A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?()A、The client does not support 802.11nB、Incorrect frequency on the client is being usedC、Incorrect encryption on the APD、The client distance from the AP

A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?()

  • A、The client does not support 802.11n
  • B、Incorrect frequency on the client is being used
  • C、Incorrect encryption on the AP
  • D、The client distance from the AP

相关考题:

The DBA issues this SQL command: CREATE USER scott IDENTIFIED by tiger; What privileges does the user Scott have at this point?() A. no privilegesB. only the SELECT privilegeC. only the CONNECT privilegeD. all the privileges of a default user

A user in the accounting department reports that their office is able to connect to the network, butthey are unable to connect to the Internet.Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).A. Physical network diagramB. Job logC. Acceptable use policyD. Baseline documentationE. Wiring schematic

A user reports that the wireless network is slow and is able to see and access shared folders that areunknown to the user.Which of the following is the cause of the problem?() A.The SSID broadcast is disabled.B.Wireless router is improperly configured.C.The user is connecting to the wrong SSIDD.The wireless NIC is defective.

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?() A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob

You are the domain administrator for . Active Directory domain. All client computers run Windows XP Professional.A user reports that she attempted to log on six times unsuccessfully. She reports that she logged on successfully yesterday. You discover that the user reset her password three days ago to comply with a new security policy that requires strong passwords.The account policies that are applied in the Domain Security Group Policy object (GPO) as shown in the following table.You need to ensure that the user can log on to the domain.What should you do?()A. Reset the password for the computer account.B. Unlock the user account.C. In the user account properties, select the Password never expires check box for the user account.D. In the user account properties, select the User must change password on next logon check box for the user account.

You have a standalone server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You install the FTP Server Windows component on Server1. You create several folders under the Ftproot folder as shown in the exhibit. (Click the Exhibit button.)A user named User1 connects to ftp://server1 and reports that he can view the Localuser folder and all of its subfolders. A user named User2 reports the same problem.You need to ensure that when users connect to ftp://server1, they can only view the content located under their user folder.What should you do? ()A. From the properties of the Default FTP Site, change the directory listing style to Unix.B. From the properties of the Default FTP Site, change the FTP site directory to c:\inetpub\ftproot\localuser.C. From the properties of each user account, modify the home folder. Remove the Users group from the access control list of c:\inetpub\ftproot.D. Delete the Default FTP Site. Create a new FTP site. Select the option to isolate users and specify the FTP site directory of c:\inetpub\ftproot.

A user reports that their onboard RJ-45 jack is damaged and will no longer function. Which of the following will provide this jack as an alternative to replacing the motherboard?()A、Install a USB serial adapterB、Connect to a USB hubC、Use an external modemD、Use an Ethernet card

A user reports that they are unable to reach a particular website. The user had no issues reaching the site earlier in the day. Which of the following is the MOST likely cause of the lack of access?()A、The VLAN is misconfiguredB、The user has an improperly configured NICC、The DHCP server is downD、The DNS server is down

A user in the accounting department reports that their office is able to connect to the network, but they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).A、Physical network diagramB、Job logC、Acceptable use policyD、Baseline documentationE、Wiring schematic

A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem?()A、The SSID broadcast is disabled.B、Wireless router is improperly configured.C、The user is connecting to the wrong SSIDD、The wireless NIC is defective.

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

A user wants to connect to the database instance from an application that is running on a remote machine. Which tools should the DBA use to establish the required configuration to ensure that the user is able to connect to the database instance?()A、Data PumpB、Oracle Net ManagerC、Oracle Enterprise ManagerD、Oracle Universal Installer (OUI)E、Database Configuration Assistant (DBCA)

The DBA issues this SQL command:CREATE USER scott IDENTIFIED by tiger;What privileges does the user Scott have at this point?()A、no privilegesB、only the SELECT privilegeC、only the CONNECT privilegeD、all the privileges of a default user

The DBA issues this SQL command: CREATE USER scott IDENTIFIES by tiger; What privileges does the user Scott have at this point? ()A、No privileges.B、Only the SELECT privilege.C、Only the CONNECT privilege.D、All the privileges of a default user.

You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. All users have Windows Mobile 6.5 devices that connect to the organization by using Exchange ActiveSync. A user named User1 reports that she lost her device and successfully performed a remote wipe of the device. User1 later reports that she located her device. User1 configures the device to connect to Exchange ActiveSync and discovers that the connection fails. You need to ensure that User1 can connect her device by using Exchange ActiveSync. What should you do?()A、Instruct User1 to perform a hardware reset on the device.B、Instruct User1 to use the Exchange Control Panel (ECP) to modify the device list.C、Run the Set-ActiveSyncDeviceAccessRule cmdlet from the Exchange Management Shell.D、Instruct User1 to change her user account password.

You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup

单选题You are ready to implement RMAN in the backup and recover strategy for your company. Which system privilege must the RMAN user have to be able to connect and execute RMAN commands on a target database?()ASYSDBABSYSOPERCNo system privileges are required for the RMAN user.DOnly SYS user can connect and execute RMAN commands on a target database.

单选题The DBA issues this SQL command: CREATE USER scott IDENTIFIED by tiger; What privileges does the user Scott have at this point?()Ano privilegesBonly the SELECT privilegeConly the CONNECT privilegeDall the privileges of a default user

单选题User1 reports she lost her mobile device.She successfully remotely wiped the information from the device.Afterwards she reports she found the device, but she cannot access her mailbox or other content.What should you do?()AInstruct the user to perform a hardware reset of the device.BYou should perform a Set-ActiveSyncDeviceAccessRuleCInstruct the user to change her passwordDMake the shell command Clear-ActiveSyncDevice -Identity User1

单选题A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?()AThe client does not support 802.11nBIncorrect frequency on the client is being usedCIncorrect encryption on the APDThe client distance from the AP

多选题A user wants to connect to the database instance from an application that is running on a remote machine. Which tools should the DBA use to establish the required configuration to ensure that the user is able to connect to the database instance?()AData PumpBOracle Net ManagerCOracle Enterprise ManagerDOracle Universal Installer (OUI)EDatabase Configuration Assistant (DBCA)

单选题A user reports their laptop computer can no longer connect to a server. The computer works correctly in a different office. Which of the following tools would be used to troubleshoot this issue?()ACable testerBMultimeterCFiber splicerDLoopback plug

多选题An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges. A multitenant container database (CDB) instant has the following parameter set: THREADED_EXECUTION = FALSE Which four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()AYou can conned as a common user by using the connect statement.BYou can connect as a local user by using the connect statement.CYou can connect by using easy connect.DYou can connect by using OS authentication.EYou can connect by using a Net Service name.FYou can connect as a local user by using the SET CONTAINER statement.

单选题A user reports that they are unable to reach a particular website. The user had no issues reaching the site earlier in the day. Which of the following is the MOST likely cause of the lack of access?()AThe VLAN is misconfiguredBThe user has an improperly configured NICCThe DHCP server is downDThe DNS server is down

单选题Your company has a main office and a branch office. Your network consists of a single Active Directory domain. All domain controllers are in the main office. The offices connect to one another by using a wide area network (WAN) link. The branch office has a computer named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). A domain user named User1 reports that he cannot log on to Server1 when the WAN link is unavailable. He reports that he can log on to Server1 when the WAN link is available. You need to ensure that User1 can log on to Server1 by using his domain account when the WAN link is unavailable. What should you do? ()AModify the Default Domain Policy.BModify the Default Domain Controller Policy.CAdd User1 to the Domain Admins group in the domain.DAdd User1 to the local Administrators group on Server1.

单选题The DBA issues this SQL command: CREATE USER scott IDENTIFIES by tiger; What privileges does the user Scott have at this point? ()ANo privileges.BOnly the SELECT privilege.COnly the CONNECT privilege.DAll the privileges of a default user.

多选题A user in the accounting department reports that their office is able to connect to the network, but they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).APhysical network diagramBJob logCAcceptable use policyDBaseline documentationEWiring schematic