Certification Questions

Q:

Time wage type selection occurs in subschema...

A.  TC11.

B.  TC10.

C.  TC01.

D.  TC00.

Answer

Answer : D

Report Error

View answer Workspace Report Error Discuss

Subject: SAP HR

12 8211
Q:

What is the name of the service included with the Windows Server operating system that manages a centralized database containing user account and security information ?

A) Windows Directory B) Active Directory
C) Directory Plus D) None of the above
 
Answer & Explanation Answer: B) Active Directory

Explanation:

Active Directory (AD) is a centralized database that is included with the Windows Server operating system. Active Directory is used to store information about a network, such as user accounts, computers, printers, and security policies.

Report Error

View Answer Report Error Discuss

48 8111
Q:

What is the purpose of Spanning Tree Protocol in a switched LAN?

A) To provide a mechanism for network monitoring is switched environments B) To prevent routing loops in network with redundant paths
C) To prevent switching loops in networks with redundant switched paths D) To manage the VLAN database across multiple switches
 
Answer & Explanation Answer: C) To prevent switching loops in networks with redundant switched paths

Explanation:

The Spanning Tree Protocol (STP) was designed to stop layer 2 loops. All Cisco switches have the STP on by default.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 8096
Q:

What protocol would you use if you were running xDSL and needed authentication?

Answer

PPPoE  or  PPPoA

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

24 8064
Q:

When analyzing an outcome for creation of value for customers, what attributes of the service should be considered?

A) Objectives, Metric, Desired outcome B) People, Products, Technology
C) Business Objectives, IT objectives, Process metrics D) Desired outcome, Supplier metrics, IT objectives
 
Answer & Explanation Answer: C) Business Objectives, IT objectives, Process metrics

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

0 8045
Q:

The Information Security Policy should be available to which groups of people?

A) Senior business managers and all IT staff B) Information Security Management staff only
C) All customers, users and IT staff D) Senior business managers, IT executives and the Security Manager
 
Answer & Explanation Answer: C) All customers, users and IT staff

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

2 8043
Q:

What are the typical three different categories of VPNs?

Answer

The following are the different types of VPNs :


PPTP ( Point to Point Tunnel protocol ) VPN : Most commonly used VPN. PPTP is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.


Site-to-Site VPN : Site-to-site VPN is a type of VPN connection that is created between two separate locations. Site-to-site VPN can be intranet based or extranet based. 


Intranet-based site-to-site VPN is created between an organization's propriety networks, while extranet-based site-to-site VPN is used for connecting with external partner networks or an intranet.


L2TP ( Layer Two Tunneling Protoco) VPN : L2TP is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network over the Internet.


IPsec (Internet Protocol Security) : IPsec is a framework for a set of protocols for security at the network or packet processing layer of network communication.


SSL (Secure Sockets Layer) VPN : SSL  is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. 


MPLS (Multiprotocol Label Switching) VPN : MPLS is a protocol for speeding up and shaping network traffic flows. 


Hybrid VPN : A hybrid VPN combines Multiprotocol Label Switching (MPLS) and Internet protocol security (IPsec)-based VPNs. 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

26 8024
Q:

The four stages of the Deming Cycle are?

A) Plan, Measure, Monitor, Report B) Plan, Check, Re-Act, Implement
C) Plan, Do, Act, Audit D) Plan, Do, Check, Act
 
Answer & Explanation Answer: D) Plan, Do, Check, Act

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

0 7913