A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugsthe cable into the only available laptop connection, but the connector is loose inside the port. TheMOST likely reason the connector is loose is the:()A、RJ-11 connector needs to be re-crimpedB、User has plugged into the laptop's NIC portC、User has plugged the wrong end of the cable into the portD、RJ-11 connector needs to be replaced with an RJ-45 connector
A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugsthe cable into the only available laptop connection, but the connector is loose inside the port. TheMOST likely reason the connector is loose is the:()
- A、RJ-11 connector needs to be re-crimped
- B、User has plugged into the laptop's NIC port
- C、User has plugged the wrong end of the cable into the port
- D、RJ-11 connector needs to be replaced with an RJ-45 connector
相关考题:
The DBA issues this SQL command: CREATE USER scott IDENTIFIED by tiger; What privileges does the user Scott have at this point?() A. no privilegesB. only the SELECT privilegeC. only the CONNECT privilegeD. all the privileges of a default user
The DBA issues this SQL command:What privileges does the user Scott have at this point?() A. No privileges.B. Only the SELECT privilege.C. Only the CONNECT privilege.D. All the privileges of a default user.
A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read
Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?() A.REVOKE ACCESS ON DATABASE FROM USER bobB.REVOKE CONNECT ON DATABASE FROM USER tomC.REVOKE tom FROM ACCESS ON DATABASE BY USER bobD.REVOKE tom FROM CONNECT ON DATABASE BY USER bob
You have a stand-alone server named Server1 that runs Windows Server 2003 Service Pack (SP2).A user attempts to connect to the server by using Remote Desktop Connection and receives the following error message.You need to ensure that the user can log on to the server by using Remote Desktop Connection.What should you do?()A. On Server1, modify the Remote Control settings for the user account.B. On Server1, modify the Remote Access Permission settings for the user account.C. Instruct the user to log on to Server1 locally and then to change her password.D. Instruct the user to log on to another computer and then connect to Server1 by using Remote Desktop Connection.
Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()A、Enable file and print shareB、FTPC、VPND、Map a drive
Which step do you need to perform to enable a user with the SYSDBA privilege to log in as SYSDBA in iSQL*Plus?()A、The user must be granted the database administrator (DBA) privilege.B、The user must be listed in the password file for the authentication.C、No special setup is needed for the user to connect as SYSDBA in iSQL*Plus.D、Set up a user in the Oracle Application Server Containers for J2EE (OC4J) user manager,and grant the webDba role to the user.
A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read
A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()A、Four port switchB、Four port wireless routerC、Four port WAPD、Four port hub
A Denial of Service (DoS) attack is:()A、an attempt to bring down a website or other online service.B、a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.C、stealing a user’s identity and making changes to their accounts.D、an attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.
Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob
A user wants to connect to the database instance from an application that is running on a remote machine. Which tools should the DBA use to establish the required configuration to ensure that the user is able to connect to the database instance?()A、Data PumpB、Oracle Net ManagerC、Oracle Enterprise ManagerD、Oracle Universal Installer (OUI)E、Database Configuration Assistant (DBCA)
The DBA issues this SQL command:CREATE USER scott IDENTIFIED by tiger;What privileges does the user Scott have at this point?()A、no privilegesB、only the SELECT privilegeC、only the CONNECT privilegeD、all the privileges of a default user
The DBA issues this SQL command: CREATE USER scott IDENTIFIES by tiger; What privileges does the user Scott have at this point? ()A、No privileges.B、Only the SELECT privilege.C、Only the CONNECT privilege.D、All the privileges of a default user.
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. All users have Windows Mobile 6.5 devices that connect to the organization by using Exchange ActiveSync. A user named User1 reports that she lost her device and successfully performed a remote wipe of the device. User1 later reports that she located her device. User1 configures the device to connect to Exchange ActiveSync and discovers that the connection fails. You need to ensure that User1 can connect her device by using Exchange ActiveSync. What should you do?()A、Instruct User1 to perform a hardware reset on the device.B、Instruct User1 to use the Exchange Control Panel (ECP) to modify the device list.C、Run the Set-ActiveSyncDeviceAccessRule cmdlet from the Exchange Management Shell.D、Instruct User1 to change her user account password.
单选题You are ready to implement RMAN in the backup and recover strategy for your company. Which system privilege must the RMAN user have to be able to connect and execute RMAN commands on a target database?()ASYSDBABSYSOPERCNo system privileges are required for the RMAN user.DOnly SYS user can connect and execute RMAN commands on a target database.
单选题You are attempting to clear an unarchived redo log file. In order to manually enact a log switch, which of the following statements is appropriate?()AALTER DATABASE BALTER SYSTEM CALTER USER DALTER REDO LOG
单选题The DBA issues this SQL command: CREATE USER scott IDENTIFIED by tiger; What privileges does the user Scott have at this point?()Ano privilegesBonly the SELECT privilegeConly the CONNECT privilegeDall the privileges of a default user
单选题A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugsthe cable into the only available laptop connection, but the connector is loose inside the port. TheMOST likely reason the connector is loose is the:()ARJ-11 connector needs to be re-crimpedBUser has plugged into the laptop's NIC portCUser has plugged the wrong end of the cable into the portDRJ-11 connector needs to be replaced with an RJ-45 connector
多选题A user wants to connect to the database instance from an application that is running on a remote machine. Which tools should the DBA use to establish the required configuration to ensure that the user is able to connect to the database instance?()AData PumpBOracle Net ManagerCOracle Enterprise ManagerDOracle Universal Installer (OUI)EDatabase Configuration Assistant (DBCA)
多选题An administrator account is granted the CREATE SESSION and SET CONTAINER system privileges. A multitenant container database (CDB) instant has the following parameter set: THREADED_EXECUTION = FALSE Which four statements are true about this administrator establishing connections to root in a CDB that has been opened in read only mode?()AYou can conned as a common user by using the connect statement.BYou can connect as a local user by using the connect statement.CYou can connect by using easy connect.DYou can connect by using OS authentication.EYou can connect by using a Net Service name.FYou can connect as a local user by using the SET CONTAINER statement.
单选题An employee cannot access the company database. You check the connection variables: What is a valid explanation for why one of the users is unable to connect to the database?()A Bob has max_user_connections set to zero, which blocks all his connectionsB Joe has exceeded the max_user_connections global limitC All users are blocked because max_user_connections is accumulated over the host account informationD Kay is already connected elsewhere and attempting to log in againE Connect_timeout is too small to allow a connection to occur
单选题A Denial of Service (DoS) attack is:()Aan attempt to bring down a website or other online service.Ba prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.Cstealing a user’s identity and making changes to their accounts.Dan attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.
单选题You are attempting to connect to your ISP. You view the status change from Dialing to Verifying user name and password. After several seconds, the status changes to Disconnecting. You are then disconnected from the computer you dialed. You verify that your user name and password are entered correctly. You want to enable your Computer to connect to your ISP correctly. What should you do? ()AConfigure your connection to enable data encryption.BConfigure your connection to use the UNIX SLIP server.CConfigure your connection to allow unsecured passwords.DInstruct your ISP to configure your account to support Multilink.
单选题The DBA issues this SQL command: CREATE USER scott IDENTIFIES by tiger; What privileges does the user Scott have at this point? ()ANo privileges.BOnly the SELECT privilege.COnly the CONNECT privilege.DAll the privileges of a default user.
单选题Under the Oracle Shared Server architecture, client-user processes ultimately connect to a()AserviceBlistenerCdispatcherDshared server process
多选题A user in the accounting department reports that their office is able to connect to the network, but they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).APhysical network diagramBJob logCAcceptable use policyDBaseline documentationEWiring schematic