Certification Questions

Q:

Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols?

A) HDLC B) Cable
C) VPN D) IPSec
 
Answer & Explanation Answer: C) VPN

Explanation:

A VPN allows or describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols. A VPN can be set up across any type of link.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

3 7848
Q:

What is the purpose of Spanning Tree Protocol in a switched LAN?

A) To provide a mechanism for network monitoring is switched environments B) To prevent routing loops in network with redundant paths
C) To prevent switching loops in networks with redundant switched paths D) To manage the VLAN database across multiple switches
 
Answer & Explanation Answer: C) To prevent switching loops in networks with redundant switched paths

Explanation:

The Spanning Tree Protocol (STP) was designed to stop layer 2 loops. All Cisco switches have the STP on by default.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 7774
Q:

When analyzing an outcome for creation of value for customers, what attributes of the service should be considered?

A) Objectives, Metric, Desired outcome B) People, Products, Technology
C) Business Objectives, IT objectives, Process metrics D) Desired outcome, Supplier metrics, IT objectives
 
Answer & Explanation Answer: C) Business Objectives, IT objectives, Process metrics

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

0 7714
Q:

chart of depreciation is assigned to company code and necessary data for asset accounting is added to company code. Hence company code is available for use in asset accounting

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP FI

9 7705
Q:

You want to ping the loopback address of your IPv6 local host. What will you type?

A) Ping 127.0.0.1 B) Ping 0.0.0.0
C) Ping ::1 D) trace 0.0. :: 1
 
Answer & Explanation Answer: C) Ping ::1

Explanation:

The loop back address with IPv4 is 127.0.0.1 . With IPv6, that address is ::1

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 7623
Q:

The four stages of the Deming Cycle are?

A) Plan, Measure, Monitor, Report B) Plan, Check, Re-Act, Implement
C) Plan, Do, Act, Audit D) Plan, Do, Check, Act
 
Answer & Explanation Answer: D) Plan, Do, Check, Act

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

0 7598
Q:

The Information Security Policy should be available to which groups of people?

A) Senior business managers and all IT staff B) Information Security Management staff only
C) All customers, users and IT staff D) Senior business managers, IT executives and the Security Manager
 
Answer & Explanation Answer: C) All customers, users and IT staff

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

2 7574
Q:

Which OSI layer defines the standards for cabling and connectors?

A) Layer 1 B) Layer 4
C) Layer 7 D) Layer 3
 
Answer & Explanation Answer: A) Layer 1

Explanation:

OSI layer 1 defines the standards for cabling and connectors.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA
Job Role: Network Engineer

11 7523