warning signal
C. Providing an indication of the enterprise's risk appetite and tolerance
D. Enabling the documentation and analysis of trends

Correct Answer: B

Explanation:
Key Risk Indicators are the prime monitoring indicators of the enterprise. KRIs are highly relevant and possess
a high probability of predicting or indicating important risk. KRIs help in avoiding excessively large number of
risk indicators to manage and report that a large enterprise may have.
As KRIs are the indicators of risk, hence its most important function is to effectively give an early warning
signal that a high risk is emerging to enable management to take proactive action before the risk actually
becomes a loss.
Incorrect Answers:
A: This is one of the important functions of KRIs which can help management to improve but is not as
important as giving early warning.
C: KRIs provide an indication of the enterprise's risk appetite and tolerance through metric setting, but this is
not as important as giving early warning.
D: This is not as important as giving early warning.
Click here to view complete Q&A of Isaca CRISC exam
Certkingdom Review
, Certkingdom PDF

MCTS Training, MCITP Trainnig
Best Isaca CRISC Certification, Isaca CRISC Training at certkingdom.com

Thursday, February 6, 2020

PSM-I Professional Scrum Master I Exam

Prove Your Scrum Knowledge and Get Certified
The Professional Scrum MasterTM level I (PSM I) assessment is available to anyone who wishes to validate his or her depth of knowledge of the PictureScrum framework and its application. Those who pass the assessment will receive the industry recognized PSM I Certification to demonstrate their fundamental level of Scrum mastery.

Taking a course is not required and if you feel that you already possess a high level of Scrum knowledge, understanding of the Scrum Guide and how to apply Scrum within Scrum Teams, you have the option to take the PSM I assessment directly. However, there are courses available to help you prepare for the assessment and gain a stronger understanding of Scrum. Depending on your role, either the 2-day Professional Scrum Foundations or Professional Scrum Master course is highly recommended.

Prepare for the Assessment
The assessment is difficult; preparation is required to achieve a passing score. Reading the Scrum Guide and taking the Open Assessments alone isn't typically enough preparation and we recommend reviewing the content below:

The assessment covers topics from multiple Focus Areas defined by the Professional Scrum Competencies.
Many questions ask you to think about or interpret the meaning from the Scrum Guide and how you would apply Scrum within a Scrum Team.
The PSM I Suggested Reading lists the Focus Areas from which questions may be selected during the assessment.
The Scrum Master Learning Path contains many additional resources to help you prepare to take the PSM I Assessment.

Search the list of existing Professional Scrum certification holders here or see a breakdown on how many people hold certifications.

To protect the integrity of the certification process, Scrum.org does not share information about the specific questions that were answered correctly or incorrectly. Learn More

The cost of PSM I is $150 USD. Assessment passwords are valid for one attempt, do not expire and remain valid until used. See below for more details.

Details
Fee: $150 USD per attempt
Passing score: 85%
Time limit: 60 minutes
Number of Questions: 80
Format: Multiple Choice, Multiple Answer and True/False
Difficulty: Intermediate
Language: English only
Scrum Resources
Required course: None
Recommended courses: Professional Scrum Foundations or Professional Scrum Master
PSM Subject Areas
Practice Assessment: Scrum Open
Ways to Learn More to help you prepare
Passwords have no expiration date, but are valid for one attempt only

When you purchase a password, it is set up in our system and emailed to you within one business day. All Students in a PSM or PSF course are emailed a password upon completion of the course (typically within 3-5 business days).**

Certification
If you pass the PSM I assessment you will receive the industry-recognized "PSM I" certification, along with a PSM I logo that you can use to identify your achievement. In addition, your name will be posted publicly for colleagues, managers, and potential employers to see.

Unlike other Scrum certifications that require only class attendance, Scrum.org certification requires a minimum score on an online assessment. Attending a course is neither required nor sufficient for certification. This gives Scrum.org certification teeth and ensures that it has true value in the marketplace.

Search the list of Professional Scrum Certificate Holders


QUESTION 1
When many Scrum Teams are working on the same product, should all of their increments be integrated every Sprint?

A. Yes, but only for Scrum Teams whose work has dependencies.
B. Yes, otherwise the Product Owners (and stakeholders) may not be able to accurately inspect what is done.
C. No, each Scrum Team stands alone.
D. No, that is far too hard and must be done in a hardening Sprint.

Correct Answer: B

QUESTION 2
When can a Development Team cancel a Sprint?

A. It can’t. Only Product Owners can cancel Sprints.
B. When functional expectations are not well understood.
C. When the Product Owner is absent too often.
D. When the selected Product Backlog items for the Sprint become unachievable.
E. When a technical dependency cannot be resolved.

Correct Answer: A

QUESTION 3
Which output from Sprint Planning provides the Development Team with a target and overarching direction for the Sprint?

A. The Sprint Backlog.
B. The Sprint Goal
C. The release plan.
D. Sprint Review minutes.

Correct Answer: B

QUESTION 4
How should a Development Team deal with non-functional requirements?

A. Ensure every Increment meets them.
B. Make sure the release department understands these requirements, but it is not the Development Team’s responsibility.
C. Handle them during the Integration Sprint preceding the Release Sprint.
D. Assign them to the lead developers on the team.

Correct Answer: A

QUESTION 5
When is a Sprint over?

A. When the Product Owner says it is done.
B. When all Product Backlog items meet their definition of “Done”.
C. When all the tasks are completed.
D. When the time-box expires.

Correct Answer: D


Click here to view complete Q&A of PSM-I exam
Certkingdom Review
, Certkingdom PDF

MCTS Training, MCITP Trainnig
Best Scrum Master PSM-I Certification, Scrum Master Certification PSM-I Training at certkingdom.com

Wednesday, February 5, 2020

A00-240 SAS Certified Statistical Business Analyst Using SAS 9: Regression and Modeling Credential Exam

Regression and Modeling
Designed for SAS professionals who use SAS/STAT® software to conduct and interpret complex statistical data analysis
Successful candidates should have experience in:
Analysis of variance.
Linear and logistic regression.
Preparing inputs for predictive models.
Measuring model performance.

ANOVA - 10%
Verify the assumptions of ANOVA
Analyze differences between population means using the GLM and TTEST procedures
Perform ANOVA post hoc test to evaluate treatment effect
Detect and analyze interactions between factors

Linear Regression - 20%
Fit a multiple linear regression model using the REG and GLM procedures
Analyze the output of the REG, PLM, and GLM procedures for multiple linear regression models
Use the REG or GLMSELECT procedure to perform model selection
Assess the validity of a given regression model through the use of diagnostic and residual analysis

Logistic Regression - 25%
Perform logistic regression with the LOGISTIC procedure
Optimize model performance through input selection
Interpret the output of the LOGISTIC procedure
Score new data sets using the LOGISTIC and PLM procedures

Prepare Inputs for Predictive Model Performance - 20%
Identify the potential challenges when preparing input data for a model
Use the DATA step to manipulate data with loops, arrays, conditional statements and functions
Improve the predictive power of categorical inputs
Screen variables for irrelevance and non-linear association using the CORR procedure
Screen variables for non-linearity using empirical logit plots

Measure Model Performance - 25%
Apply the principles of honest assessment to model performance measurement
Assess classifier performance using the confusion matrix
Model selection and validation using training and validation data
Create and interpret graphs (ROC, lift, and gains charts) for model comparison and selection
Establish effective decision cut-off values for scoring

ANOVA - 10%
Verify the assumptions of ANOVA
 Explain the central limit theorem and when it must be applied
 Examine the distribution of continuous variables (histogram, box-whisker, Q-Q plots)
 Describe the effect of skewness on the normal distribution
 Define H0, H1, Type I/II error, statistical power, p-value
 Describe the effect of sample size on p-value and power
 Interpret the results of hypothesis testing
 Interpret histograms and normal probability charts
 Draw conclusions about your data from histogram, box-whisker, and Q-Q plots
 Identify the kinds of problems may be present in the data: (biased sample, outliers, extreme values)
 For a given experiment, verify that the observations are independent
 For a given experiment, verify the errors are normally distributed
 Use the UNIVARIATE procedure to examine residuals
 For a given experiment, verify all groups have equal response variance
 Use the HOVTEST option of MEANS statement in PROC GLM to asses response variance

Analyze differences between population means using the GLM and TTEST procedures
 Use the GLM Procedure to perform ANOVA
o CLASS statement
o MODEL statement
o MEANS statement
o OUTPUT statement

 Evaluate the null hypothesis using the output of the GLM procedure
 Interpret the statistical output of the GLM procedure (variance derived from MSE, F value, p-value R**2, Levene's test)
 Interpret the graphical output of the GLM procedure
 Use the TTEST Procedure to compare means

Perform ANOVA post hoc test to evaluate treatment effect
 Use the LSMEANS statement in the GLM or PLM procedure to perform pairwise comparisons
 Use PDIFF option of LSMEANS statement
 Use ADJUST option of the LSMEANS statement (TUKEY and DUNNETT)
 Interpret diffograms to evaluate pairwise comparisons
 Interpret control plots to evaluate pairwise comparisons
 Compare/Contrast use of pairwise T-Tests, Tukey and Dunnett comparison methods

Detect and analyze interactions between factors
 Use the GLM procedure to produce reports that will help determine the significance of the interaction between factors. MODEL statement
 LSMEANS with SLICE=option (Also using PROC PLM)
 ODS SELECT
 Interpret the output of the GLM procedure to identify interaction between factors: p-value
 F Value
 R Squared
 TYPE I SS
 TYPE III SS

Linear Regression - 20%

Fit a multiple linear regression model using the REG and GLM procedures
 Use the REG procedure to fit a multiple linear regression model
 Use the GLM procedure to fit a multiple linear regression model

Analyze the output of the REG, PLM, and GLM procedures for multiple linear regression models
 Interpret REG or GLM procedure output for a multiple linear regression model: convert models to algebraic expressions
 Convert models to algebraic expressions
 Identify missing degrees of freedom
 Identify variance due to model/error, and total variance
 Calculate a missing F value
 Identify variable with largest impact to model
 For output from two models, identify which model is better
 Identify how much of the variation in the dependent variable is explained by the model
 Conclusions that can be drawn from REG, GLM, or PLM output: (about H0, model quality, graphics)

Use the REG or GLMSELECT procedure to perform model selection
 Use the SELECTION option of the model statement in the GLMSELECT procedure
 Compare the different model selection methods (STEPWISE, FORWARD, BACKWARD)
 Enable ODS graphics to display graphs from the REG or GLMSELECT procedure
 Identify best models by examining the graphical output (fit criterion from the REG or GLMSELECT procedure)
 Assign names to models in the REG procedure (multiple model statements)

Assess the validity of a given regression model through the use of diagnostic and residual analysis
 Explain the assumptions for linear regression
 From a set of residuals plots, asses which assumption about the error terms has been violated
 Use REG procedure MODEL statement options to identify influential observations (Student Residuals, Cook's D, DFFITS, DFBETAS)
 Explain options for handling influential observations
 Identify collinearity problems by examining REG procedure output
 Use MODEL statement options to diagnose collinearity problems (VIF, COLLIN, COLLINOINT)

Logistic Regression - 25%
Perform logistic regression with the LOGISTIC procedure
 Identify experiments that require analysis via logistic regression
 Identify logistic regression assumptions
 logistic regression concepts (log odds, logit transformation, sigmoidal relationship between p and X)
 Use the LOGISTIC procedure to fit a binary logistic regression model (MODEL and CLASS statements)

Optimize model performance through input selection
 Use the LOGISTIC procedure to fit a multiple logistic regression model
 LOGISTIC procedure SELECTION=SCORE option
 Perform Model Selection (STEPWISE, FORWARD, BACKWARD) within the LOGISTIC procedure

Interpret the output of the LOGISTIC procedure
 Interpret the output from the LOGISTIC procedure for binary logistic regression models: Model Convergence section
 Testing Global Null Hypothesis table
 Type 3 Analysis of Effects table
 Analysis of Maximum Likelihood Estimates table
 Association of Predicted Probabilities and Observed Responses

Score new data sets using the LOGISTIC and PLM procedures
 Use the SCORE statement in the PLM procedure to score new cases
 Use the CODE statement in PROC LOGISTIC to score new data
 Describe when you would use the SCORE statement vs the CODE statement in PROC LOGISTIC
 Use the INMODEL/OUTMODEL options in PROC LOGISTIC
 Explain how to score new data when you have developed a model from a biased sample

Prepare Inputs for Predictive Model Performance - 20%

Identify the potential challenges when preparing input data for a model
 Identify problems that missing values can cause in creating predictive models and scoring new data sets
 Identify limitations of Complete Case Analysis
 Explain problems caused by categorical variables with numerous levels
 Discuss the problem of redundant variables
 Discuss the problem of irrelevant and redundant variables
 Discuss the non-linearities and the problems they create in predictive models
 Discuss outliers and the problems they create in predictive models
 Describe quasi-complete separation
 Discuss the effect of interactions
 Determine when it is necessary to oversample data

Use the DATA step to manipulate data with loops, arrays, conditional statements and functions
 Use ARRAYs to create missing indicators
 Use ARRAYS, LOOP, IF, and explicit OUTPUT statements

Improve the predictive power of categorical inputs
 Reduce the number of levels of a categorical variable
 Explain thresholding
 Explain Greenacre's method
 Cluster the levels of a categorical variable via Greenacre's method using the CLUSTER procedure

o METHOD=WARD option
o FREQ, VAR, ID statement
o Use of ODS output to create an output data set

 Convert categorical variables to continuous using smooth weight of evidence

Screen variables for irrelevance and non-linear association using the CORR procedure
 Explain how Hoeffding's D and Spearman statistics can be used to find irrelevant variables and non-linear associations
 Produce Spearman and Hoeffding's D statistic using the CORR procedure (VAR, WITH statement)
 Interpret a scatter plot of Hoeffding's D and Spearman statistic to identify irrelevant variables and non-linear associations

Screen variables for non-linearity using empirical logit plots
 Use the RANK procedure to bin continuous input variables (GROUPS=, OUT= option; VAR, RANK statements)
 Interpret RANK procedure output
 Use the MEANS procedure to calculate the sum and means for the target cases and total events (NWAY option; CLASS, VAR, OUTPUT statements)
 Create empirical logit plots with the SGPLOT procedure
 Interpret empirical logit plots

Measure Model Performance - 25%
Apply the principles of honest assessment to model performance measurement
 Explain techniques to honestly assess classifier performance
 Explain overfitting
 Explain differences between validation and test data
 Identify the impact of performing data preparation before data is split

Assess classifier performance using the confusion matrix
 Explain the confusion matrix
 Define: Accuracy, Error Rate, Sensitivity, Specificity, PV+, PV-
 Explain the effect of oversampling on the confusion matrix
 Adjust the confusion matrix for oversampling

Model selection and validation using training and validation data
 Divide data into training and validation data sets using the SURVEYSELECT procedure
 Discuss the subset selection methods available in PROC LOGISTIC
 Discuss methods to determine interactions (forward selection, with bar and @ notation)
 Create interaction plot with the results from PROC LOGISTIC
 Select the model with fit statistics (BIC, AIC, KS, Brier score)

Create and interpret graphs (ROC, lift, and gains charts) for model comparison and selection
 Explain and interpret charts (ROC, Lift, Gains)
 Create a ROC curve (OUTROC option of the SCORE statement in the LOGISTIC procedure)
 Use the ROC and ROCCONTRAST statements to create an overlay plot of ROC curves for two or more models
 Explain the concept of depth as it relates to the gains chart

Establish effective decision cut-off values for scoring
 Illustrate a decision rule that maximizes the expected profit
 Explain the profit matrix and how to use it to estimate the profit per scored customer
 Calculate decision cutoffs using Bayes rule, given a profit matrix
 Determine optimum cutoff values from profit plots
 Given a profit matrix, and model results, determine the model with the highest average profit

Note: All 22 main objectives will be tested on every exam. The 126 expanded objectives are provided for additional explanation and define the entire domain that could be tested.

QUESTION 1
When mean imputation is performed on data after the data is partitioned for honest assessment, what is the most appropriate method for handling the mean imputation?

A. The sample means from the validation data set are applied to the training and test data sets.
B. The sample means from the training data set are applied to the validation and test data sets.
C. The sample means from the test data set are applied to the training and validation data sets.
D. The sample means from each partition of the data are applied to their own partition.

Correct Answer: B

QUESTION 2
An analyst generates a model using the LOGISTIC procedure. They are now interested in getting the
sensitivity and specificity statistics on a validation data set for a variety of cutoff values.
Which statement and option combination will generate these statistics?

A. Score data=valid1 out=roc;
B. Score data=valid1 outroc=roc;
C. mode1 resp(event= '1') = gender region/outroc=roc;
D. mode1 resp(event"1") = gender region/ out=roc;

Correct Answer: B

QUESTION 3
In partitioning data for model assessment, which sampling methods are acceptable? (Choose two.)
A. Simple random sampling without replacement
B. Simple random sampling with replacement
C. Stratified random sampling without replacement
D. Sequential random sampling with replacement
Correct Answer: AC

QUESTION 4
An analyst has a sufficient volume of data to perform a 3-way partition of the data into training, validation, and test sets to perform honest assessment during the model building process.
What is the purpose of the training data set?

A. To provide an unbiased measure of assessment for the final model.
B. To compare models and select and fine-tune the final model.
C. To reduce total sample size to make computations more efficient.
D. To build the predictive models.

Correct Answer: A

QUESTION 5
The total modeling data has been split into training, validation, and test data. What is the best data to use for model assessment?

A. Training data
B. Total data
C. Test data
D. Validation data

Correct Answer: D
Click here to view complete Q&A of A00-240 exam
Certkingdom Review
, Certkingdom PDF

MCTS Training, MCITP Trainnig
Best SAS Institute A00-240 Certification, SAS Institute Certification A00-240 Training at certkingdom.com

Monday, February 3, 2020

PMI-ACP PMI Agile Certified Practitioner Exam

If you’re experienced using agile approaches, have good collaboration skills, eagerly embrace complexity and thrive on rapid response times, then your talents are in demand.

The PMI Agile Certified Practitioner (PMI-ACP)® formally recognizes your knowledge of agile principles and your skill with agile techniques. It will make you shine even brighter to your employers, stakeholders and peers.

The PMI-ACP® is our fastest growing certification, and it’s no wonder. Organizations that are highly agile and responsive to market dynamics complete more of their projects successfully than their slower-moving counterparts — 75 percent versus 56 percent — as shown in our 2015 Pulse of the Profession® report.

The PMI-ACP spans many approaches to agile such as Scrum, Kanban, Lean, extreme programming (XP) and test-driven development (TDD.) So it will increase your versatility, wherever your projects may take you.

Take the PMI-ACP Exam Online
Through an online proctor, you have the option to take the PMI-ACP exam from home or your office—a great option to fit your busy lifestyle.

Who Should Apply?
If you work on agile teams or if your organization is adopting agile practices, the PMI-ACP is a good choice for you. Compared with other agile certifications based solely on training and exams, the PMI-ACP is evidence of your real-world, hands-on experience and skill.

Gain and Maintain Your PMI-ACP
The certification exam has 120 multiple-choice questions and you have three hours to complete it.
To maintain your PMI-ACP, you must earn 30 professional development units (PDUs) in agile topics every three years.

Prerequisites
2,000 hours of general project experience working on teams. A current PMP® or PgMP® will satisfy this requirement but is not required to apply for the PMI-ACP.
1,500 hours working on agile project teams or with agile methodologies. This requirement is in addition to the 2,000 hours of general project experience.
21 contact hours of training in agile practices.

QUESTION 1
What key benefits might stakeholders realize from an Agile approach?

A. The ability to bypass the change-management process, inserting new requirements and changes directly into the team as they meet daily
B. The early and continuous delivery of valuable software, providing increased visibility and the opportunity for more frequent adjustments
C. Increased access to the project and less reliance on formal reports and status meetings to better understand the current work and the risks the team is accepting
D. The team’s flexibility to make changes mid-iteration as business needs or priorities change, increasing the ability of the team to meet project commitments

Correct Answer: B

QUESTION 2
What is the first thing that a team should do to estimate user stories for a project?

A. Sort the user stories according to priority.
B. Schedule a team meeting to understand them.
C. Define the story points measure.
D. Estimate through function point analysis.

Correct Answer: C

QUESTION 3
A story point is the:

A. Relative measure of the size of a user story.
B. Duration it takes to complete a user story.
C. Priority of the user story in the backlog.
D. Business value of the user story.

Correct Answer: A

QUESTION 4
According to the Agile Manifesto, which of the following describes the more valued items?

A. Customer collaboration, following a plan, working software, and individual interactions 07B13F58239056B81577933EB624485B
B. Working software, individual interactions, responding to change, and comprehensive documentation
C. Individual interactions, working software, customer collaboration, and responding to change
D. Responding to change, individual interactions, processes and tools, and customercollaboration

Correct Answer: C

QUESTION 5
On a particular project, product quality is being measured at regular intervals and is consistently below the acceptable level. In a Lean environment, how should this problem be addressed?

A. The team should implement more rigorous testing at the end of each development cycle.
B. Management should direct the team on specific actions that they should take to improve quality.
C. Management should guide the team as it seeks to improve itself and reduce errors in the system.
D. The Project Champion should review the acceptable quality threshold to ensure that it is realistic.

Correct Answer: C
Click here to view complete Q&A of PMI-ACP exam
Certkingdom Review
, Certkingdom PDF

MCTS Training, MCITP Trainnig
Best PMI-ACP PMI-ACP Certification, PMI-ACP Certification Training at certkingdom.com

Sunday, February 2, 2020

1Y0-340 Analyzing Citrix NetScaler Advanced Topics: Security, Management, and Optimization Exam


The Citrix 1Y0-340 exam preparation guide is designed to provide candidates with necessary information about the CCP-N exam. It includes exam summary, sample questions, practice test, objectives and ways to interpret the exam objectives to enable candidates to assess the types of questions-answers that may be asked during the Citrix Certified Professional Networking (CCP-N) exam.

It is recommended for all the candidates to refer the 1Y0-340 objectives and sample questions provided in this preparation guide. The Citrix CCP-N certification is mainly targeted to the candidates who want to build their career in Networking domain and demonstrate their expertise. We suggest you to use practice exam listed in this cert guide to get used to with exam environment and identify the knowledge areas where you need more work prior to taking the actual Citrix ADC Advanced Topics - Security Management and Optimization exam.

Citrix 1Y0-340 Exam Summary:
Citrix ADC Advanced Topics - Security Management and Optimization (CCP-N)
Exam Code 1Y0-340
Duration 90 minutes
Number of Questions 62
Passing Score 62%
Recommended Training / Books CNS-320 Citrix NetScaler Advanced Topics - Security, Management, and Optimization
Schedule Exam PEARSON VUE
Sample Questions Citrix 1Y0-340 Sample Questions
Recommended Practice Citrix Certified Professional Networking (CCP-N) Practice Test

Section Weight Objectives
Citrix Web App Firewall Overview 8% - Identify common web application attacks.
- Determine the Functionality of Citrix Web App Firewall, given a scenario.
- Understand the audit for PCI-DSS compliance.

Citrix Web App Firewall Profiles and Policies 6% - Determine how to create (or implement) Citrix Web App Firewall profiles.
- Determine how to configure Citrix Web App Firewall Policies.
- Determine how to analyze application firewall settings.

Regular Expression 5% - Identify PCRE metacharacters.
- Determine how to apply regular expressions for Citrix ADC.

Attacks and Protections 21% - Determine how to configure security checks to meet given requirements.
- Identify various attacks and protections.
- Determine how to configure the generation of simple and generalized rules based on given requirements.
- Determine learned rules per security check.
- Determine how to deploy, skip and edit learned rules.

Monitoring and Troubleshooting 8% - Determine how Citrix Web App Firewall interacts with applications in a given environment.
- Determine how to Implement logging and monitoring.
- Identify troubleshooting methods for Citrix Web App Firewall.

Security and Filtering 6% - Determine how to implement IP reputation.
- Determine how to implement IP rate-limiting.
- Determine how to Implement AppQoE.
- Determine how to implement HTTP Callout.

Citrix Application Delivery
Management: Introduction and Configuration 8%
- Determine how to perform the initial configuration of Citrix Application Delivery Management.
- Determine how to deploy Citrix Application Delivery Management based on a given scenario.
- Determine how to create additional instances of Citrix Application Delivery Management.

Managing and Monitoring Citrix ADC Instances 11% - Determine how to manage multiple instances in a single Citrix Application Delivery Management deployment with Inventory Management.
- Determine how to manage and monitor the aspects of Authentication, Authorization, and Logging with User Management.
- Identify what data is captured and utilized with Analytics and Automation.
- Determine how to configure and install SSL Certificates on Citrix Application Delivery Management.

Managing Citrix ADC Configurations 5% - Determine how to create, manage, and configure StyleBooks.
- Determine how to utilize Citrix Application Delivery Management recommendations to assist in resource delivery.

Citrix ADC Web Logging 3%
- Determine how to install and configure Citrix ADC Web Logging.
- Determine how to troubleshoot issues using Citrix ADC Web Logging.

Integrated Caching 6%
- Determine when to use static or dynamic content requests.
- Determine how to configure cache policies.
- Determine which content group settings to configure based on a given scenario.

Front-End Optimization 5%
- Determine how content is currently handled by browsers based on a given environment.
- Determine how to utilize front-end optimizations based on a given scenario.

Tuning and Optimizations 6%
- Determine how the Citrix ADC system uses HTTP connections based on a given description.
- Determine how to configure Surge Protection and Priority Queuing.
- Determine how to Tune HTTP and TCP behaviors in Connection Profiles.
- Determine how to utilize HTTP DoS protection deployment guidelines to meet the needs of a given environment.

Recommended Knowledge and Skills for 1Y0-340: Item
- Identify common web attacks and vulnerabilities.
- Understand how to utilize the adaptive learning engine.
- Configure Citrix Web App Firewall to protect web applications.
- Utilize Citrix ADC Secure Insight to monitor, manage and report on application services security.
- Troubleshoot Citrix Web App Firewall.
- Manage multiple Citrix ADC platforms centrally.
- Orchestrate configuration changes.
- Report on transactions passing through the Citrix ADC environment.
- Visualize infrastructure and plan expansion.

Recommended Product Experience for 1Y0-340:
- Citrix Web App Firewall Overview
- Citrix Web App Firewall Profiles and Policies
- Regular Expression
- Attacks and Protections
- Monitoring and Troubleshooting
- Security and Filtering
- Citrix Application Delivery Management: Introduction and Configuration
- Managing and Monitoring Citrix ADC Instances
- Managing Citrix ADC Configurations
- Citrix ADC Web Logging
- Integrated Caching
- Front-End Optimization
- Tuning and Optimizations
Type of Candidate Time Limits* Notes
Native English speakers 90 minutes
Non-native English speakers that take the exam in countries where English is a foreign language
90 minutes
+30 minutes (time extension)
Time extension granted automatically
Non-native English speakers that take the exam in countries where English is NOT a foreign language
90 minutes
+30 minutes (time extension)
Must request time extension from Citrix.


QUESTION 1
Which two security checks invoke sessionization? (Choose two.)

A. CSRF Form Tagging
B. Field Formats
C. Form Field Consistency
D. HTML Cross-Site Scripting

Correct Answer: A,C

QUESTION 2
Which NetScaler Management Analytics System (NMAS) feature can the Citrix Engineer use to convert configuration tasks performed using the GUI to CLI commands?

A. Master Configuration
B. Inbuilt Template
C. Record-and-Play
D. Configuration Template

Correct Answer: C

QUESTION 3
A Citrix Engineer needs to deploy the NetScaler Management and Analytics System (NMAS) in their company environment to ensure that NMAS provides uninterrupted operation in all situations.
Which deployment type can meet this requirement?

A. Active-Active High Availability Mode
B. Single-Server Deployment Mode
C. NMAS integrated with Director mode
D. Active-Passive High Availability Mode

Correct Answer: A

QUESTION 4
Which two settings can be used when creating a Cache Content group? (Choose two.)

A. Remove response cookies
B. Set Lazy DNS resolution
C. Expire cookies
D. Use DNS Query
E. Use browser settings

Correct Answer: A,B

QUESTION 5
Scenario: A Citrix Engineer needs to configure Application Firewall to handle SQL injection issues. However,
after enabling SQL injection check, the backend server started dropping user requests.
The Application Firewall configuration is as follows:
add appfw profile Test123 –startURLAction none- denyURLAction none-crossSiteScriptingAction none –
SQLInjectionAction log stats- SQLInjection TransformSpecialChars ON –SQLInjectionCheckSQLWildChars
ON- fieldFormatAction none- bufferOverflowAction none- responseContentType “application/octet-stream” –
XMLSQLInjectionAction none- XMLXSSAction none-XMLWSIAction none- XMLValidationAction none
What does the engineer need to change in the Application Firewall configuration?

A. Enable-XMLSQLInjectionAction none
B. Enable-XMLValidationAction none
C. Disable- SQLInjectionCheckSQLWildChars ON
D. Disable- SQLInjectionTransformSpecialChars ON

Correct Answer: C


Click here to view complete Q&A of 1Y0-340 exam
Certkingdom Review
, Certkingdom PDF

MCTS Training, MCITP Trainnig
Best Citrix CCA-N 1Y0-340 Certification, Citrix CCA-N Certification 1Y0-340 Training at certkingdom.com