网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A user has no network connectivity. A check of the associated port indicates that the interface is up, the line protocol is down. Which item would most likely cause this problem?()

  • A、Speed mismatch
  • B、Incorrect encapsulation
  • C、MTU set too low
  • D、Duplex mismatch

参考答案

更多 “A user has no network connectivity. A check of the associated port indicates that the interface is up, the line protocol is down. Which item would most likely cause this problem?()A、Speed mismatchB、Incorrect encapsulationC、MTU set too lowD、Duplex mismatch” 相关考题
考题 A router has been configured with the settings shown below:[edit]user@host show system authentication-order authentication-order [ radius tacplus ];The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()A.The user lab will not be able to login.B.The user lab will be authenticated against the local database and will be able to login.C.The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.D.The user will be able to login only if tries to login as the root user.

考题 A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()A、A custom logo on the user interface pageB、A maximum timeout value of 600 minutesC、A maximum time out value of 1200 minutesD、A default Juniper Networks logo on the user interface page

考题 The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()A、The database user OPS$SKD will be able to administer the database.B、The authentication detail for the database user OPS$SKD is recorded in the password file.C、The local operating system user SKD will be able to access the database instance without specifying the username and password.D、The database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.

考题 A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A、The user has a UID less than 200B、The user has been defined as an administrative userC、The file /usr/es/sbin/cluster/clpasswd is not executable by the userD、The user needs explicit authorization to change their password cluster-wide

考题 A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user.  The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession.  Which method in HttpSession is used to accomplish this?()A、 getCreationTimeB、 invalidateAfterC、 getLastAccessedTimeD、 getMaxInactiveInterval

考题 A user has purchased a laptop that has no means to charge the battery. Which of the followingwould the user MOST likely purchase?()A、USB cableB、AC adapterC、PCMCIA cardD、Replacement battery

考题 All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled

考题 A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugsthe cable into the only available laptop connection, but the connector is loose inside the port. TheMOST likely reason the connector is loose is the:()A、RJ-11 connector needs to be re-crimpedB、User has plugged into the laptop's NIC portC、User has plugged the wrong end of the cable into the portD、RJ-11 connector needs to be replaced with an RJ-45 connector

考题 Which of the following is the BEST way to make sure the network printer is automatically installed when the user logs on?()A、Log onto the user’s computer as a local administrator and install the printer.B、Make sure the user has permission to print to the printer.C、Create and implement a logon script.D、After the user has logged on, install the printer.

考题 A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A、The website has updated the security policies.B、The user’s identity has been stolen.C、The browser has been hijacked.D、The user typed the website address incorrectly.

考题 Which statement is true about the database and database-user used during installation of IMS Server?()A、A preexisting database user may be used but a new database has to be created during installation.B、A preexisting database may be used but a new database user has to be created during installation.C、A preexisting database and user may be used or a new database and user are created during installation.D、A preexisting database and user cannot be used; a new database and user are created during  installation.

考题 Your company has an Active Directory domain. A user attempts to log on to the domain from a client computer and receives the following message: "This user account has expired Ask your administrator to reactivate the account." You need to ensure that the user is able to log on to the domain. What should you do()A、Modify the properties of the user account to set the account to never expire.B、Modify the properties of the user account to extend the Logon Hours setting.C、Modify the properties of the user account to set the password to never expire.D、Modify the default domain policy to decrease the account lockout duration.

考题 多选题A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()AA custom logo on the user interface pageBA maximum timeout value of 600 minutesCA maximum time out value of 1200 minutesDA default Juniper Networks logo on the user interface page

考题 单选题A user reports that the Windows update function will not run on the computer but the Internet can be accessed. The user is running an original version of Windows XP Professional. Which of the following is MOST likely the cause?()A The user has not registered the copy of Windows.B The user has not applied at least Service Pack 1 to their system.C The user does not know what site to access for the updates.D The user needs to flush the DNS cache.

考题 单选题A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A The website has updated the security policies.B The user’s identity has been stolen.C The browser has been hijacked.D The user typed the website address incorrectly.

考题 填空题What kind of storage the user’s account now has?It now has 5,000 megabytes of ____ storage.

考题 单选题A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A The user has a UID less than 200B The user has been defined as an administrative userC The file /usr/es/sbin/cluster/clpasswd is not executable by the userD The user needs explicit authorization to change their password cluster-wide

考题 单选题A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()A Agree with the user’s complaintsB Clarify the user’s statementsC Minimize the user’s criticismD Shadow the other technician on the next repair

考题 单选题A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()A GetcreationtimeB InvalidateafterC GetlastaccessedtimeD Getmaxinactiveinterval

考题 单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A The user will be instructed to call the network administrator.B The user will fail authentication.C The user will be prompted to install a new device certificate on the MAG Series device.D The user will successfully authenticate and have full network access.

考题 单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A The wireless access point is using MAC address filteringB The user has connected to a nearby wireless access point from another officeC The user has configured the wireless settings with the wrong encryption typeD The wireless access point has SSID broadcast disabled

考题 单选题A remote user cannot connect to the office via VPN. The user has established Internet connectivity. Which of the following is the MOST likely next step in troubleshooting?()A Power cycle the VPN concentrator at the office.B Determine if the VPN service is running at the office.C Reinstall the VPN client at the remote computer.D Determine if the user has the correct VPN address and password.

考题 单选题Which statement is true about the database and database-user used during installation of IMS Server?()A A preexisting database user may be used but a new database has to be created during installation.B A preexisting database may be used but a new database user has to be created during installation.C A preexisting database and user may be used or a new database and user are created during installation.D A preexisting database and user cannot be used; a new database and user are created during  installation.

考题 单选题A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers respond with a reject for user lab?()A The user lab will not be able to login.B The user lab will be authenticated against the local database and will be able to login.C The user will be able to login only if tries to login as the root user.D The user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.

考题 多选题A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()APerform a policy trace for the specific user and review the output to isolate the problem.BReview the Events log.CReview the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.DReview the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

考题 单选题The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()A The database user OPS$SKD will be able to administer the database.B The authentication detail for the database user OPS$SKD is recorded in the password file.C The local operating system user SKD will be able to access the database instance without specifying the username and password.D The database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.

考题 多选题TestKing.com has a SQL Server 2005 computer. You have been assigned the task of retrieving information about a user who is currently logged in. You need to create a function that returns scalar information about the activity time for a particular user. What are two possible ways to achieve this goal?()ACreate a function that returns a list of values that represent the login times for the given user.BCreate a function that returns a list of values that represent the people who have logged more hours than the current user has logged.CCreate a function that returns a numeric value that represents the number of hours that a user has logged for the current day.DCreate a function that returns a numeric value that represents the number of hours that a user has logged for the current month.