网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user reports they can no longer change the web browser home page. Which of the following is MOSTlikely the problem? ()
A

They are using the wrong WEP key.

B

They have been infected with malware.

C

They have lost Internet connectivity.

D

They need to update their network device drivers.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user reports they can no longer change the web browser home page. Which of the following is MOSTlikely the problem? ()A They are using the wrong WEP key.B They have been infected with malware.C They have lost Internet connectivity.D They need to update their network device drivers.” 相关考题
考题 ● A Web ___(73)___ is one of many software applications that function as the interfacebetween a user and the Internet.(73)A. display B. browser C. window D. view

考题 You create a Web application. The Web application enables users to change fields in their personal profiles. Some of the changes are not persisting in the database. You need to raise a custom event to track each change that is made to a user profile so that you can locate the error.Which event should you use? ()A. WebAuditEventB. WebEventManagerC. WebBaseEventD. WebRequestEvent

考题 WWW is popular for its multimedia transmission and friendly(71). Although the speed of network has been improved considerably in recent years, the rapid(72)of using the Internet, the inherited character of delay in the network and the Request/Response working mode of WWW still make the Internet traffic very(73)and give no guarantee on the Quality of Service. Because HTTP has no states, the web server cannot know the users' demand and the users' requests cannot be predicted Taking advantage of a cache mechanism and the time locality of WWW accesses, the browser can preserve the documents ever accessed in the local machine. By this means, for the documents in the local cache, the browser does not need to send the requests to the remote server or to receive the whole responses from the remote one Pre-fetching uses the space locality of accesses First, the users' access requests are predicted according to the users' current request. Secondly, the expected pages are fetched into the local cache when the user is brow sing the current page. Finally, the users can access these pages downloaded from the local cache. And this can reduce the access delay to some degrees. Pre-fetching is one kind of active caches that can cache the pages which are still not requested by the user. The application of pre-fetching technology in the web can greatly reduce the waiting time after users have sent their requests. This paper brings forward an intelligent technique of web pre-fetching, which can speed up fetching web pages. In this technique, we use a simplified WWW data model to represent the data in the cache of web browser to mine the association rules. We store these rules in a knowledge base so as to(74)the user's actions. In the client sides, the agents are responsible for mining the users' interest and pre-fetching the web pages, which are based on the interest association repository. Therefore it is(75)for the users to speed up the browsing.A.interactiveB.interactionC.interactivityD.infection

考题 A home user working outside an office reports that their laptop is no longer connecting to theInternet. Which of the following would a technician recommend to check FIRST?() A. Windows Firewall settingsB. DHCP settingsC. Disable HomeGroupD. Wireless on/off switch

考题 You are the domain administrator for . Active Directory domain. All client computers run Windows XP Professional.A user reports that she attempted to log on six times unsuccessfully. She reports that she logged on successfully yesterday. You discover that the user reset her password three days ago to comply with a new security policy that requires strong passwords.The account policies that are applied in the Domain Security Group Policy object (GPO) as shown in the following table.You need to ensure that the user can log on to the domain.What should you do?()A. Reset the password for the computer account.B. Unlock the user account.C. In the user account properties, select the Password never expires check box for the user account.D. In the user account properties, select the User must change password on next logon check box for the user account.

考题 You have a standalone server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You install the FTP Server Windows component on Server1. You create several folders under the Ftproot folder as shown in the exhibit. (Click the Exhibit button.)A user named User1 connects to ftp://server1 and reports that he can view the Localuser folder and all of its subfolders. A user named User2 reports the same problem.You need to ensure that when users connect to ftp://server1, they can only view the content located under their user folder.What should you do? ()A. From the properties of the Default FTP Site, change the directory listing style to Unix.B. From the properties of the Default FTP Site, change the FTP site directory to c:\inetpub\ftproot\localuser.C. From the properties of each user account, modify the home folder. Remove the Users group from the access control list of c:\inetpub\ftproot.D. Delete the Default FTP Site. Create a new FTP site. Select the option to isolate users and specify the FTP site directory of c:\inetpub\ftproot.

考题 A home user working outside an office reports that their laptop is no longer connecting to theInternet. Which of the following would a technician recommend to check FIRST?()A、Windows Firewall settingsB、DHCP settingsC、Disable HomeGroupD、Wireless on/off switch

考题 A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A、the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor groupB、the user can see all the users except those in the Admin group, but can only modify the user’s own accountC、the user can see only the user’s own account, and cannot modify itD、the user can see only the user’s own account, and can change the password only

考题 A user in your company has a laptop, which he uses both, on and off the network. You want to change the users profile to roaming but when you attempt to change the setting, the Roaming profile option is grayed out. How can you change the laptop users profile to roaming?()A、In Control Panel, System, User Profiles Tab, change profile to roaming.B、Have him log back into the network.C、Change the Profile to a Mandatory User Profile.D、Change the profile to a Mandatory Roaming Profile.

考题 A user reports they can no longer change the web browser home page. Which of the following is MOSTlikely the problem? ()A、They are using the wrong WEP key.B、They have been infected with malware.C、They have lost Internet connectivity.D、They need to update their network device drivers.

考题 A user reports that their touchpad no longer works on their laptop. Which of the following is the FIRST troubleshooting step?()A、Plug in USB keyboardB、Check for a disable switchC、Contact the laptop manufacturerD、Plug in a USB mouse

考题 Where can the Open Source prerequisite filesets that allow the installation of the Firefox Web browser be found?()A、Fix CentralB、IBM AIX ToolboxC、AIX Expansion PackD、Common base AIX CDs

考题 Your network contains an Active Directory domain. The domain contains three domain controllers.   One of the domain controllers fails.   Seven days later, the help desk reports that it can no longer create user accounts.  You need to ensure that the help desk can create new user accounts.  Which operations master role should you seize()A、domain naming masterB、infrastructure masterC、primary domain controller (PDC) emulatorD、RID masterE、schema master

考题 You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. All users have Windows Mobile 6.5 devices that connect to the organization by using Exchange ActiveSync. A user named User1 reports that she lost her device and successfully performed a remote wipe of the device. User1 later reports that she located her device. User1 configures the device to connect to Exchange ActiveSync and discovers that the connection fails. You need to ensure that User1 can connect her device by using Exchange ActiveSync. What should you do?()A、Instruct User1 to perform a hardware reset on the device.B、Instruct User1 to use the Exchange Control Panel (ECP) to modify the device list.C、Run the Set-ActiveSyncDeviceAccessRule cmdlet from the Exchange Management Shell.D、Instruct User1 to change her user account password.

考题 You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?() A、Start the default Web site.B、Start the IIS Admin Service.C、Run the IPconfig /registerdns command.D、In the default Web site properties,disable the host header setting.

考题 You create a Web application. The Web application enables users to change fields in their personal profiles. Some of the changes are not persisting in the database. You need to raise a custom event to track each change that is made to a user profile so that you can locate the error. Which event should you use?()A、WebAuditEventB、WebEventManagerC、WebBaseEventD、WebRequestEvent

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. The Default Domain Policy GPO is configured to prompt users to change their password 14 days before it expires. A user who returns from a two-week vacation reportes that she cannot log on to the domain. You discover that when she last logged on, she was prompted to change her password. She reports that she did not change her password before leaving on vacation. You need to ensure that the user can log on to the domain. What should you do?()A、Enable the user account.B、Reset the password for the user account.C、Use Active Directory Users and Computers to select the Password never expires option.D、Configure the Prompt user to change password before expiration security policy option to 21 days.

考题 单选题You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()A Start the default Web site.B Start the IIS Admin Service.C Run the IPconfig /registerdns command.D In the default Web site properties,disable the host header setting.

考题 单选题Your network contains a server that runs Windows Server 2008 R2.You have a shared folder named Data that is located on the C drive. The permissions for the Data folder are configured as shown in the following table.Group name NTFS permission Share permission Group1 Read Read Group2 Modify Change Group3 Full control Read A user named User1 is a member of Group1 and Group3.User1 reports that she cannot upload files to the share.You need to ensure that User1 can upload files to C:/Data. The solution must minimize the number of permissions assigned to all users.What should you do?()A Add User1 to Group2.B Remove User1 from Group1.C Assign the Change share permission to Group1.D Assign the Change share permission to Group3.

考题 单选题User1 reports she lost her mobile device.She successfully remotely wiped the information from the device.Afterwards she reports she found the device, but she cannot access her mailbox or other content.What should you do?()A Instruct the user to perform a hardware reset of the device.B You should perform a Set-ActiveSyncDeviceAccessRuleC Instruct the user to change her passwordD Make the shell command Clear-ActiveSyncDevice -Identity User1

考题 单选题A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor groupB the user can see all the users except those in the Admin group, but can only modify the user’s own accountC the user can see only the user’s own account, and cannot modify itD the user can see only the user’s own account, and can change the password only

考题 单选题A user reports their laptop computer can no longer connect to a server. The computer works correctly in a different office. Which of the following tools would be used to troubleshoot this issue?()A Cable testerB MultimeterC Fiber splicerD Loopback plug

考题 单选题Which Web-filtering technology can be used at the same time as integrated Web filtering on a single branch SRX Series device?()A Websense redirect Web filteringB local Web filtering (blacklist or whitelist)C firewall user authenticationD ICAP

考题 单选题A user reports that their onboard RJ-45 jack is damaged and will no longer function. Which of the following will provide this jack as an alternative to replacing the motherboard?()A Install a USB serial adapterB Connect to a USB hubC Use an external modemD Use an Ethernet card

考题 多选题A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()Apacket segmentationBserialized checkingCpacket sequencingDparallel checking

考题 单选题A user’s print jobs default to PRINTER_A.The user wants to change their default printer to PRINTER_B.How can the system administrator change the user’s default printer to PRINTER_B?()A Execute the command ’piobe -q PRINTER_B’B Edit the user’s stanza in the /etc/qconfig fileC Execute the command ’chuser -a QUEUE=PRINTER_B user’D Add the line ’export PRINTER=PRINTER_B’ to the user’s .profile

考题 多选题A web browser can connect directly to an Oracle server using which two?()AHTTPBIIOPCTCP/IPDNamed PipesETCP/IP with SSL