Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()A、AshortB、Open pairsC、ESDD、EMI

Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()

  • A、Ashort
  • B、Open pairs
  • C、ESD
  • D、EMI

相关考题:

You are connected using SQL* Plus to a multitenant container database (CDB) with SYSDBA privilegesand execute the following sequence statements:What is the result of the last SET CONTAINER statement and why is it so?()A. It succeeds because the PDB_ADMIN user has the required privileges.B. It fails because common users are unable to use the SET CONTAINER statement.C. It fails because local users are unable to use the SET CONTAINER statement.D. If fails because the SET CONTAINER statement cannot be used with PDB$SEED as the target pluggable database (PDB).

Users are unable to access resources in the 172.23.14.0/24 subnet.Referring to the exhibit, which two actions would solve this problem?() A. Configure a separate routing instance.B. Configure a default static route.C. Configure a static route to 172.23.14.0/24.D. Configure the existing routes to resolve the indirect next hop.

Users are unable to stay connected to the company‘s wireless network. Several times throughoutthe day the users‘ signals are dropped and they are forced to reconnect to the network.A technician determines the network cabling that supplies the WAP has been run inside with severalpower lines.Which of the following is the MOST likely cause of the network issue?()A.AshortB.Open pairsC.ESDD.EMI

Remote users are unable to connect to a shared folder on your computer. You need to allow access to the shared folder.What are the two possible ways to achieve this goal?() A.AB.BC.CD.D

In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

Several remote sales employees, who have come into the office this week, report that they are unable to get on the Internet, but no other users have reported similar issues.  The help desk hasescalated the issue and the case notes state that the users have IP addresses that begin with 169. Which of the following should the system administrator check FIRST?()A、DHCP serverB、Network switchesC、DNS serverD、Core router

A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?()A、Switching loop is occurring on the switch.B、Wrong subnet mask on the switch.C、Incorrect SNMP settings on the switch.D、Port is misconfigured on the switch.

An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()A、The administrator forgot to change the share permissionsB、The users were not part of the “Everyone” built in groupC、The administrator shared the files but not the folderD、“Modify” only allows users to change existing documents

Several users report that they are unable to print to a new printer recently installed. The technician is unable to ping the printer. Which of the following is the MOST likely cause?()A、No IP address on the printerB、Paper jam in the paper feed trayC、Improper DNS settings on the printerD、Broken LCD screen on the printer

Users are unable to access the Internet but the users are able to send/receive email from theirdesktops. Which of the following ports is MOST likely being blocked?()A、25B、80C、110D、143

Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram

Users are unable to complete print jobs sent to a network printer from an AIX server.  Which command can be run to look at the print queue?()A、lpstat B、prtconf C、lpd D、netstat

You are unable to move the Unified Job Scheduler occupant from the SYSAUX tablespace to the USERS tablespace. What could be the reason?()A、None of the SYSAUX occupants can be relocated.B、The USERS tablespace is a bigfile tablespace (BFT).C、The united Job Scheduler occupant cannot be relocated.D、The SYSAUX occupants can be relocated to the SYSTEM tablespace only.

Certkiller .com boosts a main office and 20 branch offices. Configured as a separate site, each branch office has a Read-Only Domain Controller (RODC) server installed.  Users in remote offices complain that they are unable to log on to their accounts.  What should you do to make sure that the cached credentials for user accounts are only stored in their local branch office RODC server()A、Open the RODC computer account security tab and set Allow on the Receive as permission only for the users that are unable to log on to their accountsB、Add a password replication policy to the main Domain RODC and add user accounts in the security groupC、Configure a unique security group for each branch office and add user accounts to the respective security group. Add the security groups to the password replication allowed group on the main RODC serverD、Configure and add a separate password replication policy on each RODC computer account

Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer.  You need to ensure that other users are able to access only the shared files.  What should you do? ()A、Restart the Workstation service on your computer.B、Change all of your TCP port exceptions to UDP port exceptions.C、Ensure parental controls are not configured to block file sharing.D、Clear the Block all incoming connections check box in Windows Firewall.

单选题You are connected using SQL* Plus to a multitenant container database (CDB) with SYSDBA privilegesand execute the following sequence statements:What is the result of the last SET CONTAINER statement and why is it so?()AIt succeeds because the PDB_ADMIN user has the required privileges.BIt fails because common users are unable to use the SET CONTAINER statement.CIt fails because local users are unable to use the SET CONTAINER statement.DIf fails because the SET CONTAINER statement cannot be used with PDB$SEED as the target pluggable database (PDB).

多选题In the admin GUI, you navigate to "System" "Status" "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()ATo forcibly sign out a single user, you should select the check box next to that user's login name, then select Delete Session.BIf you select Delete All Sessions, all users are forcibly signed out and are unable to sign in again until Enable All Users is selected.CSelecting Disable All Users prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.DSelecting Refresh Roles re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

单选题An administrator learns that users are unable to login to a server via ssh.  After making a telnet connection to the server, how can the administrator check the status of the sshd subsystem?()Alssys -a comBlssys -a sshdClssrc -s sshdDlssrc -s tcpip

单选题An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()AThe administrator forgot to change the share permissionsBThe users were not part of the “Everyone” built in groupCThe administrator shared the files but not the folderD“Modify” only allows users to change existing documents

单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()AA public place where guests are free to access the wireless network.BA small office where a defined number of specific wireless devices are used.CA meeting room where various company users will access the wireless network during meetings. DAn office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

单选题you configure a new file server that runs windows server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files.The TCP/IP properties for the file server are configured as shown in the following exhibit.You need to ensure that users are able to access the shared files. What should you do?()AConfigure a static IP address.BConfigure the default gateway.CConfigure the DNS server address.DAdd the domain to the DNS suffix on the network interface.

单选题You configure a new file server that runs Windows Server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files. The TCP/IP properties for the file server are configured as shown in the following exhibit.(exhibit not there again wtf!) You need to ensure that users are able to access the shared files. How should you configure the TCP/IP properties in the file server?()AConfigure a static IP addressBConfigure the default gatewayCConfigure the DNS server addressDAdd the domain to the DNS suffix on the network interface

单选题Your company has recently deployed a server that runs windows server 2008. The server has the ip information shown below.Ip address 192.168.46.186Subnet mask: 255.255.255.192Default gateway: 192.168.46.1Users on remote subnets report that they are unable to connect to the server.You need to ensure all users are able to connect to the server.What should you do?()AChange the IP address to192.168.46.129BChange the IPaddress to192.168.46.200CChange thes ubnet mask to a 24-bitmaskDChange the subnet mask to a 27-bitmask.

单选题Users are unable to access the Internet but the users are able to send/receive email from theirdesktops. Which of the following ports is MOST likely being blocked?()A25B80C110D143

单选题Several users report that they are unable to print to a new printer recently installed. The technician is unable to ping the printer. Which of the following is the MOST likely cause?()ANo IP address on the printerBPaper jam in the paper feed trayCImproper DNS settings on the printerDBroken LCD screen on the printer

多选题User SCOTT wants to perform a bulk insert operation in the EMP_DEP table. SCOTT receives the followingerror after the INSERT statement is issued and few rows are inserted:INSERT INTO EMP_DEP (emp_id,name,salary,dep_name,mgr_id) *ERROR at line 1: ORA-01653: unable to extend table SCOTT.EMP_DEP by 128 in tablespace USERS Identify two actions eitherof which will help you resolve this problem. ()AGrant the RESOURCE role to SCOTT.BAdd data files to the USERS tablespace.CGrant the CREATE ANY TABLE privilege to SCOTT.DIncrease the space for SCOTT on the USERS tablespace.EIncrease the size of the data file associated with the USERS tablespace