Certification Questions

Q:

What is the Class B private IP address space?

Answer

172.16.0.0 through 172.31.255.255

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2313
Q:

Differentiate a MAC address and an IP address and describe how and when each address type is used in a network?

Answer

A MAC address is a hexadecimal number identifying the physical connection of a host. MAC addresses are said to operate on layer 2 of the OSI model. IP addresses, which can be expressed in binary or decimal format, are logical identifiers that are said to be on layer 3 of the OSI model. Hosts on the same physical segment locate one another with MAC addresses, while IP addresses are used when they reside on different LAN segments or subnets. Even when the hosts are in different subnets , a destination IP address will be converted to a MAC address when the packet reaches the destination network via routing.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

1 2311
Q:

You are the database administrator of a SQL Server 2000 computer. The server contains your company's Accounts database. Hundreds of users access the database each day.Because you have had power interruptions in the past, you want to protect the physical integrity of the Accounts database. You do not want to slow down server operations.What should you do?

A) Create a database maintenance plan to check database integrity and make repairs each night. B) Enable the torn page detection database option for each database.
C) Disablewrite caching on all disk controllers. D) Ensure that write caching disk controllers have battery backups.
 
Answer & Explanation Answer: D) Ensure that write caching disk controllers have battery backups.

Explanation:

The scenario states that power interruptions have occurred in the past. By buying a battery backup solution for the disk controllers the power interruption problem would be prevented.

Report Error

View Answer Report Error Discuss

0 2311
Q:

Differentiate types of Ethernet cabling and identify their proper application?

Answer

The three types of cables that can be created from an Ethernet cable are straight-through (to connect a PC's or a router's Ethernet interface to a hub or switch), crossover (to connect hub to hub , hub to switch, switch to switch, or PC to PC), and rolled (for a console conection from a PC to a router or switch).

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

1 2310
Q:

You are choosing a windows 2000 operating system to use on a new computer at your company. This new computer will be used exclusively as a network file server. Which operating system should you use choose?

A) Windows 2000 professional B) Windows 2000 Server
C) Windows 2000 Advanced Server D) Windows 2000 Datacenter Server
 
Answer & Explanation Answer: B) Windows 2000 Server

Explanation:

Windows 2000 server is optimized for use on network file, print , application and Web servers.

Report Error

View Answer Report Error Discuss

0 2307
Q:

You are the administrator of a SQL Server 2000 computer named CorpSQL. The server is a member of a Microsoft Windows NT domain named CORPORATE. Franz maintains a local user account on CorpSQL and is a member of the local Power Users group. He requests access to the SQL Server databases that are stored on CorpSQL.You need to allow Franz to access CorpSQL. Which Transact-SQL statement should you execute?

A) EXEC sp_grantlogin CorpSQL\Franz B) EXEC sp_grantlogin Franz
C) EXEC sp_grantlogin [Power Users\Franz] D) EXEC sp_grantlogin CORPORATE\Franz
 
Answer & Explanation Answer: A) EXEC sp_grantlogin CorpSQL\Franz

Explanation:
Report Error

View Answer Report Error Discuss

0 2304
Q:

Which object types can you merge when using Multi Queries in a Web Intelligence document (WID)?

A. Dimension - Measure

B. Dimension - Detail

C. Measure - Measure

D. Dimension - Dimension

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

0 2303
Q:

You develop an enterprise application, called XYZApplication that includes a Windows Form presentation layer, middle-tier components for business logic and data access, and a Microsoft SQL Server database.


You are in the process of creating a middle-tier component that will execute the data access routines in your application. When data is passed to this component, the component will call several SQL Server stored procedures to perform database updates. All of these procedure calls run under the control of a single transaction.


The code for the middle-tier component will implement the following objects:
SqlConnection cn = new SqlConnection();
SqlTransaction tr;


If two users try to update the same data concurrently, inconsistencies such as phantom reads will occur. You must now add code to your component to specify the highest possible level of protection against such inconsistencies.
Which code segment should you use?

A) tr = cn.BeginTransaction(?ReadCommitted?); B) tr = cn.BeginTransaction(IsolationLevel.ReadCommitted);
C) tr = cn.BeginTransaction(IsolationLevel.Serializable); D) tr = cn.BeginTransaction(?Serializable?);
 
Answer & Explanation Answer: C) tr = cn.BeginTransaction(IsolationLevel.Serializable);

Explanation:

Serializable is the highest isolation transaction level. It provide the highest possible level of protection against concurrent data errors. The correct syntax to begin a transaction with this transaction isolation level is: cn.BeginTransaction(IsolationLevel.Serializable)

Report Error

View Answer Report Error Discuss

1 2298