网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()
A

Baseline configuration

B

Security policy

C

Performance and transaction logs

D

Physical network diagram


参考答案

参考解析
解析: 暂无解析
更多 “单选题Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A Baseline configurationB Security policyC Performance and transaction logsD Physical network diagram” 相关考题
考题 Which of the following statements about internet is (are) correct?Ⅰ.Each host in internet only has a IP address.Ⅱ.It is possible to have multiple names corresponding to the same IP address.Ⅲ.In users' points, Internet means a virtual network.A.NoneB.Ⅰ and ⅡC.Ⅱ and ⅢD.All

考题 You are writing an application that uses isolated storage to store user preferences.The application uses multiple assemblies.Multiple users will use this application on the same computer.You need to create a directory named Preferences in the isolated storage area that is scoped to the current Microsoft Windows identity and assembly.Which code segment should you use?()A.B.C.D.

考题 Users can define policy to control traffic flow between which two components? ()(Choose two.) A. from a zone to the router itselfB. from a zone to the same zoneC. from a zone to a different zoneD. from one interface to another interface

考题 Which two statements are true about the configure exclusive command?() A. It allows users to retain all uncommitted changes when exiting exclusive configuration mode.B. It allows multiple users to edit private copies of the configuration concurrently.C. It causes the loss of all uncommitted changes when exiting exclusive configuration mode.D. It excludes other users from editing the configuration.

考题 Several users from the same location are reporting problems accessing the intranet server. Anadministrator has verified that no other remote areas are having issues connecting to the sameserver.Which of the following steps should the administrator perform NEXT?()A. Determine what has changedB. Test a solution.C. Establish the most probable causeD. Escalate the problem to the right section

考题 Which of the following BEST describes server virtualization?()A、 A single logical server operating on multiple physical servers.B、 Applications hosted on a single server and deployed to multiple users.C、 Multiple servers used to host applications for multiple users.D、 Multiple logical servers operating on the same physical server.

考题 Your network contains multiple computers that run Windows XP Professional. Multiple users share the computers. You need to ensure that users can switch their keyboard layouts between multiple languages. What should you do?() A、Install the Multilingual User Interface (MUI) pack.B、From Internet Explorer, modify the Language Preferences.C、From the Keyboard settings, update the driver for the keyboard. D、From Regional and Language Options, modify the Text services and input languages settings.

考题 Your network consists of a single Active Directory domain. The functional level of the forest is Windows Server 2008 R2.   You need to create multiple password policies for users in your domain.   What should you do()A、From the Active Directory Schema snap-in, create multiple class schema objects.B、From the ADSI Edit snap-in, create multiple Password Setting objects.C、From the Security Configuration Wizard, create multiple security policies.D、From the Group Policy Management snap-in, create multiple Group Policy objects.

考题 When is the site-to-site remote access model appropriate? ()A、for multiple ISDN connectionsB、for modem concentrated dial-up connectionsC、for a group of users in the same vicinity sharing a connectionD、for use by mobile users

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue

考题 Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram

考题 When arriving at the customers location, two different users describe the problem, and from their description it seems to be two separate problems. Which of the following is an appropriate step to take?()A、Ignore both of them and decide what the real problem is.B、Set up a separate call for each problem.C、Have them duplicate the problem at the device.D、Ask a third person and see if the problem is the same thing.

考题 Which of the following best describes how locks are used in DB2?()A、To maintain control of updated rows for commit processingB、To ensure only committed changes are altered by another applicationC、To allow two applications to update the same row of data simultaneouslyD、To prevent multiple applications from accessing the same data simultaneously

考题 Users can define policy to control traffic flow between which two components?()A、from a zone to the device itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

考题 Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

考题 Which phrase best describes RMAN multiplexed backup sets?()A、Stripes a single backup set across multiple channels.B、Identical copies of backup pieces within a backup set.C、Multiple backup sets with multiple channels configured.D、Simultaneous reads from multiple files and writes into the same backup piece.

考题 Your network consists of a single Active Directory domain. The functional level of the forest is Windows Server 2008. You need to create multiple password policies for users in your domain. What should you do()A、From the Schema snap-in, create multiple class schema objects.B、From the ADSI Edit snap-in, create multiple Password Setting objects.C、From the Security Configuration Wizard, create multiple security policies.D、From the Group Policy Management snap-in, create multiple Group Policy objects.

考题 You have a computer that runs Windows XP Professional. Multiple users share the computer. Users work in either French or English. You need to ensure that users can change the language in which the system menus appear. What should you do first?() A、From the Display Properties, modify the Desktop settings.B、From Internet Explorer, modify the Language Preferences. C、From the Multilingual User Interface (MUI) pack installation CD, run muisetup.exe. D、From Regional and Language Options, modify the Location settings and the Input Languages settings. 

考题 单选题Which phrase best describes RMAN multiplexed backup sets?()A Stripes a single backup set across multiple channels.B Identical copies of backup pieces within a backup set.C Multiple backup sets with multiple channels configured.D Simultaneous reads from multiple files and writes into the same backup piece.

考题 单选题Which of the following BEST describes server virtualization?()A  A single logical server operating on multiple physical servers.B  Applications hosted on a single server and deployed to multiple users.C  Multiple servers used to host applications for multiple users.D  Multiple logical servers operating on the same physical server.

考题 单选题When is the site-to-site remote access model appropriate? ()A for multiple ISDN connectionsB for modem concentrated dial-up connectionsC for a group of users in the same vicinity sharing a connectionD for use by mobile users

考题 单选题When is the site-to-site remote access model appropriate? ()A  for multiple ISDN connectionsB  for modem concentrated dial-up connectionsC  for a group of users in the same vicinity sharing a connectionD  for use by mobile users

考题 单选题A technician is dispatched to a location. While working, the technician’s cell phone rings. Which of the following actions should the technician take?()A Answer the call to determine its importance.B Ignore the call and return the call from a land line.C Answer the call and leave the location in order to talk.D Silence the phone and allow the call to go to voice mail.

考题 单选题A towboat has the same draft as the barges it is pushing ahead. If the distance from the stern of the towboat to the head of the tow is 260m,where is the approximate location of the pivot point of the unit?()A At the head of the towB 75m from the head of the towC 120m from the head of the towD 180m from the head of the tow

考题 单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A  Implement preventative measures.B  Close the issue.C  Document the outcome.D  Question other users to make sure they are not having the same issue.

考题 单选题You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer.  What should you do? ()A Configure File signature verification to block driver installation, and set driver signing as a system default.B Remove all users from the Power User group.C Create a Local Computer Policy to prevent users from installing drivers.D Create a Local Computer Policy to enable Windows File Protection.

考题 单选题Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?()A Determine what has changedB Test a solution.C Establish the most probable causeD Escalate the problem to the right section