Certification Questions

Q:

Which layer defines how data is formatted , presented, encoded, and converted for use on the network?

Answer

The presentation layer makes sure that data is in a readable format for the Application layer.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

12 6596
Q:

Decomposing tasks into smaller activities can be helpful in reducing the amount of stress associated with overwhelmingly large milestones. What is a feature of the hierarchical nature of the WBS? 

A) A WBS hierarchy prevents duplication B) A WBS cab be rolled up or collapsed to provide information at the appropriate level for a particular audience.
C) The decomposition of tasks provides a detailed planning tool D) The depth of a WBS is restricted to three levels, which avoids overplanning
 
Answer & Explanation Answer: B) A WBS cab be rolled up or collapsed to provide information at the appropriate level for a particular audience.

Explanation:

Answer A is incorrect because the WBS hierarchy does not prevent duplication by itself. Answer C is incorrect because a WBS is focused on deliverables and components or work packages and not on tasks. Answer D is incorrect because a WBS can be sized appropriately to the project size with as many levels as necessary.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

5 6576
Q:

AUC have depreciation key, which denotes that depreciation will not be calculated

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP FI

4 6481
Q:

By default , what type of trust are all Windows 2000 trust relationships within a domain tree or forest?

A) Explicit trust B) One-way trust
C) Transitive trust D) Non-transitive trust
 
Answer & Explanation Answer: C) Transitive trust

Explanation:

By default, all Windows 2000 trusts within a domain tree or forest are transitive trusts.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

6 6472
Q:

What is the most common attack on a network today?

A) Lock picking B) Naggle
C) DoS D) auto secure
 
Answer & Explanation Answer: C) DoS

Explanation:

The most common attack on a network today is a denial of service (DoS) because they are the easiest attack to achieve.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 6448
Q:

When a ping to the local host IP address fails, what can you assume?

A) The IP address of the local host is incorrect B) The IP address of the remote host is incorrect
C) The NIC is not functional D) The IP stack has failed to initialize
 
Answer & Explanation Answer: C) The NIC is not functional

Explanation:

When a ping to the local host IP address fails, you can assume the NIC is not functional.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 6319
Q:

Which dml command is used in conjunction with @@identity?

A) INSERT and UPDATE B) UPDATE and DELETE
C) SCOPE_IDENTITY and IDENT_CURRENT D) Commit and rollback
 
Answer & Explanation Answer: C) SCOPE_IDENTITY and IDENT_CURRENT

Explanation:

Using automatically incrementing IDENTITY columns is very popular with database developers. You don’t need to explicitly calculate unique surrogate keys when inserting new data, the IDENTITY column functionality does that for you. The IDENTITY feature also allows you to specify useful Seed and Increment properties. When you use an INSERT statement to insert data into a table with an IDENTITY column defined, SQL Server will generate a new IDENTITY value.

 

You can use the @@IDENTITY variable and the SCOPE_IDENTITY and IDENT_CURRENT functions to return the last IDENTITY value that has been generated by SQL Server. This is very useful when you need to return the key for the row that has just been inserted, back to the caller.

Report Error

View Answer Report Error Discuss

9 6253
Q:

What multicast addresses does RIPng use?

A) FF02::A B) FF02::9
C) FF02::5 D) FF02::6
 
Answer & Explanation Answer: B) FF02::9

Explanation:

RIPng uses the multicast IPv6 address of FF02::9. If you remember the multicast addresses for IPv4, the numbers at the end of each IPv6 address are the same.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 6219