Certification Questions

Q:

Go command is a signal to execute the entire batch of SQL statements after previous Go

A) TRUE B) FALSE
Answer & Explanation Answer: A) TRUE

Explanation:
Report Error

View Answer Workspace Report Error Discuss

0 3447
Q:

You telnet into a remote device and type debug ip rip, but no output from the debug command is seen. What could the problem be?

A) You must type the show ip rip command first B) IP addressing on the network is incorrect
C) You must use the terminal monitor command D) Debug output is sent only to the console.
 
Answer & Explanation Answer: C) You must use the terminal monitor command

Explanation:

To see console messages through your Telnet session, you must enter the terminal monitor command.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 3444
Q:

Data integrity constraints are used to

A) Ensure that duplicate records are not entered into the table B) Prevent users from changing the values stored in the table
C) Control who is allowed access to the data D) Improve the quality of data entered for a specific property like table column
 
Answer & Explanation Answer: D) Improve the quality of data entered for a specific property like table column

Explanation:

Integrity constraints are used to ensure accuracy and consistency of data in a relational database. Data integrity is handled in a relational database through the concept of referential integrity. Many types of integrity constraints play a role in referential integrity (RI).

 

Hence, Data integrity constraints are used to Improve the quality of data entered for a specific property i.e, table column.

Report Error

View Answer Report Error Discuss

0 3425
Q:

The network address used to advertise a summary address is always which of the following?

A) The last network address in the block B) The next to last network in the block
C) The second network in the block D) The first network in the block
 
Answer & Explanation Answer: D) The first network in the block

Explanation:

The network address used to advertise a summary address is always the first network in the block

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3423
Q:

The project life cycle can be broken into five phases that tend to overlap with each other frm one phase to another;however ,the control phase does not overlap with a specific phase. why?

A) Change control management is seperate from the other phases B) Change control management has a plan that can be usede throughout the initiation, planning, execution, and closeout of the project
C) Because the project sponsor is responsible for change control management , the project manager is not involved with that phase of the project D) Change control extends throughout the entire project from initiation to closeout
 
Answer & Explanation Answer: D) Change control extends throughout the entire project from initiation to closeout

Explanation:

Change control management is utilized from the begining to the end of the project in order to keep it focused with an emphasis on the time and budget. Answer A is incorrect because change control management is not seperate from the other phases. Answer B is incorrect because the control plan must be throughout the other phases of a project. Its usage is not optional, and consistent utilization is imperative to managing scope creep and other scope expansions. Answer C is incorrect because the project sponsors is generally not responsible for the change control documentation, although it should be involved in the buy-in and approval process.

Report Error

View Answer Report Error Discuss

Filed Under: PMP Certification

0 3420
Q:

Your inside locals are not being translated to the inside global addresses. Which of the following commands will show you if your inside globals are allowed to use the NAT pool?

ip nat pool Corp 198.18.41.129 198.18.41.134 netmask 255.255.255.248

ip nat inside source list 100 int pool Corp overload

A) debug ip nat B) show access - list
C) show ip nat translation D) show ip nat statistics
 
Answer & Explanation Answer: B) show access - list

Explanation:

Once you create your pool, the command ip nat inside source must be used to say which inside locals are allowed to use the pool. In this question we need to see if access - list 100 is configured correctly, if at all , so show access - list is the best answer.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3411
Q:

You have installed a Windows Server 2003 DNS server, but because of security reasons, you have to install this behind a firewall. What port on the firewall must be opened so that users can access the server?

A) IP and UDP port 42 B) UDP and TCP port 53
C) TCP 53 but not UDP D) PPTP and UDP 21
 
Answer & Explanation Answer: B) UDP and TCP port 53

Explanation:
Report Error

View Answer Report Error Discuss

0 3411
Q:

If two laptops are exchanging data directly with each other using a 802.11g connection, there are said to be in what mode?

A) Ad-hoc mode. B) Operational exchange mode.
C) Basic Service Set mode. D) Infrastructure mode.
 
Answer & Explanation Answer: A) Ad-hoc mode.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCENT

0 3396