Certification Questions

Q:

Which command displays RIP routing updates?

A) Show ip route B) debug ip rip
C) show protocols D) Debug ip route
 
Answer & Explanation Answer: B) debug ip rip

Explanation:

Debug ip rip is used to show the internet Protocol (IP) Routng Information protocol (RIP) updates being sent and received on the router.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3749
Q:

Subject to which prerequisites can a source of supply be assigned as early as during the MRP run?

A. The 'MRP-relevant' indicator must have been set in a contract item.

B. The source determination facility must be activated at the start of the MRP run.

C. A quota arrangement must exist and the quota arrangement usage indicator must allow use of the quota arrangement in materials planning.

D. An info record must exist for the relevant material and the vendor must have been flagged in the source list as the single/sole source of supply for the purposes of materials planning.

Answer

Answer : C , D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

7 3746
Q:

You are the administrator of a Microsoft Windows NT Server 4.0 computer. The server is the PDC in your domain and also runs SQL Server 2000. The server has four processors and 1 GB of RAM.Your network consists of 500 client computers that are running Microsoft Windows Millennium Edition. Users report that when they log on in the morning their computers respond slowly and occasionally return error messages.You use System Monitor to monitor processor performance and RAM utilization. You discover that the % Total Time and % User Time counters average 90 percent and the % Privileged Time counter averages 20 percent. The Available Mbytes counter averages 800 MB. You need to improve server performance for user logons. What should you do?

A) Increase the physical RAM on the computer to 2 GB. B) Increase the virtual RAM on the computer to 4 GB.
C) Configure SQL Server to use only processors 0, 1, and 2. D) Configure SQL Server to use only processors 1, 2, and 3.
 
Answer & Explanation Answer: D) Configure SQL Server to use only processors 1, 2, and 3.

Explanation:

The system monitor clearly indicates that the processors are overloaded. We need to decide which processors we should use for SQL Server. Processor 0 is the default CPU for the I/O subsystem. Network Interface Cards (NIC) are assigned to the remaining CPUs, starting from the highest-numbered CPU. The NIC would get processor 3.
SQL Server would be using all four processors by default.

The Windows NT/2000/XP operating system use processor 0. In order to avoid the logon
problems we should not let SQL Server to use this processor. Instead SQL Server should be configured to use processor 1, 2, and 3.

Note 1: The Affinity mask is used to exclude a processor on a multiprocessor computer from processing SQL Server 2000 threads. Default is equal distribution of SQL Server 2000 processes across all processors.

Note 2: Monitoring the Processor and System object counters provides information about the CPU utilization and helps in determining whether or not a bottleneck exists. The %Total Processor Time is used on multiple CPU Severs to gauge the average activity of the processors and shows the percentage of elapsed time that a processor is busy executing a nonidle thread. Values around 100 percent on a Server computer that processes many client requests indicate that processes are queuing up, waiting for processor time, and causing a bottleneck. Such a sustained high level of processor usage is unacceptable for a server.

Report Error

View Answer Report Error Discuss

0 3744
Q:

Suppose an installed z/OS customer also has Power6 Servers. They are investigating consolidation of both types of servers to z/OS.Which of the following will establish the capacity for a new z/OS server?

A) AD Tools B) CP3000
C) Estimate the AIX load and add to CP3000 results. D) Run AIX in a z/OS LPAR to establish the loadWArialTimes New RomanZ
 
Answer & Explanation Answer: C) Estimate the AIX load and add to CP3000 results.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

10 3740
Q:

Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain.


From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain.


You need to ensure that you can recover all EFS encrypted files from Computer2. What should you do?

A) On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker. B) On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
C) On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter. D) On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter.
 
Answer & Explanation Answer: B) On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.

Explanation:
Report Error

View Answer Report Error Discuss

6 3736
Q:

At which level can the valuation area be determined?

A. Plant

B. Storage Location

C. Client

D. Company Code

Answer

Answer : A ,D


Explanation: The valuation level (= valuation area) can be either the company code or the plant.

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

1 3732
Q:

If you do not want to enter a document with provision for updating the ledger on approval from authorized officials, you use the following functionality

A. sample document

B. recurring document

C. parked document

D. account assignment model

Answer

Answer: D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

14 3721
Q:

What does a link-local address always start with?

Answer

FE80::/10

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 3720