单选题A user has no network connectivity. A check of the associated port indicates that the interface is up, the line protocol is down. Which item would most likely cause this problem?()ASpeed mismatchBIncorrect encapsulationCMTU set too lowDDuplex mismatch

单选题
A user has no network connectivity. A check of the associated port indicates that the interface is up, the line protocol is down. Which item would most likely cause this problem?()
A

Speed mismatch

B

Incorrect encapsulation

C

MTU set too low

D

Duplex mismatch


参考解析

解析: 暂无解析

相关考题:

A network associate is trying to understand the operation of the FLD Corporation by studying the network in the exhibit. The associate knows that the server in VLAN 4 provides the necessary resources to support the user hosts in the other VLANs. The associate needs to determine which interfaces are access ports. Which interfaces are access ports? ()A.Switch1 - Fa 0/2B.Switch1 - Fa 0/9C.Switch2 - Fa 0/3D.Switch2 - Fa 0/4E.Switch2 - Fa 0/8F.Router - Fa 1/0

A user complains that the network printer is not printing.  The system administrator knows there is a print queue for the network printer and needs to check on the queue.  Which command is run?()A、 netstat B、 lpstat C、 telinit D、 prtconf

A user reports that a network printer will not print, however, other users are not experiencing any problems. The user has rebooted their computer twice and it is still not printing. Which of the following should the technician check?()A、Run the printer configuration wizard on the desktop.B、Check to see if the network printer is turned on.C、Verify that the printer is connected to the network.D、Check the local print queue for a failed print job.

A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()A、Check if the user account is lockedB、Check group policyC、Check the drive for fragmentationD、Check NTFS permissions

An end user reports that their computer is not performing as fast as it used to and it shuts down unexpectedly. Which of the following is the MOST likely cause?()A、Network data cables are damaged.B、Memory has become unseated.C、The user has defragmented the hard drive.D、Processor cooling fan is not functioning.

You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A、The user will be instructed to call the network administrator.B、The user will fail authentication.C、The user will be prompted to install a new device certificate on the MAG Series device.D、The user will successfully authenticate and have full network access.

What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()A、The ability to detect and prevent malicious traffic.B、The ability to associate security breaches with a specific user.C、Converged management of network and security events, network flow data, and identity information.D、Consistent device management across administrative realms.

A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()A、Remotely connect to the user's laptop and review the network configuration settingsB、Ping the web server from inside the network to ensure it is still up and running.C、Check to make sure the company's website is accessible from the Internet.D、Ensure the Ethernet cable is securely plugged into the user's laptop

All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled

A network associate is trying to understand the operation of the FLD Corporation by studying the network in the exhibit. The associate knows that the server in VLAN 4 provides the necessary resources to support the user hosts in the other VLANs. The associate needs to determine which interfaces are access ports. Which interfaces are access ports? ()A、Switch1 - Fa 0/2B、Switch1 - Fa 0/9C、Switch2 - Fa 0/3D、Switch2 - Fa 0/4E、Switch2 - Fa 0/8F、Router - Fa 1/0

A virus has been removed from the user’s machine, but the user still cannot access the Internet.Which of the following should the technician check NEXT?()A、Disable port forwarding on the router.B、Reboot to Safe Mode and see if the Internet is accessible.C、Format the machine and reinstall the OS.D、Check the web browser’s proxy settings.

A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugsthe cable into the only available laptop connection, but the connector is loose inside the port. TheMOST likely reason the connector is loose is the:()A、RJ-11 connector needs to be re-crimpedB、User has plugged into the laptop's NIC portC、User has plugged the wrong end of the cable into the portD、RJ-11 connector needs to be replaced with an RJ-45 connector

Which of the following is the BEST way to make sure the network printer is automatically installed when the user logs on?()A、Log onto the user’s computer as a local administrator and install the printer.B、Make sure the user has permission to print to the printer.C、Create and implement a logon script.D、After the user has logged on, install the printer.

A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()A、Four port switchB、Four port wireless routerC、Four port WAPD、Four port hub

A workstation no longer has network connectivity. Upon visual inspection, all connectors andsettings seem to be properly configured. Which of the following tools should the technician use to troubleshoot this issue? ()A、PSU testerB、Loopback plugC、Cable testerD、Multimeter

A user reports that they are unable to print to a remote printer. Which of the following should the technician check FIRST?()A、Printer driverB、Protocol stackC、Network connectivityD、Correct patch application

Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A、the Netsh toolB、the Network Policy Server consoleC、the Registry EditorD、the Routing and Remote Access console

You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()A、Configure the ISDN connection to use SLIP instead of PPP.B、Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.C、Clear the Use default gateway on remote network check box.D、Install and configure the SAP Agent service.

You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.

多选题A network associate is trying to understand the operation of the FLD Corporation by studying the network in the exhibit. The associate knows that the server in VLAN 4 provides the necessary resources to support the user hosts in the other VLANs. The associate needs to determine which interfaces are access ports. Which interfaces are access ports? ()ASwitch1 - Fa 0/2BSwitch1 - Fa 0/9CSwitch2 - Fa 0/3DSwitch2 - Fa 0/4ESwitch2 - Fa 0/8FRouter - Fa 1/0

单选题A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()ACheck if the user account is lockedBCheck group policyCCheck the drive for fragmentationDCheck NTFS permissions

单选题A user reports that a network printer will not print, however, other users are not experiencing any problems. The user has rebooted their computer twice and it is still not printing. Which of the following should the technician check?()ARun the printer configuration wizard on the desktop.BCheck to see if the network printer is turned on.CVerify that the printer is connected to the network.DCheck the local print queue for a failed print job.

单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All user files are stored in home folders on a member server named Testking3. Full backups are performed on Testking3 every day. A user named Mark leaves the company. A technical support specialist deletes Mark's user account and his files. You need to restore certain files from Mark's folder and enable another user named Anne to access them. What should you do?()AClear the Restore security check box. Use the Backup utility to restore Mark's files to the original location.BSelect the Restore security check box. Use the Backup utility to restore Mark's files to the original location.CClear the Restore security check box. Use the Backup utility to restore Mark's files to Anne's home folder.DSelect the Restore security check box. Use the Backup utility to restore Mark's files to Anne's home folder.

单选题A user complains that the network printer is not printing.  The system administrator knows there is a print queue for the network printer and needs to check on the queue.  Which command is run?()A netstat B lpstat C telinit D prtconf

单选题Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()Athe Netsh toolBthe Network Policy Server consoleCthe Registry EditorDthe Routing and Remote Access console

单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()AThe user will be instructed to call the network administrator.BThe user will fail authentication.CThe user will be prompted to install a new device certificate on the MAG Series device.DThe user will successfully authenticate and have full network access.

单选题A user has no network connectivity. A check of the associated port indicates that the interface is up,the line protocol is down. Which item would most likely cause this problem?()ASpeed mismatchBIncorrect encapsulationCMTU set too lowDDuplex mismatch

单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()AThe wireless access point is using MAC address filteringBThe user has connected to a nearby wireless access point from another officeCThe user has configured the wireless settings with the wrong encryption typeDThe wireless access point has SSID broadcast disabled