网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()
A

 Implement preventative measures.

B

 Close the issue.

C

 Document the outcome.

D

 Question other users to make sure they are not having the same issue.


参考答案

参考解析
解析: 暂无解析
更多 “单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A  Implement preventative measures.B  Close the issue.C  Document the outcome.D  Question other users to make sure they are not having the same issue.” 相关考题
考题 Click the Exhibit button.A network administrator receives complaints that the application voicecube is timing out after being idle for 30 minutes.Referring to the exhibit, what is a resolution?() A. [edit] user@host# set applications application voicecube inactivity-timeout neverB. [edit] user@host# set applications application voicecube inactivity-timeout 2C. [edit] user@host# set applications application voicecube destination-port 5060D. [edit] user@host# set security policies from-zone trust to-zone trust policy intrazone then timeout never

考题 An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()A. NetstatB. IfconfigC. HostnameD. Ping

考题 A company finished upgrading the wireless encryption to WPA2 Enterprise. The administratorreceives a call from a user who is unable to connect to the company wireless.Which of the following is MOST likely causing the connection problem?()A. The laptop is missing the software supplicantB. The access point SSID is hidden.C. The laptop only supports TKIP and AES encryption,D. The access point is on the wrong channel.

考题 A user is unable to determine the default system text editor. How can the local administrator assist the user by identifying the default text editor for the system?()A、Login as the user and run ’echo $ENV’.B、Login as root and run the ’env’ command.C、Login as root and ’cat /etc/environment’.D、Login as the user and run the ’env’ command.

考题 An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()A、NetstatB、IfconfigC、HostnameD、Ping

考题 A user selects their proper domain and is unable to log into their Windows computer.The error states:‘System cannot log you on to the domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect’.Which of the following is the MOST likely cause for this error?()A、The computer’s account was removed from Active Directory.B、The user’s account was removed from Active Directory.C、The computer was disjoined from the domain.D、The user typed in the wrong password.

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue

考题 An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()A、 Create an action plan.B、 Escalate the issue.C、 Reboot the mail server.D、 Document the solution.

考题 A user connects to the companys intranet server via a VPN connection from a small office / home office (SOHO) using the broadband service. One day, the user cannot successfully connect to the VPN and receives an error message that states "Username and password are invalid on the domain." Which of the following should be done to correct this problem?()A、Call the corporate help desk to have the VPN server rebootedB、Re-enter the username and password in the VPN connection and reconnectC、Call the broadband Internet provider to replace the SOHO router with a newer modelD、Ping the corporate VPN server to ensure it is online

考题 A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()A、The laptop is missing the software supplicantB、The access point SSID is hidden.C、The laptop only supports TKIP and AES encryption,D、The access point is on the wrong channel.

考题 An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()A、SSHB、Remote Desktop ConnectionC、TelnetD、VPN

考题 Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram

考题 A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B、Increase the number of licenses; using smit chaili censeC、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D、Change User can logi field from false to true: using smit chuser.

考题 A system administrator is unable to unmount a file system. Which is the appropriate command to determine who or what is accessing the file system?()A、who /filesystemB、lsfs /filesystemC、fuser /filesystemD、umount -f /filesystem

考题 An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB

考题 An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A、/tmpB、/var/preserveC、/var/tmp/$USERD、$HOME/.vi

考题 Your company has an Active Directory domain. A user attempts to log on to the domain from a client computer and receives the following message: "This user account has expired Ask your administrator to reactivate the account." You need to ensure that the user is able to log on to the domain. What should you do()A、Modify the properties of the user account to set the account to never expire.B、Modify the properties of the user account to extend the Logon Hours setting.C、Modify the properties of the user account to set the password to never expire.D、Modify the default domain policy to decrease the account lockout duration.

考题 单选题A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()A The laptop is missing the software supplicantB The access point SSID is hidden.C The laptop only supports TKIP and AES encryption,D The access point is on the wrong channel.

考题 单选题A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()A Request the user to logoff and log back on.B Add the user as an administrator on their local machine.C Add the user as an administrator on the server.D Run an ipconfig /renew on the user’s machine.

考题 单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A Phishing scamB Social engineeringC Man-in-the-MiddleD Shoulder surfing

考题 单选题A system administrator periodically receives calls from users who complain about poor performance with their application. Use the following sar command output to answer the question: Which of the following system resources need more investigation?()A CPUsB DiskC MemoryD NetworkX

考题 单选题An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A /tmpB /var/preserveC /var/tmp/$USERD $HOME/.vi

考题 单选题A system administrator is unable to unmount a file system. Which is the appropriate command to determine who or what is accessing the file system?()A who /filesystemB lsfs /filesystemC fuser /filesystemD umount -f /filesystem

考题 单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A As the root user from serverA run the command rhost serverBB As the root user from serverA run the command rlogin serverBC As the desired user from serverB run the command rhost serverAD As the desired user from serverA run the command rlogin serverB

考题 单选题An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()A  Create an action plan.B  Escalate the issue.C  Reboot the mail server.D  Document the solution.

考题 单选题A user is unable to determine the default system texteditor. How can the local administrator assist the user by identifying the default text editor for the system?()A Login as the user and run 'echo $ENV'.B Login as root and run the 'env' command.C Login as root and 'cat /etc/environment'.D Login as the user and run the 'env' command.