网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()
A

Block both IRC and ICMP

B

Utilize SNMP to identify IM users

C

Contact the IM carrier to request the IM account be disabled

D

Change the shaping setting to allow minimal traffic to reduce port hopping


参考答案

参考解析
解析: 暂无解析
更多 “单选题A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()A Block both IRC and ICMPB Utilize SNMP to identify IM usersC Contact the IM carrier to request the IM account be disabledD Change the shaping setting to allow minimal traffic to reduce port hopping” 相关考题
考题 A technician installs a CD-RW drive with a feature that enables the drive to write labels directly onto the disk. The computer will burn disks but will not write labels. Which of the following should the technician do NEXT?()A. Reboot the computerB. Remove the drive and reinstallC. Install the device driverD. Flash the BIOS

考题 The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A. Verity full system functionalityB. Identify the main problem and question the userC. Document their findings, actions, and outcomesD. Escalate the issue to upper management

考题 A technician is using a packet sniffer to identify a server. The technician observes the followingnetwork traffic:Which of the following is MOST likely to be the server?() A.HOST-AB.HOST-BC.HOST-CD.HOST-D

考题 Which of the following features would BEST be used to optimize real-time voice and video chat?()(Select TWO) A. Load balancingB. Caching enginesC. QosD. Fault tolerance systemsE. Traffic shaping

考题 A technician needs to ensure that a specific application on a single home user‘s computerreceives Internet traffic reliably. The home network provides access to three other users and theapplication relies on a specific protocol.Which of the following should the technician use?()A. DHCPB. PATC. ProxyD. IPX

考题 Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 A technician installs a CD-RW drive with a feature that enables the drive to write labels directly onto the disk. The computer will burn disks but will not write labels. Which of the following should the technician do NEXT?()A、Reboot the computerB、Remove the drive and reinstallC、Install the device driverD、Flash the BIOS

考题 A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()A、Update the antivirus applicationB、Install critical update security patchesC、Adjust the software firewall settingsD、Replace the current antivirus program

考题 The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A、Verity full system functionalityB、Identify the main problem and question the userC、Document their findings, actions, and outcomesD、Escalate the issue to upper management

考题 A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA、Power UsersB、UsersC、GuestsD、Administrato

考题 A technician wants to compare a new server performance over a period of time. Which of the following should the technician do FIRST?()A、Monitor processor performance logsB、Constantly check the task managerC、Use performance server logsD、Establish a baseline for the server

考题 After a baseline check was completed it was noted that the network was working far below the level of the last baseline. Which of the following should the technician do NEXT to determine where the network problems are occurring?()A、Upgrade the firmware on all routers and switchesB、Reboot the entire network one device at a timeC、Conduct a network traffic analysisD、Rerun the baseline to ensure the results were correct

考题 An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs

考题 A technician wants to create a spanned volume on a set of hard drives. Which of the following tools will identify if the drives will support a spanned volume?()A、System InformationB、Disk ManagementC、Device ManagerD、Task Manager

考题 Which of the following features would BEST be used to optimize real-time voice and video chat?()(Select TWO)A、Load balancingB、Caching enginesC、QosD、Fault tolerance systemsE、Traffic shaping

考题 A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A、DHCPB、PATC、ProxyD、IPX

考题 A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()A、Block both IRC and ICMPB、Utilize SNMP to identify IM usersC、Contact the IM carrier to request the IM account be disabledD、Change the shaping setting to allow minimal traffic to reduce port hopping

考题 单选题A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A DHCPB PATC ProxyD IPX

考题 单选题A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()A Update the antivirus applicationB Install critical update security patchesC Adjust the software firewall settingsD Replace the current antivirus program

考题 单选题A technician installs a CD-RW drive with a feature that enables the drive to write labels directly onto the disk. The computer will burn disks but will not write labels. Which of the following should the technician do NEXT?()A Reboot the computerB Remove the drive and reinstallC Install the device driverD Flash the BIOS

考题 单选题A technician wants to compare a new servers performance over a period of time. Which of the following should the technician do FIRST?()A  Monitor processor performance logsB  Constantly check the task managerC  Use performance server logsD  Establish a baseline for the server

考题 单选题A technician wants to compare a new server performance over a period of time. Which of the following should the technician do FIRST?()A Monitor processor performance logsB Constantly check the task managerC Use performance server logsD Establish a baseline for the server

考题 单选题All of these are fundamental building blocks of a differentiated services Traffic Conditioner Block except which one?()A dropperB classifierC markerD querierE meterF shaper

考题 多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs

考题 单选题After a technician installs a video card, which of the following should the technician configure NEXT?()A ResolutionB ColorsC Dots per inchD Refresh rate

考题 单选题A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA Power UsersB UsersC GuestsD Administrato

考题 单选题A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()A Block both IRC and ICMPB Utilize SNMP to identify IM usersC Contact the IM carrier to request the IM account be disabledD Change the shaping setting to allow minimal traffic to reduce port hopping

考题 单选题After a baseline check was completed it was noted that the network was working far below the level of the last baseline. Which of the following should the technician do NEXT to determine where the network problems are occurring?()A Upgrade the firmware on all routers and switchesB Reboot the entire network one device at a timeC Conduct a network traffic analysisD Rerun the baseline to ensure the results were correct