Certification Questions

Q:

You recently been promoted to Network Administrator for DLM Shipping. When you took over this position the first thing you notice is this Windows 2000 environment using DNS naming convention, root domain is DIM.COM, with numerous child domains. User accounts are stored in the child domains. However your supervisor informs you that root domain is misspelled and should be DLM.COM. He explains this is causing tremendous problems with the users and customers. He wants you to rename the domain. What will happen if you rename this root domain server?

A) When you rename the root domain server you will only have to rebuild the user accounts since the root domain holds the authentication (SAM) database. B) When you rename the root domain server you will simply rename the child domain also.
C) When you rename the root domain server you will lose the entire network orphaning the child domains. D) When you rename the root domain server you will not need to do anything else since domain names are inherited the child domains will acquire the new domain name.
 
Answer & Explanation Answer: C) When you rename the root domain server you will lose the entire network orphaning the child domains.

Explanation:
Report Error

View Answer Report Error Discuss

12 6637
Q:

The following are lot sizing rules available for SAP R/3?

A. Replenish to maximum stock level
B. Weekly lot size
C. Daily lot size
D. Fixed lot size

Answer

Answer : A ,B ,C

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

9 6635
Q:

AUC have depreciation key, which denotes that depreciation will not be calculated

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP FI

4 6566
Q:

By default , what type of trust are all Windows 2000 trust relationships within a domain tree or forest?

A) Explicit trust B) One-way trust
C) Transitive trust D) Non-transitive trust
 
Answer & Explanation Answer: C) Transitive trust

Explanation:

By default, all Windows 2000 trusts within a domain tree or forest are transitive trusts.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

6 6502
Q:

What is the most common attack on a network today?

A) Lock picking B) Naggle
C) DoS D) auto secure
 
Answer & Explanation Answer: C) DoS

Explanation:

The most common attack on a network today is a denial of service (DoS) because they are the easiest attack to achieve.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 6472
Q:

Which dml command is used in conjunction with @@identity?

A) INSERT and UPDATE B) UPDATE and DELETE
C) SCOPE_IDENTITY and IDENT_CURRENT D) Commit and rollback
 
Answer & Explanation Answer: C) SCOPE_IDENTITY and IDENT_CURRENT

Explanation:

Using automatically incrementing IDENTITY columns is very popular with database developers. You don’t need to explicitly calculate unique surrogate keys when inserting new data, the IDENTITY column functionality does that for you. The IDENTITY feature also allows you to specify useful Seed and Increment properties. When you use an INSERT statement to insert data into a table with an IDENTITY column defined, SQL Server will generate a new IDENTITY value.

 

You can use the @@IDENTITY variable and the SCOPE_IDENTITY and IDENT_CURRENT functions to return the last IDENTITY value that has been generated by SQL Server. This is very useful when you need to return the key for the row that has just been inserted, back to the caller.

Report Error

View Answer Report Error Discuss

9 6408
Q:

When a ping to the local host IP address fails, what can you assume?

A) The IP address of the local host is incorrect B) The IP address of the remote host is incorrect
C) The NIC is not functional D) The IP stack has failed to initialize
 
Answer & Explanation Answer: C) The NIC is not functional

Explanation:

When a ping to the local host IP address fails, you can assume the NIC is not functional.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 6349
Q:

What multicast addresses does RIPng use?

A) FF02::A B) FF02::9
C) FF02::5 D) FF02::6
 
Answer & Explanation Answer: B) FF02::9

Explanation:

RIPng uses the multicast IPv6 address of FF02::9. If you remember the multicast addresses for IPv4, the numbers at the end of each IPv6 address are the same.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 6243