Certification Questions

Q:

What network service is the most likely problem if you can ping a computer by IP address but not by name?

A) DNS B) DHCP
C) ARP D) ICMP
 
Answer & Explanation Answer: A) DNS

Explanation:

 The most likely problem if you can ping a computer by IP address but not by name is a failure of DNS.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3683
Q:

The procurement documents to be used, the supplier management processes and the types of contracts that will be used are to be found in which document?

A) Solicitation management plan. B) Contracting management plan.
C) Organizational policies. D) Procurement management plan.
 
Answer & Explanation Answer: D) Procurement management plan.

Explanation:

Key elements in the procurement management plan are enumerated in this PMBOK section. [12.1.3.1]

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3683
Q:

Where is a Web Intelligence variable stored?

A. In the document

B. In the Central Management Server (CMS)

C. In the Metadata Cube

D. In the cell

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

2 3671
Q:

You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do your network?

A) Add more routers B) Use the auto secure command
C) Implement IDS/IPS D) Configure Naggle
 
Answer & Explanation Answer: C) Implement IDS/IPS

Explanation:

Implementing Intrusion Detection Service and Intrusion prevention Service (IDS/IPS) will help notify you and stop attacks in real time.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 3668
Q:

Maximum number of sessions a user can open when he logs on to SAP

A.Six

B.One

C.Three

D.Five

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

1 3666
Q:

Users on the 192.168.10.0/24 network must access files located on the Server 1. What route could be configured on router R1 for file requests to reach the server?

A. IP route 0.0.0.0 0.0.0.0 s0/0/0
B. IP route 0.0.0.0 0.0.0.0 209.165.200.226
C. IP route 209.165.200.0 255.255.255.0 192.168.10.250
D. IP route 192.168.10.0 255.255.255.0 209.165.100.250

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 3656
Q:

Which among the following keys are used to identify each row of the table uniquely?

A) Primary key B) Unique key
C) Partial key D) None of the above
 
Answer & Explanation Answer: A) Primary key

Explanation:

Primary key helps us to identify a row uniquely in a relation

Report Error

View Answer Report Error Discuss

2 3650
Q:

A company that you previously worked for is seeking new employees and you are trying to exolain the culture to a potential candidate. The company has strict policies, supervisory control, and rules. Team members are not encouraged to be individualistic nor offer feedback to upper management. Many times, the team feels its input is not valuable or implemented. This explanation describes a company that utilizes what employee management theory?

A) Meridith and Mann's Autocratic Management Theory B) Deming's Zero Defects Theory
C) Kerzner's Earned value Theory D) DMcGregor's X Theory
 
Answer & Explanation Answer: D) DMcGregor's X Theory

Explanation:

Answer A is incorrect because Meridith and Mann did not develop an autocratic management theory.Answer B is incorrect because Deming's theories did not involve any of the X and Y theories that were developed by McGregor. Answer C is incorrect because Earned value is not related to X or Y management theories.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3646