网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()

  • A、net view
  • B、ipconfig
  • C、dig
  • D、ifconfig

参考答案

更多 “Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A、net viewB、ipconfigC、digD、ifconfig” 相关考题
考题 Many of the world’s great novels are reported ________ into films last year. A.to makeB.to have been madeC.to have madeD.to be making

考题 The Coast Guards reported ____________ a ship without hanging its national flag. A.to seeB.to have seenC.seeingD.seen

考题 It is reported ________great changes have been made.A.whichB.thatC.whileD.what

考题 It is reported that today _____ president will have lunch with _____ President Bush.A. the…theB. a…aC. the…/D. /…/

考题 His book is reported () into several foreign languages already. A、to be translatedB、to have translatedC、to translateD、to have been translated

考题 Several shoals______reported to exist in the area southwest of the Brothers.A.haveB.have beenC.hasD.has been

考题 The Authority reserves the right not to accept ______ for pilots by vessels in anchorages if the vessels have not reported their anchored position.A.bookingsB.commandsC.ordersD.Reports

考题 Multiple users have reported not being able to print to a network printer. Which of the followingcommands will test the network connectivity status of the printer?() A. rsyncB. netstatC. pingD. ipconfig

考题 Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A. net viewB. ipconfigC. digD. ifconfig

考题 A company has recently switched ISPs and is being assigned a new block of public addresses.  The public web and FTP servers must be re-addressed to support this change.  After changing IP addresses and updating the DNS records many customers have reported that they are not able to access the web or FTP servers.  Which of the following could have been done prior to making these changes to make it more transparent to users?()A、Reduce the TTL on the DHCP records.B、Configure a primary DNS server for the PTR records.C、Reduce the TTL on the DNS records.D、Configure a caching only DNS server.

考题 Several remote sales employees, who have come into the office this week, report that they are unable to get on the Internet, but no other users have reported similar issues.  The help desk hasescalated the issue and the case notes state that the users have IP addresses that begin with 169. Which of the following should the system administrator check FIRST?()A、DHCP serverB、Network switchesC、DNS serverD、Core router

考题 Multiple users have reported not being able to print to a network printer. Which of the followingcommands will test the network connectivity status of the printer?()A、rsyncB、netstatC、pingD、ipconfig

考题 Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address.  Which of the following tools would allow the administrator to test name resolution?()A、 net viewB、 ipconfigC、 digD、 ifconfig

考题 You have an enterprise subordinate certification authority (CA). You have a custom Version 3  certificate template.     Users can enroll for certificates based on the custom certificate template by using the Certificates  console.     The certificate template is unavailable for Web enrollment. You need to ensure that the certificate  template is available on the Web enrollment pages.     What should you do()A、Run certutil.exe -pulse.B、Run certutil.exe -installcert.C、Change the certificate template to a Version 2 certificate template.D、On the certificate template, assign the Autoenroll permission to the users.

考题 You have an Exchange Server 2010 organization.Users on the network use HTTPS to connect to Outlook Web App (OWA).The Client Access server uses a certificate issued by an internal certification authority (CA).You plan to deploy an e-mail encryption solution for all users. You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME from OWA.What should you do?()A、Issue a certificate to each userB、Instruct all OWA users to import a root CA certificateC、Modify the authentication settings of the OWA virtual directoryD、Configure the Client Access Server to use a certificate issued by a third-party CA

考题 You are the administrator of your company's network. You install 220 new Windows 2000 Professional computers in the Sales department. Two weeks later users report that five of the computers have stopped responding. You troubleshoot the five computers and find that the users have attached USB devices and have installed device drivers that are not supported by Windows 2000 Professional. You want to ensure that it does not happen again. You decide to configure the computer to install device drivers only for the devices that are included on the current hardware compatibility list (HCL). What should you do?()A、Use NTFS permission to restrict users access to the C:///WinNT/driver cache folder.B、Use NTFS permission to restrict users access to the C:///WinNT/system32/drivers folder.C、Configure Windows 2000 Professional to enable driver signing verification.D、Configure Windows 2000 Professional to trust the Microsoft certificate authority (CA).

考题 Your network contains a Windows Server 2008 R2 server that functions as a file server. All users have laptop computers that run Windows 7.   The network is not connected to the Internet. Users save files to a shared folder on the server. You need to design a data provisioning solution that meets the following requirements:   èUsers who are not connected to the corporate network must be able to access the files and the folders in the corporate network.    èUnauthorized users must not have access to the cached files and folders. What should you do?()A、Implement a certification authority (CA). Configure IPsec domain isolation.B、Implement a certification authority (CA). Configure Encrypting File System (EFS) for the drive that hosts the files.C、Implement Microsoft SharePoint Foundation 2010. Enable Secure Socket Layer (SSL) encryption.D、Configure caching on the shared folder. Configure offline files to use encryption.

考题 单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address.  Which of the following tools would allow the administrator to test name resolution?()A  net viewB  ipconfigC  digD  ifconfig

考题 单选题It’s reported that by the end of this month the output of cement in the factory _____ by about 10%.A will have risenB has risenC will be risingD has been rising

考题 单选题You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The network contains an internal root certification authority (CA).Users on the network use Outlook Anywhere.A Client Access server uses a wildcard certificate issued by a trusted third-party root CA.You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME. What should you do?()A Instruct all users to import the third-party root CA certificate.B Import the internal root CA certificate to the Client Access server.C Instruct all users to import the internal root CA certificate.D Issue a certificate to each user from the internal root CA

考题 单选题A technician has fixed a reported issue with a heavily used software program and users have verified that the program is working correctly. Which of the following should the technician do NEXT?()A Document the process and update the baseline.B Test the theory of probable cause and verify with the software vendor.C Establish a plan of action to be included in the business impact analysis.D Implement the software manufacturer workaround.

考题 多选题On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()ASign-in PolicyBRole Mapping RuleCRole RestrictionsDTrusted Server CA

考题 单选题You are a Windows Server 2008 systems administrator responsible for configuring FTP Publishing Servicefor use by members of your organization’s engineering department. The name of the server is FTPServer01. Several users have reported that they are able to access most files through the FTP site,but they cannot access the contents of the Drawings folder. You have verified that these users. Windowsaccounts have the correct file system permissions for this folder. You want to minimize the permissionsgranted to all the users. Which of the following changes should you make to enable users to access thisfolder?()A Change the permissions for the IUSR_FTPServer01 account on the Drawings folder.B Create new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.C Disable the Allow Only Anonymous Connections option.D Add the users to the local Administrators group on FTPServer02.

考题 多选题Which two statements are true when using the configure exclusive CLI command?()AMultiple users can enter configuration mode and have their own private configuration.BWhen a user commits, only the user's changes are committed.CA message indicates which other users are in configuration mode and what portion of the configuration they are editing.DOnly a single user can edit the configuration.

考题 多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configurationBAll users have their own private candidate configurationCWhen a user commits, all non conflicting changes made by all users are commitedDWhen a users commits, only the user's own changes are commited

考题 多选题Which two statements accurately describe a role?()AA role can be given to a maximum of 1000 users.BA user can have access to a maximum of 10 roles.CA role can have a maximum of 100 privileges contained in it.DPrivileges are given to a role by using the CREATE ROLE statement.EA role is a named group of related privileges that can be granted to the user.FA user can have access to several roles, and several users can be assigned the same role.

考题 单选题It can be inferred from the passage that ______.A malaria and yellow fever have been reported this yearB no new cases of smallpox have been reported this yearC smallpox victims no longer die when they contract the diseaseD smallpox is not transmitted from one person to another

考题 单选题_____ is reported in the newspapers that the talks between the two companies have not made any progress.A ThatB WhatC ItD As