Certification Questions

Q:

You want to search for a specific shared folder object in Active Directory. Which tool should you use?

A) Search B) Windows Explorer
C) Active Directory Sites and Services D) Active Directory Users and Computers
 
Answer & Explanation Answer: D) Active Directory Users and Computers

Explanation:

To search for a specific shared folder in Active Directory, use Active Directory Users and computers. You can use Windows Explorer to browse Active Directory, but you can't use it to search for a specific  shared folder.

Report Error

View Answer Report Error Discuss

0 2374
Q:

Differentiate a MAC address and an IP address and describe how and when each address type is used in a network?

Answer

A MAC address is a hexadecimal number identifying the physical connection of a host. MAC addresses are said to operate on layer 2 of the OSI model. IP addresses, which can be expressed in binary or decimal format, are logical identifiers that are said to be on layer 3 of the OSI model. Hosts on the same physical segment locate one another with MAC addresses, while IP addresses are used when they reside on different LAN segments or subnets. Even when the hosts are in different subnets , a destination IP address will be converted to a MAC address when the packet reaches the destination network via routing.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

1 2374
Q:

Project Stakeholders

What do you meant by project stakeholders?

Answer

Project Stakeholders are individuals and organizations that are actively involved in the project, or whose interests may be affected as a result of project execution or project completion.


Stakeholders may have a positive or negative.


Positive stakeholders are those who would normally benefit from a successful outcome from the project, while negative stakeholders are those who see negative outcomes from the project's success.

Report Error

View answer Workspace Report Error Discuss

0 2374
Q:

Project Procurement Management - Processes

Describe the Inputs, Tools and Techniques , Outputs included in the Request Seller Responses?

Answer

I. Inputs



  • Organizational process assets

  • Procurement management plan

  • Procurement documents


II. Tools and Techniques



  • Bidder conferences

  • Advertising

  • Develop qualified sellers list


III. Outputs



  • Qualified sellers list

  • Procurement document package

  • Proposals

Report Error

View answer Workspace Report Error Discuss

0 2369
Q:

Which authentication method provides the highest level of security?

A) Microsoft encrypted authentication version 2 (MS-CHAP v2) B) Microsoft encrypted authentication (MS-CHAP)
C) Encrypted authentication (CHAP) D) Shiva password Authentication Protocol (SPAP)
 
Answer & Explanation Answer: A) Microsoft encrypted authentication version 2 (MS-CHAP v2)

Explanation:

Microsoft encrypted auhentication version 2 (MS-CHAP v2) is the most secure authentication method.

Report Error

View Answer Report Error Discuss

0 2368
Q:

When is redistribution required for EIGRP?

Answer

Redistribution is required when more than one EIGRP session or process is running and they are identified with different ASNs. Redistribution shares topology information between EIGRP sessions.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2368
Q:

What is the purpose of the AS_PATH attribute?

Answer

If a router has more than one route to the same IP prefix, the best path is the one with the shortest AS_PATH (assuming other BGP attributes are equal).

Report Error

View answer Workspace Report Error Discuss

Subject: CCNP

0 2359
Q:

What is the command to copy a Cisco IOS to a TFTP server?

Answer

copy flash tftp

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2355