Certification Questions

Q:

When data is encapsulated , which is the correct order?

A) Data, frame, packet, segment, bit B) Segment, data, packet, frame, bit
C) Data, segment, packet, frame, bit D) Data, segment, frame, packet, bit
 
Answer & Explanation Answer: C) Data, segment, packet, frame, bit

Explanation:

The encapsulation method is data, segment, packet, frame, bit.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 6876
Q:

Your company wants to reconfigure a Catalyst 2950. Which actions must be taken to erase the old configuration?(Choose three)

A. Erase flash
B. Restart the switch
C. Delete the VLAN database
D. Erase the startup configuration

Answer

Answer: B  C  D

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

4 6813
Q:

AUC have depreciation key, which denotes that depreciation will not be calculated

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP FI

4 6792
Q:

What is the output after compile and run the following code ?

int Output = 10;
boolean b = false;
if((b == true) && ((Output += 10) == 20))
{
System.out.println("We are equal " + Output);
}
else
{
System.out.println("Not equal! " + Output);
}

A) Compilation and output of "We are equal 10" B) Compilation and output of "Not equal! 10"
C) Compilation error, attempting to perform binary comparison on logical data type D) Compilation and output of "Not equal! 20"
 
Answer & Explanation Answer: B) Compilation and output of "Not equal! 10"

Explanation:

The output will be "Not equal! 10". Please note that && is logical AND operator. If first operand before (&&) is false then the other operand will not be evaluated. This illustrates that the Output +=10 calculation was never performed because processing stopped after the first operand was evaluated to be false. If you change the value of b1 to true, processing occurs as you would expect and the output would be "We are equal 20".

Report Error

View Answer Report Error Discuss

Filed Under: Oracle Certification
Job Role: Analyst

6 6759
Q:

By default , what type of trust are all Windows 2000 trust relationships within a domain tree or forest?

A) Explicit trust B) One-way trust
C) Transitive trust D) Non-transitive trust
 
Answer & Explanation Answer: C) Transitive trust

Explanation:

By default, all Windows 2000 trusts within a domain tree or forest are transitive trusts.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

6 6731
Q:

Which layer defines how data is formatted , presented, encoded, and converted for use on the network?

Answer

The presentation layer makes sure that data is in a readable format for the Application layer.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

12 6718
Q:

Which dml command is used in conjunction with @@identity?

A) INSERT and UPDATE B) UPDATE and DELETE
C) SCOPE_IDENTITY and IDENT_CURRENT D) Commit and rollback
 
Answer & Explanation Answer: C) SCOPE_IDENTITY and IDENT_CURRENT

Explanation:

Using automatically incrementing IDENTITY columns is very popular with database developers. You don’t need to explicitly calculate unique surrogate keys when inserting new data, the IDENTITY column functionality does that for you. The IDENTITY feature also allows you to specify useful Seed and Increment properties. When you use an INSERT statement to insert data into a table with an IDENTITY column defined, SQL Server will generate a new IDENTITY value.

 

You can use the @@IDENTITY variable and the SCOPE_IDENTITY and IDENT_CURRENT functions to return the last IDENTITY value that has been generated by SQL Server. This is very useful when you need to return the key for the row that has just been inserted, back to the caller.

Report Error

View Answer Report Error Discuss

9 6689
Q:

What is the most common attack on a network today?

A) Lock picking B) Naggle
C) DoS D) auto secure
 
Answer & Explanation Answer: C) DoS

Explanation:

The most common attack on a network today is a denial of service (DoS) because they are the easiest attack to achieve.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 6518