单选题A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()AThe wrong cable type has been used.B. IDS has shut down the computer's switch port.CThe port on the switch is configured incorrectlyDSpanning tree protocol was implemented.

单选题
A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()
A

The wrong cable type has been used.

B

. IDS has shut down the computer's switch port.

C

The port on the switch is configured incorrectly

D

Spanning tree protocol was implemented.


参考解析

解析: 暂无解析

相关考题:

Refer to the exhibit. A partial routing configuration is shown. Complete the configuration so that only the default - network is redistributed from EIGRP 190 into EIGRP 212. Which ACL statement completes the configuration correctly? ()A. access - list 100 permit ip 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0 .0B. access - list 100 permit ip host 0.0.0.0 anyC. access - list 100 permit ip any host 0.0.0.0D. A default -network cannot be redistributed between routing processes.

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?() A. reflexiveB. extendedC. standardD. dynamic

You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A、The user will be instructed to call the network administrator.B、The user will fail authentication.C、The user will be prompted to install a new device certificate on the MAG Series device.D、The user will successfully authenticate and have full network access.

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()A、NAC can authenticate using 802.1X and IBNS cannotB、NAC can ensure only compliant machines connect and IBNS cannotC、NAC can ensure access to the correct network resources and IBNS cannotD、NAC can manage user mobility and reduce overhead costs and IBNS cannot

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()A、reflexiveB、extendedC、standardD、dynamic

A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A、 That there are no DHCP relay serversB、 That the user account on Active Directory is not lockedC、 That the network card driver is not installed incorrectlyD、 The network connection is functioning

A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()A、The wrong cable type has been used.B、. IDS has shut down the computer's switch port.C、The port on the switch is configured incorrectlyD、Spanning tree protocol was implemented.

A user states that they cannot access a network shared drive. The technician has verified that the clients network cable is good. The IP address of the machine is 169.254.10.15. Which of the following is the cause of the problem?()A、The WINS server is not resolving names properly.B、The DNS server is not resolving names.C、The DHCP server is out of IP address leases.D、The hosts file is corrupted.

On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which of the following is the cause of the problem?()A、The file server is offline.B、The DNS server is not resolving correctly.C、The DHCP server is not assigning correct IP addresses.D、The domain controller is not responding.

A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?()A、Incorrect DNSB、Incorrect subnet maskC、Duplicate IP addressD、Incorrect SSID

Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23  subnet.   The company hires temporary employees. You provide user accounts and computers to the temporaryem ployees. The temporary employees receive computers that are outside the Active Directory domain.   The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system.   You need to plan the network’s security so that it complies with the company 's security policy. What should you include in your plan?()A、Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.B、Create an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.C、Move the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.D、Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.

You are designing a strategy to ensure that VPN users are able to access all internal resources.  What should you do?()A、 Specify a static routing table entry on VPN1 for the Dallas network.B、 Specify a static routing table entry on VPN1 for the Seattle network.C、 Implement Internet Authentication Service (IAS) on VPN1.D、 Define a User Class option for Routing  Remote Access Clients on the DHCP Server.

Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A、the Netsh toolB、the Network Policy Server consoleC、the Registry EditorD、the Routing and Remote Access console

Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

The user cannot access some Internet websites, but can connect to resources inside the local network. The technician successfully uses the ping command to test the user’s connectivity. Which of the following commands can the technician run NEXT to troubleshoot the issue?()A、net /?B、ipconfig /flushdnsC、netstat -rD、nbtstat -R

单选题A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()ACheck if the user account is lockedBCheck group policyCCheck the drive for fragmentationDCheck NTFS permissions

单选题A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A That there are no DHCP relay serversB That the user account on Active Directory is not lockedC That the network card driver is not installed incorrectlyD The network connection is functioning

单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()AThe network uses MAC filteringBThe network uses WEPCThe network uses SSID broadcastDThe network uses WPA

单选题On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which of the following is the cause of the problem?()AThe file server is offline.BThe DNS server is not resolving correctly.CThe DHCP server is not assigning correct IP addresses.DThe domain controller is not responding.

单选题A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()ARemotely connect to the user's laptop and review the network configuration settingsBPing the web server from inside the network to ensure it is still up and running.CCheck to make sure the company's website is accessible from the Internet.DEnsure the Ethernet cable is securely plugged into the user's laptop

单选题You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network. What should you do?()AOn Folder1, modify the share permissions.BOn Folder1, modify the NTFS permissions.CAdd all local user accounts to the Guests group. DAdd all local user accounts to the Network Configuration Operators group.

单选题Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()Athe Netsh toolBthe Network Policy Server consoleCthe Registry EditorDthe Routing and Remote Access console

单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode

单选题A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()APersistent sessionBDynamic evaluationCRoaming sessionDBrowser request follow-through

单选题A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?()AIncorrect DNSBIncorrect subnet maskCDuplicate IP addressDIncorrect SSID