A user connects̳

题目

A user connects to the companys intranet server via a VPN connection from a small office / home office (SOHO) using the broadband service. One day, the user cannot successfully connect to the VPN and receives an error message that states "Username and password are invalid on the domain." Which of the following should be done to correct this problem?()

  • A、Call the corporate help desk to have the VPN server rebooted
  • B、Re-enter the username and password in the VPN connection and reconnect
  • C、Call the broadband Internet provider to replace the SOHO router with a newer model
  • D、Ping the corporate VPN server to ensure it is online
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following is the MOST accurate description of a L2/L3 switch?()

A. Performs switching and routing duties

B. A router that directly connects to a switch

C. A multi-purpose switch fabric used in full mesh environments

D. A switch that directly connects to a router


参考答案:A

第2题:

In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.

A.cooperates
B.coordinates
C.connects
D.mediates

答案:C
解析:
在物理安全和信息安全领域,访问控制是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为授权。
访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否被允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员维护一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能监视并保存用户访问系统资源的记录。
在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个基本的,而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

第3题:

In enterprises, the gateway is the computer that(71) the traffic from a workstation to the outside network that is serving the Web pages. In homes ,the gateway is the(72) that connects the user to the internet.

A.finds

B.searches

C.routes

D.tracks


正确答案:C

第4题:

A user typically connects to the Internet in one of two ways: dedicated access and()access.

  • A、 broadcasting
  • B、 point-to-point
  • C、 dial-up
  • D、 Internet

正确答案:C

第5题:

When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()

  • A、An error will occur.
  • B、Data passed between the client and the server is encrypted.
  • C、User IDs and passwords are passed to the server unencrypted.
  • D、User IDs and passwords are encrypted before they are passed to the server.

正确答案:A

第6题:

You have a standalone server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You install the FTP Server Windows component on Server1. You create several folders under the Ftproot folder as shown in the exhibit. (Click the Exhibit button.)A user named User1 connects to ftp://server1 and reports that he can view the Localuser folder and all of its subfolders. A user named User2 reports the same problem.You need to ensure that when users connect to ftp://server1, they can only view the content located under their user folder.What should you do? ()

A. From the properties of the Default FTP Site, change the directory listing style to Unix.

B. From the properties of the Default FTP Site, change the FTP site directory to c:\inetpub\ftproot\localuser.

C. From the properties of each user account, modify the home folder. Remove the Users group from the access control list of c:\inetpub\ftproot.

D. Delete the Default FTP Site. Create a new FTP site. Select the option to isolate users and specify the FTP site directory of c:\inetpub\ftproot.


参考答案:D

第7题:

A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.

A.encoded
B.encrypted
C.stored
D.transmitted

答案:D
解析:

第8题:

When a non-root user connects to a JUNOS platform and enters a username and password, the user is immediately placed at which level?()

A.UNIX shell

B.user level CLI

C.configuration mode

D.operational mode


参考答案:D

第9题:

Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()

  • A、User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());
  • B、User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());
  • C、User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());
  • D、User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());
  • E、User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());

正确答案:E

第10题:

如果想要在JSP中使用user包中的User类,则以下写法正确的是()。 

  • A、 <jsp:useBean id="user" class="user.User" scope="page"/>
  • B、 <jsp:useBean class="user.User.class" /> 
  • C、 <jsp:useBean name="user" class="user.User"/>
  • D、 <jsp:useBean id="user" class="User" import="user.* "/>

正确答案:A

更多相关问题