更多"An administrator receives reports f"的相关试题:
[单项选择] An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()
A. Implement preventative measures.
B. Close the issue.
C. Document the outcome.
D. Question other users to make sure they are not having the same issue
[多项选择] A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)
A. Use the custom application feature.
B. Configure static NAT for the host.
C. Use port address translation (PAT).
D. Use the address-persistent option.
[单项选择] An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()
A. Multilayer switch
B. CSU
C. Proxy server
D. IDS
[单项选择]A network administrator receives an error message while tring to configure the Ethernet interface of a router with IP address 10.24.24.24/29.which statement explains the reason for this issue?()
A. The address is a broadcast address
B. The Ehernet interface is faulty
C. VLSM-capable routing protocols must be enable first on the router.
D. This address is a network address.
[单项选择]An administrator receives a contract for a server install at a new building. Which of the followingshould be completed after installing the server?()
A. Log the administrator password used
B. Test the air temperature
C. Update the network diagram
D. Review the evacuation procedures
[单项选择]A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()
A. Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.
B. Increase the number of licenses; using smit chaili cense
C. Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.
D. Change User can logi field from false to true: using smit chuser.
[单项选择] An administrator learns that users are unable to login to a server via ssh. After making a telnet connection to the server, how can the administrator check the status of the sshd subsystem?()
A. lssys -a com
B. lssys -a sshd
C. lssrc -s sshd
D. lssrc -s tcpip
[单项选择]A network administrator repeatedly receives support calls about network issues. After investigating the issues, the administrator finds that the source NAT pool is running out of addresses.To be notified that the pool is close to exhaustion, what should the administrator configure?()
A. Use the pool-utilization-alarm raise-threshold under the security nat source stanza.
B. Use a trap-group with a category of services under the SNMP stanza.
C. Use an external script that will run a show command on the SRX Series device to see when the pool is close to exhaustion.
D. Configure a syslog message to trigger a notification when the pool is close to exhaustion.
[单项选择]A router receives a packet from a neighbor with an MPLS shim header value of 0.What does the router do with this packet?()
A. It performs a label pop operation and an IP lookup.
B. It performs a label swap operation and an IP lookup.
C. It sends an error message toward the egress router.
D. It sends an error message toward the ingress router.
[单项选择] A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()
A. Phishing scam
B. Social engineering
C. Man-in-the-Middle
D. Shoulder surfing
[单项选择]Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。
A. The MAC address of the NIC in Host 1
B. The MAC address of the NIC in server 1
C. The MAC address of the Fa0/0 interface of router R1
D. The MAC address of the s0/0/0 interface of the router R2
[单项选择] An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
A. Secure VPN
B. MAC filtering
C. IP filtering
D. Static IP addresses
[单项选择] Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?()
A. Determine what has changed
B. Test a solution.
C. Establish the most probable cause
D. Escalate the problem to the right section
[多项选择] An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).
A. TACACS+
B. RADIUS
C. Kerberos
D. 802.1X
E. RRAS
[单项选择] The router receives a login request from a PPP over ATM client and examines the domain map for the client's domain. The router finds no entries currently configured within the domain map. What does the router do with the login request?()
A. The router rejects it.
B. The router tunnels it via L2TP.
C. The router authenticates it locally.
D. The default virtual router authenticates it.
[单项选择] An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()
A. Implement preventative measures.
B. Close the issue.
C. Document the outcome.
D. Question other users to make sure they are not having the same issue.