Certification Questions

Q:

What is the maximum data rate for the 802.11g standard?

A) 6Mbps B) 11Mbps
C) 22Mbps D) 54Mbps
 
Answer & Explanation Answer: D) 54Mbps

Explanation:

The IEEE 802.11g standard provides a maximum data rate of up to 54Mbps.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2930
Q:

Which of the following is correct?

A) Full- duplex Ethernet uses one pair of wires B) Full- duplex Ethernet uses two pairs of wires
C) Half- duplex Ethernet uses two pairs of wires D) Full- duplex Ethernet uses three pairs of wires
 
Answer & Explanation Answer: B) Full- duplex Ethernet uses two pairs of wires

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2925
Q:

What is the administrative distance of OSPF?

A) 90 B) 100
C) 110 D) 120
 
Answer & Explanation Answer: C) 110

Explanation:

The administrative distance (AD) is a very important parameter in a routing protocol. The lower the AD, the more trusted the route. If you have IGRP and OSPF running , by default IGRP routes would be placed in the routing table because IGRP has a lower AD of 100. OSPF has an AD of 110. RIPv1 and RIPv2 both have an AD of 120, and EIGRP is the lowest, at 90.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 2908
Q:

How are +1s calculated for your ad and Google+ page when using the social extension on your ads?

Answer

+1s from your Google+ page show in the count that is visible on your ad.

Report Error

View answer Workspace Report Error Discuss

0 2908
Q:

A Good CFO will tell you that it is important to look at your bottom line and determine how to increase profits for the organization. Veronica, the new CFO at a local university, is taking that approach and applying it to new projects. Therefore,she wants to include costs from each phase of the project on a total expenditure is known as 

A) An opportunity cost B) A sunk cost
C) NPV D) A life cycle
 
Answer & Explanation Answer: D) A life cycle

Explanation:

Life Cycle costing includes the costs from each phase of the project life cycle when the total investment costs are calculated. Answer A is incorrect because an opportunity cost is the difference between a chosen investment and the one that is passed up. Answer B is incorrect because sunk costs are costs that have been incurred and cannot be reversed. Answer C is incorrect because net present value (NPV) is the present value of cash inflows(benifits) minus the present value of cash outflows (costs).

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 2903
Q:

Your network consists of a single Active Directory domain. All network servers run Windows Server 2003 Service Pack 2 (SP2). You share a folder named Research. A user named User1 reports that he cannot access files in the Research share. You confirm that the Domain Users group is granted the Change permission for the Research share. You run the Cacls command as shown in the exhibit:

You need to ensure that User1 can modify files in the Research share. You must prevent User1 from modifying permissions for the Research folder. To which group should you add User1?

A) Administrators B) IT
C) Research D) ResearchManagers
 
Answer & Explanation Answer: D) ResearchManagers

Explanation:
Report Error

View Answer Report Error Discuss

1 2903
Q:

Project Management - Introduction

What is Project Management?

Answer

Project Management is the application of Knowledge, skills, tools and techniques to project activities to meet project requirements. Project Management is accomplished through the application and integraton of the project management processes of  initiating, planning, executing, monitoring and controlling , closing.

Report Error

View answer Workspace Report Error Discuss

0 2899
Q:

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an
application. The application connects to a Microsoft SQL Server database. The application stores encrypted credit card numbers in the database. You need to ensure that credit card numbers can be extracted from the database.
Which cryptography provider should you use?

A) DSACryptoServiceProvider B) AESCryptoServiceProvider
C) MD5CryptoServiceProvider D) SHA1CryptoServiceProvider
 
Answer & Explanation Answer: B) AESCryptoServiceProvider

Explanation:
Report Error

View Answer Report Error Discuss

0 2897