网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()
A
/tmp
B
/var/preserve
C
/var/tmp/$USER
D
$HOME/.vi
参考答案
参考解析
解析:
暂无解析
更多 “单选题An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A /tmpB /var/preserveC /var/tmp/$USERD $HOME/.vi” 相关考题
考题
An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router
考题
You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A、The user will be instructed to call the network administrator.B、The user will fail authentication.C、The user will be prompted to install a new device certificate on the MAG Series device.D、The user will successfully authenticate and have full network access.
考题
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configured.D、The PC has connectivity up to Layer 5 of the OSI model.E、The PC has the TCP/IP protocol stack correctly installed.
考题
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC.If a reply is received, what does this confirm?()A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configuredD、The PC has connectivity up to Layer 5 of the OSI modelE、The PC has the TCP/IP protocol stack correctly installed.
考题
A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()A、SpamB、PhishingC、AdwareD、A Trojan
考题
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.
考题
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue
考题
The customer has a dedicated ink jet fax machine that is used to send and receive faxes only from the corporate office. The user complains of streaks on the received faxes while the internal self-prints are fine. Which of the following should a technician recommend?()A、Clean the scanner glass on the distant machine.B、Clean the scanner glass on the local machine.C、Clean the printer head on the local machine.D、Call the telephone company to increase the line signal level.
考题
An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem. Which of thefollowing is the NEXT step that the administrator should take? ()A、 Create an action plan.B、 Escalate the issue.C、 Reboot the mail server.D、 Document the solution.
考题
A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem, which step should the administrator take FIRST?()A、 Reboot the file server.B、 Ask the user what they were doing when they noticed the problem.C、 Ask the user to reboot their PC.D、 Ask the user to ping the default gateway and report the response times back to the administrator.
考题
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router
考题
The technician is moving a user’s files from a Windows XP PC to a Windows Vista PC. Which of the following directories corresponds to each operating system?()A、c:/users/user1/documents to c:/users/user1/documentsB、c:/documents and settings/user1/my documents to c:/users/user1/documentsC、c:/documents and settings/user1/my documents to c:/documents and settings/user1/my documentsD、c:/users/user1/my documents to c:/users/user1/documents
考题
An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()A、SSHB、Remote Desktop ConnectionC、TelnetD、VPN
考题
Several people in an Information Technology (IT) department are asking for fileset updates that the system administrator received earlier that day on CD-ROM. The system administrator created an install directory on their machine and made it available to everyone. Which of the following commands will allow the system administrator to copy the images from the CD-ROM to the install directory?()A、smit bffcreate from the target directoryB、tar -xvf /dev/cd0 from the target directoryC、restore -xvqf /dev/cd0 from the target directoryD、mount the cdrom on /cdrom and cp /cdrom/* . from the target directory
考题
An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB
考题
An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A、/tmpB、/var/preserveC、/var/tmp/$USERD、$HOME/.vi
考题
单选题A company finished upgrading the wireless encryption to WPA2 Enterprise. The administrator receives a call from a user who is unable to connect to the company wireless. Which of the following is MOST likely causing the connection problem?()A
The laptop is missing the software supplicantB
The access point SSID is hidden.C
The laptop only supports TKIP and AES encryption,D
The access point is on the wrong channel.
考题
单选题If no distress acknowledgement is received()a DSC distress call transmission, then the ship in distress may repeat the DSC distress call attempt after a delay of between 3.5 and 4.5 minutes from the beginning of the initial call.A
relevant toB
relate toC
in response toD
in relation to
考题
单选题everal people in an finance customer IT department are asking for fileset updates that the system administrator received from IBM earlier that day on CD-ROM. The system administrator created an install directory on their machine and made it available to everyone. Which of the following commands will allow the system administrator to copy the images from an IBM update CD-ROM to the install directory()A
smit bffcreate from the target directoryB
tar -xvf /dev/cd0 from the target directoryC
restore -xvqf /dev/cd0 from the target directoryD
mount the cdrom on /cdrom and run cp /cdrom/* . from the target directory
考题
单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A
Phishing scamB
Social engineeringC
Man-in-the-MiddleD
Shoulder surfing
考题
多选题Given: 3.class MyServlet extends HttpServlet { 4.public void doPut(HttpServletRequest req, HttpServletResponse resp) throws ServletException,IOException { 5.// servlet code here ... 26.} 27.} If the DD contains a single security constraint associated with MyServlet and its only tagsand tags are:GETPUT Admin Which four requests would be allowed by the container?()AA user whose role is Admin can perform a PUT.BA user whose role is Admin can perform a GET.CA user whose role is Admin can perform a POST.DA user whose role is Member can perform a PUT.EA user whose role is Member can perform a POST.FA user whose role is Member can perform a GET.
考题
单选题An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A
The PC has connectivity with a local host.B
The PC has connectivity with a Layer 3 device.C
The PC has a default gateway correctly configured.D
The PC has connectivity up to Layer 5 of the OSI model.E
The PC has the TCP/IP protocol stack correctly installed.
考题
单选题A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()A
SpamB
PhishingC
AdwareD
A Trojan
考题
单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A
Implement preventative measures.B
Close the issue.C
Document the outcome.D
Question other users to make sure they are not having the same issue.
考题
单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A
As the root user from serverA run the command rhost serverBB
As the root user from serverA run the command rlogin serverBC
As the desired user from serverB run the command rhost serverAD
As the desired user from serverA run the command rlogin serverB
考题
单选题An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem. Which of thefollowing is the NEXT step that the administrator should take? ()A
Create an action plan.B
Escalate the issue.C
Reboot the mail server.D
Document the solution.
考题
单选题A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem, which step should the administrator take FIRST?()A
Reboot the file server.B
Ask the user what they were doing when they noticed the problem.C
Ask the user to reboot their PC.D
Ask the user to ping the default gateway and report the response times back to the administrator.
热门标签
最新试卷