单选题A company plans to upgrade a network server. Before proceeding with the upgrade, the HCL (Hardware Compatibility List) and hardware is checked and necessary backups and documentation are made.   The existing 512 MB of SDRAM is replaced with 1024 MB. The 10 Mbps network card is replaced with a 10/100 PCI network card. When the server restarts, beeps sound and the server does not pass the POST.  Which of the following is the MOST likely cause of the problem?()A The memory is not seated correctly.B The network card is not configured correctly.C The server does not support 1024 MB of memory.D Master SDRAM ECC needs to be enabled in the CMOS.

单选题
A company plans to upgrade a network server. Before proceeding with the upgrade, the HCL (Hardware Compatibility List) and hardware is checked and necessary backups and documentation are made.   The existing 512 MB of SDRAM is replaced with 1024 MB. The 10 Mbps network card is replaced with a 10/100 PCI network card. When the server restarts, beeps sound and the server does not pass the POST.  Which of the following is the MOST likely cause of the problem?()
A

 The memory is not seated correctly.

B

 The network card is not configured correctly.

C

 The server does not support 1024 MB of memory.

D

 Master SDRAM ECC needs to be enabled in the CMOS.


参考解析

解析: 暂无解析

相关考题:

You are the network administrator for Ezonexam. The network includes a Microsoft Windows NT Server 4.0 member server computer that has a non-Plug and Play ISA network adapter.You want to upgrade this computer to Microsoft Windows 2000 Server. You also want to ensure that you maintain the current device configuration during the upgrade.What should you do? (Each correct answer presents part of the solution. Choose two)A. Install the latest driver for the network adapter.B. Disable the network adapter.C. Start the upgrade process by using Winnt32.exeD. Start the upgrade process by booting from the Windows 2000 Server compact disc.E. Configure BIOS to reserve the IRQ currently in use by the network adapter.F. Press F6 at the beginning of the text mode setup to specify an additional driver.

You are the administrator for your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 20 new PXE-compliant computers on the marketing segment of your network. The new computers do not have operating systems installed.You create a RIS image. You load the image onto the RIS server. You then start the new computers.You find that the new computers cannot connect to the RIS server. You verify that the new computers cannot connect to the RIS server. You verify that the existing client computers in the network can connect to the network servers, including the RIS server. You want to enable the new computers to connect to the RIS server.What should you do?A.Add a Windows 2000 Server computer running WINS to the network.B.Add a Windows 2000 Server computer running DHCP to the network.C.Add the domain Everyone group to the RIS OS image security settings.D.Place the new computers on the same segment as the RIS server.

A network technician arrives to work and discovers users are having a problem connecting thecompany server. The server operator was working on upgrades the night before.Which of the following documents should the technician use to attempt to discover the problem?()A. Network mapsB. Change managementC. BaselinesD. Cable management

A network technician arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should the technician use to attempt to discover the problem?()A、Network mapsB、Change managementC、BaselinesD、Cable management

Lesson plans are useful only before the lesson.()

A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?()A、CoaxialB、CAT3C、CAT5D、CAT5e

Company.com has a cluster with nodes that support "hot swap" adapters. During an upgrade of  The network infrastructure,an additional network adapter has been added to the nodes and configured in AIX.  What is the next step required to add this adapter to HACMP?()  A、 Stop the node.B、 Stop the cluster.C、 Run autodiscovery.D、 Configure the IP adapter.

As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)A、It provides reliable input for verifying network consistency.B、It requires a network audit to support some upgrade decisions.C、It requires a network audit to support any network restructuring.D、It begins with gathering organizational input that may be inaccurate.

A company plans to upgrade a network server. Before proceeding with the upgrade, the HCL (Hardware Compatibility List) and hardware is checked and necessary backups and documentation are made.   The existing 512 MB of SDRAM is replaced with 1024 MB. The 10 Mbps network card is replaced with a 10/100 PCI network card. When the server restarts, beeps sound and the server does not pass the POST.  Which of the following is the MOST likely cause of the problem?()A、 The memory is not seated correctly.B、 The network card is not configured correctly.C、 The server does not support 1024 MB of memory.D、 Master SDRAM ECC needs to be enabled in the CMOS.

An administrator is adding memory to a server. Once the system boots up, the same amount of memory appears as before the upgrade. Which of the following is the MOST likely cause?()A、The memory is not the correct CAS latency.B、The memory is not installed in the correct slot.C、The memory does not have the correct timing.D、The memory is not the correct speed.

Company.com has a p5-570 with an application running on each of three Micro-Partitions. The disk I/O is shared through a VIO server. A technical specialist has been asked to upgrade the VIO  server. Which of the following procedures should be taken to maintain the integrity of the partitions?()A、Shut down all client partitions before updating the VIO server.B、Disconnect the client partitions from any IP networks before updating the VIO server.C、Update the client partitions to the latest OS maintenance level before updating the VIO Server.D、Update the VIO server while the partitions are running, but reboot each client partition at a convenient time after the update.

What are the steps required to perform a Preservation install on a server?()A、Shutdown the server and boot it into SMS.Select SMS menu option OS Upgrade, Preservation install for the install type, and allow upgrade to run.B、Shut down the server and perform a network boot from a local NIM server. Select Preservation install for the install type, and allow upgrade to run.C、Shutdown the server and boot it into SMS.Select SMS menu option OS Upgrade, Preservation install for the install type, and allow for upgrade to run.D、Re-boot the server and NFS mount the bos images from a local NIM server. Run smit install. Select Preservation install for the install type, and allow upgrade to run.

You perform the following activities during the database upgrade from Oracle Database 10g to Oracle Database 11g: 1. Capture plans for a SQL workload into a SQL Tuning Set (STS) before upgrade. 2. Load these plans from the STS into the SQL plan baseline immediately after the upgrade. What is the reason for performing these activities? ()A、to minimize plan regression due to the use of a new optimizer versionB、to completely avoid the use of new plans generated by a new optimizer versionC、to prevent plan capturing when the SQL statement is executed after the database upgradeD、to keep the plan in the plan history so that it can be used when the older version of the optimizer is used

Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23  subnet.   The company hires temporary employees. You provide user accounts and computers to the temporaryem ployees. The temporary employees receive computers that are outside the Active Directory domain.   The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system.   You need to plan the network’s security so that it complies with the company 's security policy. What should you include in your plan?()A、Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.B、Create an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.C、Move the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.D、Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.

Your company plans to deploy eight file servers that run Windows Server 2008 R2. All file servers will connect to Ethernet switches.  You need to plan a data storage solution that meets the followingrequirements:   èAllocates storage to the servers as needed èUtilizes the existing network infrastructure  èMaximizes performance  èMaximizes fault tolerance   Which actions should you include in your plan?()A、Install Windows Server 2008 R2 Datacenter on each server. Deploy the servers in a failover cluster. deploy an iSCSI storage area network (SAN).B、Install Windows Server 2008 R2 Standard on each server. Deploy the servers in a Network Load balancing (NLB) cluster. Implement RAID?5 on each server.C、Install Windows Server 2008 R2 Enterprise on each server. Deploy the servers in a failover cluster. deploy a Fibre Channel (FC) storage area network (SAN).D、Install Windows Server 2008 R2 Enterprise on each server. Deploy the servers in a Network Load balancing (NLB) cluster. Map a network drive on each server to an external storage array.

The network at Company Ltd. consists of one Windows NT Server 4.0 domain and 35 Windows 2000Professional computers. The Company network consists of five interconnected TCP/IP subnets. All of thecomputers use TCP/IP as the only network protocol.You are adding 15 Windows 2000 Professional computers to the network. You want to enable theWindows 2000 Professional computers to resolve NetBIOS names to TCP/IP addresses.What should you do? ()A、Install a DHCP server. Configure each computer to use DHCP. B、Install a WINS server. Configure each computer to use WINS. C、Create a Lmhosts.sam file on each computer. Add an entry containing the TCP/IP address and  NetBIOS name for each computer on the network. D、Create a Hosts.sam file on each computer. Add an entry containing the TCP/IP address and NetBIOS name for each computer on the network.

You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.

You are the administrator of Etechsol.com Enterprises. Your company consists of a small 20-user network. Management has decided to upgrade all computers to Windows 2000.   After having a closer examination of your company’s network, you realize that only half of the network interface cards are Net PC compliant. You decide to create Windows 2000 remote boot floppies.  What executable is used for creating RIS boot disks for non-PXE compliant clients?()A、RBFG*EXEB、RIPREP*EXEC、RIS*EXED、RISPXE*EXEE、RISBOO*EXE

单选题Company.com has a p5-570 with an application running on each of three Micro-Partitions. The disk I/O is shared through a VIO server. A technical specialist has been asked to upgrade the VIO  server. Which of the following procedures should be taken to maintain the integrity of the partitions?()AShut down all client partitions before updating the VIO server.BDisconnect the client partitions from any IP networks before updating the VIO server.CUpdate the client partitions to the latest OS maintenance level before updating the VIO Server.DUpdate the VIO server while the partitions are running, but reboot each client partition at a convenient time after the update.

单选题Your company has just upgraded its CATAGORY 5 Ethernet network from 10Mbps to 100Mbps. After the upgrade, the 20 Windows 2000 Professional computers in the marketing department can no longer connect to the network. The remaining 80 Windows 2000 computers in the company can connect, however. Your company uses NWLink as the only network protocol.You need to connect the computers in the marketing department to the network. What must you do? ()AConfigure the NWLink frame type of the network adapters to be ethernet 802.3.BConfigure the NWLink frame type of the network adapters to be ethernet II.CReplace the network adapters with 10/100 BNC adapters.DReplace the network adapters with 10/100 UTP network adapters.

单选题A company plans to upgrade a network server. Before proceeding with the upgrade, the HCL (Hardware Compatibility List) and hardware is checked and necessary backups and documentation are made.   The existing 512 MB of SDRAM is replaced with 1024 MB. The 10 Mbps network card is replaced with a 10/100 PCI network card. When the server restarts, beeps sound and the server does not pass the POST.  Which of the following is the MOST likely cause of the problem?()A The memory is not seated correctly.B The network card is not configured correctly.C The server does not support 1024 MB of memory.D Master SDRAM ECC needs to be enabled in the CMOS.

单选题You install Windows 2000 Professional on your portable computer. You create a new dial up connection to connect to your company’s remote access server. You connect to the remote access server by using the dial up connection. You can connect to the servers on the same segment as the remote access server. You cannot access the shared resources that are on the remote segments from the remote access server. What should you do? ()AConfigure the company remote access server to accept multilink connections.BConfigure the TCP/IP program for the dial up connection to disable IP header compression.CConfigure the TCP/IP properties for the dial up connection to use the default gateway on theremote network.DGrant your user account dial in permission on the company remote access server.

单选题Your company plans to upgrade all client computers to Windows 7.   The company uses a custom line-of-business application. The application contains sensitive data.  The application will not run on Windows 7  You establish that Microsoft Enterprise Desktop Virtualization (MED-V) v2 is the appropriate technology to allow your organization to continue to use the application.    You need to ensure that the virtual machine (VM) images that contain sensitive data can be used only when the user is connected to the MED-V server.  What should you do?()AUse BitLocker Drive Encryption to encrypt the drive on which the VM image is stored.BIn the MED-V console, configure the MED-V workspace to prevent offline operation.CUsing MED-V TrimTransfer technology, deploy the VM image over the network.DUsing Microsoft System Center Configuration Manager, deploy the VM image to an image store directory.

单选题A network technician arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should the technician use to attempt to discover the problem?()ANetwork mapsBChange managementCBaselinesDCable management

单选题You perform the following activities during the database upgrade from Oracle Database 10g to Oracle Database 11g: 1. Capture plans for a SQL workload into a SQL Tuning Set (STS) before upgrade. 2. Load these plans from the STS into the SQL plan baseline immediately after the upgrade. What is the reason for performing these activities? ()Ato minimize plan regression due to the use of a new optimizer versionBto completely avoid the use of new plans generated by a new optimizer versionCto prevent plan capturing when the SQL statement is executed after the database upgradeDto keep the plan in the plan history so that it can be used when the older version of the optimizer is used

单选题As the administrator of your company’s network you are asked to upgrade several Windows NT 4.0 computers to Windows 2000 Professional.  All user settings and application settings must be preserved. Most applications currently running are compatible with Windows 2000 and all the Windows NT 4.0 computers meet the minimum hardware requirements. After you upgrade several computers to Windows 2000 Professional, you find that some applications did not upgrade properly.   What utilities and/or applications should be disabled (or removed) before upgrading?()ACustom printer third-party software.BAPM and Anti-virus softwareCAll Non-Microsoft ProductsDAll 32-bit applicationsEThird-party video drivers

单选题A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?()ACoaxialBCAT3CCAT5DCAT5e

多选题As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)AIt provides reliable input for verifying network consistency.BIt requires a network audit to support some upgrade decisions.CIt requires a network audit to support any network restructuring.DIt begins with gathering organizational input that may be inaccurate.