A user states that all their incoming mail is showing that it is behind three hours. All other users have the correct time. Which of the following should the technician check?()
第1题:
A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()
第2题:
A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()
第3题:
An administrator is planning to bring a newly purchased server online. Which of the following should the administrator do FIRST?()
第4题:
A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()
第5题:
A system has three different network adapters installed. Which of the following should a technician use to get the details of all the adapters at the same time?()
第6题:
A user reports that they are unable to print to a remote printer. Which of the following should the technician check FIRST?()
第7题:
Which two statements apply when a user has entered private configuration mode by typing configure private?()
第8题:
Which two statements apply when a user has entered private configuration mode by typing configure private?()
第9题:
You have been asked to create three users, PUB1, PUB2 and PUB3, for three newly hired employees and to allocate unlimited quota on their default tablespace PUBLISHER_TBS with no other privileges. After creating the users, which method can you use for granting the required privileges?()
第10题:
You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users' files. What should you do to accomplish these goals?()
第11题:
the server vendor’s FAQ website
the SCSI controller vendor’s user manual
the drive enclosure vendor’s user manual
the network operating system vendor’s website
第12题:
System privileges apply only to the PDB in which they are used.
Local users cannot use local system privileges on the schema of a common user.
The granter of system privileges must possess the set container privilege.
Common users connected to a PDB can exercise privileges across other PDBs.
System privileges with the with grant option container all clause must be granted to a common user before the common user can grant privileges to other users.
第13题:
A user states that email is not being received. Which of the following protocols should thetechnician check for incoming mail?()
第14题:
Bob, a technician, needs to backup a user’s local My Documents on a Windows XP workstation.Which of the following is the QUICKEST way to the user’s folder?()
第15题:
A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()
第16题:
Two new servers are purchased and need to be installed to allow sharing of a single external hard drive enclosure. One server is configured as a local file server, and the other as a database server for a different network. The onsite technician notices that when both servers are running at the same time, they each receive SCSI errors. When they are running individually, no errors are reported. Which of the following is the BEST source of information to use for troubleshooting this problem?()
第17题:
A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()
第18题:
The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()
第19题:
Which two statements apply when a user has entered private configuration mode by typing configure private? ()
第20题:
From the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries and are consuming a lot of CPU time. This causes problems for you when you try to log on as the system user and perform small maintenance tasks. You would like to ensure that users SYS and SYSTEM get priority over all other users. Which method would you use to achieve this objective?()
第21题:
Which three statements are true about the working of system privileges in a multitenant control database(CDB) that has pluggable databases (PDBs)?()
第22题:
You have an Exchange Server 2010 organization. Your company’s compliance policy states the following:.Delete e-mail messages sent to legal department users that are older than 180 days. .Delete e-mail messages sent to all other users that are older than 60 days You need to recommend a solution that meets the requirements of the compliance policy. What should you recommend?()
第23题:
The system’s local time settings
The system’s O/S version and patch status
The system’s network configuration
The mail server’s configuration