Certification Questions

Q:

If you wanted administrators to see a message when logging into the router, which command would you use?

A) message banner motd B) banner message motd
C) banner motd D) message motd
 
Answer & Explanation Answer: C) banner motd

Explanation:

The typical banner is a message of the day (MOTD) and is set by using the global configuration mode command banner motd.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2851
Q:

Where can an advertiser change the location targeting of an ad?

Answer

Location targeting is set at the campaign level.

Report Error

View answer Workspace Report Error Discuss

1 2851
Q:

Project Risk Management

What are the Project Management Processes included in the Project Risk Management? 

Answer

The Project Risk Management Processes include the following:


Risk Management Planning - Deciding how to approach , plan, and execute the risk management activities for a project


Risk Identification - Determining which risks might affect the project and documenting their characteristics.


Qualitative Risk Analysis - Prioritizing risks for subsequent further analysis or action by assessing and combining their probability of occurrence and impact


Quantitative Risk Analysis - Numerically analyzing the effect on overall project objectives of identified risks


Risk Response Planning - Developing options and actions to enhance opportunities , and to reduce threats to project objectives.


Risk Monitoring and Control - Tracking identified risks, monitoring residual risks, identifying new risks, executing risk response plans, and evaluating their effectiveness throughout the project life cycle.

Report Error

View answer Workspace Report Error Discuss

0 2849
Q:

A device on a network is ready to send a frame. What is the first thing that CSMA/CD logic does?

A) Sends a token out to instruct other devices not to send packets. B) Sends a jamming signal out to prevent other hosts from sending packets.
C) Sends a discovery message out to find out if the destination host is on the same subnet. D) Listens to see if the Ethernet is busy.
 
Answer & Explanation Answer: D) Listens to see if the Ethernet is busy.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCENT

0 2845
Q:

Which of the following tools can be used to identify inefficient SQL statements without executing them?

A) QMF B) Task Center
C) Visual Explain D) Development Center
 
Answer & Explanation Answer: C) Visual Explain

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

1 2840
Q:

Monitoring and Controlling Process Group

What are the Project Management Processes included in Monitoring and Controlling Process Group?

Answer


    • Monitor and Control Project Work

    • Integrated Change Control

    • Scope Verification

    • Scope Control

    • Schedule Control

    • Cost Control

    • Perform Quality Control

    • Manage Project Team

    • Performance Reporting

    • Manage Stakeholders

    • Risk Monitoring and Control

    • Contract Administration


Report Error

View answer Workspace Report Error Discuss

0 2838
Q:

The SQL keyword BETWEEN is used:

A) for ranges B) as a wildcard
C) to limit the columns displayed D) All the above
 
Answer & Explanation Answer: A) for ranges

Explanation:

In SQL, BETWEEN Keyword is used for ranges like Number Ranges, Date Ranges, etc...

Report Error

View Answer Report Error Discuss

0 2836
Q:

How does DHCP client ensure that no other computer has its assigned IP address?

A) Acknowledge receipt of a TCP segment B) Ping to its own address to see if a response is detected
C) Broadcast a Proxy ARP D) Broadcast a gratuitous ARP
 
Answer & Explanation Answer: D) Broadcast a gratuitous ARP

Explanation:

To stop possible address conflicts , a DHCP client will use gratuitous ARP (broadcast an ARP request for its own IP address) to see if another host responds.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2831