A data problem is reported to the network administrator. The problem is found to be with the UTP network connection. Which steps could the network administrator have taken to isolate the problem? (Select two.)

a. Visually inspect all UTP terminations.
b. Run a cable test, using a cable tester.
c. Use the ping command to verify network connectivity.
d. Use pairs 4–5 and 7–8 to repair the connection.
e. Contact the installer of the UTP cable to obtain a certification report.


b. Run a cable test, using a cable tester.
c. Use the ping command to verify network connectivity.

Computer Science & Information Technology

You might also like to view...

Which of the following are Standard Template Library components?

a. Templates b. Generic Algorithms c. Template Containers d. Iterators e. Classes f. Structs

Computer Science & Information Technology

Which of the following is an example of an IP address?

A. 204,127,129,1 B. 204;127;129;1 C. 204.127.129.1 D. 204   127   129   1

Computer Science & Information Technology

An IEEE 802.1D port goes through four states when transitioning to the forwarding state. What is the correct order?

A) Blocking, learning, listening, forwarding B) Learning, listening, blocking, forwarding C) Blocking, listening, learning, forwarding D) Listening, blocking, learning, forwarding

Computer Science & Information Technology

Disclosure of the sum of all financial aid for students in Smith dorm is not sensitive because no individual student is associated with an amount. Similarly, a list of names of students receiving financial aid is not sensitive because no amounts are specified. However, the combination of these two lists reveals the amount for an individual student if only one student in Smith dorm receives aid

What computation would a database management system have to perform in order to determine that the list of names might reveal sensitive data? What records would the database management system have to maintain on what different users know in order to determine that the list of names might reveal sensitive data? What will be an ideal response?

Computer Science & Information Technology