Certification Questions

Q:

Differnt types of Depreciation areas.

A.Book depreciation - 01
B.Income tax depreciation -20
C.Revaluation -10
D.Derived Depriciation - 50

Answer

Answer : A , B , C ,D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP FI

0 2858
Q:

Pat Address Translation is also called what?

A) NAT Fast B) NAT Static
C) NAT Overload D) Overloading Static
 
Answer & Explanation Answer: C) NAT Overload

Explanation:

Another term for port Address Translation is NAT Overload because that is the keyword used to enable port address translation.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2856
Q:

Which of the following is an example of a standard IP access list?

A) access - list 110 permit host 1.1.1.1 B) access - list 1 deny 172 . 16 . 10 . 1 0 . 0 . 0 . 0
C) access - list 1 permit 172 . 16 . 10 . 1 255 . 255 . 0 . 0 D) access - list standard 1 . 1 . 1 . 1
 
Answer & Explanation Answer: B) access - list 1 deny 172 . 16 . 10 . 1 0 . 0 . 0 . 0

Explanation:

Standard IP access lists use the numbers 1 - 99 and 1300 - 1999 and filter based on source IP address only. Option C is incorrect because the mask must be in wildcard format.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2855
Q:

Which of the following commands will allow a Linux on iSeries administrator to quickly scan backup tapes for files saved via a tar command on a Linux system?

A) The Linux command mt B) The Linux command cpio
C) The OS/400 command RST option(*print) D) The OS/400 command DSPTAP option(*savrst)
 
Answer & Explanation Answer: B) The Linux command cpio

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: IBM Certification

1 2854
Q:

Explain what is posting key and what does it control ?

Answer

In order to determine the transaction type which is entered in the line item, a two digit numerical is used known as 'Posting Key'
Posting key determines:
a) Account Types
b) Types of posting. Debit or Credit
c) Field status of transaction

Report Error

View answer Workspace Report Error Discuss

11 2850
Q:

How can you describe an operational level agreement (OLA) ?

A) It is a legally binding contract outlining services delivered to an IT service provider that underpin a service that provider delivers to its customers. B) It is a written agreement between a supplier and the IT customer(s), defining the key service targets and responsibilities of both parties.
C) It contains targets that underpin those within an SLA to ensure that targets will not be breached by failure of the supporting activity. D) It is an agreement between a supplier and another part of the same organization that assists with the provision of services.
 
Answer & Explanation Answer: D) It is an agreement between a supplier and another part of the same organization that assists with the provision of services.

Explanation:

An agreement between an IT service provider and another part of the same organization. An OLA supports the IT service provider's delivery of services to customers. The OLA defines the goods or services to be provided and the responsibilities of both parties.

 

* For an example there be an OLA - between the IT service provider and a acquiring department to obtain hardware in discussed times - between the Service Desk and a support group to provide Incident resolution in accepted times.

Report Error

View Answer Report Error Discuss

7 2848
Q:

You want to enable dynamic routing on a Windows 2000 Server computer on your TCP/IP network . You want this computer to manage the propagation of multicast traffic throught your network. Which routing protocol should you use?

A) IGMP Version2, Router and Proxy B) Open Shortest Path First (OSPF)
C) RIP Version 2 for Internet Protocol D) Network Address Translation(NAT)
 
Answer & Explanation Answer: A) IGMP Version2, Router and Proxy

Explanation:

IGMP is the only routing protocol that manages multicast traffic.

Report Error

View Answer Report Error Discuss

0 2844
Q:

Which authentication method supports smart cards?

A) Encrypted authentication (CHAP) B) Extensible authentication protocol (EAP)
C) Shiva Password Authentication Protocol (SPAP) D) Microsoft encrypted authentication version 2(MS-CHAP v2)
 
Answer & Explanation Answer: B) Extensible authentication protocol (EAP)

Explanation:

Only the Extensible authentication protocol (EAP) has the ability to support smart cards.

Report Error

View Answer Report Error Discuss

0 2835