A. Remotely connect to the user's laptop and review the network configuration settings
B. Ping the web server from inside the network to ensure it is still up and running.
C. Check to make sure the company's website is accessible from the Internet.
D. Ensure the Ethernet cable is securely plugged into the user's laptop
您可能感兴趣的试卷
你可能感兴趣的试题
A. Baseline
B. Network map
C. Wire scheme
D. Asset management
A. Verity full system functionality
B. Identify the main problem and question the user
C. Document their findings, actions, and outcomes
D. Escalate the issue to upper management
A. Review the architectural plans to see how many drops go to each closet.
B. Count the number of rooms near each closet and standardize eight drops per room.
C. Wireless is the new standard and no network switches will be needed in the building,
D. Count the number of phone ports and configure two network ports for each phone port.
A technician is using a packet sniffer to identify a server. The technician observes the following
network traffic:
Which of the following is MOST likely to be the server?()
A.HOST-A
B.HOST-B
C.HOST-C
D.HOST-D
A. Packet analysis
B. QoS
C. Traffic shaping
D. Fault tolerance
A. traceroute
B. ipconfig
C. ifconfig
D. route
E. hostname
A.RIP
B.0S:F
C.STP
D.EGP
A.10GBase-ER
B.10GBase-LW
C.100Base-FX
D.1000Base-T
A.RCP
B.Telnet
C.RSH
D.SSH
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC.
Which of the following devices is the administrator plugged into? ()
A.Hub
B. Bridge
C. Switch
D. Router
最新试题
A wireless access point supports up to 20 clients. Which of the following describes this wirelessnetwork?()
Which of the following cable types is intended to be used on short distances and is immune to anytype of interference?()
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()
Which of the following protocols is commonly used for VoIP technology?()
When ordering switches for a new building, which of the following is the BEST way for the technician to determine the number of switches to put in each network closet?()
Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()
Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()
Which of the following defines access for a network?()
After a baseline check was completed it was noted that the network was working far below the level of the last baseline.Which of the following should the technician do NEXT to determine where the network problems are occurring?()