Certification Questions

Q:

Which encryption type does WPA2 use?

A) AES - CCMP B) PPK via IV
C) PSK D) TKIP/MIC
 
Answer & Explanation Answer: A) AES - CCMP

Explanation:

WPA2 uses AES-CCMP for encryption. WPA uses TKIP

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4822
Q:

A quality audit is

A) a structured, independent review to determine whether project activities comply with organizational and project policies, processes, and procedures. B) the process of regularly evaluating overall project performance to provide confidence that the project will satisfy relevant quality standards.
C) an approach where the team members meet regularly to improve the process of quality control on their project. D) the process of determining the appropriate actions to increase the effectiveness and efficiency of the project to provide added benefits to project stakeholders.
 
Answer & Explanation Answer: A) a structured, independent review to determine whether project activities comply with organizational and project policies, processes, and procedures.

Explanation:

“A quality audit is a structured, independent review to determine whether project activities comply with organizational and project policies, processes, and procedures.”

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 4820
Q:

In free goods determination which of the following does the system use?

A. Sales document type

B. Sales area

C. Item category

D. Sold-to party

Answer

Answer : A , B , D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP SD

5 4818
Q:

You have a portable computer named Computer1 that runs Windows 7.
You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1.


You need to configure Computer1 to meet the following requirements:
Ensure that cached files from Share1 are encrypted.
Ensure that files located in Share1 are available when Server1 is disconnected from the network.


What should you do?

A) On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline. B) On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline.
C) On Computer1, make Share1 available offline and enable encryption of offline files. D) On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive Encryption.
 
Answer & Explanation Answer: C) On Computer1, make Share1 available offline and enable encryption of offline files.

Explanation:
Report Error

View Answer Report Error Discuss

10 4808
Q:

If you do not want to dun a vendor beyond a particular level

A. use dunning block on the vendor master

B. use dunning block on the dunning procedure

C. use dunning clerk to block dunning

D. use dunning key to limit the maximum level

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

0 4785
Q:

The price that you charge for your project is

A) equal to the cost estimate plus a fixed percentage. B) essentially the same as the cost estimate.
C) typically 1.5 - 2.5 times the cost estimate in order to account for corporate overhead costs D) a business decision that considers the cost estimate together with other factors.
 
Answer & Explanation Answer: D) a business decision that considers the cost estimate together with other factors.

Explanation:

Overhead costs should be figured into the cost estimate. Desired profit considered together with other factors such as market demand, availability of resources, prior experience are then used to determine the optimal price.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 4785
Q:

With which network type will OSPF establish router adjacencies but not perform the DR/BDR election process?

A) Point-to-Point B) Backbone area 0
C) Broadcast multi-access D) Non-broadcast multi-access
 
Answer & Explanation Answer: A) Point-to-Point

Explanation:

No DR is assigned on any type of point-to-point link. No DR/BDR is assigned on the NBMA point-to-multipoint due to the hub/spoke  topology. DR and BDR are elected on broadcast and non-broadcast multi-access network. Frame relay is a non-broadcast multiaccess (NBMA) network by default.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4782
Q:

Which two descriptions are correct about characteristics of IPv6 unicast addressing? (Choose two)

A. Global addresses start with 2000::/3.
B. Link-local addresses start with FF00::/10.
C. Link-local addresses start with FE00:/12.
D. There is only one loopback address and it is ::1.

Answer

Answer : A , D


Explanation:


An IPv6 Unicast address identifies a single network interface. The Internet Protocol delivers packets sent to a unicast address to that specific interface.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

3 4776