Certification Questions

Q:

You need to subnet a network that has 5 subnets, each wit at least 16 hosts. Which classful subnet mask would you use?

A) 255.255.255.192 B) 255.255.255.224
C) 255.255.255.240 D) 255.255.255.248
 
Answer & Explanation Answer: B) 255.255.255.224

Explanation:

You need 5 subnets, each with at least 16 hosts. The mask 255.255.255.240 provides 16 subnets with 14 hosts - this will not work. The mask 255.255.255.224 provides 8 subnets, each with 30 hosts. This is the best answer.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

2 9618
Q:

The following are lot sizing rules available for SAP R/3?

A. Replenish to maximum stock level
B. Weekly lot size
C. Daily lot size
D. Fixed lot size

Answer

Answer : A ,B ,C

Report Error

View answer Workspace Report Error Discuss

Subject: SAP MM

20 9523
Q:

Which dml command is used in conjunction with @@identity?

A) INSERT and UPDATE B) UPDATE and DELETE
C) SCOPE_IDENTITY and IDENT_CURRENT D) Commit and rollback
 
Answer & Explanation Answer: C) SCOPE_IDENTITY and IDENT_CURRENT

Explanation:

Using automatically incrementing IDENTITY columns is very popular with database developers. You don’t need to explicitly calculate unique surrogate keys when inserting new data, the IDENTITY column functionality does that for you. The IDENTITY feature also allows you to specify useful Seed and Increment properties. When you use an INSERT statement to insert data into a table with an IDENTITY column defined, SQL Server will generate a new IDENTITY value.

 

You can use the @@IDENTITY variable and the SCOPE_IDENTITY and IDENT_CURRENT functions to return the last IDENTITY value that has been generated by SQL Server. This is very useful when you need to return the key for the row that has just been inserted, back to the caller.

Report Error

View Answer Report Error Discuss

20 9409
Q:

Which ITIL process has the objective of helping to monitor the IT services by maintaining a logical model of the IT infrastructure and IT services?

A) Capacity Management B) Change Management
C) Configuration Management D) Financial Management for IT services
 
Answer & Explanation Answer: C) Configuration Management

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

3 9367
Q:

By default , what type of trust are all Windows 2000 trust relationships within a domain tree or forest?

A) Explicit trust B) One-way trust
C) Transitive trust D) Non-transitive trust
 
Answer & Explanation Answer: C) Transitive trust

Explanation:

By default, all Windows 2000 trusts within a domain tree or forest are transitive trusts.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

25 9347
Q:

How can an organization determine the effectiveness of the Service Level Management process?

A) By checking contracts with suppliers B) By measuring customer satisfaction
C) By defining service levels D) By reporting on all incidents
 
Answer & Explanation Answer: B) By measuring customer satisfaction

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: ITIL Certification

0 9023
Q:

As a network administrator you have been requested to move a printer from your company's Marketing OU to your company's Research OU. After the move you test the printer and find that the local administrator assigned to the Marketing OU still has access and can remove print jobs from it. What can you do to change this?

A) Remove the permissions for the local administrator from the printer. B) Remove printer permissions from the local administrator.
C) Remove the Everyone group from the printer. D) Delete the printer object.
 
Answer & Explanation Answer: A) Remove the permissions for the local administrator from the printer.

Explanation:
Report Error

View Answer Report Error Discuss

29 8905
Q:

The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model?

A) Application B) Host-to-Host
C) Internet D) Network Access
 
Answer & Explanation Answer: C) Internet

Explanation:

The four layers of the DoD model are Application/process, Host-to-Host, Internet, and Network Access. The Internet layer is equivalent to the Network layer of the OSI model.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

3 8856