Searching for "Which"

Q:

The Information Security Policy should be available to which groups of people?

A) Senior business managers and all IT staff B) Information Security Management staff only
C) All customers, users and IT staff D) Senior business managers, IT executives and the Security Manager
 
Answer & Explanation Answer: C) All customers, users and IT staff

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

Q:

Which of the following is the most appropriate approach to carrying out Service Operations?

A) The internal IT view is most important as Service Operations has to monitor and manage the infrastructure B) Service Operations should maintain a balance between an internal IT view and an external business view
C) IT Operations does not take an internal or external view as they execute processes defined by Service Design D) The external business view is most important as Service Operations is the place where value is realized and the customer obtains the benefit of the services
 
Answer & Explanation Answer: B) Service Operations should maintain a balance between an internal IT view and an external business view

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

Q:

which IOS command enables access to high-level commands?

A) su root B) admin 0
C) enable D) init
 
Answer & Explanation Answer: C) enable

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

The network with ip address 192.168.100.0/27 is to be used on a router. If ip subnet-zero is configured, which statement describe the resulting number of available subnets and hosts?

A) 7 usable subnets, each with 32 host addresses B) 8 usable subnets, each with 30 host addresses
C) 8 usable subnets, each with 27 host addresses D) 7 usable subnets, each with 24 host addresses
 
Answer & Explanation Answer: B) 8 usable subnets, each with 30 host addresses

Explanation:

Because subnet zero is configured and we have a class C address (192.168.100.0) then the network portion will have 3 bits so 8 subnets will be available. The rest of the bits, 5, represent the available hosts, so 2^5=32, but only 30 are available, 0 ad 31 are network and broadcast respectively.

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

Which layer of the OSI model is associated with HDLC, Frame Relay and PPP?

A) The Physical Layer B) The Data Link layer
C) The Transport Layer D) The Network Layer
 
Answer & Explanation Answer: B) The Data Link layer

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

Which layer of the OSI model is associated with LAN switches?

A) The Transport layer. B) The Physical layer.
C) The Network layer. D) The Data Link layer.
 
Answer & Explanation Answer: D) The Data Link layer.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

Which of the following symbols indicate that a ping was successful?

A) ! B) .
C) ? D) U
 
Answer & Explanation Answer: A) !

Explanation:

Explanation: The following table explains the output generated by ping:

! – reply received

. – timed out

U – unreachable

C – congestion

? – unknown packet type

& packet lifetime exceeded

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

Which three IP addresses can be assigned to hosts if the subnet mask is /27 and subnet zero is usable?

A. 10.15.32.17
B. 17.15.66.128
C. 66.55.128.1
D. 135.1.64.34
E. 129.33.192.192
F. 192.168.5.63

Answer

Answer : A C D


 


 


 


Explanation: If you follow the cram table,  /27 is mask 255.255.255.224. 3 bits were borrowed with value of 32. Follow the fourth octets of the addresses:
A is a usable host address.
B is classified as a network address
C is a usable host address form the subnet 0
D is a usable host address
E is a network address
F is a broadcast address

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA