|
1.Which of the following is not true regarding MAC addresses? a . All MAC addresses are unique b . For computers on the same network, MAC addresses are used at the Data Link layer of the OSI model c . The first portion of the MAC address defines the manufacturer d . The MAC address is used with the PING command to test communications with other hosts. Answer: The MAC address is used with the PING command to test communications with other hosts 2.Which of the following would be the default subnet mask for the IP address 64.72.48.185? a . 255.0.0.0 b . 255.240.0.0 c . 255.255.0.0 d . 255.255.255.0 Answer(s): 255.0.0.0 3.Which of the following IP addresses is most likely a private IP address used on an intranet? a . 192.168.42.5 b . 145.145.62.62 c . 178.55.22.10 d . 12.2.5.1 Answer: 192.168.42.5 4.By default, which port is used by FTP? a . 21 b . 23 c . 80 d . 110 Answer: 21 5.What is TCP port 80 used for? a . FTP b . Telnet c . DNS d . HTTP Answer: HTTP
|
Passed today with 908 / 1000. All questions and answers in itcertkeys.
|
People, I'd like that someone send last dump to usmanbuttonline@gmail.com thanks
|
Hi all, Can anyone send me the latest dumps and let me know how many question in the exam. my email : t_saim@yahoo.com
|
I passed this exam scoring 100%. There were 93 questions; out of which 63 are from 'Magic Johnson' document(u will find it in one the earlier mails, it contains 149 qs). For the remaining 30 questions I had to make wild guesses and I doubt if any of the answers were correct. Yet scored 100% !! Hence I conclude only the 63 qs are taken for scoring.Trust this document. thanx...
|
Last week I passed the exam 70-350 with 905. Study itcertkeys study guide 70-350 and you will pass. 95% the questions was in itcertkeys.
|
Passed itcertkeys guide still good.
|
Does anybody knows those questions? You are saying there are 15 new...anybody... send those questions... thx...
|
Required latest dumps 70-229 dumps urgently..please help
|
Question 1.
When you run a DBCC SHRINKFILE command in SQL Query Analyzer to shrink the specified transaction log file of a database, the transaction log file does not shrink, and you may receive an error message:
Cannot shrink log file <transaction log file ID> (<transaction log file name>).
Which of the following statement is true?
A. When a transaction log file has one virtual log file, you cannot shrink the transaction
log file by using the DBCC SHRINKFILE command
B. When a transaction log file has two virtual log file, you cannot shrink the transaction
log file by using the DBCC SHRINKFILE command
C. You can not shrink the log file by using the DBCC SHRINKFILE command
D. None of the above
Answer: B
Question 2.
What is the default transaction time-out setting for the table designer and for the database designer in SQL Server Management Studio?
A. 10 Seconds
B. 20 Seconds
C. 30 Seconds
D. 40 Seconds
Answer: C
Question 3.
Which of the following trace flag value is used to enable database mirroring for Microsoft SQL server 2005.
A. trace flag 1400
B trace flag 1500
C. trace flag 1600
D. trace flag 1700
Answer: A
Question 4.
Companyxyz.com uses a SQL Server 2005 database. This database contains a trigger named trg_Insert Orders, which fires when order data is inserted into the Orders table. The trigger is responsible for ensuring that a customer exists in the Customers table before data is inserted into the Orders table. You need to configure the trigger to prevent it from firing during the data import process. You must accomplish this goal while using the least amount of administrative effort.
Which two Transact-SQL statements can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. ALTER TABLE Orders DISABLE TRIGGER trg_Insert Orders
B. DROP TRIGGER trg_Insert Orders
C. DISABLE TRIGGER trg_Insert Orders ON Orders
D. ALTER TRIGGER trg_InsertOrders ON Orders NOT FOR REPLICATION
E. sp_settriggerorder@triggername= 'trg_Insert Orders', @order='None'
Answer: A, C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.