网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()
A

Enable file and print share

B

FTP

C

VPN

D

Map a drive


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()A Enable file and print shareB FTPC VPND Map a drive” 相关考题
考题 A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?() A.EDITB.CHMODC.ATTRIBD.CONVERT

考题 A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read

考题 The last step in resolving an end user ticket should be which of the following?() A. Create an incident recordB. Verify the problem is resolvedC. Document the solutionD. Notify the user the problem is resolved

考题 Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?() A. ARP spoofingB. VLANC. MirroringD. Spanning tree

考题 Which of the following should be implemented to allow a user to securely connect to a network driveremotely?() A. Enable file and print shareB. FTPC. VPND. Map a drive

考题 Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()A、Enable file and print shareB、FTPC、VPND、Map a drive

考题 A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

考题 A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT

考题 Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A、AdministratorB、UserC、GuestD、Power user

考题 Which of the following expansion devices would allow a user to utilize multiple hardware profiles to control an external display and power option?()A、PCI Express cardB、KVMC、PCMCIA cardD、Docking station

考题 Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A、WPA-PSK encryptionB、SSID broadcastC、Port forwardingD、MAC filtering

考题 A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()A、Four port switchB、Four port wireless routerC、Four port WAPD、Four port hub

考题 An administrator needs to connect servers to the Fiber Channel SAN. Which of the following should the administrator install in the servers to allow this connection?()A、RiserB、HBAC、SCSI cardD、SAS card

考题 Which of the following expansion cards should be installed in a server to allow the server to connect toa SAN via a fiber channel? ()A、 SATAB、 iSCSIC、 SCSID、 HBA

考题 Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()A、ARP spoofingB、VLANC、MirroringD、Spanning tree

考题 A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()A、MAC filteringB、PoEC、IP filteringD、802.1X

考题 A user wants to be able to receive help from a coworker that is located outside the company’s local office. Which of the following MUST be enabled to allow the user to watch and interact with the coworker simultaneously?()A、Remote DesktopB、TelnetC、Computer ManagementD、Remote Assistance

考题 A company has just implemented a disaster recovery plan in which critical business must be restored in a four hour window.  Which of the following methods should be used to backup theservers?()A、Incremental backupB、Data only backupsC、SAN replicationD、Full backup

考题 A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()A、Allow the user to continue workingB、Check for virusesC、Re-image the hard driveD、Document time/date for later referenceE、Prevent users from accessing the PCF、Turn off PC

考题 Which role should a site administrator assign to a user in the selling organization to allow the user to manage suborganizations and users in their organization?()A、Organization AdministratorB、SellerC、Seller AdministratorD、Store AdministratorE、Account Representative

考题 单选题A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()A MAC filteringB PoEC IP filteringD 802.1X

考题 单选题A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()A Agree with the user’s complaintsB Clarify the user’s statementsC Minimize the user’s criticismD Shadow the other technician on the next repair

考题 单选题Which of the following commands will allow a user to discover their IP address, subnet, and DNS?()A IPCONFIGB NETSTAT -AC NSLOOKUPD IPCONFIG /ALL

考题 单选题Which of the following network modifications should be implemented to extend the wirelessnetwork range and allow out-of-range users to share the Internet connection?()A Create a new VLAN for the out-of-range users.B Add a wireless access point for the out-of-range users.C Upgrade the out-of-range users’ SSID searching software.D Enable network sharing on the users’ computers that are within range.

考题 单选题The last step in resolving an end user ticket should be which of the following?()A Create an incident recordB Verify the problem is resolvedC Document the solutionD Notify the user the problem is resolved

考题 单选题Which role should a site administrator assign to a user in the selling organization to allow the user to manage suborganizations and users in their organization?()A Organization AdministratorB SellerC Seller AdministratorD Store AdministratorE Account Representative

考题 单选题A user wants to replace their 17” CRT monitor with the thinnest possible 17” monitor available.Which of the following monitors should the user purchase?()A LED LCDB DLPC CCFL LCDD Plasma

考题 单选题Which of the following expansion cards should be installed in a server to allow the server to connect to a SAN via a fiber channel?()A SATAB iSCSIC SCSID HBA