A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()A、SpamB、PhishingC、AdwareD、A Trojan
A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()
- A、Spam
- B、Phishing
- C、Adware
- D、A Trojan
相关考题:
From the DX WebUI Dashboard, which steps are used for creating a new admin user? () A. Click Admin Users. Enter username, password, role, account status, and email.B. Click Admin Users. Enter username, password, role, account status, and user class.C. Click Users Manage Users. Enter username, password, role, account status, and user class.D. Click Users Manage Users. Enter username, password, ActiveDirectory domain, account status, and role.
A user selects their proper domain and is unable to log into their Windows computer. The error states: system cannot log you on to the domain because the system‘s computer account in its primary domain is missing or the password on that account is incorrect.Which of the following is the MOST likely cause for this error?()A. The computer‘s account was removed from Active Directory.B. The user‘s account was removed from Active Directory.C. The computer was disjoined from the domain.D. The user typed in the wrong password
Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()A、User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());B、User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());C、User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());D、User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());E、User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());
A technician accesses a corporate users hard drive and notices that there are inappropriate images in their My Documents folder. Accessing this kind of material is a clear violation of company policy. Which of the following should the technician do? ()A、Confront the user and tell them to remove the material.B、Backup the files and delete them from the users folder.C、Inquire with the manager about policies and procedures.D、Ignore the files, this is the users personal documents folder.
A user states that email is not being received. Which of the following protocols should thetechnician check for incoming mail?()A、SMTPB、POP3C、NNTPD、HTTP
Which statement describes the Authentication Proxy feature?()A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
A user selects their proper domain and is unable to log into their Windows computer.The error states:‘System cannot log you on to the domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect’.Which of the following is the MOST likely cause for this error?()A、The computer’s account was removed from Active Directory.B、The user’s account was removed from Active Directory.C、The computer was disjoined from the domain.D、The user typed in the wrong password.
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、 Implement preventative measures.B、 Close the issue.C、 Document the outcome.D、 Question other users to make sure they are not having the same issue.
An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A、Implement preventative measures.B、Close the issue.C、Document the outcome.D、Question other users to make sure they are not having the same issue
An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem. Which of thefollowing is the NEXT step that the administrator should take? ()A、 Create an action plan.B、 Escalate the issue.C、 Reboot the mail server.D、 Document the solution.
A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A、 Guest user accountB、 Limited user accountC、 Power user accountD、 Administrator user account
An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB
Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A、REVOKE ALL PRIVILEGES FROM USER tomB、REVOKE ALL ON EMPLOYEE FROM USER tomC、REVOKE EXECUTE ON EMPLOYEE FROM USER tomD、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
From the DX WebUI Dashboard, which steps are used for creating a new admin user? ()A、Click Admin Users. Enter username, password, role, account status, and email.B、Click Admin Users. Enter username, password, role, account status, and user class.C、Click Users Manage Users. Enter username, password, role, account status, and user class.D、Click Users Manage Users. Enter username, password, ActiveDirectory domain, account status, and role.
How can you verify that you have correctly configured SSH access to your Junos device?()A、user@router# show system servicesB、user@router show configuration servicesC、user@router# show configuration system servicesD、user@router# show system login
Your database initialization parameter file has the following entry: SEC_MAX_FAILED_LOGIN_ATTEMPTS=3 Which statement is true regarding this setting?()A、 It drops the connection after the specified number of login attempts fail for any user.B、 It is enforced only if the password profile is enabled for the user.C、 It locks the user account after the specified number of attempts.D、 It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.
Which statement is true regarding this setting?()A、It drops the connection after the specified number of login attempts fail for any user.B、It is enforced only if the password profile is enabled for the user. C、It locks the user account after the specified number of attempts. D、It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.
. Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You create a new domain user account named User1 and assign the account a password of P@ssw0rd. On the new account, you enable the User must change password at next logon option. A week later, you discover that User1 is still using the password P@ssw0rd to log on to the domain. You need to ensure that User1 is forced to use a different password the next time she changes her password. What should you do first? ()A、In the Default Domain Policy, select Enforce password history.B、In the Default Domain Policy, select Passwords must meet complexity requirements.C、From the User’s account properties, select Account is sensitive and cannot be delegated.D、From the User’s account properties, select Store password using reversible encryption.
Your network contains an Active Directory domain. A user named User1 takes a leave of absence for one year. You need to restrict access to the User1 user account while User1 is away. What should you do()A、From the Default Domain Policy, modify the account lockout settings.B、From the Default Domain Controller Policy, modify the account lockout settings.C、From the properties of the user account, modify the Account options.D、From the properties of the user account, modify the Session settings.
You install Microsoft Windows Vista on a computer. You will share the computer with another user. You need to prevent the user from making unauthorized changes to the computer. What should you do? ()A、Add the user to the Guests group.B、Create a standard user account for the user.C、Create an administrator account for the user.D、Add the user to the Remote Desktop Users group.
单选题An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()A Implement preventative measures.B Close the issue.C Document the outcome.D Question other users to make sure they are not having the same issue.
单选题Which statement is true regarding this setting?()AIt drops the connection after the specified number of login attempts fail for any user.BIt is enforced only if the password profile is enabled for the user. CIt locks the user account after the specified number of attempts. DIt drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.
单选题A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()ASpamBPhishingCAdwareDA Trojan
单选题An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()AAs the root user from serverA run the command rhost serverBBAs the root user from serverA run the command rlogin serverBCAs the desired user from serverB run the command rhost serverADAs the desired user from serverA run the command rlogin serverB
单选题A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()APhishingBSmurf attackCDenial of serviceDMan-in-the-middle
单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A Guest user accountB Limited user accountC Power user accountD Administrator user account
单选题Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()AUser user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());BUser user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());CUser user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());DUser user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());EUser user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());