单选题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()ADownload the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.BProvide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.CAssist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.DConfigure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.
单选题
A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()
A
Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.
B
Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.
C
Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.
D
Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.
参考解析
解析:
暂无解析
相关考题:
Desk Clerk:Good afternoon,Holiday Inn.Customer:Hello,I’d like to book a double room for the nights of 23rd and 24th please. Desk Clerk:______ A:What’s the matter?B:Just a minute, please.C:What can I do for you?D:Can I help you?
Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?() A. Put all other work orders on hold and assist the user with all their computer issues.B. Have another technician take over support calls for this user.C. Explain that the user needs to fill out a work order for the computer problems.D. Ask the user to call another technician for more in-depth assistance.
A call logging process would be used by a technician in order to:() A. assign the appropriate status level for the problem.B. create records which enable user authentication.C. help maintain a balanced workload for the help desk technicians.D. identify common problems among many users.
When using the Tivoli Dynamic Workload Console, which monitor tasks are available to the user?()A、 all those that have been created by all usersB、 just those created by the user in the current sessionC、 all those created by the user and shared with user’s login groupD、 just those where the connection engine specifies the user’s logon
你是一个企业管理员,管理的windows 2000树包含5个域。所有域都是native mode,每个域都有一个和多个用户来帮助客户端的员工。每个域都有一个全局组叫HELP DESK MEMBERS包含所有该域中的客户端员工。在根域下有一个名叫interns的OU,如何做()A、在根域下创建一个全局安全组叫HELP DESK STAFF,在HELP DESK STAFF中加入5个help desk members组,在RESE TINTERNS GROUP组中加入HELP DESK STAFF组,赋予重设密码的权限给HELP DESK STAFF组B、在根域下创建一个全局安全组叫HELP DESK STAFF,在HELP DESK STAFF中加入5个help desk staff组,在根域下创建本地安全组Reset Interns,把所有Interns OU中的成员都加入ResetInterns组。在InternsOU中,赋予重设密码权限C、在根域下创建一个新的通用组叫Help Desk Staff,在HelpStaff组中加入5个Help Desk Members组,创建一个本地安全组Reset Interns在根域,在Reset Interns中加入Help Desk Staff组D、在根域下创建一个新的通用组HelpDeskStaff,在HelpStaff组中加入5个HelpDeskMembers组.在根域下创建一个本地安全组叫Rese tInterns,把所有Interns OU中的成员都加入Reset Interns组,在Reset Interns组,赋予修改密码权限
你是一个拥有5个域的Win2k网络的企业级网管,每个域有一个或多个用户进行桌面级维护,每个域有一个全局组help mem包含所有桌面维护用户。根域下有一个OU interns,你希望help mem组成员可以为Interns重设密码。应如何做()A、在根域下创建通用组Help desk,将五个help mem组加入help desk组B、在根域下创建本地组reset,将help desk加入resetC、在interns OU,给以reset组重设密码权限D、设置域上的组策略no override
What is the primary benefit of Single Number Reach?()A、 Employees can receive calls at their desk and cell phone simultaneously.B、 Customers can call one number to reach all employees.C、 Employees can have their calls forwarded to the receptionist.D、 Customers can call any office number and the receptionist receives the call.
A network technician is troubleshooting a network issue that has just been reported. Which of thefollowing troubleshooting steps should the technician take FIRST to help resolve this issue?()A、Record the solution in the appropriate logs for future use.B、Ask the user who reported the issue what past documentation they have.C、Ask the user who reported the issue to explain the symptoms in detail.D、Record what steps should be taken to resolve the issue.
A call logging process would be used by a technician in order to:()A、assign the appropriate status level for the problem.B、create records which enable user authentication.C、help maintain a balanced workload for the help desk technicians.D、identify common problems among many users.
A user calls about a problem with receiving email. After troubleshooting the user’s computer and finding nothing wrong, the technician contacts the email sender and finds out the user gave out their email address incorrectly. Which of the following is the BEST approach in explaining the issue to the user?()A、“Sometimes computers are just strange, but it seems to be working now.”B、“You gave them the wrong address and caused this problem.”C、“The sender had the e-mail address wrong, but they have it correct now and the problem has been resolved.”D、“The SMTP server was not getting a proper resolution of the recipient name field when it was parsing the header.”
A user connects to the companys intranet server via a VPN connection from a small office / home office (SOHO) using the broadband service. One day, the user cannot successfully connect to the VPN and receives an error message that states "Username and password are invalid on the domain." Which of the following should be done to correct this problem?()A、Call the corporate help desk to have the VPN server rebootedB、Re-enter the username and password in the VPN connection and reconnectC、Call the broadband Internet provider to replace the SOHO router with a newer modelD、Ping the corporate VPN server to ensure it is online
Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?()A、Put all other work orders on hold and assist the user with all their computer issues.B、Have another technician take over support calls for this user.C、Explain that the user needs to fill out a work order for the computer problems.D、Ask the user to call another technician for more in-depth assistance.
Your network contains an Active Directory domain. The domain contains three domain controllers. One of the domain controllers fails. Seven days later, the help desk reports that it can no longer create user accounts. You need to ensure that the help desk can create new user accounts. Which operations master role should you seize()A、domain naming masterB、infrastructure masterC、primary domain controller (PDC) emulatorD、RID masterE、schema master
You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003. Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only. All user accounts are located in the default Users container. You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment. What should you do?()A、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B、 Create a toplevel OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D、 Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.
You need to recommend an administrative solution for the help desk technicians that meets the museum’s technical requirements What should you recommend?()A、Add the help desk technicians to the Domain Admins group.B、Add the help desk technicians to the Accounts Operators group.C、Assign permissions for the Groups OU and the Branch1 OU to the help desk technicians.D、Assign permissions for the domain object and the Users container to the help desk technicians.
单选题What is the primary benefit of Single Number Reach?()A Employees can receive calls at their desk and cell phone simultaneously.B Customers can call one number to reach all employees.C Employees can have their calls forwarded to the receptionist.D Customers can call any office number and the receptionist receives the call.
单选题When using the Tivoli Dynamic Workload Console, which monitor tasks are available to the user?()A all those that have been created by all usersB just those created by the user in the current sessionC all those created by the user and shared with user’s login groupD just those where the connection engine specifies the user’s logon
单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()APhishing scamBSocial engineeringCMan-in-the-MiddleDShoulder surfing
单选题You are the help desk manager for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. All help desk technicians are members of the Help Desk Technicians group. They use Remote Assistance to remotely control user sessions to provide online support and training to users. The users currently use Windows Messenger to submit Remote Assistance invitations to the help desk technicians. You want to reduce the time required for help desk technicians to respond to Remote Assistance requests. To accomplish this goal, you want to configure the client computers to allow help desk technicians to establish a Remote Assistance session with a client computer without requiring an invitation from a user. What should you do?()AIn the Default Domain Policy, set the Remote Assistance - Solicited Remote Assistance policy setting to Disabled. BIn the Default Domain Policy, set the Remote Assistance - Offer Remote Assistance policy setting to Enabled and add the Help Desk Technicians group to the Helpers list. CIn each computer's Local Security Policy, grant the Help Desk Technicians group the Allow logon through Terminal Services user right. DIn the System properties for each computer, select the Allow users to connect remotely to this computer option, and add the Help Desk Technicians group to the list of allowed users.
单选题You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003. Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only. All user accounts are located in the default Users container. You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment. What should you do?()A Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B Create a toplevel OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D Create a toplevel OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.
单选题A call logging process would be used by a technician in order to:()Aassign the appropriate status level for the problem.Bcreate records which enable user authentication.Chelp maintain a balanced workload for the help desk technicians.Didentify common problems among many users.
单选题You have an Exchange Server 2010 organization. You have a group named Help Desk that contains all the help desk users in the organization. You need to ensure that the Help Desk group can manage all the mailboxes and mail-enabled contacts in the organization. The solution must minimize the number of permissions assigned to the Help Desk group. Which management role should you assign to the Help Desk group?()AMail RecipientsBMail Recipient CreationCOrganization Client AccessDRecipient Policies
单选题You are a security administrator for your company. The network consists of a single Active Directory domain. Servers run either Windows Server 2003 or Windows 2000 Server. All client computers run Windows XP Professional. The company’s written security policy states that user accounts must be locked if an unauthorized user attempts to guess the users, passwords. The current account policy locks out a user after two invalid password attempts in five minutes. The user remains locked out until the account is reset by an administrator. Users frequently call the help desk to have their account unlocked. Calls related to account lockout constitute 25 percent of help desk calls. You need to reduce the number of help desk calls related to account lockout. What should you do?()A Modify the Default Domain Controllers Policy Group Policy object(GPO). Increase the maximum lifetime for serviceB Modify the Default Domain Policy Group Policy object(GPO). Configure an account lockout threshold of 10.C Modify the Default Domain Controllers Policy Group Policy object(GPO). Disable the enforcement of user logon resD Modify the Default Domain Policy Group Policy object(GPO). Increase the minimum password age.
单选题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()ADownload the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.BProvide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.CAssist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.DConfigure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.
多选题A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()APerform a policy trace for the specific user and review the output to isolate the problem.BReview the Events log.CReview the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.DReview the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.
单选题You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003. A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup. You need to enable the user to log on to the domain. You must ensure that the user retains access to resources. What should you do?()AInstall a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.BDecrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.CPerform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.DRe-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.
单选题A user calls about a problem with receiving email. After troubleshooting the user’s computer and finding nothing wrong, the technician contacts the email sender and finds out the user gave out their email address incorrectly. Which of the following is the BEST approach in explaining the issue to the user?()A“Sometimes computers are just strange, but it seems to be working now.”B“You gave them the wrong address and caused this problem.”C“The sender had the e-mail address wrong, but they have it correct now and the problem has been resolved.”D“The SMTP server was not getting a proper resolution of the recipient name field when it was parsing the header.”
单选题You are the network administrator for The network includes three office locations. Each office has one Windows Server 2003 computer that functions as a file and print server. This server hosts home folders for network users. In each office, a single printer is installed on the file and print server. The local help desk technicians have the necessary permissions to manage printers. A user named King notifies the local help desk that his documents are not printing. A help desk technician finds a list of documents waiting in the print queue. No user can successfully print. The technician cannot delete documents from the queue. You need to restore printing capabilities. What should you do?()AInstall a second instance of the printer. Redirect the original printer to the new printer.BStop and restart the Print Spooler service. Ask users to resubmit the documents for printing.CPause the printer. Reconfigure the print queue to hold mismatched documents. Unpause the printer.DInstall a second instance of the printer. Delete the original printer. Direct King to resubmit the documents for printing.