Certification Questions

Q:

Which command will configure a switch port to use the IEEE standard method of inserting VLAN membership information into Ethernet frames?

A) Switch (config) #switchport trunk encapsulation ietf B) Switch (config) #switchport trunk encapsulation dot1q
C) Switch (config-if) #switchport trunk encapsulation ietf D) Switch (config-if) #switchport trunk encapsulation dot1q
 
Answer & Explanation Answer: D) Switch (config-if) #switchport trunk encapsulation dot1q

Explanation:

If you are on a 2950 switch, then the interface command is just swichport mode trunk since the 2050 can only run the  IEEE 802.1q version. However, a 3550 can run both ISL and 802.1q, so you must also use the encapsulation command. The argument to choose 802.1q for a trunking protocol is dot1q.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 3333
Q:

What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?

A) Forwards the switch to the first available link B) Drops the frame
C) Floods the network with the frame looking for the device D) Sends back a message to the originating station asking for a name resolution
 
Answer & Explanation Answer: C) Floods the network with the frame looking for the device

Explanation:

Switches flood all frames that have an unknown destination address. If a device answers the frame, the switch will update the MAC address table to reflect the location of the device. 

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3332
Q:

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an
application. The application connects to a Microsoft SQL Server database. The application has two DataTable objects that reference the Customers and Orders tables in the database. The application contains the following code segment. (Line numbers are included for reference only.)


01DataSet customerOrders = new DataSet();
02customerOrders.EnforceConstraints = true;
03ForeignKeyConstraint ordersFK = new ForeignKeyConstraint("ordersFK",
04customerOrders.Tables["Customers"].Columns["CustomerID"],
05customerOrders.Tables["Orders"].Columns["CustomerID"]);
06
07customerOrders.Tables["Orders"].Constraints.Add(ordersFK);


You need to ensure that an exception is thrown when you attempt to delete Customer records that have related Order records. Which code segment should you insert at line 06?

A) ordersFK.DeleteRule = Rule.SetNull; B) ordersFK.DeleteRule = Rule.None;
C) ordersFK.DeleteRule = Rule.SetDefault; D) ordersFK.DeleteRule = Rule.Cascade;
 
Answer & Explanation Answer: B) ordersFK.DeleteRule = Rule.None;

Explanation:
Report Error

View Answer Report Error Discuss

17 3330
Q:

Verify Scope is the process of

A) progressively elaborating and documenting the project work that produces the product of the project. B) subdividing the major product deliverables into smaller, more manageable components.
C) obtaining formal acceptance of the project scope by the stakeholders. D) influencing the factors that create scope changes to ensure that changes are agreed upon, determining that a scope change has occurred and managing the changes when and if they occur.
 
Answer & Explanation Answer: C) obtaining formal acceptance of the project scope by the stakeholders.

Explanation:

“Verify Scope is the process of formalizing acceptance of the completed project deliverables. Verifying scope includes reviewing deliverables with the customer or sponsor to ensure that they are completed satisfactorily and obtaining formal acceptance of deliverables by the customer or sponsor.” PMBOK [5.4]

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3301
Q:

A sales area is composed of...

A. Division

B. Sales organization

C. Distribution channel

D. Plant

Answer

Answer : A , B , C

Report Error

View answer Workspace Report Error Discuss

Subject: SAP SD

0 3297
Q:

You create a System Policy file on a Windows 2000 Server computer to manage Windows NT 4.0 client computers  (and their users) on your Windows 2000 network. What filename should you assign to this System Policy file?

A) Config.pol B) Ntconfig.pol
C) Nt4config.pol D) Winntconfig.pol
 
Answer & Explanation Answer: B) Ntconfig.pol

Explanation:

A Windows NT 4.0 System Policy file should be named NTconfig.pol

Report Error

View Answer Report Error Discuss

0 3281
Q:

Project Integration Management

What are the Project Management Processes included in the Project Integration Management?

Answer

The Integrative Project Management Processes include:


Develop Project Charter - Developing the project charter that formally authorizes a project or a project Phase.


Develope Preliminary Project Scope Statement - Developing the preliminary project scope statement that provides a high level scope narrative


Develop Project Management Plan -  Documenting the actions necessary to define, prepare, integrate, and coordinate all subsidiary plans into a project management plan.


Direct and Manage Project Execution- Executing the work defined in the project management plan to achieve the project's requirements defined in the project scope statement.


Monitor and Control Project Work - Monitoring and controlling the processes used to initiate, plan, execute, and close a project to meet the performance objectives defined in the project management plan.


Integrated Change Control - Reviewing all change requests, approving changes, and controlling changes to the deliverables and organizational process assets.


Close Project - Finalizing all activities across all of the Project Management Process Groups to formally close the project or a Project phase.

Report Error

View answer Workspace Report Error Discuss

0 3279
Q:

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an application. The application uses the ADO.NET Entity Framework to model entities. The application allows users to make changes to entities while disconnected from the central data store.

 

You need to ensure that when the user connects to the central data store and retrieves new data, the application meets the following requirements:

  • Changes made to the local data store in disconnected mode are preserved.
  • Entities that have already been loaded into the local data store, but have not been modified by the user, are updated with the latest data.

What should you do?

A) Call the query's Execute method by using the MergeOptions.AppendOnly option. B) Call the query's Execute method by using the MergeOptions.OverwriteChanges option.
C) Call the Refresh method of ObjectContext by using the RefreshMode.StoreWins option. D) Call the Refresh method of ObjectContext by using the RefreshMode.ClientWins method.
 
Answer & Explanation Answer: D) Call the Refresh method of ObjectContext by using the RefreshMode.ClientWins method.

Explanation:
Report Error

View Answer Report Error Discuss

17 3278