A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()A、PhishingB、Smurf attackC、Den

题目

A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()

  • A、Phishing
  • B、Smurf attack
  • C、Denial of service
  • D、Man-in-the-middle

相似考题
更多“A user receives an email slatin”相关问题
  • 第1题:

    A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()

    • A、Spam
    • B、Phishing
    • C、Adware
    • D、A Trojan

    正确答案:B

  • 第2题:

    A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?()

    • A、FTP
    • B、SMTP
    • C、POP
    • D、SNMP

    正确答案:B

  • 第3题:

    An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()

    • A、Implement preventative measures.
    • B、Close the issue.
    • C、Document the outcome.
    • D、Question other users to make sure they are not having the same issue

    正确答案:C

  • 第4题:

    A user calls about a problem with receiving email. After troubleshooting the user’s computer and finding nothing wrong, the technician contacts the email sender and finds out the user gave out their email address incorrectly. Which of the following is the BEST approach in explaining the issue to the user?()

    • A、“Sometimes computers are just strange, but it seems to be working now.”
    • B、“You gave them the wrong address and caused this problem.”
    • C、“The sender had the e-mail address wrong, but they have it correct now and the problem has been resolved.”
    • D、“The SMTP server was not getting a proper resolution of the recipient name field when it was parsing the header.”

    正确答案:C

  • 第5题:

    User "twsuser" is logged on to the IBM Tivoli Workload Scheduler  Master Domain Manager server using Job Scheduling Console to update  calendar. The user receives a message: MODIFY on   CALENDAR access not granted.  What is the cause of this error?()

    • A、 Batchman process is down.
    • B、 User password has expired.
    • C、 WebSphere security is damaged.
    • D、 There are insufficient permissions in Security file.

    正确答案:D

  • 第6题:

    单选题
    现有表user,字段:userid,username,salary,deptid,email;表department,字段:deptid,deptname;下面()应采用检查约束来实现。
    A

    若department中不存在deptid为2的纪录,则不允许在user表中插入deptid为2的数据行。

    B

    若user表中已经存在userid为10的记录,则不允许在user表中再次插入userid为10的数据行。

    C

    User表中的salary(薪水)值必须在1000元以上。

    D

    若User表的email列允许为空,则向user表中插入数据时,可以不输入email值。


    正确答案: B
    解析: 暂无解析

  • 第7题:

    填空题
    What is the purpose of the Gmail team in sending this email?They hope the user will ____ the account.

    正确答案: (continue to) use/ log in to
    解析:
    细节题。本题考查发送此邮件的目的。邮件最后一句提到,邮件公司希望用户给它一次机会,接受它的服务。如果用户想要登录自己的账户,只需要点击以下的网址即可。此处应填continue to use或log in to。

  • 第8题:

    单选题
    A user states that email is not being received. Which of the following protocols should thetechnician check for incoming mail?()
    A

    SMTP

    B

    POP3

    C

    NNTP

    D

    HTTP


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()
    A

     Implement preventative measures.

    B

     Close the issue.

    C

     Document the outcome.

    D

     Question other users to make sure they are not having the same issue.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    变量$email=user@example.com,以下哪项能得到字符串example.com?()
    A

    substr($email,strpos($email,‘@’));

    B

    strstr($email,‘@’);

    C

    substr($email,strpos($email,‘@’)+1);

    D

    strrpos($email,‘@’);


    正确答案: C
    解析: 暂无解析

  • 第11题:

    多选题
    要在users表中插入一条新记录,下面语句正确的是()。
    A

    Insert Into users(id,user_name) Values(100, luhong)

    B

    Insert Into users(real_name,tel) Values(卢红,6545632)

    C

    Insert Into users(user_name,Email) Values(luhong, )

    D

    Insert Into users(user_name,Email) Values(luhong, NULL)


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    单选题
    A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()
    A

    Phishing

    B

    Smurf attack

    C

    Denial of service

    D

    Man-in-the-middle


    正确答案: B
    解析: 暂无解析

  • 第13题:

    An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()

    • A、 Implement preventative measures.
    • B、 Close the issue.
    • C、 Document the outcome.
    • D、 Question other users to make sure they are not having the same issue.

    正确答案:C

  • 第14题:

    A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()

    • A、Configuring the Windows Firewall exceptions.
    • B、Using Windows Messenger.
    • C、Configuring My Network Places.
    • D、Using Internet Explorer.

    正确答案:B

  • 第15题:

    An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()

    • A、 Create an action plan.
    • B、 Escalate the issue.
    • C、 Reboot the mail server.
    • D、 Document the solution.

    正确答案:B

  • 第16题:

    An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()

    • A、SSH
    • B、Remote Desktop Connection
    • C、Telnet
    • D、VPN

    正确答案:C

  • 第17题:

    While connected to the database,a user on a PC receives a fatal error and the machine reboots. Which background process cleans up the failed connection?()

    • A、ARCn
    • B、CKPT
    • C、DBWn
    • D、LGWR
    • E、PMON
    • F、SMON

    正确答案:E

  • 第18题:

    单选题
    A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()
    A

    Phishing scam

    B

    Social engineering

    C

    Man-in-the-Middle

    D

    Shoulder surfing


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    While connected to the database,a user on a PC receives a fatal error and the machine reboots. Which background process cleans up the failed connection?()
    A

    ARCn

    B

    CKPT

    C

    DBWn

    D

    LGWR

    E

    PMON

    F

    SMON


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()
    A

    Spam

    B

    Phishing

    C

    Adware

    D

    A Trojan


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()
    A

    Persistent session

    B

    Dynamic evaluation

    C

    Roaming session

    D

    Browser request follow-through


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()
    A

     Create an action plan.

    B

     Escalate the issue.

    C

     Reboot the mail server.

    D

     Document the solution.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    A user calls about a problem with receiving email. After troubleshooting the user’s computer and finding nothing wrong, the technician contacts the email sender and finds out the user gave out their email address incorrectly. Which of the following is the BEST approach in explaining the issue to the user?()
    A

    “Sometimes computers are just strange, but it seems to be working now.”

    B

    “You gave them the wrong address and caused this problem.”

    C

    “The sender had the e-mail address wrong, but they have it correct now and the problem has been resolved.”

    D

    “The SMTP server was not getting a proper resolution of the recipient name field when it was parsing the header.”


    正确答案: B
    解析: 暂无解析