Certification Questions

Q:

What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?

A) Forwards the switch to the first available link B) Drops the frame
C) Floods the network with the frame looking for the device D) Sends back a message to the originating station asking for a name resolution
 
Answer & Explanation Answer: C) Floods the network with the frame looking for the device

Explanation:

Switches flood all frames that have an unknown destination address. If a device answers the frame, the switch will update the MAC address table to reflect the location of the device. 

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3398
Q:

Which command will configure a switch port to use the IEEE standard method of inserting VLAN membership information into Ethernet frames?

A) Switch (config) #switchport trunk encapsulation ietf B) Switch (config) #switchport trunk encapsulation dot1q
C) Switch (config-if) #switchport trunk encapsulation ietf D) Switch (config-if) #switchport trunk encapsulation dot1q
 
Answer & Explanation Answer: D) Switch (config-if) #switchport trunk encapsulation dot1q

Explanation:

If you are on a 2950 switch, then the interface command is just swichport mode trunk since the 2050 can only run the  IEEE 802.1q version. However, a 3550 can run both ISL and 802.1q, so you must also use the encapsulation command. The argument to choose 802.1q for a trunking protocol is dot1q.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 3385
Q:

What is frame tagging?

Answer

Frame identification (frame tagging) uniquely assigns a user-defined ID to each frame. This is sometimes reffered to as a VLAN ID or color.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 3377
Q:

Verify Scope is the process of

A) progressively elaborating and documenting the project work that produces the product of the project. B) subdividing the major product deliverables into smaller, more manageable components.
C) obtaining formal acceptance of the project scope by the stakeholders. D) influencing the factors that create scope changes to ensure that changes are agreed upon, determining that a scope change has occurred and managing the changes when and if they occur.
 
Answer & Explanation Answer: C) obtaining formal acceptance of the project scope by the stakeholders.

Explanation:

“Verify Scope is the process of formalizing acceptance of the completed project deliverables. Verifying scope includes reviewing deliverables with the customer or sponsor to ensure that they are completed satisfactorily and obtaining formal acceptance of deliverables by the customer or sponsor.” PMBOK [5.4]

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3358
Q:

Two workers have established wireless communication directly between their wireless laptops. What type of wireless topology has been created by these employees?

A) BSS B) SSID
C) IBSS D) ESS
 
Answer & Explanation Answer: C) IBSS

Explanation:

Two wireless hosts directly connected wirelessly is no different then two hosts connecting with a crossover cable. They are both ad-hoc networks, but in wireless, we call this an independent Basic Service Set(IBSS).

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3357
Q:

A sales area is composed of...

A. Division

B. Sales organization

C. Distribution channel

D. Plant

Answer

Answer : A , B , C

Report Error

View answer Workspace Report Error Discuss

Subject: SAP SD

0 3357
Q:

You are considering upgrading a Windows NT Workstation 4.0 computer on your network to Windows 2000 Professional. The computer has 12 applications installed in addition to the operating system. All the applications are compatible with Windows 2000. The end user would benefit from the additional features Windows 2000 provides. What action should you take? 

A) Upgrade the Windows NT Workstation 4.0 computer to Windows 2000 Server B) Upgrade the Windows NT Workstation 4.0 computer to Windows 2000 Professional
C) Perform a clean install of Windows 2000 Professional on the Windows NT Workstation 4.0 computer D) Don't upgrade the Windows NT Workstation 4.0 computer, but install the Directory Service Client on it instead
 
Answer & Explanation Answer: B) Upgrade the Windows NT Workstation 4.0 computer to Windows 2000 Professional

Explanation:

Upgrading the computer to Windows 2000 Professional is probably the best choice given that the current operating system is Windows NT Workstation 4.0 (which upgrades easily to Windows 2000 Professional) and the fact that the computer has 12 additional applications installed on it that would need to be reinstalled and reconfigured if a clean install was performed.

Report Error

View Answer Report Error Discuss

1 3342
Q:

You have a computer named Computer1 that runs Windows 7. You need to ensure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network. What should you do?

A) From Windows Firewall with Advanced Security, create a new rule. B) From the local Group Policy, modify the application control policies.
C) From Windows Firewall, modify the Allowed Programs and Features list. D) From Network and Sharing Center, modify the Advanced Sharing settings.
 
Answer & Explanation Answer: A) From Windows Firewall with Advanced Security, create a new rule.

Explanation:
Report Error

View Answer Report Error Discuss

0 3337