Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day. Which of the following is the NEXT step the administrator should take?()A、 Verify the configuration of the connected port on the network switch.B、 Reboot the server.C、 Install a new NIC on the server.D、 Verify that network cables are connected.
Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day. Which of the following is the NEXT step the administrator should take?()
- A、 Verify the configuration of the connected port on the network switch.
- B、 Reboot the server.
- C、 Install a new NIC on the server.
- D、 Verify that network cables are connected.
相关考题:
A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?() A. tracertB. msconfigC. routeD. net use
You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).Users report that it takes a long time to open shared files on Server1. Users do not report this performance problem when they open files on other servers.You notice the following performance statistics on Server1:You need to optimize the performance of Server1.What should you do?()A. Add more ram.B. Upgrade the processor.C. Increase the size of the PageFile.D. Disable Data Execution Prevention (DEP).
A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()A、 tracertB、 msconfigC、 routeD、 net use
Several remote sales employees, who have come into the office this week, report that they are unable to get on the Internet, but no other users have reported similar issues. The help desk hasescalated the issue and the case notes state that the users have IP addresses that begin with 169. Which of the following should the system administrator check FIRST?()A、DHCP serverB、Network switchesC、DNS serverD、Core router
An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()A、The administrator forgot to change the share permissionsB、The users were not part of the “Everyone” built in groupC、The administrator shared the files but not the folderD、“Modify” only allows users to change existing documents
The EMPLOYEES table is stored in the USERS tablespace. You need to check if the EMPLOYEES table is affected by the block corruption found in the USERS tablespace. Which option would you use?() A、the DBNEWID utilityB、the ANALYZE commandC、the RMAN LIST commandD、the RMAN REPORT commandE、the RMAN CROSSCHECK commandF、the RMAN BLOCKRECOVER command
The order entry department requested a report to display the average time to enter an order from each order entry clerk sorted by supervisor with a group average after viewing the report users requested to bold the value for each supervisors group average. Where would you make this change?()A、In the template used. B、In the data model. C、In the life previewer. D、In the field property palette.
You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). Users report that print jobs are not printing. Users also report that they do not receive any error messages. Younotice a large number of jobs in the print queue. You attempt to delete some jobs from the queue and notice that the jobs remain in the queue. You need to ensure that users can print successfully. What should you do? ()A、Restart the Print Spooler service.B、Pause the printer, and then restart the printer.C、Take ownership of the printer, and then delete the print jobs.D、Assign the Manage Documents permission to the users connected to the printer.
You are a database administrator for your company. A user named Susan belongs to the Windows SalesManagers group. Susan needs a Reporting Services report to display annual sales information by territory. A user named Joe reports to Susan and belongs to the Windows Sales group. He needs a report that is limited to his sales territory, but still displays the same detailed sales data that is on Susan’s report. You need to design a secure solution that meets the reporting needs of the users and that consumes the minimal amount of server resources. What should you do?()A、Design a report for Susan that includes two data regions. One data region is used for summary sales data. The other data region is used for the detailed sales data for each sales representative. Then, design a report for Joe that displays the detailed sales data.B、Design two reports for Susan. One report includes the territory information, and one report includes the detailed sales data. Then, design a report for Joe that displays the detailed sales data for his territories.C、Design a report for Susan that includes the territory information. Then, design a report for Joe that includes detailed sales data for his territories. Finally, configure Susans report so that it includes the data in Joes report.D、Design a parameterized report for Susan that includes all territory information. Then, design a linked report for Joe that links to Susans report.
You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()A、Advanced settingsB、Group scopeC、Group typeD、The mail flow settings
You create 200 new user accounts. The users are located in six different sites. New users report that they receive the following error message when they try to log on: "The username or password is incorrect." You confirm that the user accounts exist and are enabled. You also confirm that the user name and password information supplied are correct. You need to identify the cause of the failure. You also need to ensure that the new users are able to log on Which utility should you run()A、RsdiagB、RstoolsC、RepadminD、Active Directory Domains and Trusts
You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Reporting Services (SSRS) solution. The solution contains a report named Sales Details that displays sales information of all the employees. You create an SSRS report named Sales Summary that displays the total monthly sales of each employee. Users who view the Sales Summary report occasionally require the monthly sales details for a particular employee. You need to ensure that the users can click a value in the month column of the Sales Summary report to open and render the Sales Details report. What should you do?()A、 Use a subreport.B、 Use a bookmark link.C、 Use the drilldown functionality.D、 Use a drillthrough report link.
You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner. What should you modify?()A、the Federation TrustB、the EWS virtual directoryC、the default sharing policyD、the Organizational Relationship
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Reporting Services (SSRS) solution. The solution contains a report named Sales Details that displays sales information of all the employees. You create an SSRS report named Sales Summary that displays the total monthly sales of each employee. Users who view the Sales Summary report occasionally require the monthly sales details for a particular employee. You need to ensure that the users can click a value in the month column of the Sales Summary report to open and render the Sales Details report. What should you do?()A Use a subreport.B Use a bookmark link.C Use the drilldown functionality.D Use a drillthrough report link.
单选题You created a report from the human resources department based on all the columns in the EMP table. After viewing the report users requested that the cmp_ID columns peers first in the output. How would you change the position of the column?()AAfter the query. BEnter the report and change the column's position in the field tab. CAlter the column's position in the object navigator. DEnter the report wizard and change the column's position in the data tab. EAlter the column's position within its group and change the layout.
单选题ou are developing a fiscal report for a customer. Your customer has a main office in the United States and a satellite office in Mexico. You need to ensure that when users in the satellite office generate the report, the current date is displayed in Mexican Spanish format.Which code segment should you use?()A AB BC CD D
单选题The order entry department requested a report to display the average time to enter an order from each order entry clerk sorted by supervisor with a group average after viewing the report users requested to bold the value for each supervisors group average. Where would you make this change?()AIn the template used. BIn the data model. CIn the life previewer. DIn the field property palette.
单选题You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner. What should you modify?()Athe Federation TrustBthe EWS virtual directoryCthe default sharing policyDthe Organizational Relationship
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a report which is often executed during business time. There is a stored procedure that is used as the data source for the report. You get a report from users saying that they receive the data returned by the report but the data is inconsistent. As the technical support, you check and find that phantom reads cause this problem. You must make sure that consistent data is returned by the report while not affecting other users. So what action should you perform to achieve this goal?()AYou should configure the database for Read Committed Snapshot isolation. BYou should modify the stored procedure to use the Snapshot isolation level CYou should configure the database for Auto Update Statistics asynchronously DYou should modify the stored procedure to use the Repeatable Read isolation level
单选题Your network contains a server named Server1. Server1 has DirectAccess deployed. A group named Group1 is enabled for DirectAccess. Users report that when they log on to their computers, the computers are not configured to use DirectAccess. You need to ensure that the users computers are configured to use DirectAccess. What should you do first?()AOn each client computer, add Group1 to the Distributed COM Users group.BOn each client computer, add Group1 to the Network Configuration Operators group.CFrom Active Directory Users and Computers, add the users user accounts to Group1.DFrom Active Directory Users and Computers, add the users computer accounts to Group1.
单选题The EMPLOYEES table is stored in the USERS tablespace. You need to check if the EMPLOYEES table is affected by the block corruption found in the USERS tablespace. Which option would you use?()Athe DBNEWID utilityBthe ANALYZE commandCthe RMAN LIST commandDthe RMAN REPORT commandEthe RMAN CROSSCHECK commandFthe RMAN BLOCKRECOVER command
单选题An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()AThe administrator forgot to change the share permissionsBThe users were not part of the “Everyone” built in groupCThe administrator shared the files but not the folderD“Modify” only allows users to change existing documents
单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()AUse Windows Explorer to receive the offline filesBUsing the Windows Explorer, disable the cache for the reports on the network shareCUse the Windows NT explorer to grant the special access for the reports on the network shareDUse the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
单选题You are responsible for migrating client computers from Windows 98 and Windows NT Workstation 4.0 to Windows 2000 Professional. You have installed Windows 2000 Professional and reinstalled the necessary application on 10 computers. You have returned these computers to their users. The users of these computers report that their word processing application will not start. What should you do?()ASet the permission on the application to Execute.BAdd the application to the Run key in the registry.CApply the Securews.inf security template on the users’ computers.DApply the compatws.inf security template on the users’ computers.
单选题A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()A tracertB msconfigC routeD net use
单选题Users report an intermittent degradation of sound on their IP phones. Which of the following woulda network administrator do to alleviate the problem?()AUse plenum cablesBProvide fault tolerance for the switchCConfigure VLAN trunking on the switchDConfigure QoS
单选题What is the impact of the results of the output of the following command?() RMAN report unrecoverable database; Report of files that need backup due to unrecoverable operations File Type of Backup Required Name 4 full or incremental C:///ORACLE/ORADATA/ORCL/USERS01.DBFA There are no backup sets with any backups of the users01.dbf datafile.B The users01.dbf datafile has had unrecoverable operations occur in it. It will need to be backed up or some data loss is possible during a recovery.C The users01.dbf datafile is corrupted.D The users01.dbf datafile backup exceeds the retention criteria.E The last backup of the users01.dbf datafile failed and must be rerun.