Certification Questions

Q:

Given the following network range 192.168.0.0/24. We want minimum 50 hosts on each of the available subnets. What will be the subnet mask?

A) /24 B) /25
C) /26 D) /27
 
Answer & Explanation Answer: C) /26

Explanation:

Explanation: 50 hosts require 6 bits of the last octet giving us 64 -2 = 62 possible hosts this satisfies our requirement and leaves us 2 bits over for the subnets. The default mask is /24 or 255.255.255.0 adding the 2 bits for the subnets it becomes 255.255.255.192 or /26

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

1 3552
Q:

What command displays the ARP table on a Cisco router?

A) show ip arp B) traceroute
C) arp -a D) tracert
 
Answer & Explanation Answer: A) show ip arp

Explanation:

The command that displays the ARP table on a Cisco router is show ip arp.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3543
Q:

What does a link-local address always start with?

Answer

FE80::/10

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 3529
Q:

You are the administrator of a SQL Server 2000 computer. The server contains a database named FinanceData that is used by a client/server application. Each employee has a SQL Server login that the application uses to access the server.Your company hires a new employee named Andrew. You create a SQL Server login named Andrew. You also create a database user named Andrew in the database and grant the database user full permissions in the database.Whenever Andrew runs the client/server application, he receives the following error message: "Invalid object name." Andrew also reports that he cannot access the database by using the application.You need to ensure that Andrew can use the application. Which Transact-SQL statement should you execute?

A) EXEC sp_defaultdb 'Andrew','FinanceData' B) GRANT ALL ON FinanceData TO Andrew
C) EXEC sp_addlogin 'Andrew' D) EXEC sp_grantdbaccess 'FinanceData','Andrew'GOsp_addrolemember 'db_datareader','Andrew'
 
Answer & Explanation Answer: A) EXEC sp_defaultdb 'Andrew','FinanceData'

Explanation:

Error 208 produces the message 'Invalid object name' and occurs when an object that does not exist in the current database is referenced. If the object exists in another database, we must use the USE statement to explicitly switch the context to the correct database or we must qualify the object name with the database name. A third option is to use the sp_defaultdb stored procedure. This stored procedure is used to change the default database for a login. When a client connects with SQL Server, the default database defined for its login becomes the current database without an explicit USE statement. The default database can be defined when the login is added with
sp_addlogin. When executing sp_addlogin the master database is the default database if a database is not specified. In this scenario a SQL Server 2000 login and a user account has been created for Andrew and he has been given database access and the required permissions.

Report Error

View Answer Report Error Discuss

0 3511
Q:

Where are EIGRP successor routes stored?

A) In the routing table only B) In the neighbor table only
C) In the routing table and neighbor table D) In the routing table and the topology table
 
Answer & Explanation Answer: D) In the routing table and the topology table

Explanation:

Successor routes are going to be in the routing table since they are the best path to a remote network. However, the topology table has a link to each and every network, so the best answer is topology table and routing table. Any secondary route to a remote network is considered a feasible successor, and those routes are found only in the topology table and used as backup routes in case of primary route failure.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3500
Q:

What is one benefit of My Client Center?

Answer

A dashboard that provides summaries of different metrics for all of your clients’ accounts.

Report Error

View answer Workspace Report Error Discuss

7 3499
Q:

In the Determine Budget processes the project schedule

A) is not one of the inputs to these processes. B) is used to allocate the project budget to the various project activities.
C) is used to assign costs to the time period when the costs will be incurred D) is used to determine the size of the contingency component of the budget after all scheduled costs are accounted for.
 
Answer & Explanation Answer: C) is used to assign costs to the time period when the costs will be incurred

Explanation:

“This [project schedule] information can be used to aggregate costs to the calendar periods when the costs are planned to be incurred.” PMBOK [7.2.1.4]

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3498
Q:

You have a portable computer named Computer1 that runs Windows 7.
You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1.


You need to configure Computer1 to meet the following requirements:
Ensure that cached files from Share1 are encrypted.
Ensure that files located in Share1 are available when Server1 is disconnected from the network.


What should you do?

A) On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline. B) On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline.
C) On Computer1, make Share1 available offline and enable encryption of offline files. D) On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive Encryption.
 
Answer & Explanation Answer: C) On Computer1, make Share1 available offline and enable encryption of offline files.

Explanation:
Report Error

View Answer Report Error Discuss

3 3481