Certification Questions

Q:

Every company code can have following combinations as chart of accounts (COA)

A. one operating, one group and one alternate COA

B. one operating COA and many group COAs

C. many operating COAs and one group and one alternate CoA

D. one operating COA and one alternate COA

Answer

Answer : A ,D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

7 5469
Q:

Which of the following uses ATM as the Data Link layer protocol that's terminated at what's known as the DSLAM?

A) DSL B) PPPoE
C) Frame Relay D) Dedicated T1
 
Answer & Explanation Answer: A) DSL

Explanation:

ATM is the Data-Link layer protocol that's typically used over the DSL layer1 connection from the CPE and terminated at what's known as the DSLAM - an ATM switch that contains DSL interface cards, or ATU-Cs.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 5461
Q:

When several organizational units carry out dunning within a single company code, the SAP entity used to distinguish and control the process is called

A. dunning area

B. dunning key

C. dunning clerk

D. dunning procedure

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

1 5452
Q:

If a hub has three computers connected to it, how many broadcast and collision domains is the hub creating?

A) Three broadcast and one collision B) Three broadcast and three collision
C) one broadcast and three collision D) One broadcast and one collision
 
Answer & Explanation Answer: D) One broadcast and one collision

Explanation:

If a hub has three computers connected to it, one broadcast and one collision domain is created

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 5416
Q:

Which three IP addresses can be assigned to hosts if the subnet mask is /27 and subnet zero is usable?

A. 10.15.32.17
B. 17.15.66.128
C. 66.55.128.1
D. 135.1.64.34
E. 129.33.192.192
F. 192.168.5.63

Answer

Answer : A C D


 


 


 


Explanation: If you follow the cram table,  /27 is mask 255.255.255.224. 3 bits were borrowed with value of 32. Follow the fourth octets of the addresses:
A is a usable host address.
B is classified as a network address
C is a usable host address form the subnet 0
D is a usable host address
E is a network address
F is a broadcast address

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

14 5384
Q:

What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information ?

A) Windows Directory B) Active Directory
C) Directory Plus D) None of the above
 
Answer & Explanation Answer: B) Active Directory

Explanation:

Active Directory (AD) is a centralized database that is included with the Windows Server operating system. Active Directory is used to store information about a network, such as user accounts, computers, printers, and security policies.

Report Error

View Answer Report Error Discuss

16 5357
Q:

What are the typical three different categories of VPNs?

Answer

The following are the different types of VPNs :


PPTP ( Point to Point Tunnel protocol ) VPN : Most commonly used VPN. PPTP is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.


Site-to-Site VPN : Site-to-site VPN is a type of VPN connection that is created between two separate locations. Site-to-site VPN can be intranet based or extranet based. 


Intranet-based site-to-site VPN is created between an organization's propriety networks, while extranet-based site-to-site VPN is used for connecting with external partner networks or an intranet.


L2TP ( Layer Two Tunneling Protoco) VPN : L2TP is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network over the Internet.


IPsec (Internet Protocol Security) : IPsec is a framework for a set of protocols for security at the network or packet processing layer of network communication.


SSL (Secure Sockets Layer) VPN : SSL  is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. 


MPLS (Multiprotocol Label Switching) VPN : MPLS is a protocol for speeding up and shaping network traffic flows. 


Hybrid VPN : A hybrid VPN combines Multiprotocol Label Switching (MPLS) and Internet protocol security (IPsec)-based VPNs. 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

7 5349
Q:

Which of the following statements accurately describe a client in an SAP system?

A. A client corresponds to a customer.
B. A client has its own database.
C. A client may represent an entire company.
D. A client represents a completely independent business entity.

Answer

Answer : C , D


 


Explanation: The data for all clients in an SAP system is stored within a single common database. This data is nevertheless divided by client so that different companies can be administered and controlled in  different clients. A client is not a customer within an SAP system.


 

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

11 5324