网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A technician notices that the BIOS event log shows a chassis intrusion. Which of the following is theMOST likely reason for the event? ()
A
There is a loose object in the case.
B
An optical drive drawer is open.
C
The computer case was opened.
D
An attacker hacked into the system.
参考答案
参考解析
解析:
暂无解析
更多 “单选题A technician notices that the BIOS event log shows a chassis intrusion. Which of the following is theMOST likely reason for the event? ()A There is a loose object in the case.B An optical drive drawer is open.C The computer case was opened.D An attacker hacked into the system.” 相关考题
考题
Which command shows the event and traceoptions file for chassis clusters?()
A. show log chassisdB. show log clusterdC. show log jsrpdD. show log messages
考题
A technician is dispatched to a malware infected system. Upon arrival, the technician notices themalware’s pop-up on the screen. Which of the following boot methods would the technician utilize?()
A. Reboot in Safe ModeB. Reboot in Recovery ConsoleC. Reboot in Last Known Good ConfigurationD. Reboot in System Debug Mode
考题
The technician notices that one of the wires in a CAT5 cable is cut in half. Which of the followingconnectivity issues did the technician discover?()
A.Open pairsB.AttenuationC.CrosstalkD.Interference
考题
A technician would like to load an operating system CD on startup. Which of the following settings would a technician change in the BIOS?()
A. Enable TPMB. Enable BIOS passwordC. Disable TPMD. Boot sequence
考题
ELM是什么的缩写?()
A.Event and Log ManagementB.Equipment and local ManagementC.Equipment and Log ManagementD.Event and Local Management
考题
以下哪一项不是系统事件通知相关的服务()A、Windows Management InstrumentationB、sys Event NotificationC、com+ event systemD、Event Log
考题
下列关于MGW的log描述哪个(些)是不正确的?()A、Alarmlog中存有告警的历史信息,该log文件保存在/c/logfiles/alarm_event/目录下,文件名为ALARM_LOG.xmlB、Event log中存有MGW出现的事件的历史信息,该log文件保存在/c/logfiles/alarm_event/目录下,文件名为EVENT_LOG.xmlC、Trace and error log中存有应用相关的错误信息,该log只保存在GPB的内存中D、以上都不是
考题
A technician purchases a new 120 GB IDE hard disk to use in an old server as a swap drive. After adding the drive to the server, the technician discovers that the operating system does not detect the drive. After rebooting the server, the technician notices the drive is missing from POST and comes to the conclusion that the BIOS needs to be updated. The technician downloads the latest version of the BIOS update from the manufacturer website. Which action should the technician take next?()A、 backup the BIOS configuration to use laterB、 install the BIOS update from a command promptC、 create a bootable floppy and copy the BIOS update tools to the floppyD、 read the manufacturer’s guidelines and recommendations on installing the update
考题
ELM是什么的缩写?()A、Event and Log ManagementB、Equipment and local ManagementC、Equipment and Log ManagementD、Event and Local Management
考题
A technician notices that the BIOS event log shows a chassis intrusion. Which of the following is theMOST likely reason for the event? ()A、There is a loose object in the case.B、An optical drive drawer is open.C、The computer case was opened.D、An attacker hacked into the system.
考题
A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following would BEST describe this connection speed?()A、The laptop is too far away from the WAP.B、The WAP is using 802.11a frequencies.C、The laptop is only set to allow 802.11n connections.D、The technician is on an 802.11b network.
考题
A technician is setting up a new inkjet printer and notices that the images appear hazy. Which of the following should the technician perform FIRST to resolve the issue?()A、Refill the cartridgesB、Replace the tonerC、Replace the network cableD、Calibrate the inkjet printer
考题
A technician is dispatched to a malware infected system. Upon arrival, the technician notices themalware’s pop-up on the screen. Which of the following boot methods would the technician utilize?()A、Reboot in Safe ModeB、Reboot in Recovery ConsoleC、Reboot in Last Known Good ConfigurationD、Reboot in System Debug Mode
考题
The technician notices that one of the wires in a CAT5 cable is cut in half. Which of the followingconnectivity issues did the technician discover?()A、Open pairsB、AttenuationC、CrosstalkD、Interference
考题
A technician is servicing a customer’s color laser printer and notices excess toner in the printer.Which of the following tools would BEST assist the technician in removing the excess toner?()A、Damp towelB、Compressed airC、Alcohol wipeD、Computer vacuum
考题
A technician has a laptop that is running slow and notices the fan is on high. Which of the following should the technician try FIRST?()A、Clean the heatsink assembly of debris.B、Turn the fan off when the AC adapter is attached.C、Turn the fan to low in the BIOS.D、Replace the processor and fan.
考题
Your network consists of a single Active Directory domain that contains two domain controllers. Both domain controllers run Windows Server 2003 Service Pack 2 (SP2). Auditing of successful account logon events is enabled on all computers in the domain. You need to identify the last time a specific user logged on to the domain. What should you do? ()A、Examine the System Event Log on the user’s computer.B、Examine the System Event Log on both domain controllers.C、Examine the Security Event Log on both domain controllers.D、Examine the Application Event Log on the user’s computer.
考题
单选题A technician is troubleshooting a laptop LCD, and when the cover is opened nothing shows on the screen. Then all of a sudden the screen comes on and works fine. Which of the following should the technician check FIRST?()A
BacklightB
InverterC
Loose cableD
Lid switch
考题
单选题You are the network administrator for The network consists of a single Active Directory domain named The TestKing Staff department has a Windows 2003 computer that functions as a file server. The computer contains a folder named TestKingData. Auditing is enabled on the TestKingData folder. The TestKing Staff department reports that confidential files were deleted from the folder. You need to identify the user who deleted the confidential files. What should you do?()A
In Event Viewer, create a new log view from the security log. Filter the log view to display only success audits.B
In Event Viewer, create a new log view from the security log. Filter the log view to display only failure audits.C
In Event Viewer, create a new log view from the system log. Filter the log view to display only success audits.D
In Event Viewer, create a new log view from the system log. Filter the log view to display only failure audits.
考题
单选题You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the file servers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU). TestKing's security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log. You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements. What should you do?()A
Modify the local security policy on each file server.Define the size and retention settings for the Security event log.B
Create a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.C
Use Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.D
Create a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.
考题
单选题A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following would BEST describe this connection speed?()A
The laptop is too far away from the WAP.B
The WAP is using 802.11a frequencies.C
The laptop is only set to allow 802.11n connections.D
The technician is on an 802.11b network.
考题
单选题A technician at a small business goes into the server room to perform maintenance on a server and notices it is very hot and audible alarms are going off. The technician is unsure of how to remedy the situation. Which of the following should the technician do?()A
Turn off all the equipment in the server closetB
Install a fan in the server closetC
Turn off the power to the server closetD
Follow escalation procedures for emergencies
考题
单选题A technician purchases a new 120 GB IDE hard disk to use in an old server as a swap drive. After adding the drive to the server, the technician discovers that the operating system does not detect the drive. After rebooting the server, the technician notices the drive is missing from POST and comes to the conclusion that the BIOS needs to be updated. The technician downloads the latest version of the BIOS update from the manufacturer website. Which action should the technician take next?()A
backup the BIOS configuration to use laterB
install the BIOS update from a command promptC
create a bootable floppy and copy the BIOS update tools to the floppyD
read the manufacturer’s guidelines and recommendations on installing the update
考题
单选题A technician would like to load an operating system CD on startup. Which of the following settings would a technician change in the BIOS?()A
Enable TPMB
Enable BIOS passwordC
Disable TPMD
Boot sequence
考题
单选题Your network consists of a single Active Directory domain that contains two domain controllers. Both domain controllers run Windows Server 2003 Service Pack 2 (SP2). Auditing of successful account logon events is enabled on all computers in the domain. You need to identify the last time a specific user logged on to the domain. What should you do?()A
Examine the System Event Log on the user’s computer.B
Examine the System Event Log on both domain controllers.C
Examine the Security Event Log on both domain controllers.D
Examine the Application Event Log on the user’s computer.
考题
单选题A technician notices that the BIOS event log shows a chassis intrusion. Which of the following is theMOST likely reason for the event? ()A
There is a loose object in the case.B
An optical drive drawer is open.C
The computer case was opened.D
An attacker hacked into the system.
考题
单选题Which command shows the event and traceoptions file for chassis clusters?()A
show log chassisdB
show log clusterdC
show log jsrpdD
show log messages
考题
单选题While upgrading an existing x445 with a second SMP expansion module and four processors, a technician notices the SMP connector cables are missing on the back, so the technician connects the cables. Upon powering up, the technician notices the upper SMP expansion module is disabled. Which of the following is the most likely cause of the problem?()A
The system requires 220V power to enable the upper SMP expansion module.B
The technician cabled the SMP expansions wrong.C
The Xcel4 cache needs to be reset in the BIOS because of the addition of the second SMP expansion module.D
If no hardware licenses keys have been purchased for the processors in the upper SMP expansion module, it will not be activated.
热门标签
最新试卷