网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()

  • A、Phishing scam
  • B、Social engineering
  • C、Man-in-the-Middle
  • D、Shoulder surfing

参考答案

更多 “ A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A、Phishing scamB、Social engineeringC、Man-in-the-MiddleD、Shoulder surfing” 相关考题
考题 You have a stand-alone server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).A user named User1 is a member of the Administrators group on Server1.User1 attempts to log on to Server1 and receives the following error message.Other members of the Administrators group can log on to Server1.You need to ensure that User1 can log on to Server1.What should you do? ()A. From the properties of the User1 account, modify the Session settings.B. From the properties of the User1 account, modify Environment settings.C. From the local security policy on Computer1, modify the Deny log on locally setting.D. From the local security policy on Server1, modify the Impersonate a client after authentication setting.

考题 A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()A. Persistent sessionB. Dynamic evaluationC. Roaming sessionD. Browser request follow-through

考题 Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?() A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob

考题 Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?() A.REVOKE ALL PRIVILEGES FROM USER tomB.REVOKE ALL ON EMPLOYEE FROM USER tomC.REVOKE EXECUTE ON EMPLOYEE FROM USER tomD.REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

考题 You configure Outlook Web App (OWA) to require SSL.A user named User1 reports that when she connects to OWA, she receives a Web site security certificate warning message.You need to prevent User1 from receiving the warning message when she connects to OWA. What should you do?()A、On User1’s computer, install the erver’s root certificate into the Trusted Root CertificatioAuthorities store.B、On the Client Access server, install the server’s root certificate into the Trusted RooCertification Authorities store.C、From the Exchange Management Console (EMC), assign an Outlook Web App mailbox policy to User1.D、From the Exchange Management Console (EMC), open owa (Default Web Site) Properties. Configure the logon format to use the user principal name (UPN).

考题 Which statement describes the call behavior of the Cisco Unified Wireless IP Phone 7921G when it roams from 802.11b to 802.11a?()A、The phone does a directed call hangup on 802.11b,then does an auto-redial on 802.11a,creating a new call.B、The phone does a directed call hangup on 802.11b, then the user does a redial on 802.11a,creating a new call.C、The phone does a disassociation on 802.11b and an association on 802.11a,and call remains up if the subnet has not changed.D、The phone does not roam from 802.11b to 802.11a when on an active call.E、The phone must switch network profiles to roam from 802.11b to 802.11a.

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.

考题 An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue

考题 An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()A、 Create an action plan.B、 Escalate the issue.C、 Reboot the mail server.D、 Document the solution.

考题 A user connects to the companys intranet server via a VPN connection from a small office / home office (SOHO) using the broadband service. One day, the user cannot successfully connect to the VPN and receives an error message that states "Username and password are invalid on the domain." Which of the following should be done to correct this problem?()A、Call the corporate help desk to have the VPN server rebootedB、Re-enter the username and password in the VPN connection and reconnectC、Call the broadband Internet provider to replace the SOHO router with a newer modelD、Ping the corporate VPN server to ensure it is online

考题 An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()A、SSHB、Remote Desktop ConnectionC、TelnetD、VPN

考题 Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

考题 A Sales Specialist receives an email from a customer, requesting information on IBM’s best Server Consolidation solution. How should the Sales Specialist proceed? ()A、Send the customer information on VMwareB、Send the customer information on IBM BladeCenter C、Call the customer to ask why they are consolidatingD、Send the customer information on IBM System P

考题 Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A、REVOKE ALL PRIVILEGES FROM USER tomB、REVOKE ALL ON EMPLOYEE FROM USER tomC、REVOKE EXECUTE ON EMPLOYEE FROM USER tomD、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

考题 An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A、/tmpB、/var/preserveC、/var/tmp/$USERD、$HOME/.vi

考题 A user has a computer that runs Windows XP Professional. The user attempts to connect to the computer by using a Remote Desktop Connection and receives the following error message: “The local policy of the system does not permit you to log on interactively.” You need to ensure that the user can log on to the computer by using a Remote Desktop Connection. What should you do?() A、From the System settings, disable Remote Assistance.B、Add the user's account to the Remote Desktop Users group. C、From Windows Firewall, modify the scope of the Remote Desktop exception. D、Set the Remote Desktop Help Session Manager service Startup type to Automatic, and then start the service.

考题 You are implementing a Web page that displays text that was typed by a user. You need to display the user input in the Web page so that a cross-site scripting attack will be prevented. What should you do?()A、Call document.write.B、Call Response.Write.C、Call HttpUtility.UrlEncode.D、Call HttpUtility.HtmlEncode.

考题 Your company has an Active Directory domain. A user attempts to log on to the domain from a client computer and receives the following message: "This user account has expired Ask your administrator to reactivate the account." You need to ensure that the user is able to log on to the domain. What should you do()A、Modify the properties of the user account to set the account to never expire.B、Modify the properties of the user account to extend the Logon Hours setting.C、Modify the properties of the user account to set the password to never expire.D、Modify the default domain policy to decrease the account lockout duration.

考题 You receive a support call from a user complaining that every time she sends a print job to a printer, she receives a confirmation message telling her that the print job has been completed. She asks you whether it can be disabled. How can you configure this?()A、You cannot configure such an option. B、Stop the Alerter service under services in the control panel. C、At the command line prompt type ‘ net stop messenger service’. D、At the command line prompt type ‘ping messenger service’. E、Uncheck the box “Notify when remote documents are printed” from the advanced server properties of the printer.

考题 单选题A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()A The laptop is missing the software supplicantB The access point SSID is hidden.C The laptop only supports TKIP and AES encryption,D The access point is on the wrong channel.

考题 单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A Phishing scamB Social engineeringC Man-in-the-MiddleD Shoulder surfing

考题 单选题Can MF/HF radiotelephone receive the MSI sent from the coast stations alone?()A No, it receives the MSI from ship stationsB Yes, it canC only with NBDP terminal, can it receives the MSI sent from coast stationsD No, it can not receive the MSI sent from coast stations

考题 单选题You need to design the retrieval of advertising statistics without compromising security. What should you do?()A Design a Notification Services solution that sends the advertising statistics to specified subscribers by e-mail.B Design a SQL Server Web service that runs a stored procedure to return the statistics on a call from the advertisers application.C Design a Database Mail solution that sends the advertising statistics to e-mail addresses that are specified in a table.D Design a stored procedure to return the statistics on a call from the advertisers application.E Design a user-defined function to return the statistics on a call from the advertisers application.

考题 单选题An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A /tmpB /var/preserveC /var/tmp/$USERD $HOME/.vi

考题 单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()A  Implement preventative measures.B  Close the issue.C  Document the outcome.D  Question other users to make sure they are not having the same issue.

考题 单选题A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()A Persistent sessionB Dynamic evaluationC Roaming sessionD Browser request follow-through

考题 单选题An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()A  Create an action plan.B  Escalate the issue.C  Reboot the mail server.D  Document the solution.

考题 单选题Which statement describes the call behavior of the Cisco Unified Wireless IP Phone 7921G when it roams from 802.11b to 802.11a?()A The phone does a directed call hangup on 802.11b,then does an auto-redial on 802.11a,creating a new call.B The phone does a directed call hangup on 802.11b, then the user does a redial on 802.11a,creating a new call.C The phone does a disassociation on 802.11b and an association on 802.11a,and call remains up if the subnet has not changed.D The phone does not roam from 802.11b to 802.11a when on an active call.E The phone must switch network profiles to roam from 802.11b to 802.11a.