网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Users complain they cannot communicate with a server.  The system administrator suspects there may be a problem with the Ethernet adapter or with the way it is configured.  Which command can be run to verify the adapter is configured correctly?()
A

netstat -in

B

ifconfig -a

C

arp -a

D

cfgmgr


参考答案

参考解析
解析: 暂无解析
更多 “单选题Users complain they cannot communicate with a server.  The system administrator suspects there may be a problem with the Ethernet adapter or with the way it is configured.  Which command can be run to verify the adapter is configured correctly?()A netstat -inB ifconfig -aC arp -aD cfgmgr” 相关考题
考题 We can infer from this passage that______.A. people cannot sent visible information until 19th centuryB. we cannot communicate without soundC. the ways of communication are similar in different countriesD. in ancient time, enough people is necessary to send messages over distance

考题 We cannot communicate with the French guests because ______we ______ he speaks French.A、neither orB、either norC、neither norD、either or

考题 You are the administrator for your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 20 new PXE-compliant computers on the marketing segment of your network. The new computers do not have operating systems installed.You create a RIS image. You load the image onto the RIS server. You then start the new computers.You find that the new computers cannot connect to the RIS server. You verify that the new computers cannot connect to the RIS server. You verify that the existing client computers in the network can connect to the network servers, including the RIS server. You want to enable the new computers to connect to the RIS server.What should you do?A.Add a Windows 2000 Server computer running WINS to the network.B.Add a Windows 2000 Server computer running DHCP to the network.C.Add the domain Everyone group to the RIS OS image security settings.D.Place the new computers on the same segment as the RIS server.

考题 Which command will configure a directory /commonfiles so that a user cannot delete files owned by other users in the same group?() A.chmod +S /commonfilesB.chmod 4775 /commonfilesC.chmod 1777 /commonfilesD.chmod -orgx /commonfiles

考题 On the Internet, users can share( )and communicate with each other.A.process B.tasks C.resources D.documents

考题 A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A、the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor groupB、the user can see all the users except those in the Admin group, but can only modify the user’s own accountC、the user can see only the user’s own account, and cannot modify itD、the user can see only the user’s own account, and can change the password only

考题 Which of the following BEST describes the purpose of user account control (UAC) in WindowsVista?()A、UAC ensures that standard users cannot access the files and folders of administrative users.B、UAC allows a computer administrator to add new user accounts to the system, configure passwords and settings for existing users, or remove existing user accounts.C、UAC ensures that viruses and other malware cannot infect the computer, eliminating the need for third-party antivirus solutions.D、UAC ensures that important changes cannot be made to Windows Vista without the permission of a computer administrator.

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable

考题 After updating serverB’s network configurations, an administrator notices that serverA, which resides in a different subnet, is unable to communicate with serverB via ssh or telnet. As ping’s to the server fail, the administrator logs onto serverB via a console and finds an available interface en0 in the ’up’ state. From the console connection, en0 can communicate with other servers in the same subnet. What is the most likely cause of the problem?()A、en0 has no associated ip address.B、serverB is missing its default route.C、serverB and serverA cannot connect due to a firewall.D、en0 has been set up to block traffic from servers that are in different subnets.

考题 Users complain they cannot communicate with a server.  The system administrator suspects there may be a problem with the Ethernet adapter or with the way it is configured.  Which command can be run to verify the adapter is configured correctly?()A、netstat -inB、ifconfig -aC、arp -aD、cfgmgr

考题 Users complain an AIX server is running slow.  Which of the following commands can be run to determine what is consuming systems resources?()A、 tprofB、 lpstatC、 ps auxD、 entstat

考题 Companycom is using shared processor LPARs exclusively, including the Virtual IO Server. The users are complaining about response time. The application LPARs can be heavy processor users. The Virtual IO Server has been measured to be processor constrained. How should the Virtual IO Server's shared processor LPAR be configured?()A、Capped and with a lower shareB、Uncapped and with a lower shareC、Uncapped and with a higher shareD、Capped and with no change in share

考题 Which command will configure a directory /commonfiles so that a user cannot delete files owned by other users in the same group?()A、chmod +S /commonfilesB、chmod 4775 /commonfilesC、chmod 1777 /commonfilesD、chmod -orgx /commonfiles

考题 You are the administrator of Company.com’s network.  Your network has 100 Windows 2000 Professional computers and 10 Windows 2000 Server computers.  Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. In addition, the network servers is configured with disk quotas for the NTFS volume that contains the home folders. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder.   When he attempts to save files to the folder, he receives the following error message: “Insufficient disk space.” Other users are not experiencing this problem with their home folders.   You want to enable the user to save files in his home folder.  What should you do?()A、 Use Windows Backup to archive and remove old files on the server. B、 Increase the server’s disk quota entry for the user to accommodate the additional files. C、 Log on to the network as a Recovery Agent.Decrypt all of the user’s files in his home folder. D、 Log on to the network by using the domain Administrator account.Grant the user Full Control permission to his home folder.

考题 Which result or results do these actions produce?()A、Users in both departments can access their files from the network.B、Users in the accounting department can view the legal department’s documents.C、Users in the legal department cannot view the accounting department’s documents.D、Company managers can access and modify both departments’ files.

考题 You administer Company's network that consists of 100 Windows 2000 Professional computers and nine Windows 2000 Server computers. All users at Company save their work files in home folders on a network server. The network server is configured with two NTFS volumes. One of the NTFS volumes contains the home folders for the users at Company and the other NTFS volume contains a shared folder named PROGRESS, which is used for users to save temporary work files in. Disk quotas and Encrypting File System (EFS) is enabled on the NTFS volume with the home folders. All users have a default limit of 100 MB and the option to deny space to users who exceed their limit has been enabled.  A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder. The user currently has no data stored in the PROGRESS folder. When he attempts to save files to his home folder, he receives the following error message: "Insufficient disk space." Other users are not experiencing this problem with their home folders. You want to allow the user to save files on the network server.  What should you do?()A、 Use Windows Backup to archive and remove old files on the server.B、 Compress the files in the user’s home folder to allow additional files to be saved.C、 Move some of the files from the user’s home folder to the PROGRESS share folder.D、 Log on the network as a Recovery Agent. Decrypt all of the user’s files in his home folder. E、 Lon on to the network by using the domain Administrator account. Grant the user Full Control permission to his home folder.

考题 You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()A、Users in both departments can access to their own files from the network.B、Users in the Accounting department can view the Legal department’s documents.C、Users in the Legal department cannot view the Accounting department’s documents.D、Company managers can access and modify both departments’ files.

考题 You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner.  What should you modify?()A、the Federation TrustB、the EWS virtual directoryC、the default sharing policyD、the Organizational Relationship

考题 单选题Users complain an AIX server is running slow.  Which of the following commands can be run to determine what is consuming systems resources?()A  tprofB  lpstatC  ps auxD  entstat

考题 单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A Default gatewayB The ports on the switchC Port security on the server's switch portD Ethernet cable

考题 单选题A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor groupB the user can see all the users except those in the Admin group, but can only modify the user’s own accountC the user can see only the user’s own account, and cannot modify itD the user can see only the user’s own account, and can change the password only

考题 单选题You are a Windows Server 2008 systems administrator responsible for configuring FTP Publishing Servicefor use by members of your organization’s engineering department. The name of the server is FTPServer01. Several users have reported that they are able to access most files through the FTP site,but they cannot access the contents of the Drawings folder. You have verified that these users. Windowsaccounts have the correct file system permissions for this folder. You want to minimize the permissionsgranted to all the users. Which of the following changes should you make to enable users to access thisfolder?()A Change the permissions for the IUSR_FTPServer01 account on the Drawings folder.B Create new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.C Disable the Allow Only Anonymous Connections option.D Add the users to the local Administrators group on FTPServer02.

考题 单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A  Default gatewayB  The ports on the switchC  Port security on the servers switch portD  Ethernet cable

考题 单选题An administrator is in charge of several remote servers in Japan. Users call and complain they cannot connect to the company’s resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running?()A pingB netstatC nbtstatD telnet

考题 单选题Certkiller is having an Active Directory Rights Management Service (AD RMS) server.  Users machines are running Windows Vista and an Active Directory domain is configured at Microsoft Windows Server 2003 functional level.  Users are complaining that they cannot protect their documents. You need to configure AD RMS so that users are able to protect their documents. What should you do()A Use a group policy to install the AD RMS client computersB Add the ADRMSADMIN account to the local administrators group on the computersC Add the ADRMSSRVC account to the local administrators on the AD RMS serverD Establish an e-mail account in Active Directory Domain Services (AD DS) for each userE Upgrade the active directory domain to the functional level of Windows 2008 server

考题 单选题You are the administrator of Company.com’s network.  Your network has 100 Windows 2000 Professional computers and 10 Windows 2000 Server computers.  Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. In addition, the network servers is configured with disk quotas for the NTFS volume that contains the home folders. All users have a default limit of 100 MB, and the option to deny space to users who exceed their limit has been enabled. A user reports that he cannot save any files to his home folder. He also cannot update files in his home folder.   When he attempts to save files to the folder, he receives the following error message: “Insufficient disk space.” Other users are not experiencing this problem with their home folders.   You want to enable the user to save files in his home folder.  What should you do?()A  Use Windows Backup to archive and remove old files on the server. B  Increase the server’s disk quota entry for the user to accommodate the additional files. C  Log on to the network as a Recovery Agent.Decrypt all of the user’s files in his home folder. D  Log on to the network by using the domain Administrator account.Grant the user Full Control permission to his home folder.

考题 多选题A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()APerform a policy trace for the specific user and review the output to isolate the problem.BReview the Events log.CReview the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.DReview the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.