Certification Questions

Q:

Where is a Web Intelligence variable stored?

A. In the document

B. In the Central Management Server (CMS)

C. In the Metadata Cube

D. In the cell

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

2 3933
Q:

Users on the 192.168.10.0/24 network must access files located on the Server 1. What route could be configured on router R1 for file requests to reach the server?

A. IP route 0.0.0.0 0.0.0.0 s0/0/0
B. IP route 0.0.0.0 0.0.0.0 209.165.200.226
C. IP route 209.165.200.0 255.255.255.0 192.168.10.250
D. IP route 192.168.10.0 255.255.255.0 209.165.100.250

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 3917
Q:

What is the specific term for the unwanted signal interference from adjacent pairs in the cable?

A) EMI B) RFI
C) Crosstalk D) Attenuation
 
Answer & Explanation Answer: C) Crosstalk

Explanation:

The term for the unwanted signal interference from adjacent pairs in the cable is crosstalk

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3909
Q:

Which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses?

A) /28 B) /29
C) /30 D) /31
 
Answer & Explanation Answer: C) /30

Explanation:

A point-to-point link uses only two hosts. A/30, or 255.255.255.252, mask provides two hosts per subnet.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3905
Q:

You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do your network?

A) Add more routers B) Use the auto secure command
C) Implement IDS/IPS D) Configure Naggle
 
Answer & Explanation Answer: C) Implement IDS/IPS

Explanation:

Implementing Intrusion Detection Service and Intrusion prevention Service (IDS/IPS) will help notify you and stop attacks in real time.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 3899
Q:

In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?

A) All hosts have equal priority B) The two hosts that caused the collision will have equal priority
C) The host that sent the jam signal after the collision D) The host with the highest MAC address
 
Answer & Explanation Answer: A) All hosts have equal priority

Explanation:

After the expiration of the backoff algorithm , all hosts have equal priority.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3892
Q:

When a ping to the loopback address fails , what can you assume?

A) The IP address of the local host is incorrect B) The IP address of the remote host is incorrect
C) The NIC is not functional D) The IP stack has failed to initialize
 
Answer & Explanation Answer: D) The IP stack has failed to initialize

Explanation:

When a ping to the loopback address fails , you can assume the IP stack has failed to initialize.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3885
Q:

Which of the following master data can/must you use for pipeline meterials?

A. BOM(ascomponent)

B. Purchasing info record

C. Material master record

D. Vendor master record

E. Source list

Answer

Answer : A , B , C , D , E [all these]


 


Explanation:You must have created a material master record with a purchasing info record. To do this, you need a vendor master record. You can use the source list and BOM in connection with the pipeline material.

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

8 3881