CompTIA 225-030 Exam

Exam Number/Code : 225-030 Exam Name : CDIA+ Certification Questions and Answers : 255 Q&As Update Time: 2010-04-11

1. A content management solution has been designed for a company. In order to complete the implementation it will
be necessary to remove user access to the content management database for several hours a day for several weeks.
How should this requirement be addressed?
A. Solicit the vendors' input for the best times to conduct implementation tasks.
B. Solicit the solution owner's input for the best times to conduct implementation tasks.
C. Redesign the solution so that all of the implementation can be handles in one 24-hour period.
D. Indicate to the solution owner that the best time for implementation tasks is 10 pm - 12 am daily.
Answer: B


2. A company is required to create a training class for a proposed Electronic Document Management System
(EDMS). All of the following factors would be considered for end-user training EXCEPT:
A. the assessed skill level of individuals.
B. the document management needs of the organization.
C. the architecture of the network.
D. the current manual processes regarding documents.
Answer: C


3. All of the following are inputs to project schedule development EXCEPT:All of the following are inputs to project
schedule development EXCEPT:
A. change requests
B. lead- and lag-times.
C. resource requirements.
D. resource availability.
Answer: A


4. A customer is implementing a workflow system with electronic dossiers. During the design of the workflow it has
been discovered that there are many exceptions to the process. What is the first step in handling the exceptions?
A. Validate exceptions through a third party.
B. Get a commitment on the number of exceptions.
C. Redesign the workflow system to handle every exception.
D. Recommend to the client that business processed be redesigned.
Answer: D


5. Companies have always taken precautions with the physical security of their records. Which of the following
security precautions is the most important when transmitting electronic documents over the Internet?
A. Digitally sign and watermark all documents before publication.
B. Limit access to the documents using encryption and authentication.
B. Limit access to the documents using encryption and authentication.
C. Limit access to the documents by implementing a firewall and HTTPS.
D. Require users to enter password and date of birth in order to access documents.
Answer: B


6. The Human Resources department receives applications: 10% by fax, 30% by e-mail, and 60% by mail. All
applications are two-sided forms. Applications received by mail must be scanned into the Document Management
System (DMS). If 300 applications are received by the Human Resources department per week, how many images
will be scanned per week?
A. 300
B. 360
C. 400
D. 600
Answer: B


7. Who is most likely to determine the origin of the bottlenecks if the productivity of a new workflow system is
less than expected?
A. End-user
B. Help Desk
C. IT Department
D. System Integrator
Answer: D


8. A proposed scanner uses TIFF Group 4 compression. What will be the average size of a black and white A4 sized
(8.5 inches x 11 inches or 216 mm x 279 mm) document at 600 dpi (24 dots per mm)?
A. 50 K bytes
B. 180 K bytes
C. 210 K bytes
D. 380 K bytes
Answer: C


9. A legal customer wants to place identifying marks on each document as it is scanned. What is the procedure
commonly called?
A. Barcoding
B. Imprinting
C. Prefetching
D. Thresholding
Answer: B


10. A client wishes to establish a Document Management System (DMS) for handling a large volume of standard
documents to be scanned. The client wants to enable search capabilities for certain information on the documents.
Which of the following is the MOST appropriate solution?
A. Form. recognition and entire document search
B. Form. recognition and index search
C. Zonal OCR and entire document search
D. Zonal OCR and index search
Answer: D


11. Hospital management is implementing a document management system. Research has indicated that
nursing staff who will be using the system feel that they are understaffed and will not have time to enter
the data. However, when questioned it was found that the nursed did not really know what the system
was about. What key factor has been overlooked?
A. A proper public relations exercise was not carried out.
B. Access to a demonstration system has not been provided.
C. Management has not explained that the system must be used.
D. The end-uses have not been engaged in the entire process.
Answer: D


12. Many of the documents to be scanned by a customer are sales invoices with a yellow background. A feature of
the proposed scanning solution should include:
A. image enhancement.
B. deskew
C. color dropout.
D. color enhancement.
Answer: C


13. When reviewing potential software choices to propose to a client, the MOST important aspect to consider from the
following is:
A. the price of the potential software solution.
B. how well the software meets the clients needs.
C. the cost of the annual maintenance agreement of the software.
D. how robust the software is.
Answer: B


14. During discovery phase interviews with key personnel, a previously unknown critical document type is identified.
What should the next step be?
A. Ignore the document type in order to avoid scope creep
B. Include the document type in the project scope
C. Document the discovery and complete a change order request form
D. Discuss alternatives to including the document type
Answer: B


15. A company would like to scan documents for disaster recovery purposes. Which system would be most
appropriate?
A. Knowledge Management System (KMS)
B. Image Management System (IMS)
C. Electronic Document Management System (EDMS)
D. Storage Area Network (SAN)
Answer: B


16. Certkiller revises several procedure documents every year. Multiple individuals review and revise these
documents before final approval. Which would be the best solution?
A. EDI
B. COLD/EDM
C. E-mail
D. Workflow
Answer: A


17. An Implementation Plan for a new imaging application should contain which activities?
A. Forms design, create the document retention strategy document and layout the workflow rules and roles.
B. integrate the production imaging system into the exsiting netwoke,connect it with the legacy systems,upgrade all
of the desktop computers.
C. Verify that images are delivered to the desktop, that the records are written in the database, and check that the
images are stored on optical disks.
D. difine production producers,creat user and techcical documention,administration and plan the roll-out in the
organization.
Answer: D


18. A company has a single call center. It will introduce new products that will increase customer service calls. The
company wants to handle an increasing number of calls without adding personnel or decreasing customer service
levels. Which aspect of workflow technology should it consider?
A. Pre-retrieval of customer folders
B. Sorting of documents in a work queue
C. Load balancing
D. Work monitoring
Answer: A


19. A company, Certkiller Inc, is using 90% of its network capacity. They plan to scan 5,000 images per day to a
network file server. In order to meet the increased demands on the system, which of the following should be
increased?
A. The network bandwidth.
B. The number of scanners.
C. The number of network servers.
D. The number of users on the network.
Answer: A


20. During the presentation of a prototype, a customer realizes that it has left out a critical security component. The
customer has already approved the software requirements. What is the appropriate next step for the consultant?
A. Ask the customer for a change request form.
B. Agree to make the changes needed at no cost.
C. Ask the development team to make the changes.
D. Inform. the customer that no changes can be made.
Answer: A

来自 “ ITPUB博客 ” ,链接:http://blog.itpub.net/23942882/viewspace-663528/,如需转载,请注明出处,否则将追究法律责任。

转载于:http://blog.itpub.net/23942882/viewspace-663528/

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值