Certification Questions

Q:

What protocol would you use if you were running xDSL and needed authentication?

Answer

PPPoE  or  PPPoA

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

5 7753
Q:

You want to ping the loopback address of your IPv6 local host. What will you type?

A) Ping 127.0.0.1 B) Ping 0.0.0.0
C) Ping ::1 D) trace 0.0. :: 1
 
Answer & Explanation Answer: C) Ping ::1

Explanation:

The loop back address with IPv4 is 127.0.0.1 . With IPv6, that address is ::1

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 7736
Q:

The four stages of the Deming Cycle are?

A) Plan, Measure, Monitor, Report B) Plan, Check, Re-Act, Implement
C) Plan, Do, Act, Audit D) Plan, Do, Check, Act
 
Answer & Explanation Answer: D) Plan, Do, Check, Act

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

0 7709
Q:

Which layer of the OSI model offers three different modes of communication : Simplex, half duplex, and full duplex?

A) Presentation B) Transport
C) Application D) Session
 
Answer & Explanation Answer: D) Session

Explanation:

The Session layer of the OSI model offers three different modes of communication : Simplex, half duplex, and full duplex.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 7649
Q:

Which of the following descriptions about IPv6 is correct?

A) Addresses are not hierarchical and are assigned at random B) Broadcasts have been eliminated and replaced with multicasts
C) There are 2.7 billion addresses D) An interface can only be configured with one IPv6 address
 
Answer & Explanation Answer: B) Broadcasts have been eliminated and replaced with multicasts

Explanation:

There are no broadcasts with IPv6. Unicast , multicast, anycast, global, and link - local unicast are used.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 7439
Q:

Sensitivity analysis is used to

A) identify the risks which have the largest potential impact on the project. B) determine which risks are most troubling to the customer.
C) identify hidden requirements that were not recognized at the outset of the project. D) determine which requirements will add the greatest customer satisfaction for the least effort.
 
Answer & Explanation Answer: A) identify the risks which have the largest potential impact on the project.

Explanation:

“Sensitivity analysis helps to determine which risks have the most potential impact on the project.”

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

3 7307
Q:

Function GWT is used in time valuation to select time wage types for all absences, which are valued on the basis of the As If principle

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP HR

5 7252
Q:

You have the following binary number :10110111. What are the decimal and hexadecimal equivalents?

A) 69/0x2102 B) 183/B7
C) 173/A6 D) 83/0xC5
 
Answer & Explanation Answer: B) 183/B7

Explanation:

You must be able to take a binary number and convert it into both decimal and hexadecimal. To convert to decimal, just add up the 1s using their values. The values that are turned on with the binary number of 10110111 are 128+32+16+4+2+1=183. To get the hexadecimal equivalent, you need to break the eight binary digits into nibbles (4 bits), 1011 and 0111. By adding up these values, you get 11 and 7. In hexadecimal, 11 is B, so the answer is 0xB7.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 7251