Certification Questions

Q:

Which among the following keys are used to identify each row of the table uniquely?

A) Primary key B) Unique key
C) Partial key D) None of the above
 
Answer & Explanation Answer: A) Primary key

Explanation:

Primary key helps us to identify a row uniquely in a relation

Report Error

View Answer Report Error Discuss

2 4011
Q:

Communication requirements are defined by

A) the adaptation of the theory of sender-receiver models to the dominant listening and learning style of each stakeholder. B) the logistics of how many individuals will be involved with the project and at which locations.
C) the technologies or methods available to transfer information back and forth among project stakeholders. D) combining the type and format of information required with an analysis of the value of that information.
 
Answer & Explanation Answer: D) combining the type and format of information required with an analysis of the value of that information.

Explanation:

“ Communication requirements are defined by combining the type and format of information needed with an analysis of the value of that information.”

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3988
Q:

Where is a Web Intelligence variable stored?

A. In the document

B. In the Central Management Server (CMS)

C. In the Metadata Cube

D. In the cell

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

2 3973
Q:

Users on the 192.168.10.0/24 network must access files located on the Server 1. What route could be configured on router R1 for file requests to reach the server?

A. IP route 0.0.0.0 0.0.0.0 s0/0/0
B. IP route 0.0.0.0 0.0.0.0 209.165.200.226
C. IP route 209.165.200.0 255.255.255.0 192.168.10.250
D. IP route 192.168.10.0 255.255.255.0 209.165.100.250

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 3966
Q:

You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do your network?

A) Add more routers B) Use the auto secure command
C) Implement IDS/IPS D) Configure Naggle
 
Answer & Explanation Answer: C) Implement IDS/IPS

Explanation:

Implementing Intrusion Detection Service and Intrusion prevention Service (IDS/IPS) will help notify you and stop attacks in real time.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 3946
Q:

In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?

A) All hosts have equal priority B) The two hosts that caused the collision will have equal priority
C) The host that sent the jam signal after the collision D) The host with the highest MAC address
 
Answer & Explanation Answer: A) All hosts have equal priority

Explanation:

After the expiration of the backoff algorithm , all hosts have equal priority.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3930
Q:

What is the specific term for the unwanted signal interference from adjacent pairs in the cable?

A) EMI B) RFI
C) Crosstalk D) Attenuation
 
Answer & Explanation Answer: C) Crosstalk

Explanation:

The term for the unwanted signal interference from adjacent pairs in the cable is crosstalk

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3928
Q:

When a ping to the loopback address fails , what can you assume?

A) The IP address of the local host is incorrect B) The IP address of the remote host is incorrect
C) The NIC is not functional D) The IP stack has failed to initialize
 
Answer & Explanation Answer: D) The IP stack has failed to initialize

Explanation:

When a ping to the loopback address fails , you can assume the IP stack has failed to initialize.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3916