Certification Questions

Q:

The Information Security Policy should be available to which groups of people?

A) Senior business managers and all IT staff B) Information Security Management staff only
C) All customers, users and IT staff D) Senior business managers, IT executives and the Security Manager
 
Answer & Explanation Answer: C) All customers, users and IT staff

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

2 7934
Q:

The four stages of the Deming Cycle are?

A) Plan, Measure, Monitor, Report B) Plan, Check, Re-Act, Implement
C) Plan, Do, Act, Audit D) Plan, Do, Check, Act
 
Answer & Explanation Answer: D) Plan, Do, Check, Act

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

0 7806
Q:

You want to ping the loopback address of your IPv6 local host. What will you type?

A) Ping 127.0.0.1 B) Ping 0.0.0.0
C) Ping ::1 D) trace 0.0. :: 1
 
Answer & Explanation Answer: C) Ping ::1

Explanation:

The loop back address with IPv4 is 127.0.0.1 . With IPv6, that address is ::1

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 7794
Q:

Which layer of the OSI model offers three different modes of communication : Simplex, half duplex, and full duplex?

A) Presentation B) Transport
C) Application D) Session
 
Answer & Explanation Answer: D) Session

Explanation:

The Session layer of the OSI model offers three different modes of communication : Simplex, half duplex, and full duplex.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 7773
Q:

Function GWT is used in time valuation to select time wage types for all absences, which are valued on the basis of the As If principle

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP HR

5 7692
Q:

Sensitivity analysis is used to

A) identify the risks which have the largest potential impact on the project. B) determine which risks are most troubling to the customer.
C) identify hidden requirements that were not recognized at the outset of the project. D) determine which requirements will add the greatest customer satisfaction for the least effort.
 
Answer & Explanation Answer: A) identify the risks which have the largest potential impact on the project.

Explanation:

“Sensitivity analysis helps to determine which risks have the most potential impact on the project.”

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

3 7572
Q:

Which of the following descriptions about IPv6 is correct?

A) Addresses are not hierarchical and are assigned at random B) Broadcasts have been eliminated and replaced with multicasts
C) There are 2.7 billion addresses D) An interface can only be configured with one IPv6 address
 
Answer & Explanation Answer: B) Broadcasts have been eliminated and replaced with multicasts

Explanation:

There are no broadcasts with IPv6. Unicast , multicast, anycast, global, and link - local unicast are used.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 7520
Q:

When you reverse a posted document, the document number must be

A. external

B. internal

C. manually assigned

D. internal or external

Answer

Answer : B

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

22 7447