A data problem is reported to the network administrator. The problem is found to be with the UTP network connection. Which steps could the network administrator have taken to isolate the problem? (Select two.)
a. Visually inspect all UTP terminations.
b. Run a cable test, using a cable tester.
c. Use the ping command to verify network connectivity.
d. Use pairs 4–5 and 7–8 to repair the connection.
e. Contact the installer of the UTP cable to obtain a certification report.
b. Run a cable test, using a cable tester.
c. Use the ping command to verify network connectivity.
You might also like to view...
Which of the following are Standard Template Library components?
a. Templates b. Generic Algorithms c. Template Containers d. Iterators e. Classes f. Structs
Which of the following is an example of an IP address?
A. 204,127,129,1 B. 204;127;129;1 C. 204.127.129.1 D. 204 127 129 1
An IEEE 802.1D port goes through four states when transitioning to the forwarding state. What is the correct order?
A) Blocking, learning, listening, forwarding B) Learning, listening, blocking, forwarding C) Blocking, listening, learning, forwarding D) Listening, blocking, learning, forwarding
Disclosure of the sum of all financial aid for students in Smith dorm is not sensitive because no individual student is associated with an amount. Similarly, a list of names of students receiving financial aid is not sensitive because no amounts are specified. However, the combination of these two lists reveals the amount for an individual student if only one student in Smith dorm receives aid
What computation would a database management system have to perform in order to determine that the list of names might reveal sensitive data? What records would the database management system have to maintain on what different users know in order to determine that the list of names might reveal sensitive data? What will be an ideal response?