Certification Questions

Q:

Which message appears when you select Use query drill while Scope of Analysis is set in a BusinessObjects Web Intelligence XI 3.0 report?

A. The Scope of Analysis is empty

B. The query drill mode option is enabled

C. The query drill mode option is not enabled

D. The Scope of Analysis is not empty

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

2 2765
Q:

Which command is used to return maximum value from result set?

A) MAX B) MIN
C) MAXIMUM D) MAXI
 
Answer & Explanation Answer: A) MAX

Explanation:

MAX command is used to return maximum value from result setMAX 

Report Error

View Answer Report Error Discuss

1 2765
Q:

Which of the following is an example of a standard IP access list?

A) access - list 110 permit host 1.1.1.1 B) access - list 1 deny 172 . 16 . 10 . 1 0 . 0 . 0 . 0
C) access - list 1 permit 172 . 16 . 10 . 1 255 . 255 . 0 . 0 D) access - list standard 1 . 1 . 1 . 1
 
Answer & Explanation Answer: B) access - list 1 deny 172 . 16 . 10 . 1 0 . 0 . 0 . 0

Explanation:

Standard IP access lists use the numbers 1 - 99 and 1300 - 1999 and filter based on source IP address only. Option C is incorrect because the mask must be in wildcard format.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2764
Q:

Which layer is used for reliable communication between end nodes over the network and provides mechanisms for establishing , maintaining , and terminating virtual circuits; transport - fault detection and recovery; and controlling the flow of information?

Answer

The Transport layer uses virtual circuits to create a reliable connection between two hosts.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

1 2764
Q:

Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?

A) The Linux command mt B) The Linux command cpio
C) The OS/400 command RST option(*print) D) The OS/400 command DSPTAP option(*savrst)
 
Answer & Explanation Answer: B) The Linux command cpio

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

1 2764
Q:

You want to enable dynamic routing on a Windows 2000 Server computer on your TCP/IP network . You want this computer to manage the propagation of multicast traffic throught your network. Which routing protocol should you use?

A) IGMP Version2, Router and Proxy B) Open Shortest Path First (OSPF)
C) RIP Version 2 for Internet Protocol D) Network Address Translation(NAT)
 
Answer & Explanation Answer: A) IGMP Version2, Router and Proxy

Explanation:

IGMP is the only routing protocol that manages multicast traffic.

Report Error

View Answer Report Error Discuss

0 2762
Q:

Dfferent Valuation approaches are used to valuate the asset Portfolio and transactions in Asset accounting. Choose the correct Example from the list given below.

A.Financial statement according to local requirement.

B.Balance sheets for tax purposes

C.Internal accounting (Cost accounting)

D.Parellel financial reporting, for example, creating consolidated balance sheet according to IAS, US GAAP and so on.

Answer

Answer : A ,B ,C ,D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

0 2760
Q:

Which authentication method supports smart cards?

A) Encrypted authentication (CHAP) B) Extensible authentication protocol (EAP)
C) Shiva Password Authentication Protocol (SPAP) D) Microsoft encrypted authentication version 2(MS-CHAP v2)
 
Answer & Explanation Answer: B) Extensible authentication protocol (EAP)

Explanation:

Only the Extensible authentication protocol (EAP) has the ability to support smart cards.

Report Error

View Answer Report Error Discuss

0 2759