题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-10-30 21:59:59

[单项选择]A mail server keeps shutting down. The administrator gets an error message over temperature error? Which of the following should the administrator replace FIRST?()
A. Power supply fan
B. CPU fan
C. Heat sink
D. Case fan

更多"A mail server keeps shutting down. "的相关试题:

[单项选择]A server keeps rebooting at various times throughout the day. Which of the following tools wouldBEST help to diagnose this issue?()
A. Multimeter
B. Temperature monitor
C. Cable tester
D. Toner probe
[单项选择]A mail server keeps shutting down. The administrator gets an error message over temperature error. Which of the following should the administrator replace FIRST?()
A.  Power supply fan
B.  CPU fan
C.  Heat sink
D.  Case fan
[单项选择]Which of the following tools allows an administrator to determine the MAC address of another computer?()
A. ping
B. arp
C. ifconfig
D. ipconfig
[单项选择]Which of the following services can an administrator use to reduce latency and prioritize the flowof data?()
A. Fault tolerance
B. RADIUS
C. Qos
D. Load balancing
[单项选择]The most important reason why the Hush administration support more new nuclear-power plants is that ______.
A. they need little government financial support
B. they will increase energy security
C. they help lessen dependence on fossil fuels
D. they are environmentally friendly
[多项选择]Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
A. Port security needs to be globally enabled.
B. Port security needs to be enabled on the interface.
C. Port security needs to be configured to shut down the interface in the event of a violation.
D. Port security needs to be configured to allow only one learned MAC address.
E. Port security interface counters need to be cleared before using the show command.
F. The port security configuration needs to be saved to NVRAM before it can become active.
[单项选择] You are a security administrator for your company. The network consists of a single Active  Directory domain. All servers run Windows Server 2003. All client computers run Windows 2000 Professional.   You manage a Windows Server 2003 computer named Server1 that is a domain member server. You use IIS on Server1 to host an Internet Web site. Approximately 4,000 employees of your company connect over the lnternet to access company confidential data on Server1. You control access to data on Server1 by using NTFS file permissions assigned to groups. Different groups are assigned access to different files. Employees must have access only to files that they are assigned access to based on their membership in a group. You enable SSL on Server1 to protect confidential data while it is in transit. You issue each employee an Authenticated Session certificate and store a copy of that certificate with their user account in the Active Directory domain.    You need to ensure that Server1 authenticates users based on possession of their certificate.  What should you do?()
A.  Request a Web server certificate from a commercial certification authority (CA).
B.  Configure access restrictions based on employee ip address.
C.  Enable Digest authentication for Windows domain servers.
D.  Configure client certificate mapping.
[单项选择] You are a database administrator for your company. A user named Susan belongs to the Windows SalesManagers group. Susan needs a Reporting Services report to display annual sales information by territory. A user named Joe reports to Susan and belongs to the Windows Sales group. He needs a report that is limited to his sales territory, but still displays the same detailed sales data that is on Susan’s report. You need to design a secure solution that meets the reporting needs of the users and that consumes the minimal amount of server resources.  What should you do?()
A. Design a report for Susan that includes two data regions. One data region is used for summary sales data. The other data region is used for the detailed sales data for each sales representative. Then, design a report for Joe that displays the detailed sales data.
B. Design two reports for Susan. One report includes the territory information, and one report includes the detailed sales data. Then, design a report for Joe that displays the detailed sales data for his territories.
C. Design a report for Susan that includes the territory information. Then, design a report for Joe that includes detailed sales data for his territories. Finally, configure Susans report so that it includes the data in Joes report.
D. Design a parameterized report for Susan that includes all territory information. Then, design a linked report for Joe that links to Susans report.
[单项选择] ou are the network administrator for your company. The network consists of a single Active Directory forest that contains one domain. The functional level of the forest is Windows 2000, and the functional level of the domain is Windows 2000 mixed. The domain contains four domain controllers named DC1, DC2, DC3, and DC4. There are two sites in the forest. DC1 and DC2 are in one site. DC3 and DC4 are in the other site. DC1 fails. You need to wait until the following week to restore DC1. While connected to DC3, you perform a bulk import of user accounts and receive an error message stating that a number of the user accounts could not be created. You need to ensure that the user accounts can be created.  What should you do?()
A.  Seize the PDC emulator role to DC3.
B.  Seize the relative ID (RID) master role to DC3. 
C.  Create a replication object to connect DC3 to DC2.
D.  Raise the functional level of the domain and the functional level of the forest to Windows Server 2003.
[单项选择] You are the system administrator for an electronics manufacturing company. The accounting department uses Windows 98 computers. The department has purchased a third-party spreadsheet application that only runs on Windows 2000 Professional. You need to upgrade the computers to Windows 2000 Professional and install the new application. You choose an unattended installation method for both the operating system and the application.  The Windows 2000 Professional installation files reside on a server named Companyrv in a shared folder name W2Ksource. You place the installation files for the spreadsheet application in //Companyrv/W2Ksource/i386/$OEMS$. You create an answer files named Acctanswer.txt and place in //Companyrv/W2Ksource. You map drive letter H: to //Companyrv/W2Ksource and begin the installation on a test computer by running the winnt32 /s:H:/i386/u:H:/acctanswer.text command. Windows 2000 Professional is installed successfully. However, the spreadsheet application is not installed. You want to ensure that the spreadsheet application is installed during the unattended installation.  What should you do? ()
A.  Run the winnt /s:H:/i386 /u:H:/acctanswer.txt command instead of the winnt32 /s:H:/i386/u:H:/acctanswer.text command. 
B.  Move the spreadsheet application installation files to //Companyrv/W2Ksource/i386, and thenrun the winnt /s:H:/i386 /u:H:/acctanswer.txt command. 
C.  Edit the [Unattended] section of the answer file to contain the parameter OemPreinstall = Yes, and then run the winnt32 /s:H:/i386/u:H:/acctanswer.text command. 
D.  Rename Acctanswer.txt to Unattend.txt, and then run the winnt32 /s:H:/i386 /u:H:/unattend.text command.
[单项选择]You work as an administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com.Subsequent to deploying a Server Core Installation of Windows Server 2012 R2 on a new ABC.com server,you are instructed to add a graphical user interface (GUI) to the server.  You want to achieve this goal from the command prompt. Which of the following actions should you take?()
A. You should consider making use of the dism.exe command.
B. You should consider making use of the dsquery.exe command.
C. You should consider making use of the dsadd.exe command.
D. You should consider making use of the dsrm.exe command.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码