单选题Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?()ADetermine what has changedBTest a solution.CEstablish the most probable causeDEscalate the problem to the right section
单选题
Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?()
A
Determine what has changed
B
Test a solution.
C
Establish the most probable cause
D
Escalate the problem to the right section
参考解析
解析:
暂无解析
相关考题:
Users can define policy to control traffic flow between which two components? ()(Choose two.) A. from a zone to the router itselfB. from a zone to the same zoneC. from a zone to a different zoneD. from one interface to another interface
Users are reporting that they are still experiencing network issues even though a fix was recentlyapplied. Which of the following troubleshooting methodology steps is the administrator using?() A. Escalating the problemB. Testing the solution and identifying the effectsC. Continuing to gather information about the same symptomsD. Documenting the solution and the entire process
Several users from the same location are reporting problems accessing the intranet server. Anadministrator has verified that no other remote areas are having issues connecting to the sameserver.Which of the following steps should the administrator perform NEXT?()A. Determine what has changedB. Test a solution.C. Establish the most probable causeD. Escalate the problem to the right section
CALDOVREP is ______.A.a pilot stationB.a portC.a mandatory ship reporting systemD.a vessel commences its voyage from a location beyond one limit of the inshore traffic zone
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram
When arriving at the customers location, two different users describe the problem, and from their description it seems to be two separate problems. Which of the following is an appropriate step to take?()A、Ignore both of them and decide what the real problem is.B、Set up a separate call for each problem.C、Have them duplicate the problem at the device.D、Ask a third person and see if the problem is the same thing.
Users are reporting problems connecting to servers in the remote company.com domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote company.com?()A、dig company.com nsB、ipconfig/allC、ifconfig-aD、dig company.com mx
A disk contains several logical volumes. Which of the following commands indicates how much data is read from or written to a particular logical volume on the same disk?()A、 sar B、 iostat C、 svmon D、 filemon
Which of the following commands should be used to show how much data is read from or written to a particular logical volume, given there are several other logical volumes on the same disk?()A、 sarB、 lslvC、 iostatD、 filemon
What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller
Users can define policy to control traffic flow between which two components?()A、from a zone to the device itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface
Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface
You have a computer that runs Windows XP Professional. Multiple users share the computer. Users work in either French or English. You need to ensure that users can change the language in which the system menus appear. What should you do first?() A、From the Display Properties, modify the Desktop settings.B、From Internet Explorer, modify the Language Preferences. C、From the Multilingual User Interface (MUI) pack installation CD, run muisetup.exe. D、From Regional and Language Options, modify the Location settings and the Input Languages settings.
多选题Users of a site-to-site VPN are reporting performance problems. The VPN connection employs IPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()AEmploy path MTU discovery.BSet the MTU higher than 1500 bytes.CTurn off pre-fragmentation for IPSec.DSet the MTU value to 1400 bytes.
多选题Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()ALoop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannotBUDLD protects against STP failures caused by cabling problems that create one-way links.CLoop guard detects and protects against duplicate packets being received and transmitted on different portsDUDLD protects against unidirectional cabling problems on copper and fiber media.ELoop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.
单选题Web users are reporting issues downloading various types of media. Which of the following shouldthe administrator do FIRST?()AFind out what has recently changed on the networkBCreate an action plan and solution identifying potential effects.CContinue to gather information and see what other problems may exist.DDetermine the most probable cause.
多选题Users of a site-to-site VPN are reporting performance problems. The VPN connection employsIPSec and GRE and traverses several Ethernet segments. The VPN packets are being fragmented as they traverse the links. What would be two methods to overcome this problem?()AEmploy path MTU discovery.BSet the MTU higher than 1500 bytes.CTurn off pre-fragmentation for IPSec.DSet the MTU value to 1400 bytes.
单选题A towboat has the same draft as the barges it is pushing ahead. If the distance from the stern of the towboat to the head of the tow is 260m,where is the approximate location of the pivot point of the unit?()AAt the head of the towB75m from the head of the towC120m from the head of the towD180m from the head of the tow
单选题Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()AConfigure a Windows Connect Now Group Policy.BConfigure a Wireless Network (IEEE 802.11) Policy.CDelete the rogue network from the Network and Sharing Center on each computer.DCreate a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.
单选题Which of the following commands should be used to show how much data is read from or written to a particular logical volume, given there are several other logical volumes on the same disk?()A sarB lslvC iostatD filemon
单选题A new customer wants to install a Power 750 in a warehouse location that has no local staff to support it. They are concerned about hardware support and would like to have the system notify IBM service if there is an issue.Which actions will address the customer concern?()AEnable automatic problem reporting from smitBUse IVM to enable console mirroring to IBM Remote Support.CUse the HMC to enable reporting through Electronic Service Agent.DEnable Automatic Problem Reporting in ASMI using he embedded modem on the FSP.
单选题Users are reporting that they are still experiencing network issues even though a fix was recentlyapplied. Which of the following troubleshooting methodology steps is the administrator using?()AEscalating the problemBTesting the solution and identifying the effectsCContinuing to gather information about the same symptomsDDocumenting the solution and the entire process
单选题You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer. What should you do? ()AConfigure File signature verification to block driver installation, and set driver signing as a system default.BRemove all users from the Power User group.CCreate a Local Computer Policy to prevent users from installing drivers.DCreate a Local Computer Policy to enable Windows File Protection.
多选题Which two statements accurately describe a role?()AA role can be given to a maximum of 1000 users.BA user can have access to a maximum of 10 roles.CA role can have a maximum of 100 privileges contained in it.DPrivileges are given to a role by using the CREATE ROLE statement.EA role is a named group of related privileges that can be granted to the user.FA user can have access to several roles, and several users can be assigned the same role.
单选题Which change in the condition of the seas could indicate the formation of a tropical storm or hurricane several hundred miles from your location? ()AA long swell from an unusual directionBA lengthy lull in the wind and seasCLarge seas coming from different directionsDA brisk chop from the southeast
单选题What is the major advantage of high altitude observations?()AErrors due to unusual parallax are eliminatedBThe same body can be used for a fix from observations separated by several minutesCThe declination is the only information needed from the almanacDThe semidiameter correction of the sextant altitude is eliminated
单选题From the whole passage, we know that ______.Amen and women have exactly the same brains in their headsBmen and women have quite different brains in their headsCmen think of mathematical problems while women think of languagesDmen and women see the world around them in just the same way