网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()
A
Enable file and print share
B
FTP
C
VPN
D
Map a drive
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()A Enable file and print shareB FTPC VPND Map a drive” 相关考题
考题
A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()
A.EDITB.CHMODC.ATTRIBD.CONVERT
考题
A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read
考题
The last step in resolving an end user ticket should be which of the following?()
A. Create an incident recordB. Verify the problem is resolvedC. Document the solutionD. Notify the user the problem is resolved
考题
Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()
A. ARP spoofingB. VLANC. MirroringD. Spanning tree
考题
Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()
A. Enable file and print shareB. FTPC. VPND. Map a drive
考题
Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()A、Enable file and print shareB、FTPC、VPND、Map a drive
考题
A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read
考题
A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT
考题
Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A、AdministratorB、UserC、GuestD、Power user
考题
Which of the following expansion devices would allow a user to utilize multiple hardware profiles to control an external display and power option?()A、PCI Express cardB、KVMC、PCMCIA cardD、Docking station
考题
Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()A、WPA-PSK encryptionB、SSID broadcastC、Port forwardingD、MAC filtering
考题
A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()A、Four port switchB、Four port wireless routerC、Four port WAPD、Four port hub
考题
An administrator needs to connect servers to the Fiber Channel SAN. Which of the following should the administrator install in the servers to allow this connection?()A、RiserB、HBAC、SCSI cardD、SAS card
考题
Which of the following expansion cards should be installed in a server to allow the server to connect toa SAN via a fiber channel? ()A、 SATAB、 iSCSIC、 SCSID、 HBA
考题
Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()A、ARP spoofingB、VLANC、MirroringD、Spanning tree
考题
A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()A、MAC filteringB、PoEC、IP filteringD、802.1X
考题
A user wants to be able to receive help from a coworker that is located outside the company’s local office. Which of the following MUST be enabled to allow the user to watch and interact with the coworker simultaneously?()A、Remote DesktopB、TelnetC、Computer ManagementD、Remote Assistance
考题
A company has just implemented a disaster recovery plan in which critical business must be restored in a four hour window. Which of the following methods should be used to backup theservers?()A、Incremental backupB、Data only backupsC、SAN replicationD、Full backup
考题
A coworker has reported that someone has engaged in prohibited activity. The supervisor hasasked the technician to quarantine the PC until police arrive. Which of the following should the technician do?()A、Allow the user to continue workingB、Check for virusesC、Re-image the hard driveD、Document time/date for later referenceE、Prevent users from accessing the PCF、Turn off PC
考题
Which role should a site administrator assign to a user in the selling organization to allow the user to manage suborganizations and users in their organization?()A、Organization AdministratorB、SellerC、Seller AdministratorD、Store AdministratorE、Account Representative
考题
单选题A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()A
MAC filteringB
PoEC
IP filteringD
802.1X
考题
单选题A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()A
Agree with the user’s complaintsB
Clarify the user’s statementsC
Minimize the user’s criticismD
Shadow the other technician on the next repair
考题
单选题Which of the following commands will allow a user to discover their IP address, subnet, and DNS?()A
IPCONFIGB
NETSTAT -AC
NSLOOKUPD
IPCONFIG /ALL
考题
单选题Which of the following network modifications should be implemented to extend the wirelessnetwork range and allow out-of-range users to share the Internet connection?()A
Create a new VLAN for the out-of-range users.B
Add a wireless access point for the out-of-range users.C
Upgrade the out-of-range users’ SSID searching software.D
Enable network sharing on the users’ computers that are within range.
考题
单选题The last step in resolving an end user ticket should be which of the following?()A
Create an incident recordB
Verify the problem is resolvedC
Document the solutionD
Notify the user the problem is resolved
考题
单选题Which role should a site administrator assign to a user in the selling organization to allow the user to manage suborganizations and users in their organization?()A
Organization AdministratorB
SellerC
Seller AdministratorD
Store AdministratorE
Account Representative
考题
单选题A user wants to replace their 17” CRT monitor with the thinnest possible 17” monitor available.Which of the following monitors should the user purchase?()A
LED LCDB
DLPC
CCFL LCDD
Plasma
考题
单选题Which of the following expansion cards should be installed in a server to allow the server to connect to a SAN via a fiber channel?()A
SATAB
iSCSIC
SCSID
HBA
热门标签
最新试卷