单项选择题A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()

A. Remotely connect to the user's laptop and review the network configuration settings
B. Ping the web server from inside the network to ensure it is still up and running.
C. Check to make sure the company's website is accessible from the Internet.
D. Ensure the Ethernet cable is securely plugged into the user's laptop


您可能感兴趣的试卷

你可能感兴趣的试题

2.单项选择题The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()

A. Verity full system functionality
B. Identify the main problem and question the user
C. Document their findings, actions, and outcomes
D. Escalate the issue to upper management

3.单项选择题When ordering switches for a new building, which of the following is the BEST way for the technician to determine the number of switches to put in each network closet?()

A. Review the architectural plans to see how many drops go to each closet.
B. Count the number of rooms near each closet and standardize eight drops per room.
C. Wireless is the new standard and no network switches will be needed in the building,
D. Count the number of phone ports and configure two network ports for each phone port.

5.单项选择题Which of the following would be used to optimize network performance and increase bandwidth availability?()

A. Packet analysis
B. QoS
C. Traffic shaping
D. Fault tolerance

8.单项选择题Which of the following uses copper wiring?()

A.10GBase-ER
B.10GBase-LW
C.100Base-FX
D.1000Base-T

最新试题

A wireless access point supports up to 20 clients. Which of the following describes this wirelessnetwork?()

题型:单项选择题

Which of the following cable types is intended to be used on short distances and is immune to anytype of interference?()

题型:单项选择题

Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).

题型:多项选择题

A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()

题型:单项选择题

Which of the following protocols is commonly used for VoIP technology?()

题型:单项选择题

When ordering switches for a new building, which of the following is the BEST way for the technician to determine the number of switches to put in each network closet?()

题型:单项选择题

Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()

题型:单项选择题

Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()

题型:单项选择题

Which of the following defines access for a network?()

题型:单项选择题

After a baseline check was completed it was noted that the network was working far below the level of the last baseline.Which of the following should the technician do NEXT to determine where the network problems are occurring?()

题型:单项选择题