Certification Questions

Q:

You have a computer that runs Windows 7.


A printer is installed on the computer.


You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer. You need to ensure that members of the Sales group can modify all the print jobs that they submit.


You must prevent Sales group members from modifying the print jobs of other users.
What should you do?

A) From the printer's properties, assign the Print permission to the Sales group. B) From the printer's properties, assign the Manage Documents permission to the Sales group.
C) From the local Group Policy, assign the Increase scheduling priority user right to the Sales group. D) From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group.
 
Answer & Explanation Answer: A) From the printer's properties, assign the Print permission to the Sales group.

Explanation:
Report Error

View Answer Report Error Discuss

5 4408
Q:

To enable RIPng , which of the following would you use?

A) Router1 (config - if) # ipv6 ospf 10 area 0.0.0.0 B) Router1 (config - if) # ipv6 router rip 1
C) Router1 (config - if) # ipv6 router eigrp 10 D) Router1 (config - if) # ospf ipv6 10 area 0
 
Answer & Explanation Answer: B) Router1 (config - if) # ipv6 router rip 1

Explanation:

It's pretty simple to enable RIPng for IPv6. You configure it right on the interface where you want RIP to run with the ipv6 router rip number command.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4381
Q:

Your network consists of a single Active Directory domain. You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the application event logs for all the Web servers. The archived logs must contain all information from the original logs. What should you do?

A) Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type. B) Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file type.
C) On each Web server, open the Security Configuration and Analysis snap in, analyze the computer, and then export the settings. D) Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.
 
Answer & Explanation Answer: B) Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file type.

Explanation:
Report Error

View Answer Report Error Discuss

9 4368
Q:

When making a HyperTerminal connection, what must the bit rate be set to?

A) 2400bps B) 1200bps
C) 9600bps D) 6400bps
 
Answer & Explanation Answer: C) 9600bps

Explanation:

When making a HyperTerminal connection, the bit rate must be set to 9600bps.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4356
Q:

To test the IP stack on your local host, which IP address would you ping?

A) 127.0.0.0 B) 1.0.0.127
C) 127.0.0.1 D) 127.0.0.255
 
Answer & Explanation Answer: C) 127.0.0.1

Explanation:

To test the localstack on your host, ping the loop back interface of 127.0.0.1

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4353
Q:

Which of the following statements about pro forma invoices are correct?

A. In copying control for proforma invoices, the quantity/value plus/minus field is not configurable

B. Account determination procedure is assigned to a proforma invoice

C. In copying control for proforma invoices, the quantity/value plus/minus field must be set to "plus"

D. Account determination procedure is always not assigned to a proforma invoice

Answer

Answer : A , D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP SD

0 4325
Q:

Why are risk tolerances and thresholds important to identify in the risk management Plan?

A) Tolerances and thresholds, when documented, can help to define the target by which the project team can measure the effectiveness of the risk response plan execution B) Tolerances and thresholds help to define how often the risk management process will be performed
C) Tolerances and thresholds determine what tools and data sources will be used in risk management D) Tolerances and thresholds provide the basis for costing the risk management process as well as defining how risk activities will be recorded
 
Answer & Explanation Answer: A) Tolerances and thresholds, when documented, can help to define the target by which the project team can measure the effectiveness of the risk response plan execution

Explanation:

Answer B defines the timing that should be addressed in the risk management plan. Answer C defines the methodology that should be identified in a risk management plan. Answer D touches on the budgeting and tracking that should be defined in the risk management plan.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 4302
Q:

What router command allows you to determine whether an IP access list is enabled on a particular interface?

A) show ip port B) show access - lists
C) show ip interface D) show access - lists interface
 
Answer & Explanation Answer: C) show ip interface

Explanation:

Of the available choices only the show ip interface command will tell you which interfaces have access lists applied. show access - lists will not show you which interfaces have an access list applied. 

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4275