Certification Questions

Q:

How does DHCP client ensure that no other computer has its assigned IP address?

A) Acknowledge receipt of a TCP segment B) Ping to its own address to see if a response is detected
C) Broadcast a Proxy ARP D) Broadcast a gratuitous ARP
 
Answer & Explanation Answer: D) Broadcast a gratuitous ARP

Explanation:

To stop possible address conflicts , a DHCP client will use gratuitous ARP (broadcast an ARP request for its own IP address) to see if another host responds.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3018
Q:

which of the following represents a set of properties that guarantee that database transactions are processed reliably in computer science ?

A) Buffer Cache B) ACID
C) Foreign Key D) None
 
Answer & Explanation Answer: B) ACID

Explanation:

ACID means (Atomicity, Consistency, Isolation, Durability) is a set of properties of database transactions intended to guarantee validity even in the event of errors, power failures, etc.

In the context of databases, a sequence of database operations that satisfies the ACID properties and, thus, can be perceived as single logical operation on the data, is called a transaction. For example, a transfer of funds from one bank account to another, even involving multiple changes such as debiting one account and crediting another, is a single transaction.

Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification
Job Role: Analyst , IT Trainer

13 3015
Q:

Which of the following is an example of a standard IP access list?

A) access - list 110 permit host 1.1.1.1 B) access - list 1 deny 172 . 16 . 10 . 1 0 . 0 . 0 . 0
C) access - list 1 permit 172 . 16 . 10 . 1 255 . 255 . 0 . 0 D) access - list standard 1 . 1 . 1 . 1
 
Answer & Explanation Answer: B) access - list 1 deny 172 . 16 . 10 . 1 0 . 0 . 0 . 0

Explanation:

Standard IP access lists use the numbers 1 - 99 and 1300 - 1999 and filter based on source IP address only. Option C is incorrect because the mask must be in wildcard format.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3014
Q:

Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?

A) The Linux command mt B) The Linux command cpio
C) The OS/400 command RST option(*print) D) The OS/400 command DSPTAP option(*savrst)
 
Answer & Explanation Answer: B) The Linux command cpio

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

1 3014
Q:

Sachin works for a computer training institute in North America.After discussing the steps of installing Windows XP professional in the class room, sachin divided the students in a group of two and asked them to complete the installation on their respective machines.But none of the students were able to complete the installation process.Identify the solution that is the cause to the above problem.

A) Needs to run XP Upgrade Adviser to avoid compatibility problem B) Needs to run XP Upgrade Professional to avoid compatibility problem
C) Needs to run XP Upgrade Home Edition to avoid compatibility problem D) Needs to run XP Service Pack to avoid compatibility problem
 
Answer & Explanation Answer: A) Needs to run XP Upgrade Adviser to avoid compatibility problem

Explanation:
Report Error

View Answer Report Error Discuss

2 3013
Q:

Project Risk Management

What are the Project Management Processes included in the Project Risk Management? 

Answer

The Project Risk Management Processes include the following:


Risk Management Planning - Deciding how to approach , plan, and execute the risk management activities for a project


Risk Identification - Determining which risks might affect the project and documenting their characteristics.


Qualitative Risk Analysis - Prioritizing risks for subsequent further analysis or action by assessing and combining their probability of occurrence and impact


Quantitative Risk Analysis - Numerically analyzing the effect on overall project objectives of identified risks


Risk Response Planning - Developing options and actions to enhance opportunities , and to reduce threats to project objectives.


Risk Monitoring and Control - Tracking identified risks, monitoring residual risks, identifying new risks, executing risk response plans, and evaluating their effectiveness throughout the project life cycle.

Report Error

View answer Workspace Report Error Discuss

0 3012
Q:

You want to use System Monitor to see how much of the paging file on your Windows 2000 computer is being utilized. Which counter should you use?

A) Paging File-% Usage B) Paging File-% Usage Peak
C) Memory-Pages/sec D) Memory-Pool Paged Bytes
 
Answer & Explanation Answer: A) Paging File-% Usage

Explanation:

The Paging File-% Usage counter is used to measure the percentage of paging file utilization.

Report Error

View Answer Report Error Discuss

0 3011
Q:

Which message appears when you select Use query drill while Scope of Analysis is set in a BusinessObjects Web Intelligence XI 3.0 report?

A. The Scope of Analysis is empty

B. The query drill mode option is enabled

C. The query drill mode option is not enabled

D. The Scope of Analysis is not empty

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

7 3010