Spam
Phishing
Adware
A Trojan
第1题:
A user selects their proper domain and is unable to log into their Windows computer.The error states:‘System cannot log you on to the domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect’.Which of the following is the MOST likely cause for this error?()
第2题:
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()
第3题:
An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()
第4题:
Which statement is true regarding this setting?()
第5题:
Click Admin > Users. Enter username, password, role, account status, and email.
Click Admin > Users. Enter username, password, role, account status, and user class.
Click Users > Manage Users. Enter username, password, role, account status, and user class.
Click Users > Manage Users. Enter username, password, ActiveDirectory domain, account status, and role.
第6题:
SMTP
POP3
NNTP
HTTP
第7题:
Spam
Phishing
Adware
A Trojan
第8题:
Phishing
Smurf attack
Denial of service
Man-in-the-middle
第9题:
Guest user account
Limited user account
Power user account
Administrator user account
第10题:
The computer's account was removed from Active Directory.
The user's account was removed from Active Directory.
The computer was disjoined from the domain.
The user typed in the wrong password
第11题:
REVOKE ALL PRIVILEGES FROM USER tom
REVOKE ALL ON EMPLOYEE FROM USER tom
REVOKE EXECUTE ON EMPLOYEE FROM USER tom
REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
第12题:
User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());
User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());
User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());
User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());
User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());
第13题:
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()
第14题:
A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()
第15题:
From the DX WebUI Dashboard, which steps are used for creating a new admin user? ()
第16题:
Your network contains an Active Directory domain. A user named User1 takes a leave of absence for one year. You need to restrict access to the User1 user account while User1 is away. What should you do()
第17题:
Implement preventative measures.
Close the issue.
Document the outcome.
Question other users to make sure they are not having the same issue.
第18题:
It drops the connection after the specified number of login attempts fail for any user.
It is enforced only if the password profile is enabled for the user.
It locks the user account after the specified number of attempts.
It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.
第19题:
As the root user from serverA run the command rhost serverB
As the root user from serverA run the command rlogin serverB
As the desired user from serverB run the command rhost serverA
As the desired user from serverA run the command rlogin serverB
第20题:
Confront the user and tell them to remove the material.
Backup the files and delete them from the users folder.
Inquire with the manager about policies and procedures.
Ignore the files, this is the users personal documents folder.
第21题:
All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
第22题:
Implement preventative measures.
Close the issue.
Document the outcome.
Question other users to make sure they are not having the same issue
第23题:
Add the user to the Guests group.
Create a standard user account for the user.
Create an administrator account for the user.
Add the user to the Remote Desktop Users group.
第24题:
It drops the connection after the specified number of login attempts fail for any user.
It is enforced only if the password profile is enabled for the user.
It locks the user account after the specified number of attempts.
It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.