Cisco Certifications (2321)
Microsoft Certifications (171)
Sun Certifications (45)
CISA Certification (744)
Oracle Certifications (64)
ISTQB Certification (109)
Certifications AllOther (295) What are two services that the OSPF Hello protocol provides? A. It discovers neighbor routers B. It gets routes from neighbors during startup C. It helps elect a designated router D. It allows administrator to test for connectivity between two devices
1 4925You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling
1 3880What is the first step in diagramming packet flow for the terminals within a network? A. Identify the end user nodes of all the terminals B. Figure out the speed of all the servers C. Find out where all the routers are located D. Find out where all the switched are located
3 5908What task do you complete to identify organizational objectives that will reflect your design? A. Business Objectives B. Scheduling requirements C. Vacation time D. Meetings
2 4723Diagramming application information flow is important because: A. it helps identify heavy traffic paths B. it helps figure out why email gets from one place to another C. it can tell you when to purchase a new router D. it can tell you when to purchase a new switch
2 5425IS management has decided to rewrite a legacy customer relations system using fourth-generation languages (4GLs). Which of the following risks is MOST often associated with system development using 4GLs? A. Inadequate screen/report design facilities B. Complex programming language subsets C. Lack of portability across operating systems D. Inability to perform data intensive operations
1 13387Which of the following would be the BEST method for ensuring that critical fields in a master record have been updated properly? A. Field checks B. Control totals C. Reasonableness checks D. A before-and-after maintenance report
1 6986Which of the following is a dynamic analysis tool for the purpose of testing software modules? A. Blackbox test B. Desk checking C. Structured walk-through D. Design and code
1 15063Which of the following is MOST likely to result from a business process reengineering (BPR) project? A. An increased number of people using technology B. Significant cost savings, through a reduction in the complexity of information technology C. A weaker organizational structures and less accountability D. Increased information protection (IP) risk will increase
1 8176Which of the following devices extends the network and has the capacity to store frames and act as a storage and forward device? A. Router B. Bridge C. Repeater D. Gateway
1 13056Which of the following is a benefit of using callback devices? A. Provide an audit trail B. Can be used in a switchboard environment C. Permit unlimited user mobility D. Allow call forwarding
2 19353A call-back system requires that a user with an id and password call a remote server through a dial-up line, then the server disconnects and: A. dials back to the user machine based on the user id and password using a telephone number from its database. B. dials back to the user machine based on the user id and password using a telephone number provided by the user during this connection. C. waits for a redial back from the user machine for reconfirmation and then verifies the user id and password using its database. D. waits for a redial back from the user machine for reconfirmation and then verifies the user id and password using the sender's database.
1 8872Structured programming is BEST described as a technique that: A. provides knowledge of program functions to other programmers via peer reviews. B. reduces the maintenance time of programs by the use of small-scale program modules. C. makes the readable coding reflect as closely as possible the dynamic execution of the program. D. controls the coding and testing of the high-level functions of the program in the development process.
1 9749
What is Phase od VPN in site to site and what information you will require to configure a SITE to SITE VPN
Mention what is the difference between dynamic ip and static ip addressing?
Where can I get LAtest qtp 2010 exam questions ?
What is name of ospf algo?
What do you understand by redundancy?
Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router?
Does a bridge divide a network into smaller segments?
Please could any send me Informatica power center developer certification dumps @ tsailunet@gmail.com? Thanks in advance
What is the subnetmask of / 27 in network based and host based?
What are the different types of password used in securing a cisco router?
I would like to know about Oracle Online Course certification (Finance)
1900 Value in which type of access list?
How do areas benefit a link state inter network?
HI Guys...... Good day ahead How many sub domains can be added in exchange server means in a domain
Tell me which protocol called rapid protocol?