单选题Several remote sales employees, who have come into the office this week, report that they are unable to get on the Internet, but no other users have reported similar issues.  The help desk hasescalated the issue and the case notes state that the users have IP addresses that begin with 169. Which of the following should the system administrator check FIRST?()ADHCP serverBNetwork switchesCDNS serverDCore router

单选题
Several remote sales employees, who have come into the office this week, report that they are unable to get on the Internet, but no other users have reported similar issues.  The help desk hasescalated the issue and the case notes state that the users have IP addresses that begin with 169. Which of the following should the system administrator check FIRST?()
A

DHCP server

B

Network switches

C

DNS server

D

Core router


参考解析

解析: 暂无解析

相关考题:

Several users have recently been calling the helpdesk about a recent network outage. These calls have increased in the last hour and are all by different users calling about the same issue. Which of the following types of communication skills should the helpdesk technicians MOST likely exercise while answering each call? ()A. Talk to co-workers while interacting with customers to help diagnose the issuesB. Be culturally sensitiveC. Provide each user with a complete, detailed report of the current outage statusD. Listen and do not interrupt a customer and then provide a brief status update

You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()A、an Authoritative Accepted DomainB、an External Relay Accepted DomainC、a new Receive connectorD、a remote domain

You have an Exchange Server 2010 organization.  You have a group named Help Desk that contains all the help desk users in the organization.  You need to ensure that the Help Desk group can manage all the mailboxes and mail-enabled contacts inthe organization.  The solution must minimize the number of permissions assigned to the Help Desk group.  Which management role should you assign to the Help Desk group?()A、Mail RecipientsB、Mail Recipient CreationC、Organization Client AccessD、Recipient Policies

Several remote sales employees, who have come into the office this week, report that they are unable to get on the Internet, but no other users have reported similar issues.  The help desk hasescalated the issue and the case notes state that the users have IP addresses that begin with 169. Which of the following should the system administrator check FIRST?()A、DHCP serverB、Network switchesC、DNS serverD、Core router

A network technician is troubleshooting a network issue that has just been reported. Which of thefollowing troubleshooting steps should the technician take FIRST to help resolve this issue?()A、Record the solution in the appropriate logs for future use.B、Ask the user who reported the issue what past documentation they have.C、Ask the user who reported the issue to explain the symptoms in detail.D、Record what steps should be taken to resolve the issue.

Several users have recently been calling the helpdesk about a recent network outage. These calls have increased in the last hour and are all by different users calling about the same issue. Which of the following types of communication skills should the helpdesk technicians MOST likely exercise while answering each call? ()A、Talk to co-workers while interacting with customers to help diagnose the issuesB、Be culturally sensitiveC、Provide each user with a complete, detailed report of the current outage statusD、Listen and do not interrupt a customer and then provide a brief status update

You executed this command to create a password file: $ orapwd file = orapworcl entries = 10 ignorecase = N Which two statements are true about the password file?()A、It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.B、It contains username and passwords of database users who are members of the OSOPER operating system group.C、It contains usernames and passwords of database users who are members of the OSDBA operating system group.D、It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.E、It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.

You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003.  Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only.  All user accounts are located in the default Users container.  You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment.  What should you do?()A、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B、 Create a top­level OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.

Your company hires 10 new employees. You want the new employees to connect to the main  office through a VPN connection. You create new user accounts and grant the new employees  the Allow Read and Allow Execute permissions to shared resources in the main office.     The new employees are unable to access shared resources in the main office. You need to  ensure that users are able to establish a VPN connection to the main office.     What should you do()A、Grant the new employees the Allow Full control permission.B、Grant the new employees the Allow Access Dial-in permission.C、Add the new employees to the Remote Desktop Users security group.D、Add the new employees to the Windows Authorization Access security group.

You are the help desk manager for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. All help desk technicians are members of the Help Desk Technicians group. They use Remote Assistance to remotely control user sessions to provide online support and training to users. The users currently use Windows Messenger to submit Remote Assistance invitations to the help desk technicians. You want to reduce the time required for help desk technicians to respond to Remote Assistance requests. To accomplish this goal, you want to configure the client computers to allow help desk technicians to establish a Remote Assistance session with a client computer without requiring an invitation from a user. What should you do?() A、In the Default Domain Policy, set the Remote Assistance - Solicited Remote Assistance policy setting to Disabled. B、In the Default Domain Policy, set the Remote Assistance - Offer Remote Assistance policy setting to Enabled and add the Help Desk Technicians group to the Helpers list. C、In each computer's Local Security Policy, grant the Help Desk Technicians group the Allow logon through Terminal Services user right. D、In the System properties for each computer, select the Allow users to connect remotely to this computer option, and add the Help Desk Technicians group to the list of allowed users.

You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?() A、Configure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.B、Disable and then re-enable Internet Connection Sharing (ICS) on Pro1.C、Create a network bridge between the wired and wireless connections on Pro1.  D、Clear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties of the VPN connection.

You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Reporting Services (SSRS) solution. The solution contains a report named Sales Details that displays sales information of all the employees. You create an SSRS report named Sales Summary that displays the total monthly sales of each employee. Users who view the Sales Summary report occasionally require the monthly sales details for a particular employee. You need to ensure that the users can click a value in the month column of the Sales Summary report to open and render the Sales Details report. What should you do?()A、 Use a subreport.B、 Use a bookmark link.C、 Use the drilldown functionality.D、 Use a drillthrough report link.

You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A、Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B、Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C、Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D、Configure the IP properties of the portable computers so that they have an alternate configuration.

单选题Your company hires 10 new employees. You want the new employees to connect to the main office   through a VPN connection. You create new user accounts and grant the new employees the Allow Read  and Allow Execute permissions to shared resources in the main office.   The new employees are unable to access shared resources in the main office.   You need to ensure that users are able to establish a VPN connection to the main office.    What should you do()AGrant the new employees the Allow Full control permission.BGrant the new employees the Allow Access Dial-in permission.CAdd the new employees to the Remote Desktop Users security group.DAdd the new employees to the Windows Authorization Access security group.

单选题You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?()AConfigure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.BDisable and then re-enable Internet Connection Sharing (ICS) on Pro1.CCreate a network bridge between the wired and wireless connections on Pro1.  DClear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties of the VPN connection.

单选题You have an Exchange Server 2010 organization.  You have a group named Help Desk that contains all the help desk users in the organization.  You need to ensure that the Help Desk group can manage all the mailboxes and mail-enabled contacts inthe organization.  The solution must minimize the number of permissions assigned to the Help Desk group.  Which management role should you assign to the Help Desk group?()AMail RecipientsBMail Recipient CreationCOrganization Client AccessDRecipient Policies

单选题You have an Exchange Server 2010 organization.You acquire a new Internet domain name.Users report that they cannot receive e-mail sent to the new domain name.You verify that all users have the new domain name configured as an e-mail address suffix.You need to ensure that users can receive e-mail sent from the Internet to the new domain name. What should you create?()Aan Authoritative Accepted DomainBan External Relay Accepted DomainCa new Receive connectorDa remote domain

单选题You are the help desk manager for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. All help desk technicians are members of the Help Desk Technicians group. They use Remote Assistance to remotely control user sessions to provide online support and training to users. The users currently use Windows Messenger to submit Remote Assistance invitations to the help desk technicians. You want to reduce the time required for help desk technicians to respond to Remote Assistance requests. To accomplish this goal, you want to configure the client computers to allow help desk technicians to establish a Remote Assistance session with a client computer without requiring an invitation from a user. What should you do?()AIn the Default Domain Policy, set the Remote Assistance - Solicited Remote Assistance policy setting to Disabled. BIn the Default Domain Policy, set the Remote Assistance - Offer Remote Assistance policy setting to Enabled and add the Help Desk Technicians group to the Helpers list. CIn each computer's Local Security Policy, grant the Help Desk Technicians group the Allow logon through Terminal Services user right. DIn the System properties for each computer, select the Allow users to connect remotely to this computer option, and add the Help Desk Technicians group to the list of allowed users.

单选题You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003.  Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only.  All user accounts are located in the default Users container.  You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment.  What should you do?()A Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B Create a top­level OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.

多选题You executed this command to create a password file: $ orapwd file = orapworcl entries = 10 ignorecase = N Which two statements are true about the password file?()AIt will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.BIt contains username and passwords of database users who are members of the OSOPER operating system group.CIt contains usernames and passwords of database users who are members of the OSDBA operating system group.DIt will permit the use of lowercase passwords for database users who have granted the SYSDBA role.EIt will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.

单选题The Lancaster case shows that employees have the right to get compensation if they ______.Aare given work that they are unable to doBsuffer mental injury caused by their workCare forced to do work that they don’t likeDfeel isolated, let down and extremely anxious

单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()AConfigure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). BConfigure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).CAdd a script to the users' desktops that changes the IP configuration between dynamic and manual.DConfigure the IP properties of the portable computers so that they have an alternate configuration.

单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Reporting Services (SSRS) solution. The solution contains a report named Sales Details that displays sales information of all the employees. You create an SSRS report named Sales Summary that displays the total monthly sales of each employee. Users who view the Sales Summary report occasionally require the monthly sales details for a particular employee. You need to ensure that the users can click a value in the month column of the Sales Summary report to open and render the Sales Details report. What should you do?()A Use a subreport.B Use a bookmark link.C Use the drilldown functionality.D Use a drillthrough report link.

单选题You replaced your Layer 3 switch, which is the default gateway of the end users. Many users cannot access anything now, including email, Internet, and other applications, although other users do not have any issues. All of the applications are hosted in an outsourced data center. In order to fix the problem, which one of these actions should you take?()AClear the MAC address table in the switch.BClear the ARP cache in the switch.CClear the ARP cache in the end devices.DClear the ARP cache in the application servers.

单选题A network technician is troubleshooting a network issue that has just been reported. Which of thefollowing troubleshooting steps should the technician take FIRST to help resolve this issue?()ARecord the solution in the appropriate logs for future use.BAsk the user who reported the issue what past documentation they have.CAsk the user who reported the issue to explain the symptoms in detail.DRecord what steps should be taken to resolve the issue.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain.  The company has remote users in the sales department who work from home. The remote users’ client computers run Windows XP Professional, and they are not members of the domain. The remote users’ client computers have local Internet access through an ISP.   The company is deploying a Windows Server 2003 computer named Server1 that has Routing and Remote Access installed. Server1 will function as a VPN server, and the remote users will use it to connect to the company network. Confidential research data will be transmitted from the remote users’ client computers. Security is critical to the company and Server1 must protect the remote users’ data transmissions to the main office. The remote client computers will use L2TP/IPSec to connect to the VPN server.  You need to choose a secure authentication method.   What should you do? ()A Use the authentication method of the default IPSec policies.B Create a custom IPSec policy and use the Kerberos version 5 authentication protocol.C Create a custom IPSec policy and use certificate-based authentication.D Create a custom IPSec policy and use preshared key authentication.E Use the authentication method of the Routing and Remote Access custom IPSec policy for L2TP connection.

单选题Several users have recently been calling the helpdesk about a recent network outage. These calls have increased in the last hour and are all by different users calling about the same issue. Which of the following types of communication skills should the helpdesk technicians MOST likely exercise while answering each call? ()ATalk to co-workers while interacting with customers to help diagnose the issuesBBe culturally sensitiveCProvide each user with a complete, detailed report of the current outage statusDListen and do not interrupt a customer and then provide a brief status update