网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A user has just moved a PC from one office to another. The patch cable and the NIC do notappear to be functioning in the new office but were working before the move. The patch cable is plugged in correctly to both the NIC and the wall jack. Which of the following actions should the technician take FIRST?()

  • A、Verify that the network card is compatible with the operating system.
  • B、Verify that the port on the switch is enabled.
  • C、Update the network card driver.
  • D、Replace the network cable with a crossover cable.

参考答案

更多 “A user has just moved a PC from one office to another. The patch cable and the NIC do notappear to be functioning in the new office but were working before the move. The patch cable is plugged in correctly to both the NIC and the wall jack. Which of the following actions should the technician take FIRST?()A、Verify that the network card is compatible with the operating system.B、Verify that the port on the switch is enabled.C、Update the network card driver.D、Replace the network cable with a crossover cable.” 相关考题
考题 Adam has just graduated from the university, he is a green hand in the marketing management. A、works hardB、has a skill in growing plantsC、is wet behind the earsD、is very experienced

考题 A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()A. Allow the user to continue workingB. Check for virusesC. Re-image the hard driveD. Document time/date for later referenceE. Prevent users from accessing the PCF. Turn off PC

考题 A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?() A. Perform an antivirus program scanB. Boot the machine into Safe ModeC. Remove the machine from the networkD. Check for system security patches

考题 The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()A.from host PC1 to host 5.1.1.10B.from host PC1 to host 5.1.3.10C.from host PC2 to host 5.1.2.10D.from host PC2 to host 5.1.3.8

考题 The August Shipment has just__________from Pusan and is waiting in the receiving dock.A.examined B.delayed C.sent D.arrived

考题 A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A、The user has a UID less than 200B、The user has been defined as an administrative userC、The file /usr/es/sbin/cluster/clpasswd is not executable by the userD、The user needs explicit authorization to change their password cluster-wide

考题 A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A、The user copied to a read-only folder share.B、The user changed the attributes of the files.C、The user copied the files from the local My Documents folder.D、The user moved instead of copied the files.

考题 All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled

考题 An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configured.D、The PC has connectivity up to Layer 5 of the OSI model.E、The PC has the TCP/IP protocol stack correctly installed.

考题 An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC.If a reply is received, what does this confirm?()A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configuredD、The PC has connectivity up to Layer 5 of the OSI modelE、The PC has the TCP/IP protocol stack correctly installed.

考题 A user has been having difficulty with their PC. Which of the following is the BEST response atechnician should give when a user asks for the definition of a particular bluescreen message?()A、“It is a message that informs the technician of what hardware needs to be replaced.”B、“A bluescreen message is just another name for an error.”C、“It provides the technician with more information about the problem.”D、“It is a complex message that is very difficult to explain to those who are not familiar with computers.”

考题 User 1 has a printer connected to a PC. User 2 is requesting the ability to print large documents to that printer. Which of the following is the BEST way for User 2 to gain access to the printer?()A、Use infrared to print remotely.B、Unplug the printer and install it on the new pc.C、Share the Printer in Windows.D、Update universal drivers to allow printing.

考题 The technician is moving a user’s files from a Windows XP PC to a Windows Vista PC. Which of the following directories corresponds to each operating system?()A、c:/users/user1/documents to c:/users/user1/documentsB、c:/documents and settings/user1/my documents to c:/users/user1/documentsC、c:/documents and settings/user1/my documents to c:/documents and settings/user1/my documentsD、c:/users/user1/my documents to c:/users/user1/documents

考题 A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()A、Allow the user to continue workingB、Check for virusesC、Re-image the hard driveD、Document time/date for later referenceE、Prevent users from accessing the PCF、Turn off PC

考题 An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB

考题 You have a computer named Computer1 that runs Windows 7. Computer1 has a shared printer. You needto configure Computer1 so that only Administrators are authorized to shut down the computer.  What should you do?()A、From User Accounts, modify the user profiles settings.B、From User Accounts, modify the User Account Control (UAC) settings.C、From the local computer policy, modify the Security Options.D、From the local computer policy, modify the User Rights Assignment.

考题 单选题A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()A Agree with the user’s complaintsB Clarify the user’s statementsC Minimize the user’s criticismD Shadow the other technician on the next repair

考题 单选题An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A The PC has connectivity with a local host.B The PC has connectivity with a Layer 3 device.C The PC has a default gateway correctly configured.D The PC has connectivity up to Layer 5 of the OSI model.E The PC has the TCP/IP protocol stack correctly installed.

考题 单选题A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()A Perform an antivirus program scanB Boot the machine into Safe ModeC Remove the machine from the networkD Check for system security patches

考题 单选题In a diesel engine, when the fuel is injected into the cylinder,()A the piston is just coming upward from the bottom dead centerB the piston has moved about one-fifth of the way upC the piston has moved most of the way up and almost reached the TDCD the piston has just past the TDC

考题 多选题A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()AAllow the user to continue workingBCheck for virusesCRe-image the hard driveDDocument time/date for later referenceEPrevent users from accessing the PCFTurn off PC

考题 单选题Your end user customer has not requested a ServicePac to cover the base unit and options they have purchased.  What is a compelling reason to offer service? ()A IBM ServicePacs remove a liability from you the reseller in the event of fireB IBM ServicePacs remove a liability from you the reseller in the event of floodingC IBM ServicePacs provide improved warranty coverageD Service just adds a layer of cost you do not needE all of the above

考题 单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A As the root user from serverA run the command rhost serverBB As the root user from serverA run the command rlogin serverBC As the desired user from serverB run the command rhost serverAD As the desired user from serverA run the command rlogin serverB

考题 单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A The wireless access point is using MAC address filteringB The user has connected to a nearby wireless access point from another officeC The user has configured the wireless settings with the wrong encryption typeD The wireless access point has SSID broadcast disabled

考题 单选题The user HR owns the EMP table. The user HR grants privileges to the user SCOTT by using this command:  SQL GRANT SELECT,INSERT,UPDATE ON emp TO scott WITH GRANT OPTION; The user SCOTT executes this command to grant privileges to the user JIM: SQL GRANT SELECT,INSERT,UPDATE ON hr.emp TO jim;  Now, the user HR decides to revoke privileges from JIM using this command: SQL REVOKE SELECT,INSERT,UPDATE ON emp FROM jim; Which statement is true after HR issues the REVOKE command()A The command fails because SCOTT still has privileges.B The command succeeds and privileges are revoked from JIM.C The command fails because HR cannot revoke the privileges from JIM.D The command succeeds and only HR has the privilege to perform the SELECT, INSERT, and UPDATEoperations on the EMP table.

考题 单选题A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A The user copied to a read-only folder share.B The user changed the attributes of the files.C The user copied the files from the local My Documents folder.D The user moved instead of copied the files.

考题 单选题You would like to configure your PC's IP address of 10.10.0.156 as an FTP host with a username of user and a password of mypass.Which configuration command accomplishes this goal?()A host user pc 10.10.0.156 ftp user mypassB host user pc 10.10.0.156 tftp user mypassC host name user pc 10.10.0.156 ftp user mypassD host name user pc 10.10.0.156 tftp user mypass