网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()
A
Guest user account
B
Limited user account
C
Power user account
D
Administrator user account
参考答案
参考解析
解析:
暂无解析
更多 “单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A Guest user accountB Limited user accountC Power user accountD Administrator user account” 相关考题
考题
A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?()
A. Warn the userB. Report through proper channelsC. Wipe the driveD. Give the computer back to the user
考题
Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?()
A. Put all other work orders on hold and assist the user with all their computer issues.B. Have another technician take over support calls for this user.C. Explain that the user needs to fill out a work order for the computer problems.D. Ask the user to call another technician for more in-depth assistance.
考题
A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()
A. ESD matB. ESD wrist strapC. Sealable plastic bagD. Anti-static bag
考题
A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()A、Check if the user account is lockedB、Check group policyC、Check the drive for fragmentationD、Check NTFS permissions
考题
If a technician needs to convert a hard drive from Basic to Dynamic, which of the following utilities would the technician use?()A、Add Hardware WizardB、Device ManagerC、Computer ManagementD、Disk Management
考题
A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()A、ESD matB、ESD wrist strapC、Sealable plastic bagD、Anti-static bag
考题
Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A、After an unsuccessful rebootB、If a user’s IP address has been spoofedC、After using IPCONFIG /RELEASED、If the computer has an ARP address conflict
考题
A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING
考题
To force a user to use Ctrl-Alt-Delete to log into the computer, a technician can go to Control Panel then:()A、Accessibility options.B、Security Center.C、User accounts and the Advanced tab.D、Windows Firewall.
考题
A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer. Which of the following would be another way for the user to send the Remote Assistance invitation? ()A、Configuring the Windows Firewall exceptions.B、Using Windows Messenger.C、Configuring My Network Places.D、Using Internet Explorer.
考题
A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?()A、Warn the userB、Report through proper channelsC、Wipe the driveD、Give the computer back to the user
考题
A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A、DHCPB、PATC、ProxyD、IPX
考题
Which of the following tools would a technician use to map a drive to a user’s machine?()A、SSHB、NETUSEC、NETSTATD、SSL
考题
Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?()A、Put all other work orders on hold and assist the user with all their computer issues.B、Have another technician take over support calls for this user.C、Explain that the user needs to fill out a work order for the computer problems.D、Ask the user to call another technician for more in-depth assistance.
考题
The technician needs to map a network share to the user’s Windows 7 computer from thecommand prompt. Which of the following commands will the technician execute?()A、NET SENDB、NET CONFIGC、NET USED、NET NAME
考题
A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A、 Guest user accountB、 Limited user accountC、 Power user accountD、 Administrator user account
考题
单选题A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A
DHCPB
PATC
ProxyD
IPX
考题
单选题Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?()A
Put all other work orders on hold and assist the user with all their computer issues.B
Have another technician take over support calls for this user.C
Explain that the user needs to fill out a work order for the computer problems.D
Ask the user to call another technician for more in-depth assistance.
考题
单选题Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A
After an unsuccessful rebootB
If a user’s IP address has been spoofedC
After using IPCONFIG /RELEASED
If the computer has an ARP address conflict
考题
单选题Which of the following commands would a technician MOST likely use to map a printer from aremote computer?()A
NET USEB
IPCONFIGC
NSLOOKUPD
TRACERT
考题
单选题The technician needs to map a network share to the user’s Windows 7 computer from thecommand prompt. Which of the following commands will the technician execute?()A
NET SENDB
NET CONFIGC
NET USED
NET NAME
考题
单选题Which of the following tools would a technician use to map a drive to a user’s machine?()A
SSHB
NETUSEC
NETSTATD
SSL
考题
单选题A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()A
ESD matB
ESD wrist strapC
Sealable plastic bagD
Anti-static bag
考题
单选题A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()A
Check if the user account is lockedB
Check group policyC
Check the drive for fragmentationD
Check NTFS permissions
考题
单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A
Guest user accountB
Limited user accountC
Power user accountD
Administrator user account
考题
单选题A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A
DHCPB
ARPC
DNSD
PING
考题
单选题A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?()A
Warn the userB
Report through proper channelsC
Wipe the driveD
Give the computer back to the user
考题
单选题A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer. Which of the following would be another way for the user to send the Remote Assistance invitation? ()A
Configuring the Windows Firewall exceptions.B
Using Windows Messenger.C
Configuring My Network Places.D
Using Internet Explorer.
热门标签
最新试卷