Certification Questions

Q:

Acknowledgments, sequencing , and flow control are characteristics  of which OSI layer?

A) Layer 2 B) Layer 3
C) Layer 4 D) Lawer 7
 
Answer & Explanation Answer: C) Layer 4

Explanation:

A reliable Transport layer connection uses acknowledgments to make sure all data is transmitted and received reliably. A reliable connection is defined by a virtual circuit that uses acknowledgments, sequencing, and flow control, which are characteristics of the transport layer.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 11450
Q:

What are the typical three different categories of VPNs?

Answer

The following are the different types of VPNs :


PPTP ( Point to Point Tunnel protocol ) VPN : Most commonly used VPN. PPTP is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.


Site-to-Site VPN : Site-to-site VPN is a type of VPN connection that is created between two separate locations. Site-to-site VPN can be intranet based or extranet based. 


Intranet-based site-to-site VPN is created between an organization's propriety networks, while extranet-based site-to-site VPN is used for connecting with external partner networks or an intranet.


L2TP ( Layer Two Tunneling Protoco) VPN : L2TP is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network over the Internet.


IPsec (Internet Protocol Security) : IPsec is a framework for a set of protocols for security at the network or packet processing layer of network communication.


SSL (Secure Sockets Layer) VPN : SSL  is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. 


MPLS (Multiprotocol Label Switching) VPN : MPLS is a protocol for speeding up and shaping network traffic flows. 


Hybrid VPN : A hybrid VPN combines Multiprotocol Label Switching (MPLS) and Internet protocol security (IPsec)-based VPNs. 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

26 11302
Q:

Which of the following DB2 data types CANNOT be used to contain the date an employee was hired?

A) CLOB B) TIME
C) VARCHAR D) TIMESTAMP
 
Answer & Explanation Answer: B) TIME

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

34 11118
Q:

 The main objective of Availability Management is?

A) To monitor and report availability of services and components B) To guarantee availability levels for services and components
C) To ensure that all targets in Service Level Agreements (SLAs) are met D) To ensure that service availability matches or exceeds the agreed needs of the business
 
Answer & Explanation Answer: D) To ensure that service availability matches or exceeds the agreed needs of the business

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

2 11010
Q:

The spell check module of a word-processing software package contains a number of errors. The Development department has corrected these errors in a new version. Which process is responsible for ensuring this updated version is tested?

A) Configuration Management B) Incident Management
C) Problem Management D) Release Management
 
Answer & Explanation Answer: D) Release Management

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

0 10714
Q:

Mention different memories used in a CISCO router ?

Answer

Different Memories used in a CISCO router are as follows :


NVRAM stores the startup configuration file.

DRAM stores the configuration file that is being executed.

Flash Memory – stores the Cisco IOS.

 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA
Job Role: Network Engineer

26 10710
Q:

The DBA can set the registry variable DB2_HASH_JOIN on or off because:

A) hash joins may require more resources to run. B) hash joins are not used unless outer joins are requested.
C) If hash joins are enabled, no other join method can be used. D) Hash joins are only needed when the tables are portioned using hash keys.
 
Answer & Explanation Answer: A) hash joins may require more resources to run.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

28 10587
Q:

With database logging, where are transaction records first placed?

A) in the logical log buffer B) in the primary chunk
C) in the physical buffer D) in a temporary database table
 
Answer & Explanation Answer: A) in the logical log buffer

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

31 10582