Certification Questions

Q:

To enable RIPng , which of the following would you use?

A) Router1 (config - if) # ipv6 ospf 10 area 0.0.0.0 B) Router1 (config - if) # ipv6 router rip 1
C) Router1 (config - if) # ipv6 router eigrp 10 D) Router1 (config - if) # ospf ipv6 10 area 0
 
Answer & Explanation Answer: B) Router1 (config - if) # ipv6 router rip 1

Explanation:

It's pretty simple to enable RIPng for IPv6. You configure it right on the interface where you want RIP to run with the ipv6 router rip number command.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4542
Q:

A column defined as UNIQUE can contain Nulls while a column defined as PRIMARY KEY can't contain Nulls

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:

Because a table can have only one primary key

Report Error

View Answer Workspace Report Error Discuss

1 4522
Q:

What router command allows you to determine whether an IP access list is enabled on a particular interface?

A) show ip port B) show access - lists
C) show ip interface D) show access - lists interface
 
Answer & Explanation Answer: C) show ip interface

Explanation:

Of the available choices only the show ip interface command will tell you which interfaces have access lists applied. show access - lists will not show you which interfaces have an access list applied. 

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4509
Q:

 If an organization is able to become more proactive in its ITSM processes, what is likely to happen to support costs?

A) They are likely to increase gradually B) They are likely to gradually reduce
C) They are likely to increase dramatically D) They are likely to reduce initially and then gradually return to current level
 
Answer & Explanation Answer: B) They are likely to gradually reduce

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

1 4495
Q:

Which command will show you whether a DTE or a DCE cable is plugged into serial 0?

A) sh int s0 B) sh int serial 0
C) show controllers s 0 D) show serial 0 controllers
 
Answer & Explanation Answer: C) show controllers s 0

Explanation:

The Show controllers serial 0 command will show you whether either a DTE or DCE cable is connected to the interface. If it is a DCE connection, you need to add clocking with the clock rate command

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4480
Q:

You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0 . Which of the following lists will you use?

A) access - list 10 deny 192.168.160.0 255.255.224.0 B) access - list 10 deny 192.168.160.0 0.0.191.255
C) access - list 10 deny 192.168.160.0 0.0.31.255 D) access - list 10 deny 192.168.0.0 0.0.31.255
 
Answer & Explanation Answer: C) access - list 10 deny 192.168.160.0 0.0.31.255

Explanation:

The range of 192.168.160.0 to 192.168.191.0 is a block size of 32. The network address is 192.168.160.0 and the mask would be 255.255.224.0, which for an access list must be a wildcard format of 0.0.31.255 . The 31 is used for a block size of 32. The wildcard is always one less than the block size.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 4479
Q:

You have a portable computer named Computer1 that runs Windows 7.
You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1.


You need to configure Computer1 to meet the following requirements:
Ensure that cached files from Share1 are encrypted.
Ensure that files located in Share1 are available when Server1 is disconnected from the network.


What should you do?

A) On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline. B) On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline.
C) On Computer1, make Share1 available offline and enable encryption of offline files. D) On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive Encryption.
 
Answer & Explanation Answer: C) On Computer1, make Share1 available offline and enable encryption of offline files.

Explanation:
Report Error

View Answer Report Error Discuss

10 4467
Q:

The currency of the controlling area must always be the same as the currency of the company code.

A) TRUE B) FALSE
Answer & Explanation Answer: B) FALSE

Explanation:

In cross-company assignments, every company code can be processed in its own currency. You are free to select the controlling area currency.

Report Error

View Answer Workspace Report Error Discuss

Subject: SAP CO

1 4454