网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A user has just moved a PC from one office to another. The patch cable and the NIC do notappear to be functioning in the new office but were working before the move. The patch cable is plugged in correctly to both the NIC and the wall jack. Which of the following actions should the technician take FIRST?()
- A、Verify that the network card is compatible with the operating system.
- B、Verify that the port on the switch is enabled.
- C、Update the network card driver.
- D、Replace the network cable with a crossover cable.
参考答案
更多 “A user has just moved a PC from one office to another. The patch cable and the NIC do notappear to be functioning in the new office but were working before the move. The patch cable is plugged in correctly to both the NIC and the wall jack. Which of the following actions should the technician take FIRST?()A、Verify that the network card is compatible with the operating system.B、Verify that the port on the switch is enabled.C、Update the network card driver.D、Replace the network cable with a crossover cable.” 相关考题
考题
Adam has just graduated from the university, he is a green hand in the marketing management.
A、works hardB、has a skill in growing plantsC、is wet behind the earsD、is very experienced
考题
A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()A. Allow the user to continue workingB. Check for virusesC. Re-image the hard driveD. Document time/date for later referenceE. Prevent users from accessing the PCF. Turn off PC
考题
A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()
A. Perform an antivirus program scanB. Boot the machine into Safe ModeC. Remove the machine from the networkD. Check for system security patches
考题
The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()A.from host PC1 to host 5.1.1.10B.from host PC1 to host 5.1.3.10C.from host PC2 to host 5.1.2.10D.from host PC2 to host 5.1.3.8
考题
The August Shipment has just__________from Pusan and is waiting in the receiving dock.A.examined
B.delayed
C.sent
D.arrived
考题
A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A、The user has a UID less than 200B、The user has been defined as an administrative userC、The file /usr/es/sbin/cluster/clpasswd is not executable by the userD、The user needs explicit authorization to change their password cluster-wide
考题
A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A、The user copied to a read-only folder share.B、The user changed the attributes of the files.C、The user copied the files from the local My Documents folder.D、The user moved instead of copied the files.
考题
All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled
考题
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configured.D、The PC has connectivity up to Layer 5 of the OSI model.E、The PC has the TCP/IP protocol stack correctly installed.
考题
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC.If a reply is received, what does this confirm?()A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configuredD、The PC has connectivity up to Layer 5 of the OSI modelE、The PC has the TCP/IP protocol stack correctly installed.
考题
A user has been having difficulty with their PC. Which of the following is the BEST response atechnician should give when a user asks for the definition of a particular bluescreen message?()A、“It is a message that informs the technician of what hardware needs to be replaced.”B、“A bluescreen message is just another name for an error.”C、“It provides the technician with more information about the problem.”D、“It is a complex message that is very difficult to explain to those who are not familiar with computers.”
考题
User 1 has a printer connected to a PC. User 2 is requesting the ability to print large documents to that printer. Which of the following is the BEST way for User 2 to gain access to the printer?()A、Use infrared to print remotely.B、Unplug the printer and install it on the new pc.C、Share the Printer in Windows.D、Update universal drivers to allow printing.
考题
The technician is moving a user’s files from a Windows XP PC to a Windows Vista PC. Which of the following directories corresponds to each operating system?()A、c:/users/user1/documents to c:/users/user1/documentsB、c:/documents and settings/user1/my documents to c:/users/user1/documentsC、c:/documents and settings/user1/my documents to c:/documents and settings/user1/my documentsD、c:/users/user1/my documents to c:/users/user1/documents
考题
A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()A、Allow the user to continue workingB、Check for virusesC、Re-image the hard driveD、Document time/date for later referenceE、Prevent users from accessing the PCF、Turn off PC
考题
An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB
考题
You have a computer named Computer1 that runs Windows 7. Computer1 has a shared printer. You needto configure Computer1 so that only Administrators are authorized to shut down the computer. What should you do?()A、From User Accounts, modify the user profiles settings.B、From User Accounts, modify the User Account Control (UAC) settings.C、From the local computer policy, modify the Security Options.D、From the local computer policy, modify the User Rights Assignment.
考题
单选题A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()A
Agree with the user’s complaintsB
Clarify the user’s statementsC
Minimize the user’s criticismD
Shadow the other technician on the next repair
考题
单选题An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A
The PC has connectivity with a local host.B
The PC has connectivity with a Layer 3 device.C
The PC has a default gateway correctly configured.D
The PC has connectivity up to Layer 5 of the OSI model.E
The PC has the TCP/IP protocol stack correctly installed.
考题
单选题A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()A
Perform an antivirus program scanB
Boot the machine into Safe ModeC
Remove the machine from the networkD
Check for system security patches
考题
单选题In a diesel engine, when the fuel is injected into the cylinder,()A
the piston is just coming upward from the bottom dead centerB
the piston has moved about one-fifth of the way upC
the piston has moved most of the way up and almost reached the TDCD
the piston has just past the TDC
考题
多选题A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()AAllow the user to continue workingBCheck for virusesCRe-image the hard driveDDocument time/date for later referenceEPrevent users from accessing the PCFTurn off PC
考题
单选题Your end user customer has not requested a ServicePac to cover the base unit and options they have purchased. What is a compelling reason to offer service? ()A
IBM ServicePacs remove a liability from you the reseller in the event of fireB
IBM ServicePacs remove a liability from you the reseller in the event of floodingC
IBM ServicePacs provide improved warranty coverageD
Service just adds a layer of cost you do not needE
all of the above
考题
单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A
As the root user from serverA run the command rhost serverBB
As the root user from serverA run the command rlogin serverBC
As the desired user from serverB run the command rhost serverAD
As the desired user from serverA run the command rlogin serverB
考题
单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A
The wireless access point is using MAC address filteringB
The user has connected to a nearby wireless access point from another officeC
The user has configured the wireless settings with the wrong encryption typeD
The wireless access point has SSID broadcast disabled
考题
单选题The user HR owns the EMP table. The user HR grants privileges to the user SCOTT by using this command: SQL GRANT SELECT,INSERT,UPDATE ON emp TO scott WITH GRANT OPTION; The user SCOTT executes this command to grant privileges to the user JIM: SQL GRANT SELECT,INSERT,UPDATE ON hr.emp TO jim; Now, the user HR decides to revoke privileges from JIM using this command: SQL REVOKE SELECT,INSERT,UPDATE ON emp FROM jim; Which statement is true after HR issues the REVOKE command()A
The command fails because SCOTT still has privileges.B
The command succeeds and privileges are revoked from JIM.C
The command fails because HR cannot revoke the privileges from JIM.D
The command succeeds and only HR has the privilege to perform the SELECT, INSERT, and UPDATEoperations on the EMP table.
考题
单选题A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A
The user copied to a read-only folder share.B
The user changed the attributes of the files.C
The user copied the files from the local My Documents folder.D
The user moved instead of copied the files.
考题
单选题You would like to configure your PC's IP address of 10.10.0.156 as an FTP host with a username of user and a password of mypass.Which configuration command accomplishes this goal?()A
host user pc 10.10.0.156 ftp user mypassB
host user pc 10.10.0.156 tftp user mypassC
host name user pc 10.10.0.156 ftp user mypassD
host name user pc 10.10.0.156 tftp user mypass
热门标签
最新试卷