Certification Questions

Q:

You have the following binary number :10110111. What are the decimal and hexadecimal equivalents?

A) 69/0x2102 B) 183/B7
C) 173/A6 D) 83/0xC5
 
Answer & Explanation Answer: B) 183/B7

Explanation:

You must be able to take a binary number and convert it into both decimal and hexadecimal. To convert to decimal, just add up the 1s using their values. The values that are turned on with the binary number of 10110111 are 128+32+16+4+2+1=183. To get the hexadecimal equivalent, you need to break the eight binary digits into nibbles (4 bits), 1011 and 0111. By adding up these values, you get 11 and 7. In hexadecimal, 11 is B, so the answer is 0xB7.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 7517
Q:

What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information ?

A) Windows Directory B) Active Directory
C) Directory Plus D) None of the above
 
Answer & Explanation Answer: B) Active Directory

Explanation:

Active Directory (AD) is a centralized database that is included with the Windows Server operating system. Active Directory is used to store information about a network, such as user accounts, computers, printers, and security policies.

Report Error

View Answer Report Error Discuss

48 7497
Q:

What is the subnetwork address for a host with the IP address 200.10.5.68/28?

A) 200.10.5.56 B) 200.10.5.32
C) 200.10.5.64 D) 200.10.5.0
 
Answer & Explanation Answer: C) 200.10.5.64

Explanation:

This is a pretty simple question. A/28 is 255.255.255.240, which means that our block size is 16 in the fourth octent. 0,16, 32, 48, 64, 80, etc. The host is in the 64 subnet.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 7461
Q:

A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?

A) Send a different source port number B) Restart the virtual circuit
C) Decrease the sequence number D) Decrease the window size
 
Answer & Explanation Answer: D) Decrease the window size

Explanation:

A receiving host can control the transmitter by using flow control ( TCP uses windowing by default). By decreasing the window size, the receiving host can slow down the transmitting host so the receiving host does  not overflow its buffers.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 7443
Q:

What are the typical three different categories of VPNs?

Answer

The following are the different types of VPNs :


PPTP ( Point to Point Tunnel protocol ) VPN : Most commonly used VPN. PPTP is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.


Site-to-Site VPN : Site-to-site VPN is a type of VPN connection that is created between two separate locations. Site-to-site VPN can be intranet based or extranet based. 


Intranet-based site-to-site VPN is created between an organization's propriety networks, while extranet-based site-to-site VPN is used for connecting with external partner networks or an intranet.


L2TP ( Layer Two Tunneling Protoco) VPN : L2TP is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network over the Internet.


IPsec (Internet Protocol Security) : IPsec is a framework for a set of protocols for security at the network or packet processing layer of network communication.


SSL (Secure Sockets Layer) VPN : SSL  is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. 


MPLS (Multiprotocol Label Switching) VPN : MPLS is a protocol for speeding up and shaping network traffic flows. 


Hybrid VPN : A hybrid VPN combines Multiprotocol Label Switching (MPLS) and Internet protocol security (IPsec)-based VPNs. 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

26 7436
Q:

An administrator issues the command "ping 127.0.0.1" from the command line prompt on a PC host named PC1. If an ICMP reply is received, what does this confirm?

A. The PC host PC1 has connectivity with a local host
B. The PC host PC1 has connectivity with a Layer 3 device
C. The PC host PC1 has a default gateway correctly configured
D. The PC host PC1 has connectivity up to Layer 5 of the OSI model
E. The PC host PC1 has the TCP/IP protocol stack correctly installed

Answer

Answer : E

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

11 7404
Q:

To view the most up to date planning data (available stock, orders, reservations, etc) on a material,use the

A. Stock Requirement list.

B. Stock Overview report

C. List display of material and accounting documents

D. Standard Analysis for a material

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

39 7391
Q:

The network with ip address 192.168.100.0/27 is to be used on a router. If ip subnet-zero is configured, which statement describe the resulting number of available subnets and hosts?

A) 7 usable subnets, each with 32 host addresses B) 8 usable subnets, each with 30 host addresses
C) 8 usable subnets, each with 27 host addresses D) 7 usable subnets, each with 24 host addresses
 
Answer & Explanation Answer: B) 8 usable subnets, each with 30 host addresses

Explanation:

Because subnet zero is configured and we have a class C address (192.168.100.0) then the network portion will have 3 bits so 8 subnets will be available. The rest of the bits, 5, represent the available hosts, so 2^5=32, but only 30 are available, 0 ad 31 are network and broadcast respectively.

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

7 7344