单选题An administrator installed new components on a server. After the device installation, two of the components fail.Which of the following is the cause of the problem?()AThe server was not powered off correctly.BThe proper ESD procedures were not used.CThe devices were installed in the incorrect sequence.DThe devices are incompatible with the system.

单选题
An administrator installed new components on a server. After the device installation, two of the components fail.Which of the following is the cause of the problem?()
A

The server was not powered off correctly.

B

The proper ESD procedures were not used.

C

The devices were installed in the incorrect sequence.

D

The devices are incompatible with the system.


参考解析

解析: 暂无解析

相关考题:

单选题Which of the following RAID levels provides the HIGHEST fault tolerance possible?()ARAID 0BRAID 5CRAID 6DRAID 10

单选题Which of the following should be done before and after a service or repair is performed on a server?()ADefragBIPCONFIG /releaseCFirmware updateDBaseline

单选题An administrator is running proprietary server software that requires services to be reconfigured every time the server is upgraded to the latest vendor version. Which of the following is the BEST solution to address this problem?()AThe current system configuration should be documented for future use.BServer diagramming and environmental topologies should be documented.CA copy of the latest pre-installation plan should be developed and utilized.DVendor support should be contacted so that they can correct the issue.

多选题Which of the following are examples of physical security measures?()APolicies and proceduresBEncryptionCLocked doorsDSecurity personnelEBackup tapes

单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A Enable audit object access and specify files and folders to monitor using Task Manager.B Enable audit policy change and specify files and folders to monitor using Windows Explorer.C Enable audit object access and specify files and folders to monitor using Windows Explorer.D Open Performance Monitor and monitor folder activity.

单选题Which of the following storage interface protocols has the FASTEST speeds?()AUltra2 SCSIBSA TACUltra320 SCSIDSAS

多选题Which of the following are enhancements from the FAT32 file system to the NTFS file system()AAbility to utilize redundant hardware devicesBAbility to create a larger partition sizeCAbility to image new server deploymentsDAbility to set file security permissionsEAbility to create virtual machines

单选题Which of the following provides the MOST redundancy for a corporate server network?()AServer-to-server replicationBServer clusteringCHot siteDDisk-to-disk replication

单选题Which of the following is the MOST common problem that occurs in server rooms?()AExcessive coolingBDust buildupCPoor ground wiresDWet floors

多选题Which of the following is a bus mastering method?()AA device transfers data directly to the memory.BA device handles mediation between the northbridge and the processor.CA device connects to another device without involving the processor.DA device transfers data to the processor and then on to the memory.EA device handles mediation between the southbridge and the processor

单选题Which of the following is a valid source for Windows operating system updates?()ASNABRISCRASDWSUS

单选题Which of the following describes a server that is hosting only an Anti-virus program?()ADistributed Application ServerBDedicated Application ServerCPeer-to-Peer Application ServerDFile and Print Server

单选题以下哪项定义内存交错?()A写入所有内存DIMM和L1缓存中的数据分布B写入某内存库(memory bank)中所有内存DIMM中的数据分布C写入所有内存DIMM和处理器中的数据分布D写入所有内存DIMM和L2缓存中的数据分布

单选题Which of the following is the FIRST thing to consider when designing an email retention policy?()A Local laws and industry regulationsB Company policies and guidelinesC Project guidelines given by stakeholdersD Mail server and backup capacity

单选题A user selects their proper domain and is unable to log into their Windows computer. The error states: system cannot log you on to the domain because the system's computer account in its primary domain is missing or the password on that account is incorrect. Which of the following is the MOST likely cause for this error?()AThe computer's account was removed from Active Directory.BThe user's account was removed from Active Directory.CThe computer was disjoined from the domain.DThe user typed in the wrong password

单选题Which of the following memory types is located in the processor chip?()AEDOBL1CxDDDDR

单选题Which of the following BEST describes a Blade server?()AProvides higher levels of physical redundancy than a typical serverBProvides better rack space utilization than a typical serverCIs 1.75 inches in height to fit properly in a rackDUses an unshared backplane

单选题Which of the following Windows Server 2003 technologies can help with making backups of open files?()A Differential backupB SnapshotC VSSD Incremental backup

单选题A disk drive failed in a RAID 5 array.  After replacing the disk drive, users are still reporting that access to the server is very slow.  Which of the following BEST explains the problem?()AThe array is rebuilding.BThe array must be reconfigured.CThe array is corrupt.DThe disk drive is not compatible.

单选题Which of the following is the MOST important consideration when implementing a data retentio program?()A The data destruction requirementsB The user awareness training programC The laws and legal requirements of the dataD The companys individual data retention policies

单选题For a technician to test network connectivity to a remote host on a Unix Server which of the following commands should they run?()A IPCONFIGB PINGC ARPD IFCONFIG

单选题Which of the following technologies causes a single processor to appear as multiple processors within System Properties in a Windows Server?()A RISCB MulticoreC Symmetric multi-processingD Hyper-V

单选题A technician manages a server that contains sensitive data. The server currently has two hard drives, one hosting the operating system and other generic files and the second hosting sensitive data. The technician needs to implement a technology that would guard against data loss for only the sensitive data, while adding only one additional hard drive. Which of the following should the technician implement to avoid reformatting any drives?()ARAID 0BRAID 1CRAID 3DRAID 5

单选题An administrator recently installed a new array controller into a server. When the server is running POST the controller does not appear as present. Which of the following could be the reason for this?()AThe server BIOS firmware is out-of-date.BThe server does not have the correct drivers.CThe server hard drives have not begun to spin.DThe server has too little memory installed.

单选题A client has a need to look at and add many image files but has no need to change them. Which of the following media types would BEST meet the client’s needs?()ACD-RWBDiskCFlashDWORM

单选题The staff is not able to access a database server.  The server has an ’Operating System not found’error and is set to boot from a fiber channel SAN. All other database servers are set to boot from the SAN and access the same switch and data as this database server. Which of the following is the MOST likely cause of the problem?()AThe SAN is offlineBFiber channel switchCMultiple failed drives in the SANDHBA

单选题Which of the following is the MOST likely connection type for a backup external modem?()AIEEE 1394BSCSICSerialDSATA

多选题Which of the following are benefits of the HCL? ()AEnhanced stabilityBVendor supportedCHigher number of available component choicesDLower costEEnhanced security