网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user wants to be able to receive help from a coworker that is located outside the company’s local office. Which of the following MUST be enabled to allow the user to watch and interact with the coworker simultaneously?()
A

Remote Desktop

B

Telnet

C

Computer Management

D

Remote Assistance


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user wants to be able to receive help from a coworker that is located outside the company’s local office. Which of the following MUST be enabled to allow the user to watch and interact with the coworker simultaneously?()A Remote DesktopB TelnetC Computer ManagementD Remote Assistance” 相关考题
考题 The Pilgrims were able to survive in America because (). A.they received help from the IndiansB.they were supported by rich companiesC.many ships brought them food from EnglandD.they had signed the Mayflower Compact

考题 A router has been configured with the settings shown below:[edit]user@host show system authentication-order authentication-order [ radius tacplus ];The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()A.The user lab will not be able to login.B.The user lab will be authenticated against the local database and will be able to login.C.The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.D.The user will be able to login only if tries to login as the root user.

考题 Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()A、User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());B、User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());C、User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());D、User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());E、User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());

考题 Which of these statements is true of clientless end-user devices?()A、They do not receive unique IP addressesB、RADIUS or LDAP is required in order to assign IP addressesC、They are assigned addresses from the internal DHCP poolD、Their traffic appears to originate from the originating host network

考题 A user has a new network printer they want setup in their home. The user wants all their PCs aswell as any guests with laptops to be able to print to it. Which of the following connection methods would be the MOST effective for meeting these requirements?()A、802.11gB、USBC、EthernetD、BluetoothE、Serial

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue

考题 An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()A、 Create an action plan.B、 Escalate the issue.C、 Reboot the mail server.D、 Document the solution.

考题 A user wants to be able to receive help from a coworker that is located outside the company’s local office. Which of the following MUST be enabled to allow the user to watch and interact with the coworker simultaneously?()A、Remote DesktopB、TelnetC、Computer ManagementD、Remote Assistance

考题 An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A、/tmpB、/var/preserveC、/var/tmp/$USERD、$HOME/.vi

考题 A user wants to connect to the database instance from an application that is running on a remote machine. Which tools should the DBA use to establish the required configuration to ensure that the user is able to connect to the database instance?()A、Data PumpB、Oracle Net ManagerC、Oracle Enterprise ManagerD、Oracle Universal Installer (OUI)E、Database Configuration Assistant (DBCA)

考题 You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )A、From System in Control Panel, select the Change Type option, and then select the Roaming profile option. B、From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. C、Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. D、Connect the portable computer to the network, and configure the user accounts for a roaming user profile.

考题 You are a system administrator at Company. The network includes 100 Windows 2000 Professional computers. A user named Peter wants to share a local printing device directly connected to his computer. Peter needs to share this device among three groups:  Engineering, Accounting, and Operations. Peter wants to delegate printer administration to one print administrator from each group. Each print administrator must be able to delete print jobs generated by their own group on the print device. They should not be able to delete print jobs from other groups. You want to configure Peter’s client computer to support these requirements.  What should you do? ()A、 Create a single shared printer to be used by all three groups.Allow each print administrator Manage Documents permission. B、 Create a separate shared printer for each group. For each shared printer, allow the respective      print administrator Manage Documents permission. C、 Create a single shared printer to be used by all three groups. Add the print administrator’s user      account from each group to the Power Users group on Peter’s client computer. D、 Create a separate shared printer for each group. Add the print administrator’s user account  from each group to the Power Users group on Peter’s client computer. 

考题 You are the network administrator for . The network consists of a single Active Directory domain named . All servers run Windows Server 2003. All client computers run Windows XP Professional. The network contains a domain controller named TestKing3. You create a preconfigured user profile on a client computer named TKClient1. You need to ensure that all users receive the preconfigured user profile when they log on to the network for the first time. All users must still be able to personalize their desktop environments. What should you do?()A、From TKClient1, copy the user profile to //TestKing3/netlogon/Default User.B、From TKClient1, copy the user profile to //TestKing3/netlogon/Default User. Change the User Profile path for all users in the Active Directory to //TestKing3/netlogon/Default. User.C、From TKClient1, copy the user profile to the C:/Documents and Settings/Default User folder. Share the Default User profile on the network.D、Create a Folder Redirection policy in Active Directory.

考题 单选题A support technician wants to help a user, in a different city, navigate a new software program. Which of the following will allow the user and technician to view and control the Windows XP PC desktop simultaneously?()A Terminal ServicesB Remote AssistanceC Routing and Remote Access ServiceD Remote Desktop

考题 单选题Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()A User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());B User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());C User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());D User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());E User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());

考题 单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A Phishing scamB Social engineeringC Man-in-the-MiddleD Shoulder surfing

考题 多选题A user has a new network printer they want setup in their home. The user wants all their PCs aswell as any guests with laptops to be able to print to it. Which of the following connection methods would be the MOST effective for meeting these requirements?()A802.11gBUSBCEthernetDBluetoothESerial

考题 多选题A user wants to connect to the database instance from an application that is running on a remote machine. Which tools should the DBA use to establish the required configuration to ensure that the user is able to connect to the database instance?()AData PumpBOracle Net ManagerCOracle Enterprise ManagerDOracle Universal Installer (OUI)EDatabase Configuration Assistant (DBCA)

考题 单选题A router has been configured with the settings shown below: [edit] user@host# show system authentication-order authentication-order [ radius tacplus ]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()A The user lab will not be able to login.B The user lab will be authenticated against the local database and will be able to login.C The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.D The user will be able to login only if tries to login as the root user.

考题 单选题An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A /tmpB /var/preserveC /var/tmp/$USERD $HOME/.vi

考题 单选题You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()A Add Julia’s user account to the local Power Users group.B Add Julia’s user account to the local Administrators group.C Allow Julia’s user account Write permissions to C:///Data.D Allow Julia’s user account Full Control permission to C:///Data.

考题 单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A  Implement preventative measures.B  Close the issue.C  Document the outcome.D  Question other users to make sure they are not having the same issue.

考题 单选题An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()A  Create an action plan.B  Escalate the issue.C  Reboot the mail server.D  Document the solution.

考题 单选题With the help of modern technology, ships are able to receive automated broadcast of safety messages().A by day or at nightB almost round the clockC somewhat and sometimeD from sunrise and sunset

考题 单选题A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers respond with a reject for user lab?()A The user lab will not be able to login.B The user lab will be authenticated against the local database and will be able to login.C The user will be able to login only if tries to login as the root user.D The user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.

考题 单选题Which of the following is NOT true about many people who experience mental health problems?A They can get over them or learn to live with them.B They don’t receive the right kind of help.C They are kept away from their families and friends.D They receive unfair treatment from the professionals who should care for them.

考题 单选题Which of the following is true about the Internet according to the passage?A Americans were more in contact before the advent of the Internet.B The Internet is weakening the tie of social networks.C If you use the internet, you are more likely to get help from network members.D Internet users are more likely to receive help from non-users.