Certification Questions

Q:

imageview2

You are the administrator of network X. You decided to implement RIP in the following topology (click exhibit). You do not want R3 to receive RIP updates. What configuration changes need to be implemented?

A) Implement a passive-interface on R1 B) Nothing needs to be configured
C) Create a sub-interface on R1 D) Change the routing protocol to OSPF
 
Answer & Explanation Answer: A) Implement a passive-interface on R1

Explanation:

Explanation: To block RIP broadcasts on an interface connected to a subnet of a RIP-enabled network add the passive-interface command to the RIP Process

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

0 2190
Q:

A solution developer needs to configure the HTTP listener of an Integration Server on a Linux Server.

Which operating system privileges does the developer need to modify Integration node
properties and properties of integration node resources?

A) root user B) mqm
C) mqbrks D) mqm and mqbrks
 
Answer & Explanation Answer: A) root user

Explanation:
Report Error

View Answer Report Error Discuss

14 2187
Q:

For most large companies, in terms of ease of network administration, what is the optimum number of Active Directory domains to use on their Windows 2000 network?

A) 1 B) 2
C) 3 D) More than 3
 
Answer & Explanation Answer: A) 1

Explanation:

Using a single domain greatly simplifies the administration of your network

Report Error

View Answer Report Error Discuss

0 2187
Q:

Project Scope Management

What are the Project Management Processes included in the Project Scope Management?

Answer

Scope Planning - Creating a project scope management plan that documents how the project scope will be defined,verified, controlled, and how the work breakdown structure (WBS) will be created and defined.


Scope Definition - Developing a detailed project scope statement as the basis for future project decisions.


Create WBS - Subdividing the major project deliverables and project work into smaller, more manageable components


Scope Verification - Formalizing acceptance of the completed project deliverables.


Scope Control - Controlling changes to the project scope.

Report Error

View answer Workspace Report Error Discuss

0 2186
Q:

Project Life Cycle

What is the Project Life Cycle?

Answer

Project managers or the organization can divide projects into phases to provide better management control with appropriate links to the ongoing operations of the performing organization. Collectively, these phases are known as the project life cycle.

Report Error

View answer Workspace Report Error Discuss

0 2176
Q:

Project Human Resource Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Human Resource Planning?

Answer

I. Inputs



  • Enterprise Environmental factors

  • Organizational process assets

  • Project management plan


                  - Activity resource requirements


II. Tools and Techniques



  • Organization charts and position descriptions 

  • Networking

  • Organizational theory


III. Outputs



  • Roles and responsibilities

  • Project organization charts

  • Staffing management plan

Report Error

View answer Workspace Report Error Discuss

0 2175
Q:

You want to configure a static IP address on a Windows 2000 Server  computer on which you want to install the DNS Server service and Active Directory. What tool should you use to configure the static IP address?

A) IPconfig.exe B) DNS administrative tool
C) Active Directory Users and Computers D) Network and Dial-up connections folder
 
Answer & Explanation Answer: D) Network and Dial-up connections folder

Explanation:

A static IP address is specified by configuring the Local Area Connection in the Network and Dial - up Connections folder.

Report Error

View Answer Report Error Discuss

0 2172
Q:

Which Event Viewer log can you use to view the results of auditing?

A) Application Log B) Security Log
C) System Log D) Directory Service Log
 
Answer & Explanation Answer: B) Security Log

Explanation:

Audited events are written to the Security Log in Event Viewer.

Report Error

View Answer Report Error Discuss

0 2171