CompTIA CD0-001 Dumps
Exam: CompTIA CDIA+
CompTIA CD0-001 Exam Tutorial
Question No : 1 - Topic 1
A financial services company receives 90,000 one-page documents per day in one batch.
All scanning must be completed within one hour of receipt without exception. Failure to
meet the one-hour deadline has grave financial consequences. The company has allocated
enough document preparation personnel to keep the scanners fully fed. Which of the
following scanner configurations should be recommended?
A. Five 300 pages per minute (ppm) scanners
B. Eight 200 ppm scanners
C. Nine 200 ppm scanners
D. Ten 150 ppm scanners
Question No : 2 - Topic 1
During Document Management System (DMS) implementation, a scope change occurs:
A. when a defined task has been completed.
B. when a modification to the agreed project plan has occurred.
C. immediately after signing off on the project.
D. when the project has been completed.
Question No : 3 - Topic 1
During the presentation of a prototype, a customer realizes that it has left out a critical
security component. The customer has already approved the software requirements. What
is the appropriate next step for the consultant?
A. Ask the customer for a change request form.
B. Agree to make the changes needed at no cost.
C. Ask the development team to make the changes.
D. Inform the customer that no changes can be made.
Question No : 4 - Topic 1
All of the following are inputs to project schedule development EXCEPT:All of the following
are inputs to project schedule development EXCEPT:
A. change requests
B. lead- and lag-times.
C. resource requirements.
D. resource availability.
Question No : 5 - Topic 1
Hospital management is implementing a document management system. Research has
nursing staff who will be using the system feel that they are understaffed and will not have
time to enter
the data. However, when questioned it was found that the nursed did not really know what
was about. What key factor has been overlooked?
A. A proper public relations exercise was not carried out.
B. Access to a demonstration system has not been provided.
C. Management has not explained that the system must be used.
D. The end-uses have not been engaged in the entire process.
Question No : 6 - Topic 1
The technician is required to implement a proof-of-concept for a proposed solution. Which
of the following would absolutely be included on the proof-of-concept document?
A. Final purchase price for the software
B. Software escrow agreement
C. Required items to be tested and proved
D. Purchase order terms and conditions
Question No : 7 - Topic 1
A content management solution has been designed for a company. In order to complete
the implementation it will be necessary to remove user access to the content management
database for several hours a day for several weeks. How should this requirement be
A. Solicit the vendors' input for the best times to conduct implementation tasks.
B. Solicit the solution owner's input for the best times to conduct implementation tasks.
C. Redesign the solution so that all of the implementation can be handles in one 24-hour period.
D. Indicate to the solution owner that the best time for implementation tasks is 10 pm - 12 am daily.
Question No : 8 - Topic 1
A medical laboratory has implemented a document management solution in which saved
reports need to
be faxed to medical practitioners. With the current system, reports are printed from a PC to
printer and then the document is faxed manually to the practitioners. How can this system
be altered to produce the best return on investment?
A. The system used is the most effective available.
B. Replace the inkjet printers with laser printers.
C. Add a fax modem and fax the documents to practitioners.
D. Use dot-matrix printers because they are less expensive to own and operate.
Question No : 9 - Topic 1
A potential risk to a project could be:
A. regular Project Manager meetings.
B. a risk analysis session.
C. creating an assumptions document.
D. allowing scope creep.
Question No : 10 - Topic 1
A legal customer wants to place identifying marks on each document as it is scanned.
What is the procedure commonly called?
Question No : 11 - Topic 1
Who is most likely to determine the origin of the bottlenecks if the productivity of a new
workflow system is
less than expected?
B. Help Desk
C. IT Department
D. System Integrator
Question No : 12 - Topic 1
In order to scope out the document workflow of a prospective hotel client, the imaging
consultant would perform which of the following actions?
A. Interview C-level management and a sampling of division heads to get their input on what the imaging solution needs to incorporate
B. Conduct a written survey only of all employees, mix-up the responses, and select random responses to represent the client needs
C. Consult with purchasing to determine what specification they would recommend given the project budget
D. Perform a dual track approach by conducting focus group interviews of decision makers and users, also follow up with direct observation of sample users in their work areas
Question No : 13 - Topic 1
A company, Certkiller Inc, is using 90% of its network capacity. They plan to scan 5,000
images per day to a network file server. In order to meet the increased demands on the
system, which of the following should be increased?
A. The network bandwidth.
B. The number of scanners.
C. The number of network servers.
D. The number of users on the network.
Question No : 14 - Topic 1
The accounting department has 400,000 images in a jukebox located in the computer
room. They expect
the volume to increase by 50% next month. So far, image retrieval response is fair. Which
of the following changes will improve performance with a minimal investment?
A. Physically move the jukebox to the accounting department.
B. Move the bridge inside the network segment of the accounting department.
C. Move the jukebox inside the network segment of the accounting department.
D. Move the database inside the network segment of the accounting department.
Question No : 15 - Topic 1
All of the following are routing features of production workflow EXCEPT:
A. work monitoring.
B. support for multiple queues based on work type
C. sorting queues in date order.
D. pending or holding items.
Question No : 16 - Topic 1
A customer is performing incremental backups nightly. At the end of the month they review
a list of documents that have reached their end of life and determine if they can be
destroyed. Which of the following BEST describes the records storage management
A. The customer does not have a records management process.
B. The customer has an informal records management process.
C. The customer has a formal records storage management process.
D. The customer has a document capture process.
Question No : 17 - Topic 1
The scanned file size of an 8.5 x 11 inches (A4) page with 300 dpi (12 dots per mm)
resolution and a bit depth of one at TIFF Group 4 compression is:
A. 25 KB.
B. 50 KB
C. 75 KB.
D. 100 KB.
Question No : 18 - Topic 1
A local library keeps many important documents relating to the historical landmarks in
town. The documents consist of blueprints, photographs, and newspaper articles. The
library wants to capture the documents electronically so they can be viewed online. The
first concern of the person capturing the documents would be the:
A. color of the documents.
B. age and physical condition of the documents.
C. volume of the documents on file.
D. number of file cabinets.
Question No : 19 - Topic 1
During discovery phase interviews with key personnel, a previously unknown critical
document type is identified. What should the next step be?
A. Ignore the document type in order to avoid scope creep
B. Include the document type in the project scope
C. Document the discovery and complete a change order request form
D. Discuss alternatives to including the document type
Question No : 20 - Topic 1
Companies have always taken precautions with the physical security of their records.
Which of the following security precautions is the most important when transmitting
electronic documents over the Internet?
A. Digitally sign and watermark all documents before publication.
B. Limit access to the documents using encryption and authentication.
C. Limit access to the documents by implementing a firewall and HTTPS.
D. Require users to enter password and date of birth in order to access documents.