A user uses both a Microsoft Windows Mobile 5.0 Smartphonebased device  and a Microsoft Windows Mobile 5.0 Pocket PC Phone Edition device for Over-The-Air (OTA) e-mail. Both devices have Microsoft Messaging and Security Feature Pack installed.   A remote wipe command is issued against the Pocket PC device.   The user reconfigures the ActiveSync settings on the Pocket PC device. When the user attempts synchronization, the device hard-resets again.   You need to ensure that the user can synchronize the Pocket PC device.   What should you do?()A、Cancel the remote wipe issued against the Pocket PC device.B、Instruct the user to configure only one device for ActiveSync.C、Instruct the user to perform a soft-reset of the Pocket PC device.D、Instruct the user to perform a manual hard-reset of the Pocket PC device.

A user uses both a Microsoft Windows Mobile 5.0 Smartphonebased device  and a Microsoft Windows Mobile 5.0 Pocket PC Phone Edition device for Over-The-Air (OTA) e-mail. Both devices have Microsoft Messaging and Security Feature Pack installed.   A remote wipe command is issued against the Pocket PC device.   The user reconfigures the ActiveSync settings on the Pocket PC device. When the user attempts synchronization, the device hard-resets again.   You need to ensure that the user can synchronize the Pocket PC device.   What should you do?()

  • A、Cancel the remote wipe issued against the Pocket PC device.
  • B、Instruct the user to configure only one device for ActiveSync.
  • C、Instruct the user to perform a soft-reset of the Pocket PC device.
  • D、Instruct the user to perform a manual hard-reset of the Pocket PC device.

相关考题:

Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?A.FTPB.TFTPC.SMTPD.TelnetE.DNS

The color display will use both chrominance and luminance information. A black and white display uses(74).A.neither of the two componentsB.the chrominance componentC.the luminance componentD.both of the twocomponents

Which of the following is the access level of a user that belongs to both the Administrators andUsers groups?() A. UserB. AdministratorC. Power UserD. Remote Desktop User

User2 is complaining that he is unable to list the contents of a directory. What is the most likely cause?() A. User2 needs write permission to the directory.B. User2 needs both read and write permissions to the directory.C. User2 needs both read and execute permissions to the directory.D. User2 needs both write and execute permissions to the directory.

Which of the following features work the same in both RIP- 2 and RIPng?() A. Distance Vector Logi cB. Uses UDPC. Uses RIP - specific authenticationD. Maximum useful metric of 15E. Automatic route summarization

Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital (_______) to be placed on messages. A digital signature uses the sender's private key to encrypt some portion of the message. When the message is received, the receiver uses the sender's () key tp decipher the digital signature to verify the sender's identity.横线处应选( )。 A. interpretationB.signaturesC. encryptionD.decryption

Which of the following features work the same in both RIP- 2 and RIPng?()A、Distance Vector Logi cB、Uses UDPC、Uses RIP - specific authenticationD、Maximum useful metric of 15E、Automatic route summarization

Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()A、 LWAPP encrypts control traffic between the AP and the controller.B、 LWAPP encrypts user traffic with a x.509 certificate using AES-CCMPC、 LWAPP encrypts both control traffic and user data.D、 When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.

Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?()A、FTPB、TFTPC、SMTPD、TelnetE、DNS

Which two statements are true about optical networks?()A、SONET and SDH both use time-division multiplexing.B、An optical transport network system uses time-division multiplexing.C、SONET and SDH both use wavelength-division multiplexing.D、An optical transport network system uses wavelength-division multiplexing.

You work as a database administrator for Supportcenter.cn. One of the user sessions was terminated abnormally in the middle of a transaction. What does Oracle database do to recover it?()A、Uses undo data for roll forwardB、Uses Flashback Log for recoveryC、Uses online redo logs to roll backD、Uses undo data to roll back the transactionE、Uses Recovery Manager (RMAN) to roll backF、Uses the System Monitor (SMON) background process to perform instance recovery

A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user.  The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession.  Which method in HttpSession is used to accomplish this?()A、 getCreationTimeB、 invalidateAfterC、 getLastAccessedTimeD、 getMaxInactiveInterval

A user in your company has a laptop, which he uses both, on and off the network. You want to change the users profile to roaming but when you attempt to change the setting, the Roaming profile option is grayed out. How can you change the laptop users profile to roaming?()A、In Control Panel, System, User Profiles Tab, change profile to roaming.B、Have him log back into the network.C、Change the Profile to a Mandatory User Profile.D、Change the profile to a Mandatory Roaming Profile.

Which statement about the Lightweight Access Point Protocol (LWAPP) is true? ()A、 LWAPP encrypts both control traffic and user data.B、 LWAPP encrypts user traffic with an x.509 certificate using AES-CCMP.C、 When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco  Aironet APs.D、 LWAPP encrypts control traffic between the AP and the controller.E、 None of the other alternatives apply.

Which of the following wiring distribution components uses a bridge clip to connect both sides ofthe block?()A、110 blockB、DemarcC、Smart jackD、66 block

User2 is complaining that he is unable to list the contents of a directory. What is the most likely cause?()A、User2 needs write permission to the directory.B、User2 needs both read and write permissions to the directory.C、User2 needs both read and execute permissions to the directory.D、User2 needs both write and execute permissions to the directory.

Companycom LPAR that is using a Virtual IO Server needs to be more highly available. How can this be accomplished using APV features?()A、Reallocate the Virtual IO Server disks to the user LPARB、Create a stripe-group within the Virtual IO Server to protect against disk failureC、Reconfigure the user LPAR to use both locally owned disk and a Virtual SCSI diskD、Create a second Virtual IO Server and reconfigure the user LPAR to mirror across both Virtual IO Servers

One of the user sessions was terminated abnormally in the middle of a transaction. What does Oracle database do to recover it?()A、uses undo data for roll forwardB、uses Flashback Log for recoveryC、uses online redo logs to roll backD、uses undo data to roll back the transactionE、uses Recovery Manager (RMAN) to roll backF、uses the System Monitor (SMON) background process to perform instance recovery

You set the undo pool resource plan directive for the consumer group named DSS_USERS that is assigned to the DAY_SHIFT plan. The database users, SCOTT and BLAKE, belong to the DSS_USERS resource group. The user, SCOTT, initiates a database session and executes a batch operation that inserts millions of rows into the HISTORY table. Which two options are true if the total undo space allocated to the DSS_USERS group exceeds the value specified in the undo pool resource plan directive?()A、 The batch operation started by the user, SCOTT, terminates with an error.B、 The batch operation started by the user, SCOTT, hangs and you are required to increase the undo pool resource plan directive.C、 The batch operation started by the user, SCOTT, runs uninterrupted because the database uses the SYSTEM tablespace for the undo operation.D、 The user, BLAKE, cannot start a transaction that uses any DML operations until you increase the value of the undo pool resource plan directive.E、 The user BLAKE can start a transaction that uses any DML operations after the batch operation started by the user, SCOTT, terminates with an error.

A user named User1 uses a computer that runs Windows XP Professional. You need to enable User1 to create local user accounts. You must minimize the rights assigned to the User1 account.  Which group should you add User1 to?() A、AdministratorsB、Power UsersC、Users D、Network Configuration Operators

You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   The company security policy requires complex passwords on all the Microsoft Windows Mobilebased devices.   You provide a Microsoft Windows Mobile 5.0 smartphonebased device to a new user. The first time the user uses the device, the user is not prompted for a password. You need to ensure that the user is prompted for a password.   What should you do?()A、Instruct the user to set a PIN on the mobile device.B、Instruct the user to perform Microsoft Exchange ActiveSync synchronization Over-The-Air (OTA).C、On the Device Security Settings tab, select the Require both numbers and letters option.D、Add the user account of the user to the Exceptions list on the Device Security Settings tab.

单选题Which of the following is the access level of a user that belongs to both the Administrators andUsers groups?()AUserBAdministratorCPower UserDRemote Desktop User

单选题Which of the following protocols uses both TCP and UDP ports?()ASMTPBTelnetCFTPDDNS

单选题Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?()AFTPBTFTPCSMTPDTelnetEDNS

单选题Which statement about the Lightweight Access Point Protocol (LWAPP) is true? ()A LWAPP encrypts both control traffic and user data.B LWAPP encrypts user traffic with an x.509 certificate using AES-CCMP.C When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco  Aironet APs.D LWAPP encrypts control traffic between the AP and the controller.E None of the other alternatives apply.

单选题Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()A LWAPP encrypts control traffic between the AP and the controller.B LWAPP encrypts user traffic with a x.509 certificate using AES-CCMPC LWAPP encrypts both control traffic and user data.D When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.

多选题Which two statements are true about optical networks?()ASONET and SDH both use time-division multiplexing.BAn optical transport network system uses time-division multiplexing.CSONET and SDH both use wavelength-division multiplexing.DAn optical transport network system uses wavelength-division multiplexing.