参考答案和解析
正确答案: C
解析: 暂无解析
更多“A user is reporting that they are getting pop-ups while they”相关问题
  • 第1题:

    You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()

    • A、The user cannot use the role at all.
    • B、The role would not be granted to the user.
    • C、The user needs to enable the role explicitly.
    • D、The user can start using the role immediately.
    • E、The user would have the admin option for the role.

    正确答案:C

  • 第2题:

    A user is reporting a loud grinding sound when the machine is powered on. The machine loadsinto windows and the user does not notice any performance issues. Which of the following is the MOST likely cause of the noise?()

    • A、Powersupplyfailure
    • B、BadHD
    • C、Badfan
    • D、FaultyCD-Rom

    正确答案:C

  • 第3题:

    The following output is generated when trying to obtain tickets from the Kerberos realm: # kinit user@SUB.DOMAIN.BIZ Password for user@SUB.DOMAIN.BIZ kinit(v5): Clock skew too great while getting initial credentials How can the problem be fixed? ()

    • A、 ntpdate domaincontroller; hwclock -systohc  
    • B、 kinit -t  
    • C、 killall -HUP krb5kdc  
    • D、 Modify the time_sync value in the kdc.conf file.  
    • E、 Modify the clockskew value in the krb5.conf file.

    正确答案:A,E

  • 第4题:

    A remote user is trying to telnet to the production server. The session is getting a timeout error. Which command should the user issue to verify the network connection?()

    • A、iptrace
    • B、nslookup
    • C、netstat
    • D、traceroute

    正确答案:D

  • 第5题:

    An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()

    • A、/tmp
    • B、/var/preserve
    • C、/var/tmp/$USER
    • D、$HOME/.vi

    正确答案:B

  • 第6题:

    Your network contains an Active Directory domain.   A user named User1 takes a leave of absence for one year.   You need to restrict access to the User1 user account while User1 is away.     What should you do()

    • A、From the Default Domain Policy, modify the account lockout settings.
    • B、From the Default Domain Controller Policy, modify the account lockout settings.
    • C、From the properties of the user account, modify the Account options.
    • D、From the properties of the user account, modify the Session settings.

    正确答案:C

  • 第7题:

    多选题
    The pop-up blocker is enabled on your computer. A Web site that you visit regularly uses pop-ups.  You need to view the pop-ups from this Web site while maintaining the highest level of security for all other Web sites.  What are two possible ways to achieve this goal?()
    A

    Disable the pop-up blocker.

    B

    Add the URL of the Web site to the list of trusted sites.

    C

    Add the URL of the Web site to the list of allowed sites.

    D

    Enable the Automatic Website Checking option on the Phishing filter.

    E

    Visit the Web site and select the Always allow pop-ups from this site option.


    正确答案: A,B
    解析: 暂无解析

  • 第8题:

    单选题
    You have a computer that runs Windows XP Professional Service Pack 2 (SP2). Five users share the computer. You need to allow pop-ups from the internal Web servers for all users of the computer. Pop-ups from other Web site must continue to be denied. You log on to the computer by using the local administrator account. What should you do next?()
    A

    Modify the Internet Explorer Pop-up Blocker settings. 

    B

    Move all URLs from the local Web servers to the Internet Explorer Favorites list.

    C

    From the Local Computer Policy, modify the User Configuration settings.

    D

    From the Local Computer Policy, modify the Computer Configuration settings.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    A user is reporting that they are getting pop-ups while they are not actively browsing the Internet.Which of the following would BEST resolve this issue?()
    A

    Antivirus

    B

    Firewall

    C

    Anti-spyware

    D

    Pop-upblocker


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    A user is reporting that access to a file server is much slower than it has been. The system administrator completes a test of the server using a system monitoring tool and compares it to the previously taken baseline. The comparison shows that there are no significant changes in the use of system resources. Which of the following actions should be taken to resolve this user problem?()
    A

    Add additional RAM to the user PC

    B

    Troubleshoot the user PC

    C

    Add additional RAM to the server

    D

    Add additional hard drive space to the server


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()
    A

    The user cannot use the role at all.

    B

    The role would not be granted to the user.

    C

    The user needs to enable the role explicitly.

    D

    The user can start using the role immediately.

    E

    The user would have the admin option for the role.


    正确答案: E
    解析: 暂无解析

  • 第12题:

    单选题
    An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()
    A

    /tmp

    B

    /var/preserve

    C

    /var/tmp/$USER

    D

    $HOME/.vi


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which of the following malicious software types will create multiple pop-ups on a computer?()

    • A、Adware
    • B、Grayware
    • C、Worms
    • D、Spyware

    正确答案:A

  • 第14题:

    A user is reporting that they are getting pop-ups while they are not actively browsing the Internet.Which of the following would BEST resolve this issue?()

    • A、Antivirus
    • B、Firewall
    • C、Anti-spyware
    • D、Pop-upblocker

    正确答案:C

  • 第15题:

    An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()

    • A、SSH
    • B、Remote Desktop Connection
    • C、Telnet
    • D、VPN

    正确答案:C

  • 第16题:

    A user calls to report they are getting I/O errors on a file system. Which of the following tools should be used to isolate this problem?()

    • A、df
    • B、diagrpt
    • C、errmsg
    • D、errpt

    正确答案:D

  • 第17题:

    You are performing a database recovery because a user’s schema is dropped. While performing the recovery, you use the UNTIL SEQUENCE clause. Which type of database recovery are you performing?()

    • A、 user managed complete recovery
    • B、 user managed incomplete recovery
    • C、 RMAN-based complete recovery
    • D、 RMAN-based incomplete recovery

    正确答案:D

  • 第18题:

    单选题
    You are performing a database recovery because a user’s schema is dropped. While performing the recovery, you use the UNTIL SEQUENCE clause. Which type of database recovery are you performing?()
    A

     user managed complete recovery

    B

     user managed incomplete recovery

    C

     RMAN-based complete recovery

    D

     RMAN-based incomplete recovery


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()
    A

    Phishing scam

    B

    Social engineering

    C

    Man-in-the-Middle

    D

    Shoulder surfing


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    MySQL is installed on a Linux server and has the following configuration: What is the purpose of changing ownership of datadir to the ‘mysql’ user?()
    A

    MySQL requires correct file ownership while remaining secure

    B

    MySQL needs to be run as the root user, but file cannot be owned by it

    C

    MySQL cannot be run as the root user


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    A user is reporting that their computer is making strange noises and randomly powers off. Which of the following tools would MOST likely be used to troubleshoot this problem?()
    A

    POST diagnostic card

    B

    Power supply tester

    C

    Loop back plug

    D

    Cable tester


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    The following output is generated when trying to obtain tickets from the Kerberos realm: # kinit user@SUB.DOMAIN.BIZ Password for user@SUB.DOMAIN.BIZ kinit(v5): Clock skew too great while getting initial credentials How can the problem be fixed? ()
    A

    ntpdate domaincontroller; hwclock -systohc

    B

    kinit -t

    C

    killall -HUP krb5kdc

    D

    Modify the time_sync value in the kdc.conf file.

    E

    Modify the clockskew value in the krb5.conf file.


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    单选题
    While connected to the database,a user on a PC receives a fatal error and the machine reboots. Which background process cleans up the failed connection?()
    A

    ARCn

    B

    CKPT

    C

    DBWn

    D

    LGWR

    E

    PMON

    F

    SMON


    正确答案: A
    解析: 暂无解析

  • 第24题:

    多选题
    A user is reporting that a PC will suddenly shut down without warning. The PC boots up with no problems, but after using the PC for a short time, the PC turns off. Which of the following components should the technician check?() (Select TWO).
    A

    CPU fan

    B

    RAM

    C

    Hard drive

    D

    Power supply

    E

    Video card


    正确答案: D,B
    解析: 暂无解析