网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()
A

Configuring the Windows Firewall exceptions.

B

Using Windows Messenger.

C

Configuring My Network Places.

D

Using Internet Explorer.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()A Configuring the Windows Firewall exceptions.B Using Windows Messenger.C Configuring My Network Places.D Using Internet Explorer.” 相关考题
考题 A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read

考题 A technician needs to ensure that a specific application on a single home user‘s computerreceives Internet traffic reliably. The home network provides access to three other users and theapplication relies on a specific protocol.Which of the following should the technician use?()A. DHCPB. PATC. ProxyD. IPX

考题 Which remote access VPN addressing technique supports a static IP address to support a specific application?() A. Use a staticip addresses based on incoming user policies.B. Use DHCP to assign addresses based on incoming user policies.C. Deploy a clientless model to assign a unique address to the user.D. Deploy RADIUS or LDAP to assign the address to the user.

考题 Which of the following should a technician instruct a user to do to initiate Remote Assistance for a user running Windows XP Professional?()A、Network Neighborhood  navigate to the users computer  right click  select Offer Remote AssistanceB、Go to Help and Support Center  Pick a Task  Use Tools  Offer Remote AssistanceC、Run Remote Desktop Connection  Select Connect to User Enter the IP addressD、Start  Programs  Administrative Tools  Remote Assistance

考题 You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()A、Use Computer Management to configure separate memory spaces for each financial  application on Helena’s Computer.B、Use Security Templates to edit the Security Policy to include the financial applications on  Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.C、Use Security Configuration and Analysis to reconfigure the default security policy .inf file to  allow the finance applications to run on Helena’s Computer.D、Use secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to  loose the permission for the Local User group on Helena’s Computer.

考题 A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user.  The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession.  Which method in HttpSession is used to accomplish this?()A、 getCreationTimeB、 invalidateAfterC、 getLastAccessedTimeD、 getMaxInactiveInterval

考题 A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

考题 A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()A、Agree with the user’s complaintsB、Clarify the user’s statementsC、Minimize the user’s criticismD、Shadow the other technician on the next repair

考题 Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A、After an unsuccessful rebootB、If a user’s IP address has been spoofedC、After using IPCONFIG /RELEASED、If the computer has an ARP address conflict

考题 A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()A、Configuring the Windows Firewall exceptions.B、Using Windows Messenger.C、Configuring My Network Places.D、Using Internet Explorer.

考题 A user calls about a problem with receiving email. After troubleshooting the user’s computer and finding nothing wrong, the technician contacts the email sender and finds out the user gave out their email address incorrectly. Which of the following is the BEST approach in explaining the issue to the user?()A、“Sometimes computers are just strange, but it seems to be working now.”B、“You gave them the wrong address and caused this problem.”C、“The sender had the e-mail address wrong, but they have it correct now and the problem has been resolved.”D、“The SMTP server was not getting a proper resolution of the recipient name field when it was parsing the header.”

考题 A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A、DHCPB、PATC、ProxyD、IPX

考题 You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A、Place the phone in Bluetooth discovery mode.B、Place the user’s computer in Bluetooth discovery mode.C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D、Install mobile phone synchronization software on the user’s computer.

考题 You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

考题 You have a computer that runs Windows XP Professional Service Pack 2 (SP2). A remote user has a computer that runs Windows XP Professional SP2. The remote user experiences several errors while attempting to install an application. You need to remotely observe the actions the user performs. What should you do first?() A、Instruct the user to send you a Remote Assistance invitation. B、Instruct the user to start the Remote Desktop Help Session Manager service.C、At the command prompt, establish a telnet session to the user's computer. D、Enable a Remote Desktop and establish a Remote Desktop Connection. Log on by using the local administrator account.

考题 单选题A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A DHCPB PATC ProxyD IPX

考题 单选题Which remote access VPN addressing technique supports a static IP address to support a specific application?()A  Use a static ip addresses based on incoming user policies.B  Use DHCP to assign addresses based on incoming user policies.C  Deploy a clientless model to assign a unique address to the user.D  Deploy RADIUS or LDAP to assign the address to the user.

考题 单选题Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A After an unsuccessful rebootB If a user’s IP address has been spoofedC After using IPCONFIG /RELEASED If the computer has an ARP address conflict

考题 单选题A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()A Agree with the user’s complaintsB Clarify the user’s statementsC Minimize the user’s criticismD Shadow the other technician on the next repair

考题 单选题A user calls about a problem with receiving email. After troubleshooting the user’s computer and finding nothing wrong, the technician contacts the email sender and finds out the user gave out their email address incorrectly. Which of the following is the BEST approach in explaining the issue to the user?()A “Sometimes computers are just strange, but it seems to be working now.”B “You gave them the wrong address and caused this problem.”C “The sender had the e-mail address wrong, but they have it correct now and the problem has been resolved.”D “The SMTP server was not getting a proper resolution of the recipient name field when it was parsing the header.”

考题 单选题You have a computer that runs Windows XP Professional Service Pack 2 (SP2). A remote user has a computer that runs Windows XP Professional SP2. The remote user experiences several errors while attempting to install an application. You need to remotely observe the actions the user performs. What should you do first?()A Instruct the user to send you a Remote Assistance invitation. B Instruct the user to start the Remote Desktop Help Session Manager service.C At the command prompt, establish a telnet session to the user's computer. D Enable a Remote Desktop and establish a Remote Desktop Connection. Log on by using the local administrator account.

考题 单选题Which of the following tools would a technician use to map a drive to a user’s machine?()A SSHB NETUSEC NETSTATD SSL

考题 单选题A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A ModifyB Full controlC WriteD Read

考题 单选题You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A  Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B  Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C  Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.D  Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

考题 单选题A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()A Configuring the Windows Firewall exceptions.B Using Windows Messenger.C Configuring My Network Places.D Using Internet Explorer.

考题 单选题You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A Place the phone in Bluetooth discovery mode.B Place the user’s computer in Bluetooth discovery mode.C Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D Install mobile phone synchronization software on the user’s computer.

考题 单选题Which of the following should a technician instruct a user to do to initiate Remote Assistance for a user running Windows XP Professional?()A Network Neighborhood  navigate to the users computer  right click  select Offer Remote AssistanceB Go to Help and Support Center  Pick a Task  Use Tools  Offer Remote AssistanceC Run Remote Desktop Connection  Select Connect to User Enter the IP addressD Start  Programs  Administrative Tools  Remote Assistance

考题 单选题A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user.  The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession.  Which method in HttpSession is used to accomplish this?()A  getCreationTimeB  invalidateAfterC  getLastAccessedTimeD  getMaxInactiveInterval