Certification Questions

Q:

Which of the following is an example of a standard IP access list?

A) access - list 110 permit host 1.1.1.1 B) access - list 1 deny 172 . 16 . 10 . 1 0 . 0 . 0 . 0
C) access - list 1 permit 172 . 16 . 10 . 1 255 . 255 . 0 . 0 D) access - list standard 1 . 1 . 1 . 1
 
Answer & Explanation Answer: B) access - list 1 deny 172 . 16 . 10 . 1 0 . 0 . 0 . 0

Explanation:

Standard IP access lists use the numbers 1 - 99 and 1300 - 1999 and filter based on source IP address only. Option C is incorrect because the mask must be in wildcard format.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2934
Q:

You want to enable dynamic routing on a Windows 2000 Server computer on your TCP/IP network . You want this computer to manage the propagation of multicast traffic throught your network. Which routing protocol should you use?

A) IGMP Version2, Router and Proxy B) Open Shortest Path First (OSPF)
C) RIP Version 2 for Internet Protocol D) Network Address Translation(NAT)
 
Answer & Explanation Answer: A) IGMP Version2, Router and Proxy

Explanation:

IGMP is the only routing protocol that manages multicast traffic.

Report Error

View Answer Report Error Discuss

0 2927
Q:

In R-DBMS, the data is organized in the form of _____.

A) Hierarchical structure B) Tabular structure
C) Linked structure D) All of the above
 
Answer & Explanation Answer: B) Tabular structure

Explanation:

Data is organized in the form of row and columns, thus it is in tabular structure.

Report Error

View Answer Report Error Discuss

Filed Under: Oracle Certification

5 2920
Q:

Differnt types of Depreciation areas.

A.Book depreciation - 01
B.Income tax depreciation -20
C.Revaluation -10
D.Derived Depriciation - 50

Answer

Answer : A , B , C ,D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

0 2915
Q:

Which authentication method supports smart cards?

A) Encrypted authentication (CHAP) B) Extensible authentication protocol (EAP)
C) Shiva Password Authentication Protocol (SPAP) D) Microsoft encrypted authentication version 2(MS-CHAP v2)
 
Answer & Explanation Answer: B) Extensible authentication protocol (EAP)

Explanation:

Only the Extensible authentication protocol (EAP) has the ability to support smart cards.

Report Error

View Answer Report Error Discuss

0 2910
Q:

We want to assign port 3 of our Catalyst 2950 switch to VLAN 3. What command will achieve this?

A) switch(config-if)#switchport vlan 3 B) switch#switchport access vlan 3
C) switch(config)#switchport access vlan 3 D) switch(config-if)#switchport access vlan 3
 
Answer & Explanation Answer: D) switch(config-if)#switchport access vlan 3

Explanation:

Explanation: The switchport access vlan [number] command will configure a switch port to that VLAN. You can also use the switchport access vlan dynamic command to configure the switch port automatically in a certain VLAN depending on the VLAN membership of the incoming packets. For both commands to work properly the switch port needs to be in access mode

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

1 2905
Q:

Which message appears when you select Use query drill while Scope of Analysis is set in a BusinessObjects Web Intelligence XI 3.0 report?

A. The Scope of Analysis is empty

B. The query drill mode option is enabled

C. The query drill mode option is not enabled

D. The Scope of Analysis is not empty

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

7 2900
Q:

Which command is used to return maximum value from result set?

A) MAX B) MIN
C) MAXIMUM D) MAXI
 
Answer & Explanation Answer: A) MAX

Explanation:

MAX command is used to return maximum value from result setMAX 

Report Error

View Answer Report Error Discuss

1 2899