网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()
A

Phishing scam

B

Social engineering

C

Man-in-the-Middle

D

Shoulder surfing


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A Phishing scamB Social engineeringC Man-in-the-MiddleD Shoulder surfing” 相关考题
考题 听力原文:The primary objective of financial reporting is to provide information useful for making investment and lending decisions.(6)A.The financial reporting is to provide information for the investors and lenders only.B.The main aim of financial reporting is to offer information useful for decision-making.C.Investment and lending decisions can be made from the financial reporting.D.Investment and lending decisions can not be made from the financial reporting.

考题 You have a stand-alone server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).A user named User1 is a member of the Administrators group on Server1.User1 attempts to log on to Server1 and receives the following error message.Other members of the Administrators group can log on to Server1.You need to ensure that User1 can log on to Server1.What should you do? ()A. From the properties of the User1 account, modify the Session settings.B. From the properties of the User1 account, modify Environment settings.C. From the local security policy on Computer1, modify the Deny log on locally setting.D. From the local security policy on Server1, modify the Impersonate a client after authentication setting.

考题 Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?() A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob

考题 Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?() A.REVOKE ALL PRIVILEGES FROM USER tomB.REVOKE ALL ON EMPLOYEE FROM USER tomC.REVOKE EXECUTE ON EMPLOYEE FROM USER tomD.REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

考题 Mysql能成功查询User表中第20行到第30行记录的是?()A、SELECT * FROM USER WHERE ROWNUM20 AND ROWNUM30 B、SELECT * FROM USER WHERE ROWID 20 AND ROWNUM30 C、SELECT * FROM USER LIMIT 20,30; D、SELECT * FROM USER LIMIT 20,10;

考题 Which statement describes the call behavior of the Cisco Unified Wireless IP Phone 7921G when it roams from 802.11b to 802.11a?()A、The phone does a directed call hangup on 802.11b,then does an auto-redial on 802.11a,creating a new call.B、The phone does a directed call hangup on 802.11b, then the user does a redial on 802.11a,creating a new call.C、The phone does a disassociation on 802.11b and an association on 802.11a,and call remains up if the subnet has not changed.D、The phone does not roam from 802.11b to 802.11a when on an active call.E、The phone must switch network profiles to roam from 802.11b to 802.11a.

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue

考题 An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()A、 Create an action plan.B、 Escalate the issue.C、 Reboot the mail server.D、 Document the solution.

考题 A user connects to the companys intranet server via a VPN connection from a small office / home office (SOHO) using the broadband service. One day, the user cannot successfully connect to the VPN and receives an error message that states "Username and password are invalid on the domain." Which of the following should be done to correct this problem?()A、Call the corporate help desk to have the VPN server rebootedB、Re-enter the username and password in the VPN connection and reconnectC、Call the broadband Internet provider to replace the SOHO router with a newer modelD、Ping the corporate VPN server to ensure it is online

考题 An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()A、SSHB、Remote Desktop ConnectionC、TelnetD、VPN

考题 Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()A、REVOKE ADD, DELETE FROM USER tom ON TABLE tab1B、REVOKE ADD, DELETE ON TABLE tab1 FROM USER tomC、REVOKE INSERT, DELETE FROM USER tom ON TABLE tab1D、REVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom

考题 Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

考题 An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB

考题 Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A、REVOKE ALL PRIVILEGES FROM USER tomB、REVOKE ALL ON EMPLOYEE FROM USER tomC、REVOKE EXECUTE ON EMPLOYEE FROM USER tomD、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

考题 An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A、/tmpB、/var/preserveC、/var/tmp/$USERD、$HOME/.vi

考题 You receive a support call from a user complaining that every time she sends a print job to a printer, she receives a confirmation message telling her that the print job has been completed. She asks you whether it can be disabled. How can you configure this?()A、You cannot configure such an option. B、Stop the Alerter service under services in the control panel. C、At the command line prompt type ‘ net stop messenger service’. D、At the command line prompt type ‘ping messenger service’. E、Uncheck the box “Notify when remote documents are printed” from the advanced server properties of the printer.

考题 单选题A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()A The laptop is missing the software supplicantB The access point SSID is hidden.C The laptop only supports TKIP and AES encryption,D The access point is on the wrong channel.

考题 单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A Phishing scamB Social engineeringC Man-in-the-MiddleD Shoulder surfing

考题 单选题Can MF/HF radiotelephone receive the MSI sent from the coast stations alone?()A No, it receives the MSI from ship stationsB Yes, it canC only with NBDP terminal, can it receives the MSI sent from coast stationsD No, it can not receive the MSI sent from coast stations

考题 单选题You need to design the retrieval of advertising statistics without compromising security. What should you do?()A Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.B Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.C Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.D Design a stored procedure to return the statistics on a call from the advertisers application.E Design a user-defined function to return the statistics on a call from the advertisers application.

考题 单选题当需要返回当前用户的名字,可以执行如下()SQL语句。A SELECT user FROM V$DBAB SELECT user FROM dualC SELECT name FROM dualD SELECT name FROM V$DBA

考题 单选题An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A /tmpB /var/preserveC /var/tmp/$USERD $HOME/.vi

考题 单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A  Implement preventative measures.B  Close the issue.C  Document the outcome.D  Question other users to make sure they are not having the same issue.

考题 单选题A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()A Persistent sessionB Dynamic evaluationC Roaming sessionD Browser request follow-through

考题 单选题An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()A  Create an action plan.B  Escalate the issue.C  Reboot the mail server.D  Document the solution.

考题 单选题You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer.  What should you do? ()A Configure File signature verification to block driver installation, and set driver signing as a system default.B Remove all users from the Power User group.C Create a Local Computer Policy to prevent users from installing drivers.D Create a Local Computer Policy to enable Windows File Protection.

考题 单选题Which statement describes the call behavior of the Cisco Unified Wireless IP Phone 7921G when it roams from 802.11b to 802.11a?()A The phone does a directed call hangup on 802.11b,then does an auto-redial on 802.11a,creating a new call.B The phone does a directed call hangup on 802.11b, then the user does a redial on 802.11a,creating a new call.C The phone does a disassociation on 802.11b and an association on 802.11a,and call remains up if the subnet has not changed.D The phone does not roam from 802.11b to 802.11a when on an active call.E The phone must switch network profiles to roam from 802.11b to 802.11a.