Certification Questions

Q:

Which  of the following commands sets the secret password to Cisco?

A) enable secret password Cisco B) enable secret cisco
C) enable secret Cisco D) enable password Cisco
 
Answer & Explanation Answer: C) enable secret Cisco

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2809
Q:

What port number is used for DHCP?

A) 67 B) 68
C) 69 D) Both A and B
 
Answer & Explanation Answer: D) Both A and B

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCENT

2 2806
Q:

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an application. The application uses the ADO.NET Entity Framework to manage customer and related order records. You add a new order for an existing customer. You need to associate the Order entity with the Customer entity. What should you do?

A) Set the Value property of the EntityReference of the Order entity. B) Call the Add method on the EntityCollection of the Order entity.
C) Use the AddObject method of the ObjectContext to add both Order and Customer entities. D) Use the Attach method of the ObjectContext to add both Order and Customer entities.
 
Answer & Explanation Answer: A) Set the Value property of the EntityReference of the Order entity.

Explanation:
Report Error

View Answer Report Error Discuss

11 2802
Q:

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Communication Foundation (WCF) Data Services service. You discover that when an application submits a PUT or DELETE request to the Data Services service, it receives an error. You need to ensure that the application can access the service. Which header and request type should you use in the application?

A) an X-HTTP-Method header as part of a POST request B) an X-HTTP-Method header as part of a GET request
C) an HTTP ContentType header as part of a POST request D) an HTTP ContentType header as part of a GET request
 
Answer & Explanation Answer: A) an X-HTTP-Method header as part of a POST request

Explanation:
Report Error

View Answer Report Error Discuss

6 2797
Q:

You are the network administrator and are given the tasks to plan for the future expansion of the network. You decide to subnet the current network of 172.15.0.0. What will be the subnet mask be if every subnet has to allocate 500 hosts.

A) 255.255.0.0 B) 255.0.0.0
C) 255.255.240.0 D) 255.255.254.0
 
Answer & Explanation Answer: D) 255.255.254.0

Explanation:

Explanation: The requirement of having to allocate 500 hosts on each subnet can be achieved by the following: 2^9 = 512. So deducting the broadcast and network address we have 510 possible hosts on each subnet. We used 9 bits to allocate the hosts, this leaves us 7 bits for possible subnets. Those 7 bits in binary is 1111 1110 or 254 in decimal.

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

1 2796
Q:

Which of the following is part of the IEEE 802.3u standard?

A) 100Base2 B) 10Base5
C) 100Base-TX D) 1000Base-T
 
Answer & Explanation Answer: C) 100Base-TX

Explanation:

IEEE 802.3u is Fast Ethernet at 100Mbps and covers 100Base-TX, 100BaseT4, and 100Base-FX.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2795
Q:

Payroll schema consists of a sequence of functions. Which of these functions is used to import Absence infotype data?

A. PAB.

B. PIT.

C. P0015.

D. RAB.

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP HR

0 2792
Q:

What is the difference between a Local and a Global temporary table?

Answer

Local :


Only available to the current Db connection for current user and are cleared when connection is closed.


Multiple users can’t share a local temporary table.


 


Global:


Available to any connection once created. They are cleared when the last connection is closed.


Can be shared by multiple user sessions

Report Error

View answer Workspace Report Error Discuss

1 2791