网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?()
A

Determine what has changed

B

Test a solution.

C

Establish the most probable cause

D

Escalate the problem to the right section


参考答案

参考解析
解析: 暂无解析
更多 “单选题Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?()A Determine what has changedB Test a solution.C Establish the most probable causeD Escalate the problem to the right section” 相关考题
考题 Users can define policy to control traffic flow between which two components? ()(Choose two.) A. from a zone to the router itselfB. from a zone to the same zoneC. from a zone to a different zoneD. from one interface to another interface

考题 Users are reporting that they are still experiencing network issues even though a fix was recentlyapplied. Which of the following troubleshooting methodology steps is the administrator using?() A. Escalating the problemB. Testing the solution and identifying the effectsC. Continuing to gather information about the same symptomsD. Documenting the solution and the entire process

考题 Several users from the same location are reporting problems accessing the intranet server. Anadministrator has verified that no other remote areas are having issues connecting to the sameserver.Which of the following steps should the administrator perform NEXT?()A. Determine what has changedB. Test a solution.C. Establish the most probable causeD. Escalate the problem to the right section

考题 CALDOVREP is ______.A.a pilot stationB.a portC.a mandatory ship reporting systemD.a vessel commences its voyage from a location beyond one limit of the inshore traffic zone

考题 Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram

考题 When arriving at the customers location, two different users describe the problem, and from their description it seems to be two separate problems. Which of the following is an appropriate step to take?()A、Ignore both of them and decide what the real problem is.B、Set up a separate call for each problem.C、Have them duplicate the problem at the device.D、Ask a third person and see if the problem is the same thing.

考题 Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A、dig company.com nsB、ipconfig/allC、ifconfig-aD、dig company.com mx

考题 A disk contains several logical volumes.  Which of the following commands indicates how much data is read from or written to a particular logical volume on the same disk?()A、 sar B、 iostat C、 svmon D、 filemon

考题 Which of the following commands should be used to show how much data is read from or written to a particular logical volume, given there are several other logical volumes on the same disk?()A、 sarB、 lslvC、 iostatD、 filemon

考题 What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller

考题 Users can define policy to control traffic flow between which two components?()A、from a zone to the device itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

考题 Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

考题 You have a computer that runs Windows XP Professional. Multiple users share the computer. Users work in either French or English. You need to ensure that users can change the language in which the system menus appear. What should you do first?() A、From the Display Properties, modify the Desktop settings.B、From Internet Explorer, modify the Language Preferences. C、From the Multilingual User Interface (MUI) pack installation CD, run muisetup.exe. D、From Regional and Language Options, modify the Location settings and the Input Languages settings. 

考题 多选题Users of a site-to-site VPN are reporting performance problems. The VPN connection employs IPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()AEmploy path MTU discovery.BSet the MTU higher than 1500 bytes.CTurn off pre-fragmentation for IPSec.DSet the MTU value to 1400 bytes.

考题 多选题Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()ALoop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannotBUDLD protects against STP failures caused by cabling problems that create one-way links.CLoop guard detects and protects against duplicate packets being received and transmitted on different portsDUDLD protects against unidirectional cabling problems on copper and fiber media.ELoop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

考题 单选题Web users are reporting issues downloading various types of media. Which of the following shouldthe administrator do FIRST?()A Find out what has recently changed on the networkB Create an action plan and solution identifying potential effects.C Continue to gather information and see what other problems may exist.D Determine the most probable cause.

考题 多选题Users of a site-to-site VPN are reporting performance problems. The VPN connection employsIPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()AEmploy path MTU discovery.BSet the MTU higher than 1500 bytes.CTurn off pre-fragmentation for IPSec.DSet the MTU value to 1400 bytes.

考题 单选题A towboat has the same draft as the barges it is pushing ahead. If the distance from the stern of the towboat to the head of the tow is 260m,where is the approximate location of the pivot point of the unit?()A At the head of the towB 75m from the head of the towC 120m from the head of the towD 180m from the head of the tow

考题 单选题Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()A Configure a Windows Connect Now Group Policy.B Configure a Wireless Network (IEEE 802.11) Policy.C Delete the rogue network from the Network and Sharing Center on each computer.D Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.

考题 单选题Which of the following commands should be used to show how much data is read from or written to a particular logical volume, given there are several other logical volumes on the same disk?()A  sarB  lslvC  iostatD  filemon

考题 单选题A new customer wants to install a Power 750 in a warehouse location that has no local staff to support it. They are concerned about hardware support and would like to have the system notify IBM service if there is an issue.Which actions will address the customer concern?()A Enable automatic problem reporting from smitB Use IVM to enable console mirroring to IBM Remote Support.C Use the HMC to enable reporting through Electronic Service Agent.D Enable Automatic Problem Reporting in ASMI using he embedded modem on the FSP.

考题 单选题Users are reporting that they are still experiencing network issues even though a fix was recentlyapplied. Which of the following troubleshooting methodology steps is the administrator using?()A Escalating the problemB Testing the solution and identifying the effectsC Continuing to gather information about the same symptomsD Documenting the solution and the entire process

考题 单选题You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer.  What should you do? ()A Configure File signature verification to block driver installation, and set driver signing as a system default.B Remove all users from the Power User group.C Create a Local Computer Policy to prevent users from installing drivers.D Create a Local Computer Policy to enable Windows File Protection.

考题 多选题Which two statements accurately describe a role?()AA role can be given to a maximum of 1000 users.BA user can have access to a maximum of 10 roles.CA role can have a maximum of 100 privileges contained in it.DPrivileges are given to a role by using the CREATE ROLE statement.EA role is a named group of related privileges that can be granted to the user.FA user can have access to several roles, and several users can be assigned the same role.

考题 单选题Which change in the condition of the seas could indicate the formation of a tropical storm or hurricane several hundred miles from your location? ()A A long swell from an unusual directionB A lengthy lull in the wind and seasC Large seas coming from different directionsD A brisk chop from the southeast

考题 单选题What is the major advantage of high altitude observations?()A Errors due to unusual parallax are eliminatedB The same body can be used for a fix from observations separated by several minutesC The declination is the only information needed from the almanacD The semidiameter correction of the sextant altitude is eliminated

考题 单选题From the whole passage, we know that ______.A men and women have exactly the same brains in their headsB men and women have quite different brains in their headsC men think of mathematical problems while women think of languagesD men and women see the world around them in just the same way