网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user has discovered that even though they are using the latest version of the anti-virus software,the computer is still being infected by a virus. Which of the following is the BEST solution for this problem?()
A

Replace the computer.

B

Run chkdsk /f.

C

Update the virus signatures.

D

Run scandisk.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user has discovered that even though they are using the latest version of the anti-virus software,the computer is still being infected by a virus. Which of the following is the BEST solution for this problem?()A Replace the computer.B Run chkdsk /f.C Update the virus signatures.D Run scandisk.” 相关考题
考题 It looks _______ everyone else has gone home. (A)as though(B) even though(C) even if(D) though

考题 Even though he has lived in China for many years, Mark still can not ( )himself to the Chinese customs. A. adoptB. adjustC. adaptD. accept

考题 Even though there has been a () with child prodigies for centuries, there has been little serious study of them until recently. A.facilityB.fascinationC.facultyD.assassination

考题 We will still have to practice economy, ( ) our income for this year has risen 30 percent compared with that of last year. A.even ifB.evenC.thoughD.even thenE. as though

考题 Even though the government has put in____ sums of money to improve the living conditions, people keep on complaining. A、vacationB、vastC、bayD、calm

考题 A user’s laptop does not produce sound even though the volume settings are at maximum in theoperating system. Which of the following would MOST likely resolve this issue?() A. A new sound cardB. A new speakerC. A BIOS updateD. A hardware volume control

考题 Two business partners have recently been connected via a dedicated extranet. It has been discovered that each of the companies are using the same private IP address space.Which of the following will help to resolve potential routing issues?()A.MulticastB.PATC.CIDRD.NAT

考题 A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A、The user has a UID less than 200B、The user has been defined as an administrative userC、The file /usr/es/sbin/cluster/clpasswd is not executable by the userD、The user needs explicit authorization to change their password cluster-wide

考题 A user’s laptop does not produce sound even though the volume settings are at maximum in theoperating system. Which of the following would MOST likely resolve this issue?()A、A new sound cardB、A new speakerC、A BIOS updateD、A hardware volume control

考题 A user has reported that they cannot access the company FTP site. The user states that they are using the IP address that was given to them “74200.92.105”. Which of the following is MOST likely the problem?()A、Invalid IP addressB、FTP program is not workingC、Port 21 is blockedD、The FTP site is down

考题 All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled

考题 Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A、After an unsuccessful rebootB、If a user’s IP address has been spoofedC、After using IPCONFIG /RELEASED、If the computer has an ARP address conflict

考题 A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugsthe cable into the only available laptop connection, but the connector is loose inside the port. TheMOST likely reason the connector is loose is the:()A、RJ-11 connector needs to be re-crimpedB、User has plugged into the laptop's NIC portC、User has plugged the wrong end of the cable into the portD、RJ-11 connector needs to be replaced with an RJ-45 connector

考题 A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()A、Configuring the Windows Firewall exceptions.B、Using Windows Messenger.C、Configuring My Network Places.D、Using Internet Explorer.

考题 Two business partners have recently been connected via a dedicated extranet. It has been discovered that each of the companies are using the same private IP address space. Which of the following will help to resolve potential routing issues?()A、MulticastB、PATC、CIDRD、NAT

考题 A system administrator receives a new server and has booted the system for the first time. The administrator has set up the terminals and users. The user start to log on. Root is logged in on the console. When additional users start to log in, an error is displayed stating that All available login sessions are in use. Which of the following steps should be followed to resolve this problem?()A、Permissions on /etc/security were changed in error; do a chmod 755 on /etc/security directory.B、Increase the number of licenses; using smit chaili censeC、Change the Maximum number of PROCESSES allowed per user variable; using smit chgsys.D、Change User can logi field from false to true: using smit chuser.

考题 单选题Which of the following options enables a user to get authenticated though a single password instead of using multiple passwords?()A Wallet ManagerB RadiusC Oracle Internet DirectoryD None of the above

考题 单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()A Enable the Require domain controller to unlock policy.B Set the Number of previous logons to cache policy to 0.  C Remove all user and group accounts from the Log on locally user right. D Remove all user and group accounts from the Access this computer from the network user right. 

考题 单选题A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A The user has a UID less than 200B The user has been defined as an administrative userC The file /usr/es/sbin/cluster/clpasswd is not executable by the userD The user needs explicit authorization to change their password cluster-wide

考题 多选题Which three statements describe user authentication in Cisco DCNM-LAN? ()ACisco DCNM-LAN server users are local to the Cisco DCNM-LAN server. Creating, changing, and removing Cisco DCNM-LAN server users has no effect on user accounts on managed devices.BA Cisco DCNM-LAN server user that has Administrator privileges can push out changes to managed devices even if the Cisco NX-OS role that is used on the discovered device has the network operator role.CCisco DCNM-LAN user roles restrict the ability of users to make changes to Cisco DCNM-LAN server settings. Cisco NX-OS user roles enforce read/write privileges on the discovered devices.DCisco DCNM-LAN allows you to configure unique credentials for each discovered device or use default credentials when you do not configure unique credentials for a device.ECisco DCNM-LAN can use AAA servers to authenticate users. Only TACACS servers are supported.

考题 多选题An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges. A multitenant container database (CDB) instant has the following parameter set: THREADED_EXECUTION = FALSE Which four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()AYou can conned as a common user by using the connect statement.BYou can connect as a local user by using the connect statement.CYou can connect by using easy connect.DYou can connect by using OS authentication.EYou can connect by using a Net Service name.FYou can connect as a local user by using the SET CONTAINER statement.

考题 单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A The wireless access point is using MAC address filteringB The user has connected to a nearby wireless access point from another officeC The user has configured the wireless settings with the wrong encryption typeD The wireless access point has SSID broadcast disabled

考题 单选题Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A After an unsuccessful rebootB If a user’s IP address has been spoofedC After using IPCONFIG /RELEASED If the computer has an ARP address conflict

考题 单选题The user HR owns the EMP table. The user HR grants privileges to the user SCOTT by using this command:  SQL GRANT SELECT,INSERT,UPDATE ON emp TO scott WITH GRANT OPTION; The user SCOTT executes this command to grant privileges to the user JIM: SQL GRANT SELECT,INSERT,UPDATE ON hr.emp TO jim;  Now, the user HR decides to revoke privileges from JIM using this command: SQL REVOKE SELECT,INSERT,UPDATE ON emp FROM jim; Which statement is true after HR issues the REVOKE command()A The command fails because SCOTT still has privileges.B The command succeeds and privileges are revoked from JIM.C The command fails because HR cannot revoke the privileges from JIM.D The command succeeds and only HR has the privilege to perform the SELECT, INSERT, and UPDATEoperations on the EMP table.

考题 单选题Users are reporting that they are still experiencing network issues even though a fix was recentlyapplied. Which of the following troubleshooting methodology steps is the administrator using?()A Escalating the problemB Testing the solution and identifying the effectsC Continuing to gather information about the same symptomsD Documenting the solution and the entire process

考题 单选题A user has reported that they cannot access the company FTP site. The user states that they are using the IP address that was given to them “74200.92.105”. Which of the following is MOST likely the problem?()A Invalid IP addressB FTP program is not workingC Port 21 is blockedD The FTP site is down

考题 单选题Bring the umbrella on the picnic even though you don’t anticipate ______ it.A usingB useC to useD to be using