A remote user is trying to telnet to the production server. The session is getting a timeout error. Which command should the user issue to verify the network connection?()A、iptraceB、nslookupC、netstatD、traceroute
A remote user is trying to telnet to the production server. The session is getting a timeout error. Which command should the user issue to verify the network connection?()
- A、iptrace
- B、nslookup
- C、netstat
- D、traceroute
相关考题:
Which of the following is the access level of a user that belongs to both the Administrators andUsers groups?() A. UserB. AdministratorC. Power UserD. Remote Desktop User
A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read
Your network consists of a single Active Directory domain. Remote Assistance is enabled on all computers.You need to ensure that you can establish Remote Assistance connections to all computers without a Remote Assistance invitation.Which group policy setting should you configure? ()A. Offer Remote AssistanceB. Solicited Remote AssistanceC. Allow users to connect remotely using Terminal ServicesD. Sets rules for remote control of Terminal Services user sessions
You have a stand-alone server named Server1 that runs Windows Server 2003 Service Pack (SP2).A user attempts to connect to the server by using Remote Desktop Connection and receives the following error message.You need to ensure that the user can log on to the server by using Remote Desktop Connection.What should you do?()A. On Server1, modify the Remote Control settings for the user account.B. On Server1, modify the Remote Access Permission settings for the user account.C. Instruct the user to log on to Server1 locally and then to change her password.D. Instruct the user to log on to another computer and then connect to Server1 by using Remote Desktop Connection.
A support technician wants to help a user, in a different city, navigate a new software program. Which of the following will allow the user and technician to view and control the Windows XP PC desktop simultaneously?()A、Terminal ServicesB、Remote AssistanceC、Routing and Remote Access ServiceD、Remote Desktop
Which of the following groups is BEST to assign to a home user to prevent software installation?()A、UsersB、AdministratorsC、Power UsersD、Remote Desktop Users
Which of the following is the access level of a user that belongs to both the Administrators andUsers groups?()A、UserB、AdministratorC、Power UserD、Remote Desktop User
Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2. All remote users use mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack (MSFP). A remote user reports the loss of a Windows Mobilebased device. You need to ensure that the information from the Microsoft Exchange ActiveSync (EAS) server is no longer available on the Windows Mobilebased device. What should you do?()A、Recreate the Active Directory remote user account.B、Perform a remote wipe on the Windows Mobilebased device of the remote user.C、On the Properties tab of the remote user account, disable the user-initiated synchronization option.D、On the Device Security Settings tab, configure the Wipe device after failed attempts option to a value of zero.
A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()A、reflexiveB、extendedC、standardD、dynamic
A company is looking to improve upon their current remote management capabilities. Thecompany must ensure that access is removed from all systems when a user is terminated and that administrators can remotely manage a system’s BIOS. Which of the following remote management systems would support both these requirements?()A、Remote management cardB、Terminal servicesC、Remote desktopD、LDAP enabled IP KVM
A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer. Which of the following would be another way for the user to send the Remote Assistance invitation? ()A、Configuring the Windows Firewall exceptions.B、Using Windows Messenger.C、Configuring My Network Places.D、Using Internet Explorer.
A user wants to be able to receive help from a coworker that is located outside the company’s local office. Which of the following MUST be enabled to allow the user to watch and interact with the coworker simultaneously?()A、Remote DesktopB、TelnetC、Computer ManagementD、Remote Assistance
Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
A user has a computer that runs Windows XP Professional. The user attempts to connect to the computer by using a Remote Desktop Connection and receives the following error message: “The local policy of the system does not permit you to log on interactively.” You need to ensure that the user can log on to the computer by using a Remote Desktop Connection. What should you do?() A、From the System settings, disable Remote Assistance.B、Add the user's account to the Remote Desktop Users group. C、From Windows Firewall, modify the scope of the Remote Desktop exception. D、Set the Remote Desktop Help Session Manager service Startup type to Automatic, and then start the service.
Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A、the Netsh toolB、the Network Policy Server consoleC、the Registry EditorD、the Routing and Remote Access console
You install Microsoft Windows Vista on a computer. You will share the computer with another user. You need to prevent the user from making unauthorized changes to the computer. What should you do? ()A、Add the user to the Guests group.B、Create a standard user account for the user.C、Create an administrator account for the user.D、Add the user to the Remote Desktop Users group.
单选题You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2. All remote users use mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack (MSFP). A remote user reports the loss of a Windows Mobilebased device. You need to ensure that the information from the Microsoft Exchange ActiveSync (EAS) server is no longer available on the Windows Mobilebased device. What should you do?()ARecreate the Active Directory remote user account.BPerform a remote wipe on the Windows Mobilebased device of the remote user.COn the Properties tab of the remote user account, disable the user-initiated synchronization option.DOn the Device Security Settings tab, configure the Wipe device after failed attempts option to a value of zero.
单选题Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()Athe Netsh toolBthe Network Policy Server consoleCthe Registry EditorDthe Routing and Remote Access console
单选题Your network consists of a single Active Directory domain. Remote Assistance is enabled on all computers. You need to ensure that you can establish Remote Assistance connections to all computers without a Remote Assistance invitation. Which group policy setting should you configure? ()AOffer Remote AssistanceBSolicited Remote AssistanceCAllow users to connect remotely using Terminal ServicesDSets rules for remote control of Terminal Services user sessions
多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.CIf a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.DIf a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
多选题Which two statements are true regarding firewall user authentication?() (Choose two.)AWhen configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.CIf a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .DIf a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
单选题You have a computer that runs Windows XP Professional Service Pack 2 (SP2). A remote user has a computer that runs Windows XP Professional SP2. The remote user experiences several errors while attempting to install an application. You need to remotely observe the actions the user performs. What should you do first?()AInstruct the user to send you a Remote Assistance invitation. BInstruct the user to start the Remote Desktop Help Session Manager service.CAt the command prompt, establish a telnet session to the user's computer. DEnable a Remote Desktop and establish a Remote Desktop Connection. Log on by using the local administrator account.
单选题Which of the following should a technician instruct a user to do to initiate Remote Assistance for a user running Windows XP Professional?()ANetwork Neighborhood navigate to the users computer right click select Offer Remote AssistanceBGo to Help and Support Center Pick a Task Use Tools Offer Remote AssistanceCRun Remote Desktop Connection Select Connect to User Enter the IP addressDStart Programs Administrative Tools Remote Assistance
单选题A remote user cannot connect to the office via VPN. The user has established Internet connectivity. Which of the following is the MOST likely next step in troubleshooting?()APower cycle the VPN concentrator at the office.BDetermine if the VPN service is running at the office.CReinstall the VPN client at the remote computer.DDetermine if the user has the correct VPN address and password.