Certification Questions

Q:

Where is a Web Intelligence variable stored?

A. In the document

B. In the Central Management Server (CMS)

C. In the Metadata Cube

D. In the cell

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: SAP BW

2 3836
Q:

Personnel Calculation Rule can contain several calculation formula depending on the definition and use of the rule.

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

Subject: SAP HR

1 3836
Q:

Which among the following keys are used to identify each row of the table uniquely?

A) Primary key B) Unique key
C) Partial key D) None of the above
 
Answer & Explanation Answer: A) Primary key

Explanation:

Primary key helps us to identify a row uniquely in a relation

Report Error

View Answer Report Error Discuss

2 3831
Q:

An important tool for project scope management is

A) Fast tracking B) Work breakdown structure
C) Crashing D) A Gantt Chart
 
Answer & Explanation Answer: B) Work breakdown structure

Explanation:

Work breakdown structure is an important tool for project scope management.

 

Project Scope Management refers to the set of processes that ensure a project’s scope is accurately defined and mapped. Scope Management techniques enable project managers and supervisors to allocate just the right amount of work necessary to successfully complete a project—concerned primarily with controlling what is and what is not part of the project’s scope.

Report Error

View Answer Report Error Discuss

8 3805
Q:

Given the following network range 192.168.0.0/24. We want minimum 50 hosts on each of the available subnets. What will be the subnet mask?

A) /24 B) /25
C) /26 D) /27
 
Answer & Explanation Answer: C) /26

Explanation:

Explanation: 50 hosts require 6 bits of the last octet giving us 64 -2 = 62 possible hosts this satisfies our requirement and leaves us 2 bits over for the subnets. The default mask is /24 or 255.255.255.0 adding the 2 bits for the subnets it becomes 255.255.255.192 or /26

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

1 3801
Q:

You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do your network?

A) Add more routers B) Use the auto secure command
C) Implement IDS/IPS D) Configure Naggle
 
Answer & Explanation Answer: C) Implement IDS/IPS

Explanation:

Implementing Intrusion Detection Service and Intrusion prevention Service (IDS/IPS) will help notify you and stop attacks in real time.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 3793
Q:

Users on the 192.168.10.0/24 network must access files located on the Server 1. What route could be configured on router R1 for file requests to reach the server?

A. IP route 0.0.0.0 0.0.0.0 s0/0/0
B. IP route 0.0.0.0 0.0.0.0 209.165.200.226
C. IP route 209.165.200.0 255.255.255.0 192.168.10.250
D. IP route 192.168.10.0 255.255.255.0 209.165.100.250

Answer

Answer : A

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 3792
Q:

In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?

A) All hosts have equal priority B) The two hosts that caused the collision will have equal priority
C) The host that sent the jam signal after the collision D) The host with the highest MAC address
 
Answer & Explanation Answer: A) All hosts have equal priority

Explanation:

After the expiration of the backoff algorithm , all hosts have equal priority.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3768