Certification Questions

Q:

Which layer is responsible for converting data packets from the Data Link layer into electrical signals?

Answer

The physical layer takes frames from the Data Link layer and encodes the 1s and 0s into a digital signal for transmission on the network medium.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

7 8501
Q:

chart of depreciation is assigned to company code and necessary data for asset accounting is added to company code. Hence company code is available for use in asset accounting

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP FI

9 8498
Q:

Which layer combines bits into bytes and bytes into frames, uses MAC addressing , and provides error detection?

Answer

The Data Link layer is responsible for the framing of data packets.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

10 8359
Q:

What is an Extension of Entity Type?

Answer

The collections of entities of a particular Entity Type are grouped together into an entity set.

Report Error

View answer Workspace Report Error Discuss

26 8173
Q:

What protocol would you use if you were running xDSL and needed authentication?

Answer

PPPoE  or  PPPoA

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

24 8147
Q:

What is the purpose of Spanning Tree Protocol in a switched LAN?

A) To provide a mechanism for network monitoring is switched environments B) To prevent routing loops in network with redundant paths
C) To prevent switching loops in networks with redundant switched paths D) To manage the VLAN database across multiple switches
 
Answer & Explanation Answer: C) To prevent switching loops in networks with redundant switched paths

Explanation:

The Spanning Tree Protocol (STP) was designed to stop layer 2 loops. All Cisco switches have the STP on by default.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 8143
Q:

The Information Security Policy should be available to which groups of people?

A) Senior business managers and all IT staff B) Information Security Management staff only
C) All customers, users and IT staff D) Senior business managers, IT executives and the Security Manager
 
Answer & Explanation Answer: C) All customers, users and IT staff

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

2 8117
Q:

When analyzing an outcome for creation of value for customers, what attributes of the service should be considered?

A) Objectives, Metric, Desired outcome B) People, Products, Technology
C) Business Objectives, IT objectives, Process metrics D) Desired outcome, Supplier metrics, IT objectives
 
Answer & Explanation Answer: C) Business Objectives, IT objectives, Process metrics

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

0 8077