A user connects to the companys intranet server via a VPN connection from a small office / home office (SOHO) using the broadband service. One day, the user cannot successfully connect to the VPN and receives an error message that states "Username and password are invalid on the domain." Which of the following should be done to correct this problem?()A、Call the corporate help desk to have the VPN server rebootedB、Re-enter the username and password in the VPN connection and reconnectC、Call the broadband Internet provider to replace the SOHO router with a newer modelD、Ping the corporate VPN server to ensure it is online
A user connects to the companys intranet server via a VPN connection from a small office / home office (SOHO) using the broadband service. One day, the user cannot successfully connect to the VPN and receives an error message that states "Username and password are invalid on the domain." Which of the following should be done to correct this problem?()
- A、Call the corporate help desk to have the VPN server rebooted
- B、Re-enter the username and password in the VPN connection and reconnect
- C、Call the broadband Internet provider to replace the SOHO router with a newer model
- D、Ping the corporate VPN server to ensure it is online
相关考题:
In enterprises, the gateway is the computer that(71) the traffic from a workstation to the outside network that is serving the Web pages. In homes ,the gateway is the(72) that connects the user to the internet.A.findsB.searchesC.routesD.tracks
When a non-root user connects to a JUNOS platform and enters a username and password, the user is immediately placed at which level?() A.UNIX shellB.user level CLIC.configuration modeD.operational mode
Which of the following is the MOST accurate description of a L2/L3 switch?() A. Performs switching and routing dutiesB. A router that directly connects to a switchC. A multi-purpose switch fabric used in full mesh environmentsD. A switch that directly connects to a router
You have a standalone server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You install the FTP Server Windows component on Server1. You create several folders under the Ftproot folder as shown in the exhibit. (Click the Exhibit button.)A user named User1 connects to ftp://server1 and reports that he can view the Localuser folder and all of its subfolders. A user named User2 reports the same problem.You need to ensure that when users connect to ftp://server1, they can only view the content located under their user folder.What should you do? ()A. From the properties of the Default FTP Site, change the directory listing style to Unix.B. From the properties of the Default FTP Site, change the FTP site directory to c:\inetpub\ftproot\localuser.C. From the properties of each user account, modify the home folder. Remove the Users group from the access control list of c:\inetpub\ftproot.D. Delete the Default FTP Site. Create a new FTP site. Select the option to isolate users and specify the FTP site directory of c:\inetpub\ftproot.
In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.A.cooperatesB.coordinates C.connects D.mediates
A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted
When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A、An error will occur.B、Data passed between the client and the server is encrypted.C、User IDs and passwords are passed to the server unencrypted.D、User IDs and passwords are encrypted before they are passed to the server.
Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()A、User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());B、User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());C、User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());D、User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());E、User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());
A user typically connects to the Internet in one of two ways: dedicated access and()access.A、 broadcastingB、 point-to-pointC、 dial-upD、 Internet
如果想要在JSP中使用user包中的User类,则以下写法正确的是()。 A、 jsp:useBean id="user" class="user.User" scope="page"/B、 jsp:useBean class="user.User.class" / C、 jsp:useBean name="user" class="user.User"/D、 jsp:useBean id="user" class="User" import="user.* "/
在JSP中要使用user包中的User类,则以写法正确的是()。A、〈jsp:useBean id="user" class="user.User" scope="page"/〉B、〈jsp:useBean class="user.Use.class"/〉C、〈jsp:useBean name="user" class="user.User"/〉D、〈jsp:useBeam id="user" class="user" import="user.*"/〉
Which statement is true about Foreign Exchange Station (FXS) ports on a router?()A、The FXS interface allows an analog connection to be directed at the public switched telephone network (PSTN’s) central office.B、The FXS interface connects directly to a standard telephone,fax machine,or similar device and supplies ring,voltage,and dial tone.C、The FXS interface connects directly to an IP phone and supplies ring,voltage,and dial tone.D、The FXS interface connects directly to ISDN voice channels.
Which of the following is the MOST accurate description of a L2/L3 switch?()A、Performs switching and routing dutiesB、A router that directly connects to a switchC、A multi-purpose switch fabric used in full mesh environmentsD、A switch that directly connects to a router
When a non-root user connects to a JUNOS platform and enters a username and password, the user is immediately placed at which level?()A、UNIX shellB、user level CLIC、configuration modeD、operational mode
Which three statements are true about memory buffer allocation by a MySQL Server?()A、Global buffers such as the InnoDB buffer pool are allocated after the server starts, and are never freedB、Thread buffers are allocated when a client connects, and are freed when the client disconnectsC、Buffers that are needed for certain operation are allocated when the operation starts, and freed when it endsD、User buffers are allocated at server startup and freed when the user is droppedE、All dynamic buffers that are set with a SET GLOBAL statement immediately get allocated globally, and are never freed
An application connects to a SQL Azure database. The application occasionally loses the connection to the SQL Azure database. You need to recommend an approach for reliably completing data access operations. What should you recommend?() A、 Use Microsoft ADO.NET connection pooling.B、 Pass exceptions to the user interface layer.C、 Implement a retry policy in the data access layer.D、 Begin a transaction before each data access operation.
TS1 is a server running Windows Server 2008 and Terminal Services. Users in your organization connectto the server TS1 to run a line-of-business application. Recently, you have noticed that user profiles arethreatening to consume the total disk capacity on TS1. You want users to be able to save their own data,but you also want to prevent profiles from exhausting the total storage capacity of the disk on TS1. Whatshould you do?()A、Use Group Policy to assign mandatory profiles to users who connect to TS1.B、Configure disk quotas for the disk on TS1 on which user profiles are stored.C、Use Group Policy to assign Terminal Services roaming user profiles to users who connect to TS1.D、Configure disk quotas for the local disk of each user who connects to TS1.
Your network contains two Web servers named Web1 and Web2. Web1 hosts the companys corporate Web site. Web2 is a test server that contains a copy of the Web site.Users connect to Web1 by using the URL http://www.contoso.com.A Web developer named User1 plans to test updates to the Web site on Web2.You need to ensure that User1 connects to Web2 by using the URL http://www.contoso.com. The solution must ensure that all other computers connect to Web1.What should you do?()A、From User1s computer, create a record in the Hosts file.B、From User1s computer, create a record in the Lmhosts file.C、From a DNS server, create a new Host (A) resource record.D、From a DNS server, create a new Alias (CNAME) resource record.
单选题Which statement about L2VPN Pseudowire Switching is not true?()AL2VPN Pseudowire Switching allows the user to extend L2VPN Pseudowires across an inter-AS boundaryBL2VPN Pseudowire Switching allows the user to extend L2VPN Pseudowires across two separate MPLS networksCQuality of service is not supported per PseudowireDL2VPN Pseudowire Switching connects two or more contiguous Pseudowires segments to from an end-to-end multihop PseudowireEThe Cisco MPLS Traffic Engineering tunnel selection is not supported
单选题如果想要在JSP中使用user包中的User类,则以下写法正确的是()。A jsp:useBean id=user class=user.User scope=page/B jsp:useBean class=user.User.class / C jsp:useBean name=user class=user.User/D jsp:useBean id=user class=User import=user.* /
单选题在JSP中要使用user包中的User类,则以写法正确的是()。A〈jsp:useBean id=user class=user.User scope=page/〉B〈jsp:useBean class=user.Use.class/〉C〈jsp:useBean name=user class=user.User/〉D〈jsp:useBeam id=user class=user import=user.*/〉
单选题You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()AInstruct User2 to add a delegateBInstruct User2 to send a signed e-mail message to User1.CInstruct User1 to send a signed e-mail message to User2.DInstruct User1 to modify the sensitivity settings of the e-mail message
单选题When a non-root user connects to a JUNOS platform and enters a username and password, the user is immediately placed at which level?()AUNIX shellBuser level CLICconfiguration modeDoperational mode
单选题The telegraph is the()(设备)that connects the engine room and the bridge.AgearBequipmentCengineDsextant
单选题Which statement is true regarding Oracle Shared Server architecture?()AA dispatcher can support multiple client connects concurrently while a shared server process can be dedicated to only one dispatcher. BUnder the Oracle Shared Server architecture, client-user processes connect to shared user processes.CEach dispatcher has its own request queue, which is monitored every three seconds by the dispatcher. DOracle Shared Server required Oracle Net Service even if the client and shared server processes reside on the same machine.
单选题You configure Outlook Web App (OWA) to require SSL.A user named User1 reports that when she connects to OWA, she receives a Web site security certificate warning message.You need to prevent User1 from receiving the warning message when she connects to OWA. What should you do?()AOn User1’s computer, install the erver’s root certificate into the Trusted Root CertificatioAuthorities store.BOn the Client Access server, install the server’s root certificate into the Trusted RooCertification Authorities store.CFrom the Exchange Management Console (EMC), assign an Outlook Web App mailbox policy to User1.DFrom the Exchange Management Console (EMC), open owa (Default Web Site) Properties. Configure the logon format to use the user principal name (UPN).
单选题Which of the following is the MOST accurate description of a L2/L3 switch?()APerforms switching and routing dutiesBA router that directly connects to a switchCA multi-purpose switch fabric used in full mesh environmentsDA switch that directly connects to a router