Certification Questions

Q:

You are the administrator of a Microsoft Windows NT Server 4.0 computer. The server is the PDC in your domain and also runs SQL Server 2000. The server has four processors and 1 GB of RAM.Your network consists of 500 client computers that are running Microsoft Windows Millennium Edition. Users report that when they log on in the morning their computers respond slowly and occasionally return error messages.You use System Monitor to monitor processor performance and RAM utilization. You discover that the % Total Time and % User Time counters average 90 percent and the % Privileged Time counter averages 20 percent. The Available Mbytes counter averages 800 MB. You need to improve server performance for user logons. What should you do?

A) Increase the physical RAM on the computer to 2 GB. B) Increase the virtual RAM on the computer to 4 GB.
C) Configure SQL Server to use only processors 0, 1, and 2. D) Configure SQL Server to use only processors 1, 2, and 3.
 
Answer & Explanation Answer: D) Configure SQL Server to use only processors 1, 2, and 3.

Explanation:

The system monitor clearly indicates that the processors are overloaded. We need to decide which processors we should use for SQL Server. Processor 0 is the default CPU for the I/O subsystem. Network Interface Cards (NIC) are assigned to the remaining CPUs, starting from the highest-numbered CPU. The NIC would get processor 3.
SQL Server would be using all four processors by default.

The Windows NT/2000/XP operating system use processor 0. In order to avoid the logon
problems we should not let SQL Server to use this processor. Instead SQL Server should be configured to use processor 1, 2, and 3.

Note 1: The Affinity mask is used to exclude a processor on a multiprocessor computer from processing SQL Server 2000 threads. Default is equal distribution of SQL Server 2000 processes across all processors.

Note 2: Monitoring the Processor and System object counters provides information about the CPU utilization and helps in determining whether or not a bottleneck exists. The %Total Processor Time is used on multiple CPU Severs to gauge the average activity of the processors and shows the percentage of elapsed time that a processor is busy executing a nonidle thread. Values around 100 percent on a Server computer that processes many client requests indicate that processes are queuing up, waiting for processor time, and causing a bottleneck. Such a sustained high level of processor usage is unacceptable for a server.

Report Error

View Answer Report Error Discuss

0 3654
Q:

Which command displays RIP routing updates?

A) Show ip route B) debug ip rip
C) show protocols D) Debug ip route
 
Answer & Explanation Answer: B) debug ip rip

Explanation:

Debug ip rip is used to show the internet Protocol (IP) Routng Information protocol (RIP) updates being sent and received on the router.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3651
Q:

When will the configure DNS Server Wizard not permit you to configure a Windows 2000 DNS server as a root server?

A) When Active Directory is installed on the DNS server B) When the DNS server has a dynamic IP address
C) When the DNS server is connected to the Internet D) When another server is configured to use the DNS server as a forwarder
 
Answer & Explanation Answer: C) When the DNS server is connected to the Internet

Explanation:

When a Windows 2000 DNS server is connected to the Internet, the Configure DNS Server Wizard does not permit you to configure this server as a root server.

Report Error

View Answer Report Error Discuss

0 3643
Q:

Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain.


From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain.


You need to ensure that you can recover all EFS encrypted files from Computer2. What should you do?

A) On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker. B) On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
C) On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter. D) On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter.
 
Answer & Explanation Answer: B) On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.

Explanation:
Report Error

View Answer Report Error Discuss

6 3638
Q:

If routers in a single area are configured with the same priority value, what value does a router use for the OSPF Router ID in the absence of a  loopback interface?

A) The Lowest IP address of any physical interface B) The Highest IP address of any physical interface
C) The Lowest IP address of any logical interface D) The Highest IP address of any logical interface
 
Answer & Explanation Answer: B) The Highest IP address of any physical interface

Explanation:

At the moment of OSPF process startup, the highest IP address on any active interface will be the Router ID (RID) of the router . If you have a loopback interface configured (logical interface), then that will override the interface IP address and become the RID of the router automatically.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3623
Q:

Who Creates The Project Charter?

A) Sponser B) Stake holder
C) Customer D) None
 
Answer & Explanation Answer: D) None

Explanation:

The project initiator or sponsor should be at a level that is appropriate to funding the project. They will either create the project charter or delegate that duty to the project manager.

Projects are authorized by someone external to the project such as a sponsor, PMO or portfolio steering committee.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification
Job Role: Analyst , Project Manager

19 3605
Q:

If you do not want to enter a document with provision for updating the ledger on approval from authorized officials, you use the following functionality

A. sample document

B. recurring document

C. parked document

D. account assignment model

Answer

Answer: D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

14 3593
Q:

Which command displays IP-to-MAC- address mappings on a Windows PC?

A) ping B) traceroute
C) arp -a D) tracert
 
Answer & Explanation Answer: C) arp -a

Explanation:

The arp -a command displays IP-to-MAC-address mappings on a Windows PC.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3581