网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A user is attempting to access a website but is getting a ‘Page cannot be displayed’ error. The technician checks the IP address of the computer and sees that it has been assigned 169.254.10.70. Which of the following is the MOST likely cause?()

  • A、The device is located behind a firewall.
  • B、The network card is disabled.
  • C、The device is not configured for DHCP.
  • D、The device cannot locate a DHCP server.

参考答案

更多 “ A user is attempting to access a website but is getting a ‘Page cannot be displayed’ error. The technician checks the IP address of the computer and sees that it has been assigned 169.254.10.70. Which of the following is the MOST likely cause?()A、The device is located behind a firewall.B、The network card is disabled.C、The device is not configured for DHCP.D、The device cannot locate a DHCP server.” 相关考题
考题 A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read

考题 Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?() A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob

考题 In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.A.cooperatesB.coordinatesC.connectsD.mediates

考题 Which of the following is enabled in the BIOS that will prompt a user to enter their password every time the laptop performs a POST?()A、Power User accessB、Power on passwordC、Administrative passwordD、User profile access

考题 All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled

考题 A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

考题 A Denial of Service (DoS) attack is:()A、an attempt to bring down a website or other online service.B、a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.C、stealing a user’s identity and making changes to their accounts.D、an attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.

考题 Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

考题 Which of the following statements allows USER1 to take away read access on the table ORG.TAB1 from USER2?()A、REVOKE SELECT FROM user2 ON TABLE org.tab1B、REVOKE SELECT ON TABLE org.tab1 FROM user2C、REVOKE READ ACCESS FROM user2 ON TABLE org.tab1D、REVOKE READ ACCESS ON TABLE org.tab1 FROM user2

考题 Under which configuration hierarchy is an access profile configured for firewall user authentication?()A、[edit access]B、[edit security access]C、[edit firewall access]D、[edit firewall-authentication]

考题 You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()A、The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.B、The user will be mapped to all realms available to the user.C、The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.D、The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.

考题 Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

考题 Examine the command: SQL ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()A、The SKD user cannot log in to the database instance.B、The objects owned by the SKD user are not accessible to any user.C、The other users can access the objects owned by the SKD user, on which they have access.D、The password for the SKD user expires and the user is forced to change the password at the next log in

考题 单选题A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()A Request the user to logoff and log back on.B Add the user as an administrator on their local machine.C Add the user as an administrator on the server.D Run an ipconfig /renew on the user’s machine.

考题 单选题You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()A The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authenticationB The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.C The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,D The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.

考题 单选题Which of the following is the access level of a user that belongs to both the Administrators andUsers groups?()A UserB AdministratorC Power UserD Remote Desktop User

考题 多选题Examine the command: SQL ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()AThe SKD user cannot log in to the database instance.BThe objects owned by the SKD user are not accessible to any user.CThe other users can access the objects owned by the SKD user, on which they have access.DThe password for the SKD user expires and the user is forced to change the password at the next log in

考题 单选题An employee cannot access the company database. You check the connection variables: What is a valid explanation for why one of the users is unable to connect to the database?()A Bob has max_user_connections set to zero, which blocks all his connectionsB Joe has exceeded the max_user_connections global limitC All users are blocked because max_user_connections is accumulated over the host account informationD Kay is already connected elsewhere and attempting to log in againE Connect_timeout is too small to allow a connection to occur

考题 单选题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()A Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.B Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.C Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.D Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.

考题 单选题You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()A The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.B The user will be mapped to all realms available to the user.C The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.D The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.

考题 多选题You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()ACreate a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.BConfigure a wired adapter and assign the required SSID under User Roles Agent Odyssey Settings.CCreate a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.DCreate a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.

考题 单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A The wireless access point is using MAC address filteringB The user has connected to a nearby wireless access point from another officeC The user has configured the wireless settings with the wrong encryption typeD The wireless access point has SSID broadcast disabled

考题 单选题A user is attempting to access a website but is getting a ‘Page cannot be displayed’ error. The technician checks the IP address of the computer and sees that it has been assigned 169.254.10.70. Which of the following is the MOST likely cause?()A The device is located behind a firewall.B The network card is disabled.C The device is not configured for DHCP.D The device cannot locate a DHCP server.

考题 单选题A Denial of Service (DoS) attack is:()A an attempt to bring down a website or other online service.B a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.C stealing a user’s identity and making changes to their accounts.D an attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.

考题 多选题A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()APerform a policy trace for the specific user and review the output to isolate the problem.BReview the Events log.CReview the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.DReview the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

考题 多选题Examine the command: SQL ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()AThe SKD user cannot log in to the database instance.BThe objects owned by the SKD user are not accessible to any user.CThe other users can access the objects owned by the SKD user, on which they have access.DThe password for the SKD user expires and the user is forced to change the password at the next log in.

考题 多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.