单选题Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has

题目
单选题
Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()
A

Ashort

B

Open pairs

C

ESD

D

EMI


相似考题
更多“单选题Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has”相关问题
  • 第1题:

    ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()

    A.1

    B.2

    C.3

    D.4


    参考答案:A

  • 第2题:

    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

    • A、WEP encryption
    • B、Channel rotation
    • C、Disable SSID
    • D、WPA encryption

    正确答案:D

  • 第3题:

    Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()

    • A、Ashort
    • B、Open pairs
    • C、ESD
    • D、EMI

    正确答案:D

  • 第4题:

    A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()

    • A、WPA TLS
    • B、WPA PEAP
    • C、64-bit WEP
    • D、128-bit WEP

    正确答案:B

  • 第5题:

    Your computer uses both wired and wireless network connections. The networks are not connected to each other.  You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder.  You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.  What should you do?()

    • A、Turn off the Windows Firewall feature.
    • B、Disable the Block all incoming connections option.
    • C、Turn off the Spyware and other malware protection option.
    • D、Enable the File and Printer Sharing exception in the firewall settings of the wireless network adapter.

    正确答案:D

  • 第6题:

    You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()

    • A、Use Windows Explorer to receive the offline files
    • B、Using the Windows Explorer, disable the cache for the reports on the network share
    • C、Use the Windows NT explorer to grant the special access for the reports on the network  share
    • D、Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

    正确答案:B

  • 第7题:

    单选题
    ABC Company has 1500 managed devices and 15,000 end users on a campus network. LAN Management Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()
    A

    1

    B

    2

    C

    3

    D

    4


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    Your computer uses both wired and wireless network connections. The networks are not connected to each other.  You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder.  You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.  What should you do?()
    A

    Turn off the Windows Firewall feature.

    B

    Disable the Block all incoming connections option.

    C

    Turn off the Spyware and other malware protection option.

    D

    Enable the File and Printer Sharing exception in the firewall settings of the wireless network adapter.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()
    A

    Use Windows Explorer to receive the offline files

    B

    Using the Windows Explorer, disable the cache for the reports on the network share

    C

    Use the Windows NT explorer to grant the special access for the reports on the network  share

    D

    Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()
    A

     Verify the configuration of the connected port on the network switch.

    B

     Reboot the server.

    C

     Install a new NIC on the server.

    D

     Verify that network cables are connected.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    This question is the first in a series of questions that all present the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series. Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to use SSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario The company hires a new desktop support technician. The technician is added to the Administrators group on all client computers and the DHCP Users group on all DHCP servers. The new technician reports that the DHCP snap-in is unavailable on his computer. You need to ensure that the technician can view the configurations of the DHCP servers. What should you do?()
    A

    Instruct the technician to customize the Start menu to display the administrative tools.

    B

    Instruct the technician to install Remote Server Administration Tools (RSAT) and to modify the Windows Features.

    C

    Request that the technician be added to the Server Operators group in Active Directory.

    D

    Request that the technician be added to the Network Configuration Operators group in Active Directory and modify the Windows Features.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?()
    A

    Switching loop is occurring on the switch.

    B

    Wrong subnet mask on the switch.

    C

    Incorrect SNMP settings on the switch.

    D

    Port is misconfigured on the switch.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    ABC Company has 1500 managed devices and 15,000 end users on a campus network. LANManagement Solution (LMS) is being deployed as the network management application. What is the recommended number of network management server(s)?()

    • A、 1
    • B、 2
    • C、 3
    • D、 4

    正确答案:A

  • 第14题:

    Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()

    • A、 Verify the configuration of the connected port on the network switch.
    • B、 Reboot the server.
    • C、 Install a new NIC on the server.
    • D、 Verify that network cables are connected.

    正确答案:D

  • 第15题:

    A user is unable to connect to the network. A network technician is able to determine that there is a problem on the switch. All other users on that switch are able to connect successfully to the network. Which of the following is a probable cause?()

    • A、Switching loop is occurring on the switch.
    • B、Wrong subnet mask on the switch.
    • C、Incorrect SNMP settings on the switch.
    • D、Port is misconfigured on the switch.

    正确答案:D

  • 第16题:

    A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following would BEST describe this connection speed?()

    • A、The laptop is too far away from the WAP.
    • B、The WAP is using 802.11a frequencies.
    • C、The laptop is only set to allow 802.11n connections.
    • D、The technician is on an 802.11b network.

    正确答案:D

  • 第17题:

    You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?() 

    • A、Configure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.
    • B、Disable and then re-enable Internet Connection Sharing (ICS) on Pro1.
    • C、Create a network bridge between the wired and wireless connections on Pro1.  
    • D、Clear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties of the VPN connection.

    正确答案:C

  • 第18题:

    单选题
    You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192.168.0.1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?()
    A

    Configure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.

    B

    Disable and then re-enable Internet Connection Sharing (ICS) on Pro1.

    C

    Create a network bridge between the wired and wireless connections on Pro1.  

    D

    Clear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties of the VPN connection.


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()
    A

    Configure the Network authentication (Shared mode) setting.

    B

    Apply a Wireless Network Policy to set the network type to WPA-PSK.

    C

    Apply a Wireless Network Policy to automatically connect to the company wireless network.

    D

    Apply a Wireless Network Policy to set the company wireless network as the preferred network.


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    A technician is working on a SOHO wireless network and notices that the wireless adaptor in the laptop shows excellent connection at 11Mbps. The technician has a wireless N adaptor. Which of the following would BEST describe this connection speed?()
    A

    The laptop is too far away from the WAP.

    B

    The WAP is using 802.11a frequencies.

    C

    The laptop is only set to allow 802.11n connections.

    D

    The technician is on an 802.11b network.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Your network contains a wired network and a wireless network. Users report that they experience intermittent problems accessing network resources when they connect to the internal wireless network. You discover that an unsecured rogue wireless access point uses the same Service Set Identifier (SSID) as the internal wireless network. You need to ensure that the users only connect to the internal wireless network. What should you do?()
    A

    Configure a Windows Connect Now Group Policy.

    B

    Configure a Wireless Network (IEEE 802.11) Policy.

    C

    Delete the rogue network from the Network and Sharing Center on each computer.

    D

    Create a Connection Manager Administration Kit (CMAK) profile and deploy it to all users.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()
    A

    Ashort

    B

    Open pairs

    C

    ESD

    D

    EMI


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()
    A

    WPA TLS

    B

    WPA PEAP

    C

    64-bit WEP

    D

    128-bit WEP


    正确答案: A
    解析: 暂无解析