Certification Questions

Q:

You want to use System Monitor to see how much of the paging file on your Windows 2000 computer is being utilized. Which counter should you use?

A) Paging File-% Usage B) Paging File-% Usage Peak
C) Memory-Pages/sec D) Memory-Pool Paged Bytes
 
Answer & Explanation Answer: A) Paging File-% Usage

Explanation:

The Paging File-% Usage counter is used to measure the percentage of paging file utilization.

Report Error

View Answer Report Error Discuss

0 3027
Q:

Project Risk Management

What are the Project Management Processes included in the Project Risk Management? 

Answer

The Project Risk Management Processes include the following:


Risk Management Planning - Deciding how to approach , plan, and execute the risk management activities for a project


Risk Identification - Determining which risks might affect the project and documenting their characteristics.


Qualitative Risk Analysis - Prioritizing risks for subsequent further analysis or action by assessing and combining their probability of occurrence and impact


Quantitative Risk Analysis - Numerically analyzing the effect on overall project objectives of identified risks


Risk Response Planning - Developing options and actions to enhance opportunities , and to reduce threats to project objectives.


Risk Monitoring and Control - Tracking identified risks, monitoring residual risks, identifying new risks, executing risk response plans, and evaluating their effectiveness throughout the project life cycle.

Report Error

View answer Workspace Report Error Discuss

0 3018
Q:

If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?

A) Discard it and send an error message back to the originating host B) Flood the network with the frame
C) Add the source addres and port to the MAC address table and forward the frame out the destination port D) Add the destination to the MAC address table and then forward the frame
 
Answer & Explanation Answer: C) Add the source addres and port to the MAC address table and forward the frame out the destination port

Explanation:

Since the source MAC address is not in the MAC address table, the switch will add the source address and the port it is connected to into the MAC address table and then forward the frame to the outgoing port.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3006
Q:

You want to enable dynamic routing on a Windows 2000 Server computer on your TCP/IP network . You want this computer to manage the propagation of multicast traffic throught your network. Which routing protocol should you use?

A) IGMP Version2, Router and Proxy B) Open Shortest Path First (OSPF)
C) RIP Version 2 for Internet Protocol D) Network Address Translation(NAT)
 
Answer & Explanation Answer: A) IGMP Version2, Router and Proxy

Explanation:

IGMP is the only routing protocol that manages multicast traffic.

Report Error

View Answer Report Error Discuss

0 3005
Q:

The personnel control record performs the following functions in payroll:[Choose one or more correct answers]

A. Defines the payroll past for retroactive accounting recognition.

B. Defines the earliest possible retroactive accounting date for each payroll area.

C. Locks master data and time data so no changes can be made during the payroll process.

D. Defines the latest possible retroactive accounting date for each payroll area.

E. Locks vendor data so no changes can be made during the payroll process.

Answer

Answer : A , B , C , D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP HR

0 2995
Q:

Which authentication method supports smart cards?

A) Encrypted authentication (CHAP) B) Extensible authentication protocol (EAP)
C) Shiva Password Authentication Protocol (SPAP) D) Microsoft encrypted authentication version 2(MS-CHAP v2)
 
Answer & Explanation Answer: B) Extensible authentication protocol (EAP)

Explanation:

Only the Extensible authentication protocol (EAP) has the ability to support smart cards.

Report Error

View Answer Report Error Discuss

0 2993
Q:

Project Procurement Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Contract Closure?

Answer

I. Inputs



  • Procurement management plan

  • Contract management plan

  • Contract documentation

  • Contract closure procedure


II. Tools and Techniques



  • Procurement audits

  • Records management system


III. Outputs



  • Closed contracts

  • Organizational process assets (updates)

Report Error

View answer Workspace Report Error Discuss

0 2990
Q:

We want to assign port 3 of our Catalyst 2950 switch to VLAN 3. What command will achieve this?

A) switch(config-if)#switchport vlan 3 B) switch#switchport access vlan 3
C) switch(config)#switchport access vlan 3 D) switch(config-if)#switchport access vlan 3
 
Answer & Explanation Answer: D) switch(config-if)#switchport access vlan 3

Explanation:

Explanation: The switchport access vlan [number] command will configure a switch port to that VLAN. You can also use the switchport access vlan dynamic command to configure the switch port automatically in a certain VLAN depending on the VLAN membership of the incoming packets. For both commands to work properly the switch port needs to be in access mode

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

1 2988