网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A user has recently added a second IDE CD-RW drive to a machine in addition to the primary DVD-ROM drive. The drive opens and closes; however, they do not see it show up in Windows. Which of the following is the MOST likely cause?()
- A、The drive jumper settings are incorrect.
- B、The drive is not receiving power from PSU.
- C、Windows only supports one optical drive.
- D、The user connected the drive with a SATA cable.
参考答案
更多 “ A user has recently added a second IDE CD-RW drive to a machine in addition to the primary DVD-ROM drive. The drive opens and closes; however, they do not see it show up in Windows. Which of the following is the MOST likely cause?()A、The drive jumper settings are incorrect.B、The drive is not receiving power from PSU.C、Windows only supports one optical drive.D、The user connected the drive with a SATA cable.” 相关考题
考题
Even though there has been a () with child prodigies for centuries, there has been little serious study of them until recently.
A.facilityB.fascinationC.facultyD.assassination
考题
Given that the current directory is empty, and that the user has read and write privileges to the current, and the following:Which statement is true?()
A.Compilation fails.B.Nothing is added to the file system.C.Only a new file is created on the file system.D.Only a new directory is created on the file system.E.Both a new file and a new directory are created on the file system.
考题
You are the administrator of Ezonexam's network.An employee named Mark has a local user account on a Windows 2000 Professional computer. Mark has rights and permissions to multiple files and folders on the computer. All of Mark's permissions are being granted through group membership. Mark recently hired a new employee named Eric as his assistant.You want Eric to have the same rights and permissions that Mark has on the Windows 2000 Professional computer. You want to accomplish this with the least amount of administrative effort.What should you do?A.Create a new local group. Create Eric's user account. Add Mark's user account and Eric's user account to the new group.B.Create Eric's user account. Copy Mark's profile to Eric's user account.C.Create Eric's user account. Make Eric's user account a member of all the same groups as Mark's user account.D.Create Eric's user account. Copy the registry entries in the subkey that correspond to Mark under HKEY_USERS to the subkey that corresponds to Eric.
考题
A user, Jill, is reporting her mouse is moving when Jill is not moving it, and the computer is running slower than normal. Which of the following is the FIRST action that Karen, a technician, should take?()A. Run chkdsk.B. Run an antivirus program.C. Replace the faulty mouse.D. Remove any recently added hardware.
考题
A user needs to create a trigger that will update table T2 whenever a row is added to table T1. Assuming the user has all appropriate privileges for table T2, which privilege is required on table T1 to create the trigger?()A.REFERENCESB.SELECTC.UPDATED.ALTER
考题
Research recently conducted on the side effects of the medication __________ that it should not be prescribed to diabetic patients.A.has found
B.has been found
C.finds
D.was finding
考题
Companycom has been performing scheduled backups of their data to tape using "tar" in a script for over one year with no problems. Recently, the tar command is returning a non zero return code during the backup phase, causing the script to fail. What is the primary cause of this problem?()A、The files have grown to over eight gigabytes in sizeB、The file systems are corrupt, and fsck should be runC、The tape block size has been changed from the defaultD、The user’s limit has been changed to less than eight gigabytes
考题
An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()A、odmgetB、odmaddC、odmshowD、odmcreate
考题
A user has purchased a laptop that has no means to charge the battery. Which of the followingwould the user MOST likely purchase?()A、USB cableB、AC adapterC、PCMCIA cardD、Replacement battery
考题
All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled
考题
A user, Jill, is reporting her mouse is moving when Jill is not moving it, and the computer is running slower than normal. Which of the following is the FIRST action that Karen, a technician, should take?()A、Run chkdsk.B、Run an antivirus program.C、Replace the faulty mouse.D、Remove any recently added hardware.
考题
A technician just installed an antivirus suite on a workstation. It is kept up-to-date and has recently scanned the system. A day later the user reports slower response times than usual. Which of the following is the user MOST likely experiencing?()A、AdvertisementsB、Resource consumptionC、A trojan infectionD、Unremoved viruses
考题
A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A、The website has updated the security policies.B、The user’s identity has been stolen.C、The browser has been hijacked.D、The user typed the website address incorrectly.
考题
A user’s workstation currently has four connected IDE devices. Which of the following could be added to the workstation to allow more ATA devices to be added to the workstation?()A、Network Interface cardB、Port expansion cardC、Serial interface cardD、Modem card
考题
An administrator has recently added a VLAN to the VIO server and wants to update the documentation. Which command displays the current VIO server VLAN configuration?()A、lsmap -allB、lsmap -netC、lsmap -entD、lsmap -vlan
考题
A user needs to create a trigger that will update table T2 whenever a row is added to table T1. Assuming the user has all appropriate privileges for table T2, which privilege is required on table T1 to create the trigger?()A、REFERENCESB、SELECTC、UPDATED、ALTER
考题
Your database initialization parameter file has the following entry: SEC_MAX_FAILED_LOGIN_ATTEMPTS=3 Which statement is true regarding this setting?()A、 It drops the connection after the specified number of login attempts fail for any user.B、 It is enforced only if the password profile is enabled for the user.C、 It locks the user account after the specified number of attempts.D、 It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.
考题
单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently added a distribution group named KingDistribute.During the course of the business week you receive instruction from Company.com to ensure that a user named Rory Allen is able to view and approve the messages sent to KingDistribute whilst ensuring you prevent Rory Allen from modifying the membership of KingDistribute.What should you do?()A
You should consider having the Message Tracking management role assigned to Rory Allen.B
You should consider having Rory Allen added to KingDistribute and create a new journal rule.C
You should consider having Rory Allen added to KingDistribute’s Managed by list.D
You should consider having Rory Allen assigned as a group moderator for KingDistribute.
考题
单选题A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A
The website has updated the security policies.B
The user’s identity has been stolen.C
The browser has been hijacked.D
The user typed the website address incorrectly.
考题
单选题Companycom has been performing scheduled backups of their data to tape using "tar" in a script for over one year with no problems. Recently, the tar command is returning a non zero return code during the backup phase, causing the script to fail. What is the primary cause of this problem?()A
The files have grown to over eight gigabytes in sizeB
The file systems are corrupt, and fsck should be runC
The tape block size has been changed from the defaultD
The user’s limit has been changed to less than eight gigabytes
考题
单选题An employee named Drew is leaving your company. A new employee named Adam will replace him. Drew has a local user account on a Windows 2000 Professional computer, with rights and permissions to multiple files and folders on the computer. You want Adam to have the same rights and permissions. How will you achieve this with the least administrative efforts? ()A
Rename Drew’s user account to Adam, and change the account password.B
Create a new account and link it to the previous users account.C
Delete the account and create a new one.D
Add a new user account to all the groups that the previous employee was added.
考题
单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A
The wireless access point is using MAC address filteringB
The user has connected to a nearby wireless access point from another officeC
The user has configured the wireless settings with the wrong encryption typeD
The wireless access point has SSID broadcast disabled
考题
单选题A technician just installed an antivirus suite on a workstation. It is kept up-to-date and has recently scanned the system. A day later the user reports slower response times than usual. Which of the following is the user MOST likely experiencing?()A
AdvertisementsB
Resource consumptionC
A trojan infectionD
Unremoved viruses
考题
多选题A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()APerform a policy trace for the specific user and review the output to isolate the problem.BReview the Events log.CReview the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.DReview the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.
考题
单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment. Xxx has recently added a distribution group named KingDistribute.How can you allow a user named Dean Austin to manage membership of KingDistribute only but not of the other groups?()A
You must create a new direct role assignment for Dean Austin.B
You must view the properties of KingDistribute the add Dean Austin to it.C
You must add Dean Austin to KingDistribute’s Managed by list.D
You must change the default sharing policy.
热门标签
最新试卷