网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A user is reporting that they are getting pop-ups while they are not actively browsing the Internet.Which of the following would BEST resolve this issue?()
A
Antivirus
B
Firewall
C
Anti-spyware
D
Pop-upblocker
参考答案
参考解析
解析:
暂无解析
更多 “单选题A user is reporting that they are getting pop-ups while they are not actively browsing the Internet.Which of the following would BEST resolve this issue?()A AntivirusB FirewallC Anti-spywareD Pop-upblocker” 相关考题
考题
The pop-up blocker is enabled on your computer. A Web site that you visit regularly uses pop-ups.You need to view the pop-ups from this Web site while maintaining the highest level of security for all other Web sites.What are two possible ways to achieve this goal?()A.AB.BC.CD.DE.E
考题
You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D
考题
Which of the following is not a while-speaking activity?A.Describing people and events.
B.Role-plays.
C.Exchanging information.
D.Reporting results.
考题
The empirical evidence suggests that______extra working hours can have positive effects on labor market outcomes, while others reporting zero or negative effects.A.absorbing
B.adopting
C.abolishing
D.abandoning
考题
You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()A、The user cannot use the role at all.B、The role would not be granted to the user.C、The user needs to enable the role explicitly.D、The user can start using the role immediately.E、The user would have the admin option for the role.
考题
Which of the following malicious software types will create multiple pop-ups on a computer?()A、AdwareB、GraywareC、WormsD、Spyware
考题
A user is reporting a loud grinding sound when the machine is powered on. The machine loadsinto windows and the user does not notice any performance issues. Which of the following is the MOST likely cause of the noise?()A、PowersupplyfailureB、BadHDC、BadfanD、FaultyCD-Rom
考题
A user is reporting that they are getting pop-ups while they are not actively browsing the Internet.Which of the following would BEST resolve this issue?()A、AntivirusB、FirewallC、Anti-spywareD、Pop-upblocker
考题
The following output is generated when trying to obtain tickets from the Kerberos realm: # kinit user@SUB.DOMAIN.BIZ Password for user@SUB.DOMAIN.BIZ kinit(v5): Clock skew too great while getting initial credentials How can the problem be fixed? ()A、 ntpdate domaincontroller; hwclock -systohc B、 kinit -t C、 killall -HUP krb5kdc D、 Modify the time_sync value in the kdc.conf file. E、 Modify the clockskew value in the krb5.conf file.
考题
An administrator receives a call from an end user reporting that the application they are using keeps giving them an error on port 23. Which of the following is being used?()A、SSHB、Remote Desktop ConnectionC、TelnetD、VPN
考题
A remote user is trying to telnet to the production server. The session is getting a timeout error. Which command should the user issue to verify the network connection?()A、iptraceB、nslookupC、netstatD、traceroute
考题
A user calls to report they are getting I/O errors on a file system. Which of the following tools should be used to isolate this problem?()A、dfB、diagrptC、errmsgD、errpt
考题
An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A、/tmpB、/var/preserveC、/var/tmp/$USERD、$HOME/.vi
考题
You are performing a database recovery because a user’s schema is dropped. While performing the recovery, you use the UNTIL SEQUENCE clause. Which type of database recovery are you performing?()A、 user managed complete recoveryB、 user managed incomplete recoveryC、 RMAN-based complete recoveryD、 RMAN-based incomplete recovery
考题
Your network contains an Active Directory domain. A user named User1 takes a leave of absence for one year. You need to restrict access to the User1 user account while User1 is away. What should you do()A、From the Default Domain Policy, modify the account lockout settings.B、From the Default Domain Controller Policy, modify the account lockout settings.C、From the properties of the user account, modify the Account options.D、From the properties of the user account, modify the Session settings.
考题
单选题You are performing a database recovery because a user’s schema is dropped. While performing the recovery, you use the UNTIL SEQUENCE clause. Which type of database recovery are you performing?()A
user managed complete recoveryB
user managed incomplete recoveryC
RMAN-based complete recoveryD
RMAN-based incomplete recovery
考题
多选题The pop-up blocker is enabled on your computer. A Web site that you visit regularly uses pop-ups. You need to view the pop-ups from this Web site while maintaining the highest level of security for all other Web sites. What are two possible ways to achieve this goal?()ADisable the pop-up blocker.BAdd the URL of the Web site to the list of trusted sites.CAdd the URL of the Web site to the list of allowed sites.DEnable the Automatic Website Checking option on the Phishing filter.EVisit the Web site and select the Always allow pop-ups from this site option.
考题
单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A
Phishing scamB
Social engineeringC
Man-in-the-MiddleD
Shoulder surfing
考题
单选题You have a computer that runs Windows XP Professional Service Pack 2 (SP2). Five users share the computer. You need to allow pop-ups from the internal Web servers for all users of the computer. Pop-ups from other Web site must continue to be denied. You log on to the computer by using the local administrator account. What should you do next?()A
Modify the Internet Explorer Pop-up Blocker settings. B
Move all URLs from the local Web servers to the Internet Explorer Favorites list.C
From the Local Computer Policy, modify the User Configuration settings.D
From the Local Computer Policy, modify the Computer Configuration settings.
考题
单选题MySQL is installed on a Linux server and has the following configuration: What is the purpose of changing ownership of datadir to the ‘mysql’ user?()A
MySQL requires correct file ownership while remaining secureB
MySQL needs to be run as the root user, but file cannot be owned by itC
MySQL cannot be run as the root user
考题
单选题A user is reporting that they are getting pop-ups while they are not actively browsing the Internet.Which of the following would BEST resolve this issue?()A
AntivirusB
FirewallC
Anti-spywareD
Pop-upblocker
考题
单选题A user is reporting that their computer is making strange noises and randomly powers off. Which of the following tools would MOST likely be used to troubleshoot this problem?()A
POST diagnostic cardB
Power supply testerC
Loop back plugD
Cable tester
考题
单选题A user is reporting that access to a file server is much slower than it has been. The system administrator completes a test of the server using a system monitoring tool and compares it to the previously taken baseline. The comparison shows that there are no significant changes in the use of system resources. Which of the following actions should be taken to resolve this user problem?()A
Add additional RAM to the user PCB
Troubleshoot the user PCC
Add additional RAM to the serverD
Add additional hard drive space to the server
考题
多选题The following output is generated when trying to obtain tickets from the Kerberos realm: # kinit user@SUB.DOMAIN.BIZ Password for user@SUB.DOMAIN.BIZ kinit(v5): Clock skew too great while getting initial credentials How can the problem be fixed? ()Antpdate domaincontroller; hwclock -systohcBkinit -tCkillall -HUP krb5kdcDModify the time_sync value in the kdc.conf file.EModify the clockskew value in the krb5.conf file.
考题
单选题You work as a database administrator for Certkiller .com. While granting a role,SELECT_CATALOG_ROLE, to a user, Certkiller, using Oracle Enterprise Manager 10g Database Control, you have cleared the DEFAULT check box. What will be the result?()A
The user cannot use the role at all.B
The role would not be granted to the user.C
The user needs to enable the role explicitly.D
The user can start using the role immediately.E
The user would have the admin option for the role.
考题
单选题While connected to the database,a user on a PC receives a fatal error and the machine reboots. Which background process cleans up the failed connection?()A
ARCnB
CKPTC
DBWnD
LGWRE
PMONF
SMON
考题
单选题An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A
/tmpB
/var/preserveC
/var/tmp/$USERD
$HOME/.vi
考题
多选题A user is reporting that a PC will suddenly shut down without warning. The PC boots up with no problems, but after using the PC for a short time, the PC turns off. Which of the following components should the technician check?() (Select TWO).ACPU fanBRAMCHard driveDPower supplyEVideo card
热门标签
最新试卷