Certification Questions

Q:

Which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses?

A) /28 B) /29
C) /30 D) /31
 
Answer & Explanation Answer: C) /30

Explanation:

A point-to-point link uses only two hosts. A/30, or 255.255.255.252, mask provides two hosts per subnet.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4136
Q:

What network service is the most likely problem if you can ping a computer by IP address but not by name?

A) DNS B) DHCP
C) ARP D) ICMP
 
Answer & Explanation Answer: A) DNS

Explanation:

 The most likely problem if you can ping a computer by IP address but not by name is a failure of DNS.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4134
Q:

Given the following network range 192.168.0.0/24. We want minimum 50 hosts on each of the available subnets. What will be the subnet mask?

A) /24 B) /25
C) /26 D) /27
 
Answer & Explanation Answer: C) /26

Explanation:

Explanation: 50 hosts require 6 bits of the last octet giving us 64 -2 = 62 possible hosts this satisfies our requirement and leaves us 2 bits over for the subnets. The default mask is /24 or 255.255.255.0 adding the 2 bits for the subnets it becomes 255.255.255.192 or /26

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

1 4126
Q:

A company that you previously worked for is seeking new employees and you are trying to exolain the culture to a potential candidate. The company has strict policies, supervisory control, and rules. Team members are not encouraged to be individualistic nor offer feedback to upper management. Many times, the team feels its input is not valuable or implemented. This explanation describes a company that utilizes what employee management theory?

A) Meridith and Mann's Autocratic Management Theory B) Deming's Zero Defects Theory
C) Kerzner's Earned value Theory D) DMcGregor's X Theory
 
Answer & Explanation Answer: D) DMcGregor's X Theory

Explanation:

Answer A is incorrect because Meridith and Mann did not develop an autocratic management theory.Answer B is incorrect because Deming's theories did not involve any of the X and Y theories that were developed by McGregor. Answer C is incorrect because Earned value is not related to X or Y management theories.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 4121
Q:

What is the default return value of a function?

A) int B) char
C) string D) None of the above
 
Answer & Explanation Answer: A) int

Explanation:

The default return value from a function is int. In other words, unless explicitly specified the default return value by compiler would be integer value from function.

Report Error

View Answer Report Error Discuss

3 4119
Q:

The procurement documents to be used, the supplier management processes and the types of contracts that will be used are to be found in which document?

A) Solicitation management plan. B) Contracting management plan.
C) Organizational policies. D) Procurement management plan.
 
Answer & Explanation Answer: D) Procurement management plan.

Explanation:

Key elements in the procurement management plan are enumerated in this PMBOK section. [12.1.3.1]

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 4119
Q:

Which of the following master data can/must you use for pipeline meterials?

A. BOM(ascomponent)

B. Purchasing info record

C. Material master record

D. Vendor master record

E. Source list

Answer

Answer : A , B , C , D , E [all these]


 


Explanation:You must have created a material master record with a purchasing info record. To do this, you need a vendor master record. You can use the source list and BOM in connection with the pipeline material.

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

8 4117
Q:

Which among the following keys are used to identify each row of the table uniquely?

A) Primary key B) Unique key
C) Partial key D) None of the above
 
Answer & Explanation Answer: A) Primary key

Explanation:

Primary key helps us to identify a row uniquely in a relation

Report Error

View Answer Report Error Discuss

2 4108