Certification Questions

Q:

Where are EIGRP successor routes stored?

A) In the routing table only B) In the neighbor table only
C) In the routing table and neighbor table D) In the routing table and the topology table
 
Answer & Explanation Answer: D) In the routing table and the topology table

Explanation:

Successor routes are going to be in the routing table since they are the best path to a remote network. However, the topology table has a link to each and every network, so the best answer is topology table and routing table. Any secondary route to a remote network is considered a feasible successor, and those routes are found only in the topology table and used as backup routes in case of primary route failure.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3766
Q:

In the Determine Budget processes the project schedule

A) is not one of the inputs to these processes. B) is used to allocate the project budget to the various project activities.
C) is used to assign costs to the time period when the costs will be incurred D) is used to determine the size of the contingency component of the budget after all scheduled costs are accounted for.
 
Answer & Explanation Answer: C) is used to assign costs to the time period when the costs will be incurred

Explanation:

“This [project schedule] information can be used to aggregate costs to the calendar periods when the costs are planned to be incurred.” PMBOK [7.2.1.4]

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3752
Q:

Who Creates The Project Charter?

A) Sponser B) Stake holder
C) Customer D) None
 
Answer & Explanation Answer: D) None

Explanation:

The project initiator or sponsor should be at a level that is appropriate to funding the project. They will either create the project charter or delegate that duty to the project manager.

Projects are authorized by someone external to the project such as a sponsor, PMO or portfolio steering committee.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification
Job Role: Analyst , Project Manager

19 3750
Q:

If you delete the contents of NVRAM and reboot the router , what mode will you be in?

A) privileged mode B) Global mode
C) Setup mode D) NVRAM loaded mode
 
Answer & Explanation Answer: C) Setup mode

Explanation:

If you delete the startup-config and reload the router, the router will automatically enter setup mode. You can also type setup from privileged mode at any time.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3747
Q:

Your switch has a port status  LED that is alternating between green and amber. What could this indicate?

A) The port is experiencing errors B) The port is shut down
C) The port is in STP blocking mode D) Nothing, this is normal.
 
Answer & Explanation Answer: A) The port is experiencing errors

Explanation:

When you connect to a switch port, at first the link lights are orange/amber, and then they turn green, indicating normal operation. If the  link light is blinking, you have a problem.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3724
Q:

User can define and use their own transaction types for Assets accounting in  a SAP R/3 system

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP FI

0 3720
Q:

Which of the following symbols indicate that a ping was successful?

A) ! B) .
C) ? D) U
 
Answer & Explanation Answer: A) !

Explanation:

Explanation: The following table explains the output generated by ping:

! – reply received

. – timed out

U – unreachable

C – congestion

? – unknown packet type

& packet lifetime exceeded

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

0 3713
Q:

What does a firewall?

A) Examines packets and decides which ones should be allowed to pass from one network to another. B) Maintains a table which maps the IP addresses of two network so that packets can be redirected between the networks.
C) Compares packets to virus signatures so that packets which are know to be dangerous can be identified and stopped. D) Prevents viruses from moving any further through a network
 
Answer & Explanation Answer: A) Examines packets and decides which ones should be allowed to pass from one network to another.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCENT

2 3707