Certification Questions

Q:

The router address 192.168.10.250 is the default gateway for both the Web Server 2 and Host 1. What is the correct subnet mask for this network?

A. 255.255.255.0
B. 255.255.255.192
C. 255.255.255.250
D. 255.255.255.252

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 7027
Q:

Of which ITIL process are Reliability, Serviceability and Maintainability components?

A) Service Level Management B) Problem Management
C) Availability Management D) IT Service Continuity Management
 
Answer & Explanation Answer: C) Availability Management

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

2 6975
Q:

Sensitivity analysis is used to

A) identify the risks which have the largest potential impact on the project. B) determine which risks are most troubling to the customer.
C) identify hidden requirements that were not recognized at the outset of the project. D) determine which requirements will add the greatest customer satisfaction for the least effort.
 
Answer & Explanation Answer: A) identify the risks which have the largest potential impact on the project.

Explanation:

“Sensitivity analysis helps to determine which risks have the most potential impact on the project.”

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

3 6952
Q:

The network with ip address 192.168.100.0/27 is to be used on a router. If ip subnet-zero is configured, which statement describe the resulting number of available subnets and hosts?

A) 7 usable subnets, each with 32 host addresses B) 8 usable subnets, each with 30 host addresses
C) 8 usable subnets, each with 27 host addresses D) 7 usable subnets, each with 24 host addresses
 
Answer & Explanation Answer: B) 8 usable subnets, each with 30 host addresses

Explanation:

Because subnet zero is configured and we have a class C address (192.168.100.0) then the network portion will have 3 bits so 8 subnets will be available. The rest of the bits, 5, represent the available hosts, so 2^5=32, but only 30 are available, 0 ad 31 are network and broadcast respectively.

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

6 6948
Q:

Function GWT is used in time valuation to select time wage types for all absences, which are valued on the basis of the As If principle

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP HR

5 6918
Q:

How many bits are in an IPv6 address field?

A) 24 B) 16
C) 32 D) 128
 
Answer & Explanation Answer: B) 16

Explanation:

There are 16 bits (four hex characters) in an IPv6 field.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 6812
Q:

To enable OSPFv3, which of the following would you use?

A) Router1 (config - if) # ipv6 ospf 10 area 0.0.0.0 B) Router1 (config - if) # ipv6 router rip 1
C) Router1 (config - if) # ipv6 router eigrp 10 D) Router1 (config - if) # ospf ipv6 10 area 0
 
Answer & Explanation Answer: A) Router1 (config - if) # ipv6 ospf 10 area 0.0.0.0

Explanation:

To enable OSPFv3, you enable the protocol at the interface level as with RIPng. The command string is ipv6 ospf proces-id area area-id.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 6801
Q:

To use VLSM, what capability must the routing protocols in use possess?

A) Support for multicast B) Multi-protocol support
C) Transmission of subnet mask information D) Support for unequal load balancing
 
Answer & Explanation Answer: C) Transmission of subnet mask information

Explanation:

To use VLSM, the routing protocols in use possess the capability to transmit subnet mask information.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 6695