网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()
A

 Guest user account

B

 Limited user account

C

 Power user account

D

 Administrator user account


参考答案

参考解析
解析: 暂无解析
更多 “单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A  Guest user accountB  Limited user accountC  Power user accountD  Administrator user account” 相关考题
考题 A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?() A. Warn the userB. Report through proper channelsC. Wipe the driveD. Give the computer back to the user

考题 Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?() A. Put all other work orders on hold and assist the user with all their computer issues.B. Have another technician take over support calls for this user.C. Explain that the user needs to fill out a work order for the computer problems.D. Ask the user to call another technician for more in-depth assistance.

考题 A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? () A. ESD matB. ESD wrist strapC. Sealable plastic bagD. Anti-static bag

考题 A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()A、Check if the user account is lockedB、Check group policyC、Check the drive for fragmentationD、Check NTFS permissions

考题 If a technician needs to convert a hard drive from Basic to Dynamic, which of the following utilities would the technician use?()A、Add Hardware WizardB、Device ManagerC、Computer ManagementD、Disk Management

考题 A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()A、ESD matB、ESD wrist strapC、Sealable plastic bagD、Anti-static bag

考题 Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A、After an unsuccessful rebootB、If a user’s IP address has been spoofedC、After using IPCONFIG /RELEASED、If the computer has an ARP address conflict

考题 A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING

考题 To force a user to use Ctrl-Alt-Delete to log into the computer, a technician can go to Control Panel then:()A、Accessibility options.B、Security Center.C、User accounts and the Advanced tab.D、Windows Firewall.

考题 A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()A、Configuring the Windows Firewall exceptions.B、Using Windows Messenger.C、Configuring My Network Places.D、Using Internet Explorer.

考题 A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?()A、Warn the userB、Report through proper channelsC、Wipe the driveD、Give the computer back to the user

考题 A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A、DHCPB、PATC、ProxyD、IPX

考题 Which of the following tools would a technician use to map a drive to a user’s machine?()A、SSHB、NETUSEC、NETSTATD、SSL

考题 Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?()A、Put all other work orders on hold and assist the user with all their computer issues.B、Have another technician take over support calls for this user.C、Explain that the user needs to fill out a work order for the computer problems.D、Ask the user to call another technician for more in-depth assistance.

考题 The technician needs to map a network share to the user’s Windows 7 computer from thecommand prompt. Which of the following commands will the technician execute?()A、NET SENDB、NET CONFIGC、NET USED、NET NAME

考题 A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A、 Guest user accountB、 Limited user accountC、 Power user accountD、 Administrator user account

考题 单选题A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A DHCPB PATC ProxyD IPX

考题 单选题Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?()A Put all other work orders on hold and assist the user with all their computer issues.B Have another technician take over support calls for this user.C Explain that the user needs to fill out a work order for the computer problems.D Ask the user to call another technician for more in-depth assistance.

考题 单选题Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A After an unsuccessful rebootB If a user’s IP address has been spoofedC After using IPCONFIG /RELEASED If the computer has an ARP address conflict

考题 单选题Which of the following commands would a technician MOST likely use to map a printer from aremote computer?()A NET USEB IPCONFIGC NSLOOKUPD TRACERT

考题 单选题The technician needs to map a network share to the user’s Windows 7 computer from thecommand prompt. Which of the following commands will the technician execute?()A NET SENDB NET CONFIGC NET USED NET NAME

考题 单选题Which of the following tools would a technician use to map a drive to a user’s machine?()A SSHB NETUSEC NETSTATD SSL

考题 单选题A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()A ESD matB ESD wrist strapC Sealable plastic bagD Anti-static bag

考题 单选题A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()A Check if the user account is lockedB Check group policyC Check the drive for fragmentationD Check NTFS permissions

考题 单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A  Guest user accountB  Limited user accountC  Power user accountD  Administrator user account

考题 单选题A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A DHCPB ARPC DNSD PING

考题 单选题A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?()A Warn the userB Report through proper channelsC Wipe the driveD Give the computer back to the user

考题 单选题A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()A Configuring the Windows Firewall exceptions.B Using Windows Messenger.C Configuring My Network Places.D Using Internet Explorer.