Certification Questions

Q:

What is the specific term for the unwanted signal interference from adjacent pairs in the cable?

A) EMI B) RFI
C) Crosstalk D) Attenuation
 
Answer & Explanation Answer: C) Crosstalk

Explanation:

The term for the unwanted signal interference from adjacent pairs in the cable is crosstalk

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3714
Q:

What is one benefit of My Client Center?

Answer

A dashboard that provides summaries of different metrics for all of your clients’ accounts.

Report Error

View answer Workspace Report Error Discuss

8 3704
Q:

Which layer is responsible for keeping the data from different applications seperate on the network?

Answer

The session layer creates sessions between different host's applications.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

5 3702
Q:

What are the minimum requirements to run an ad on the Search Network?

Answer

Text ad, keyword list, and a default bid.

Report Error

View answer Workspace Report Error Discuss

10 3694
Q:

Which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses?

A) /28 B) /29
C) /30 D) /31
 
Answer & Explanation Answer: C) /30

Explanation:

A point-to-point link uses only two hosts. A/30, or 255.255.255.252, mask provides two hosts per subnet.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3692
Q:

You have a portable computer named Computer1 that runs Windows 7.
You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1.


You need to configure Computer1 to meet the following requirements:
Ensure that cached files from Share1 are encrypted.
Ensure that files located in Share1 are available when Server1 is disconnected from the network.


What should you do?

A) On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline. B) On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline.
C) On Computer1, make Share1 available offline and enable encryption of offline files. D) On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive Encryption.
 
Answer & Explanation Answer: C) On Computer1, make Share1 available offline and enable encryption of offline files.

Explanation:
Report Error

View Answer Report Error Discuss

3 3691
Q:

In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?

A) All hosts have equal priority B) The two hosts that caused the collision will have equal priority
C) The host that sent the jam signal after the collision D) The host with the highest MAC address
 
Answer & Explanation Answer: A) All hosts have equal priority

Explanation:

After the expiration of the backoff algorithm , all hosts have equal priority.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3690
Q:

You are preparing to install Windows 2000 on a computer, and you want this computer to be able to dual  boot between Windows 2000 and Windows 98. Which file system should you use?

A) FAT B) NTFS
C) HPFS D) You can use either FAT or NTFS
 
Answer & Explanation Answer: A) FAT

Explanation:

If you want your computer to dual boot between Windows 2000 and windows 98, you should choose the FAT or FAT 32 file system, because Windows 98 does not support NTFS or HPFS, and Windows 2000 does not support HPFS.

Report Error

View Answer Report Error Discuss

0 3688