单选题Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()AAshortBOpen pairsCESDDEMI

单选题
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()
A

Ashort

B

Open pairs

C

ESD

D

EMI


参考解析

解析: 暂无解析

相关考题:

You are connected using SQL* Plus to a multitenant container database (CDB) with SYSDBA privilegesand execute the following sequence statements:What is the result of the last SET CONTAINER statement and why is it so?()A. It succeeds because the PDB_ADMIN user has the required privileges.B. It fails because common users are unable to use the SET CONTAINER statement.C. It fails because local users are unable to use the SET CONTAINER statement.D. If fails because the SET CONTAINER statement cannot be used with PDB$SEED as the target pluggable database (PDB).

A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()A. Persistent sessionB. Dynamic evaluationC. Roaming sessionD. Browser request follow-through

A company finished upgrading the wireless encryption to WPA2 Enterprise. The administratorreceives a call from a user who is unable to connect to the company wireless.Which of the following is MOST likely causing the connection problem?()A. The laptop is missing the software supplicantB. The access point SSID is hidden.C. The laptop only supports TKIP and AES encryption,D. The access point is on the wrong channel.

Users are unable to stay connected to the company‘s wireless network. Several times throughoutthe day the users‘ signals are dropped and they are forced to reconnect to the network.A technician determines the network cabling that supplies the WAP has been run inside with severalpower lines.Which of the following is the MOST likely cause of the network issue?()A.AshortB.Open pairsC.ESDD.EMI

Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()A.AB.BC.CD.D

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

You are preparing to slush a stay on your vessel by lowering yourself down the stay in a bosun's chair.The proper way to do this is to ride down the stay on a riding shackle ______.A.with the pin of the shackle riding on the stayB.with the pin of the shackle through the chair's bridle eyeC.with a hook attaching the chair to the riding shackleD.connected to a second shackle on the chair

In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A、 Verify the configuration of the connected port on the network switch.B、 Reboot the server.C、 Install a new NIC on the server.D、 Verify that network cables are connected.

An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled

Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()A、AshortB、Open pairsC、ESDD、EMI

A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()A、The laptop is missing the software supplicantB、The access point SSID is hidden.C、The laptop only supports TKIP and AES encryption,D、The access point is on the wrong channel.

Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()A、the size of the hard drives for each PC connected to the client’s networkB、the average size of the wallet based on the number of profiles and accountsC、if any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hoursD、the number of users that will be connected using the wireless network, as opposed to a wired connection

You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?() A、Configure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.B、Disable and then re-enable Internet Connection Sharing (ICS) on Pro1.C、Create a network bridge between the wired and wireless connections on Pro1.  D、Clear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties of the VPN connection.

You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.

单选题A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()AThe laptop is missing the software supplicantBThe access point SSID is hidden.CThe laptop only supports TKIP and AES encryption,DThe access point is on the wrong channel.

单选题Which important factor is taken into account when determining an estimate for the maximum network bandwidth to be used by a customer?()Athe size of the hard drives for each PC connected to the client’s networkBthe average size of the wallet based on the number of profiles and accountsCif any users will use IBM Tivoli Access Manager for Enterprise Single Sign-On during non-work hoursDthe number of users that will be connected using the wireless network, as opposed to a wired connection

单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()AA public place where guests are free to access the wireless network.BA small office where a defined number of specific wireless devices are used.CA meeting room where various company users will access the wireless network during meetings. DAn office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

多选题A company has a business application that provides its users with many different reports: receivables reports, payables reports, revenue projects, and so on.The company has just purchased some new, state-of-the-art,wireless printers, and a programmer has been assigned the task of enhancing all of the reports to use not only the company’s old printers, but the new wireless printers as well.When the programmer starts looking into the application, the programmer discovers that because of the design of the application, it is necessary to make changes to each report to support the new printers.  Which two design concepts most likely explain the situation?()AInheritanceBLow cohesionCTight couplingDHigh cohesionELoose couplingFObject immutablility

单选题An employee cannot access the company database. You check the connection variables: What is a valid explanation for why one of the users is unable to connect to the database?()A Bob has max_user_connections set to zero, which blocks all his connectionsB Joe has exceeded the max_user_connections global limitC All users are blocked because max_user_connections is accumulated over the host account informationD Kay is already connected elsewhere and attempting to log in againE Connect_timeout is too small to allow a connection to occur

多选题A company has a business application that provides its users with many different reports: receivables reports, payables reports, revenue projects, and so on. The company has just purchased somenew, state-of-the-art, wireless printers, and a programmer has been assigned the task of enhancing all ofthe reports to use not only the company’s old printers, but the new wireless printers as well. When the programmer starts looking into the application, the programmer discovers that because of the design of theapplication, it is necessary to make changes to each report to support the new printers. Which two designconcepts most likely explain this situation? ()AInheritanceBLow cohesionCTight couplingDHigh cohesionELoose couplingFObject immutability

单选题A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()APersistent sessionBDynamic evaluationCRoaming sessionDBrowser request follow-through

单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()AThe wireless access point is using MAC address filteringBThe user has connected to a nearby wireless access point from another officeCThe user has configured the wireless settings with the wrong encryption typeDThe wireless access point has SSID broadcast disabled

单选题Our company's visitors decided to stay in our city for ______ two days as they wanted to have a look around.AotherBthe otherCanotherDother's

单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()AConfigure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). BConfigure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).CAdd a script to the users' desktops that changes the IP configuration between dynamic and manual.DConfigure the IP properties of the portable computers so that they have an alternate configuration.