Certification Questions

Q:

Which of the following uses ATM as the Data Link layer protocol that's terminated at what's known as the DSLAM?

A) DSL B) PPPoE
C) Frame Relay D) Dedicated T1
 
Answer & Explanation Answer: A) DSL

Explanation:

ATM is the Data-Link layer protocol that's typically used over the DSL layer1 connection from the CPE and terminated at what's known as the DSLAM - an ATM switch that contains DSL interface cards, or ATU-Cs.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4991
Q:

 What is the difference between a process and a project?

A) A process is continuous and has no end date, whereas a project has a finite lifespan. B) A project is continuous and has no end date, whereas a process has a finite lifespan.
C) A process stops when the objective has been achieved, whereas a project does not stop when the objective is met. D) In a project the focus is not on the result, whereas with a process the result is important
 
Answer & Explanation Answer: A) A process is continuous and has no end date, whereas a project has a finite lifespan.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

0 4977
Q:

You want to implement a network medium that is not susceptible to EMI. Which type of cabling should you use?

A) Thicknet coax B) Thinnet coax
C) Category 5 UTP cable D) Fiber-optic cable
 
Answer & Explanation Answer: D) Fiber-optic cable

Explanation:

Fiber-optic cable provides a more secure, long - distance cable that is not susceptible to EMI interference at high speeds.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4971
Q:

When several organizational units carry out dunning within a single company code, the SAP entity used to distinguish and control the process is called

A. dunning area

B. dunning key

C. dunning clerk

D. dunning procedure

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

1 4953
Q:

Every company code can have following combinations as chart of accounts (COA)

A. one operating, one group and one alternate COA

B. one operating COA and many group COAs

C. many operating COAs and one group and one alternate CoA

D. one operating COA and one alternate COA

Answer

Answer : A ,D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

6 4937
Q:

Which of the following MRP areas do not exist?

A. Consignment MRP area
B. Plant MRP area
C. Storage location MRP area
D. Subcontractor MRP area

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

5 4924
Q:

A process that specifies how formal verification and acceptance of the completed project deliverables will be obtained is a part of which plan?

A) Project integration plan. B) WBS development plan.
C) Configuration management plan. D) Scope management plan.
 
Answer & Explanation Answer: D) Scope management plan.

Explanation:

“The work involved in performing the five processes of Project Scope Management is preceded by a planning effort by the project management team. This planning effort is part of the Develop Project Management Plan process, which produces a scope management plan that provides guidance on how project scope will be defined, documented, verified, managed, and controlled. The scope management plan may be formal or informal, highly detailed, or broadly framed, based upon the needs of the project.”

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

2 4924
Q:

What are the typical three different categories of VPNs?

Answer

The following are the different types of VPNs :


PPTP ( Point to Point Tunnel protocol ) VPN : Most commonly used VPN. PPTP is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.


Site-to-Site VPN : Site-to-site VPN is a type of VPN connection that is created between two separate locations. Site-to-site VPN can be intranet based or extranet based. 


Intranet-based site-to-site VPN is created between an organization's propriety networks, while extranet-based site-to-site VPN is used for connecting with external partner networks or an intranet.


L2TP ( Layer Two Tunneling Protoco) VPN : L2TP is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network over the Internet.


IPsec (Internet Protocol Security) : IPsec is a framework for a set of protocols for security at the network or packet processing layer of network communication.


SSL (Secure Sockets Layer) VPN : SSL  is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. 


MPLS (Multiprotocol Label Switching) VPN : MPLS is a protocol for speeding up and shaping network traffic flows. 


Hybrid VPN : A hybrid VPN combines Multiprotocol Label Switching (MPLS) and Internet protocol security (IPsec)-based VPNs. 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

7 4918