Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Certifications Interview Questions
Questions Answers Views Company eMail

Of the following switching types, which one has the highest latency? A.) Cut-through B.) None C.) Store-and-forward D.) Fragment Free

2 10299

What does the IPX maximum path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)

1 4217

What does -1 mean in an extended IPX access-list? A.) Any IP address B.) Deny all C.) Deny host D.) Any host or any network

1 4425

What parameter is used with statically assigned routers to tell packets which interface to use to reach a distant network? A.) Mask B.) Subnet C.) Default gateway D.) Interface

1 3917

Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP

CMC,

1 4332

What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops

1 6457

IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port

1 4719

What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000

1 3933

CPE is an acronym for which of the following? A.) Customer Premise Equipment B.) Central Processing Engineering C.) Customer Process Equipment D.) Central Processing Equipment

1 4243

How often does IP RIP send out routing table updates by default? A.) They send complete updates every 30 seconds B.) They send partial updates every 30 seconds C.) They send complete updates every 60 seconds D.) They send partial updates every 60 seconds

2 18154

Which ISDN protocol prefix specifies switching and signaling? A.) I B.) E C.) Q D.) S

1 8044

CSMA/CD stand for which of the following? A.) Carrier Sense, Multiple Access with Collision Detection B.) Collision Sense, Multiple Access with Collision Detection C.) Collision Sense, Multiple Access with Carrier Detection D.) Carrier Sense, MAC address with Collision Detection

1 5049

Which of the following are Distant Vector protocols? A.) IGRP B.) RIP C.) OSFP D.) EIGRP

1 4320

UDP works at which layer of the DOD model? A.) Internet B.) Host-to-Host C.) Transport D.) Data Link

1 7562

Of the following switching types, which one has the lowest latency? A.) Cut-through B.) Fragment Free C.) None D.) Store-and-forward

1 15451


Un-Answered Questions { Certifications }

what's the difference between Symmetric and Asymmetric cryptosystem?

2639


Do you know how many types of data?

1191


What purpose does aging serve in a link state protocol?

1155


Why is network segmentation a good idea when managing a large network?

1155


Can you explain VPN tunneled packet in detail?

2193


I want to join a good institute in Noida for SAP SD for experienced professionals,I have 2 years of experience as a SAP SD functional consultant.Can anyone suggest plz.

1447


Explain the term 'unicast'.

1183


1. What is Active Directory? 2. What is LDAP? 3. Can you connect Active Directory to other 3rd-party Directory Services? Name a few options. 4. Where is the AD database held? What other folders are related to AD? 5. What is the SYSVOL folder? 6. Name the AD NCs and replication issues for each NC 7. What are application partitions? When do I use them 8. How do you create a new application partition 9. How do you view replication properties for AD partitions and DCs? 10. What is the Global Catalog? 11. How do you view all the GCs in the forest? 12. Why not make all DCs in a large forest as GCs? 13. Trying to look at the Schema, how can I do that? 14. What are the Support Tools? Why do I need them? 15. What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is REPADMIN? 16. What are sites? What are they used for? 17. What’s the difference between a site link’s schedule and interval? 18. What is the KCC? 19. What is the ISTG? Who has that role by default? 20. What are the requirements for installing AD on a new server? 21. What can you do to promote a server to DC if you’re in a remote location with slow WAN link? 22. How can you forcibly remove AD from a server, and what do you do later? • Can I get user passwords from the AD database? 23. What tool would I use to try to grab security related packets from the wire? 24. Name some OU design considerations. 25. What is tombstone lifetime attribute? 26. What do you do to install a new Windows 2003 DC in a Windows 2000 AD? 27. What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD? 28. How would you find all users that have not logged on since last month? 29. What are the DS* commands? 30. What’s the difference between LDIFDE and CSVDE? Usage considerations? 31. What are the FSMO roles? Who has them by default? What happens when each one fails? 32. What FSMO placement considerations do you know of? 33. I want to look at the RID allocation table for a DC. What do I do? 34. What’s the difference between transferring a FSMO role and seizing one? Which one should you NOT seize? Why? 35. How do you configure a “stand-by operation master” for any of the roles? 36. How do you backup AD? 37. How do you restore AD? 38. How do you change the DS Restore admin password? 39. Why can’t you restore a DC that was backed up 4 months ago? 40. What are GPOs? 41. What is the order in which GPOs are applied? 42. Name a few benefits of using GPMC. 43. What are the GPC and the GPT? Where can I find them? 44. What are GPO links? What special things can I do to them? 45. What can I do to prevent inheritance from above? 46. How can I override blocking of inheritance? 47. How can you determine what GPO was and was not applied for a user? Name a few ways to do that. 48. A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and everyone else there gets the GPO. What will you look for? 49. Name a few differences in Vista GPOs 50. Name some GPO settings in the computer and user parts. 51. What are administrative templates? 52. What’s the difference between software publishing and assigning? 53. Can I deploy non-MSI software with GPO? 54. You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that?

2804


Define class full protocol?

1209


On which base distance vector choose best path?

1125


What s the formula for metric of ospf?

1229


Why is vlan used?

1116


An update function module VF is called within subprogram VU .The program contains the call , VU on commit . At which point are the parameters for the update function VF evaluated ? a) when perform is executed b) at the beginning of function c) at commit work d) at start of v1 update e) at the end of the dialog step. Please answer only if you are very sure about this. Else please dont try.

2469


What does data packets consist of?

1098


Where can I get LAtest qtp 2010 exam questions ?

2510