A user is attempting to connect

题目

A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugsthe cable into the only available laptop connection, but the connector is loose inside the port. TheMOST likely reason the connector is loose is the:()

  • A、RJ-11 connector needs to be re-crimped
  • B、User has plugged into the laptop's NIC port
  • C、User has plugged the wrong end of the cable into the port
  • D、RJ-11 connector needs to be replaced with an RJ-45 connector
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()

A.Modify

B.Full control

C.Write

D.Read


参考答案:D

第2题:

You have a stand-alone server named Server1 that runs Windows Server 2003 Service Pack (SP2).A user attempts to connect to the server by using Remote Desktop Connection and receives the following error message.You need to ensure that the user can log on to the server by using Remote Desktop Connection.What should you do?()

A. On Server1, modify the Remote Control settings for the user account.

B. On Server1, modify the Remote Access Permission settings for the user account.

C. Instruct the user to log on to Server1 locally and then to change her password.

D. Instruct the user to log on to another computer and then connect to Server1 by using Remote Desktop Connection.


参考答案:C

第3题:

The DBA issues this SQL command: CREATE USER scott IDENTIFIED by tiger; What privileges does the user Scott have at this point?()

A. no privileges

B. only the SELECT privilege

C. only the CONNECT privilege

D. all the privileges of a default user


参考答案:A

第4题:

A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()

  • A、Four port switch
  • B、Four port wireless router
  • C、Four port WAP
  • D、Four port hub

正确答案:B

第5题:

Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()

  • A、The user must be granted the database administrator (DBA) privilege.
  • B、The user must be listed in the password file for the authentication.
  • C、No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.
  • D、Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.

正确答案:D

第6题:

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()

A.REVOKE ACCESS ON DATABASE FROM USER bob

B.REVOKE CONNECT ON DATABASE FROM USER tom

C.REVOKE tom FROM ACCESS ON DATABASE BY USER bob

D.REVOKE tom FROM CONNECT ON DATABASE BY USER bob


参考答案:B

第7题:

Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()

  • A、Enable file and print share
  • B、FTP
  • C、VPN
  • D、Map a drive

正确答案:C

第8题:

The DBA issues this SQL command:What privileges does the user Scott have at this point?()

A. No privileges.

B. Only the SELECT privilege.

C. Only the CONNECT privilege.

D. All the privileges of a default user.


参考答案:A

第9题:

A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()

  • A、Modify
  • B、Full control
  • C、Write
  • D、Read

正确答案:D

第10题:

A Denial of Service (DoS) attack is:()

  • A、an attempt to bring down a website or other online service.
  • B、a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.
  • C、stealing a user’s identity and making changes to their accounts.
  • D、an attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.

正确答案:A

更多相关问题