Certification Questions

Q:

You recently been promoted to Network Administrator for DLM Shipping. When you took over this position the first thing you notice is this Windows 2000 environment using DNS naming convention, root domain is DIM.COM, with numerous child domains. User accounts are stored in the child domains. However your supervisor informs you that root domain is misspelled and should be DLM.COM. He explains this is causing tremendous problems with the users and customers. He wants you to rename the domain. What will happen if you rename this root domain server?

A) When you rename the root domain server you will only have to rebuild the user accounts since the root domain holds the authentication (SAM) database. B) When you rename the root domain server you will simply rename the child domain also.
C) When you rename the root domain server you will lose the entire network orphaning the child domains. D) When you rename the root domain server you will not need to do anything else since domain names are inherited the child domains will acquire the new domain name.
 
Answer & Explanation Answer: C) When you rename the root domain server you will lose the entire network orphaning the child domains.

Explanation:
Report Error

View Answer Report Error Discuss

28 7044
Q:

When data is encapsulated , which is the correct order?

A) Data, frame, packet, segment, bit B) Segment, data, packet, frame, bit
C) Data, segment, packet, frame, bit D) Data, segment, frame, packet, bit
 
Answer & Explanation Answer: C) Data, segment, packet, frame, bit

Explanation:

The encapsulation method is data, segment, packet, frame, bit.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 7013
Q:

To use VLSM, what capability must the routing protocols in use possess?

A) Support for multicast B) Multi-protocol support
C) Transmission of subnet mask information D) Support for unequal load balancing
 
Answer & Explanation Answer: C) Transmission of subnet mask information

Explanation:

To use VLSM, the routing protocols in use possess the capability to transmit subnet mask information.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 7004
Q:

AUC have depreciation key, which denotes that depreciation will not be calculated

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP FI

4 6908
Q:

Mention different memories used in a CISCO router ?

Answer

Different Memories used in a CISCO router are as follows :


NVRAM stores the startup configuration file.

DRAM stores the configuration file that is being executed.

Flash Memory – stores the Cisco IOS.

 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA
Job Role: Network Engineer

26 6899
Q:

Your company wants to reconfigure a Catalyst 2950. Which actions must be taken to erase the old configuration?(Choose three)

A. Erase flash
B. Restart the switch
C. Delete the VLAN database
D. Erase the startup configuration

Answer

Answer: B  C  D

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

4 6874
Q:

Which layer defines how data is formatted , presented, encoded, and converted for use on the network?

Answer

The presentation layer makes sure that data is in a readable format for the Application layer.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

12 6770
Q:

With database logging, where are transaction records first placed?

A) in the logical log buffer B) in the primary chunk
C) in the physical buffer D) in a temporary database table
 
Answer & Explanation Answer: A) in the logical log buffer

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

31 6727