Certification Questions

Q:

Which of the following is usually not considered a goal of portfolio management?

A) To manage the effective and efficient use of resources. B) To balance the portfolio among incremental and radical investments.
C) To maximize the value of the portfolio by careful examination of candidate projects and exclusion of those no meeting strategic objectives. D) To ensure that the relationship between projects in the portfolio clearly reflects strategic objectives.
 
Answer & Explanation Answer: D) To ensure that the relationship between projects in the portfolio clearly reflects strategic objectives.

Explanation:

There is not necessarily a relationship between projects in a portfolio. Answer D is actually one of the goals of PROGRAM management. PMBOK Guide [1.4]

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 4554
Q:

Which of the following DB2 data types CANNOT be used to contain the date an employee was hired?

A) CLOB B) TIME
C) VARCHAR D) TIMESTAMP
 
Answer & Explanation Answer: B) TIME

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

11 4500
Q:

Typically not referred to as a buffer type in critical chain project management is ______.

A) Free Buffer B) Resource Buffer
C) Project Buffer D) Feeding Buffer
 
Answer & Explanation Answer: A) Free Buffer

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

8 4494
Q:

A static map to the S-AMER location is required. Which command should be used to create this map?

A. frame-relay map ip 172.16.1.3 704 broadcast
B. frame-relay map ip 172.16.1.3 196 broadcast
C. frame-relay map ip 172.16.1.3 702 broadcast
D. frame-relay map ip 172.16.1.3 344 broadcast

Answer

Answer: B

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 4487
Q:

Which encryption type does WPA2 use?

A) AES - CCMP B) PPK via IV
C) PSK D) TKIP/MIC
 
Answer & Explanation Answer: A) AES - CCMP

Explanation:

WPA2 uses AES-CCMP for encryption. WPA uses TKIP

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4479
Q:

What switch must be added to the ipconfig command on a PC to verify DNS configuration?

A) /dns B) -dns
C) /all D) -all
 
Answer & Explanation Answer: C) /all

Explanation:

The /all switch must be added to the ipconfig command on a PC to verify DNS configuration.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4473
Q:

What is the bit length and expression form of a MAC address?

Answer

48 bits (6 bytes) expressed as a hexadecimal number.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

2 4462
Q:

Which command will create a dynamic pool named Todd that will provide you with 30 global addresses?

A) ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.240 B) ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224
C) ip nat pool todd 171.16.10.65 171.16.10.94 net 255.255.255.224 D) ip nat pool Todd 171.16.10.1 171.16.10.254 net 255.255.255.0
 
Answer & Explanation Answer: B) ip nat pool Todd 171.16.10.65 171.16.10.94 net 255.255.255.224

Explanation:

The command ip nat pool name creates the pool that hosts can use to get onto the global internet. What makes option B correct is that the range 171.16.10.65 through 171.16.10.94 includes 30 hosts, but the mask has to match 30 hosts as well, and that mask is 255.255.255.224 . Option C is wrong because there is a lowercase t in the pool name. Pool name are case sensitive.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4449