网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()
A
Phishing scam
B
Social engineering
C
Man-in-the-Middle
D
Shoulder surfing
参考答案
参考解析
解析:
暂无解析
更多 “单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A Phishing scamB Social engineeringC Man-in-the-MiddleD Shoulder surfing” 相关考题
考题
A call logging process would be used by a technician in order to:()
A. assign the appropriate status level for the problem.B. create records which enable user authentication.C. help maintain a balanced workload for the help desk technicians.D. identify common problems among many users.
考题
A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A、Phishing scamB、Social engineeringC、Man-in-the-MiddleD、Shoulder surfing
考题
A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A、The user copied to a read-only folder share.B、The user changed the attributes of the files.C、The user copied the files from the local My Documents folder.D、The user moved instead of copied the files.
考题
A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()A、SpamB、PhishingC、AdwareD、A Trojan
考题
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.
考题
A call logging process would be used by a technician in order to:()A、assign the appropriate status level for the problem.B、create records which enable user authentication.C、help maintain a balanced workload for the help desk technicians.D、identify common problems among many users.
考题
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue
考题
A user connects to the companys intranet server via a VPN connection from a small office / home office (SOHO) using the broadband service. One day, the user cannot successfully connect to the VPN and receives an error message that states "Username and password are invalid on the domain." Which of the following should be done to correct this problem?()A、Call the corporate help desk to have the VPN server rebootedB、Re-enter the username and password in the VPN connection and reconnectC、Call the broadband Internet provider to replace the SOHO router with a newer modelD、Ping the corporate VPN server to ensure it is online
考题
Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?()A、Put all other work orders on hold and assist the user with all their computer issues.B、Have another technician take over support calls for this user.C、Explain that the user needs to fill out a work order for the computer problems.D、Ask the user to call another technician for more in-depth assistance.
考题
A user wants to be able to receive help from a coworker that is located outside the company’s local office. Which of the following MUST be enabled to allow the user to watch and interact with the coworker simultaneously?()A、Remote DesktopB、TelnetC、Computer ManagementD、Remote Assistance
考题
An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()A、SSHB、Remote Desktop ConnectionC、TelnetD、VPN
考题
Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob
考题
Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A、REVOKE ALL PRIVILEGES FROM USER tomB、REVOKE ALL ON EMPLOYEE FROM USER tomC、REVOKE EXECUTE ON EMPLOYEE FROM USER tomD、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
考题
A user has a computer that runs Windows XP Professional. The user attempts to connect to the computer by using a Remote Desktop Connection and receives the following error message: “The local policy of the system does not permit you to log on interactively.” You need to ensure that the user can log on to the computer by using a Remote Desktop Connection. What should you do?() A、From the System settings, disable Remote Assistance.B、Add the user's account to the Remote Desktop Users group. C、From Windows Firewall, modify the scope of the Remote Desktop exception. D、Set the Remote Desktop Help Session Manager service Startup type to Automatic, and then start the service.
考题
Your network contains an Active Directory domain. The domain contains three domain controllers. One of the domain controllers fails. Seven days later, the help desk reports that it can no longer create user accounts. You need to ensure that the help desk can create new user accounts. Which operations master role should you seize()A、domain naming masterB、infrastructure masterC、primary domain controller (PDC) emulatorD、RID masterE、schema master
考题
单选题Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?()A
Put all other work orders on hold and assist the user with all their computer issues.B
Have another technician take over support calls for this user.C
Explain that the user needs to fill out a work order for the computer problems.D
Ask the user to call another technician for more in-depth assistance.
考题
单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A
Phishing scamB
Social engineeringC
Man-in-the-MiddleD
Shoulder surfing
考题
单选题Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A
REVOKE ACCESS ON DATABASE FROM USER bobB
REVOKE CONNECT ON DATABASE FROM USER tomC
REVOKE tom FROM ACCESS ON DATABASE BY USER bobD
REVOKE tom FROM CONNECT ON DATABASE BY USER bob
考题
单选题A user connects to the companys intranet server via a VPN connection from a small office / home office (SOHO) using the broadband service. One day, the user cannot successfully connect to the VPN and receives an error message that states "Username and password are invalid on the domain." Which of the following should be done to correct this problem?()A
Call the corporate help desk to have the VPN server rebootedB
Re-enter the username and password in the VPN connection and reconnectC
Call the broadband Internet provider to replace the SOHO router with a newer modelD
Ping the corporate VPN server to ensure it is online
考题
单选题You are the help desk manager for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. All help desk technicians are members of the Help Desk Technicians group. They use Remote Assistance to remotely control user sessions to provide online support and training to users. The users currently use Windows Messenger to submit Remote Assistance invitations to the help desk technicians. You want to reduce the time required for help desk technicians to respond to Remote Assistance requests. To accomplish this goal, you want to configure the client computers to allow help desk technicians to establish a Remote Assistance session with a client computer without requiring an invitation from a user. What should you do?()A
In the Default Domain Policy, set the Remote Assistance - Solicited Remote Assistance policy setting to Disabled. B
In the Default Domain Policy, set the Remote Assistance - Offer Remote Assistance policy setting to Enabled and add the Help Desk Technicians group to the Helpers list. C
In each computer's Local Security Policy, grant the Help Desk Technicians group the Allow logon through Terminal Services user right. D
In the System properties for each computer, select the Allow users to connect remotely to this computer option, and add the Help Desk Technicians group to the list of allowed users.
考题
单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A
Implement preventative measures.B
Close the issue.C
Document the outcome.D
Question other users to make sure they are not having the same issue.
考题
单选题Your network contains an Active Directory domain. The domain contains three domain controllers. One of the domain controllers fails. Seven days later, the help desk reports that it can no longer create user accounts. You need to ensure that the help desk can create new user accounts. Which operations master role should you seize()A
domain naming masterB
infrastructure masterC
primary domain controller (PDC) emulatorD
RID masterE
schema master
考题
单选题A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()A
SpamB
PhishingC
AdwareD
A Trojan
考题
单选题An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()A
SSHB
Remote Desktop ConnectionC
TelnetD
VPN
考题
单选题A user wants to be able to receive help from a coworker that is located outside the company’s local office. Which of the following MUST be enabled to allow the user to watch and interact with the coworker simultaneously?()A
Remote DesktopB
TelnetC
Computer ManagementD
Remote Assistance
考题
单选题A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A
The user copied to a read-only folder share.B
The user changed the attributes of the files.C
The user copied the files from the local My Documents folder.D
The user moved instead of copied the files.
考题
单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A
Implement preventative measures.B
Close the issue.C
Document the outcome.D
Question other users to make sure they are not having the same issue
考题
单选题Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A
REVOKE ALL PRIVILEGES FROM USER tomB
REVOKE ALL ON EMPLOYEE FROM USER tomC
REVOKE EXECUTE ON EMPLOYEE FROM USER tomD
REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
热门标签
最新试卷