A user has discovered that even though they are using the latest version of the anti-virus software,the computer is still being infected by a virus. Which of the following is the BEST solution for this problem?()A、Replace the computer.B、Run chkdsk /f.C、Update the virus signatures.D、Run scandisk.
A user has discovered that even though they are using the latest version of the anti-virus software,the computer is still being infected by a virus. Which of the following is the BEST solution for this problem?()
- A、Replace the computer.
- B、Run chkdsk /f.
- C、Update the virus signatures.
- D、Run scandisk.
相关考题:
So far nobody has claimed the money in the library.A. discoveredB. to be discoveredC. discoveringD. having discovered
He is determined to prove his innocence, __________he has to go to the highest court of the country.A. even soB. even nowC. even asD. even if
Daydreaming,science has discovered,is an ______relaxation technique.A. effectiveB. affectiveC. efficientD. affectionate
●The project budget has been finalized.Additional work has been discovered that was not planned for in the budget or project scope.(74) could provide the fund to cover the newly discovered work item.(74) A. Contingency reserveB. Project profitC. Management reserveD. Special fund
The project budget has been finalized.Additional work has been discovered that was not planned for in the budget or project scope. (74) could provide the fund to cover the newly discovered work item.A.Contingency reserveB.Project profitC.Management reserveD.Special fund
A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()A、A custom logo on the user interface pageB、A maximum timeout value of 600 minutesC、A maximum time out value of 1200 minutesD、A default Juniper Networks logo on the user interface page
The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0 You have a local operating system user SKD. You create a database user OPS$SKD, and then assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege. What would youachieve by the above process()A、The database user OPS$SKD will be able to administer the database.B、The authentication detail for the database user OPS$SKD is recorded in the password file.C、The local operating system user SKD will be able to access the database instance without specifying the username and password.D、The database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.
A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A、The user has a UID less than 200B、The user has been defined as an administrative userC、The file /usr/es/sbin/cluster/clpasswd is not executable by the userD、The user needs explicit authorization to change their password cluster-wide
A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user. The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()A、 getCreationTimeB、 invalidateAfterC、 getLastAccessedTimeD、 getMaxInactiveInterval
A user has purchased a laptop that has no means to charge the battery. Which of the followingwould the user MOST likely purchase?()A、USB cableB、AC adapterC、PCMCIA cardD、Replacement battery
All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled
A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugsthe cable into the only available laptop connection, but the connector is loose inside the port. TheMOST likely reason the connector is loose is the:()A、RJ-11 connector needs to be re-crimpedB、User has plugged into the laptop's NIC portC、User has plugged the wrong end of the cable into the portD、RJ-11 connector needs to be replaced with an RJ-45 connector
Which of the following is the BEST way to make sure the network printer is automatically installed when the user logs on?()A、Log onto the user’s computer as a local administrator and install the printer.B、Make sure the user has permission to print to the printer.C、Create and implement a logon script.D、After the user has logged on, install the printer.
A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A、The website has updated the security policies.B、The user’s identity has been stolen.C、The browser has been hijacked.D、The user typed the website address incorrectly.
Which statement is true about the database and database-user used during installation of IMS Server?()A、A preexisting database user may be used but a new database has to be created during installation.B、A preexisting database may be used but a new database user has to be created during installation.C、A preexisting database and user may be used or a new database and user are created during installation.D、A preexisting database and user cannot be used; a new database and user are created during installation.
单选题A user reports that the Windows update function will not run on the computer but the Internet can be accessed. The user is running an original version of Windows XP Professional. Which of the following is MOST likely the cause?()AThe user has not registered the copy of Windows.BThe user has not applied at least Service Pack 1 to their system.CThe user does not know what site to access for the updates.DThe user needs to flush the DNS cache.
单选题A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()AThe website has updated the security policies.BThe user’s identity has been stolen.CThe browser has been hijacked.DThe user typed the website address incorrectly.
单选题A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()AThe user has a UID less than 200BThe user has been defined as an administrative userCThe file /usr/es/sbin/cluster/clpasswd is not executable by the userDThe user needs explicit authorization to change their password cluster-wide
单选题A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()AAgree with the user’s complaintsBClarify the user’s statementsCMinimize the user’s criticismDShadow the other technician on the next repair
多选题Which three statements describe user authentication in Cisco DCNM-LAN? ()ACisco DCNM-LAN server users are local to the Cisco DCNM-LAN server. Creating, changing, and removing Cisco DCNM-LAN server users has no effect on user accounts on managed devices.BA Cisco DCNM-LAN server user that has Administrator privileges can push out changes to managed devices even if the Cisco NX-OS role that is used on the discovered device has the network operator role.CCisco DCNM-LAN user roles restrict the ability of users to make changes to Cisco DCNM-LAN server settings. Cisco NX-OS user roles enforce read/write privileges on the discovered devices.DCisco DCNM-LAN allows you to configure unique credentials for each discovered device or use default credentials when you do not configure unique credentials for a device.ECisco DCNM-LAN can use AAA servers to authenticate users. Only TACACS servers are supported.
单选题A user has discovered that even though they are using the latest version of the anti-virus software,the computer is still being infected by a virus. Which of the following is the BEST solution for this problem?()AReplace the computer.BRun chkdsk /f.CUpdate the virus signatures.DRun scandisk.
单选题A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()AGetcreationtimeBInvalidateafterCGetlastaccessedtimeDGetmaxinactiveinterval
单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()AThe user will be instructed to call the network administrator.BThe user will fail authentication.CThe user will be prompted to install a new device certificate on the MAG Series device.DThe user will successfully authenticate and have full network access.
单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()AThe wireless access point is using MAC address filteringBThe user has connected to a nearby wireless access point from another officeCThe user has configured the wireless settings with the wrong encryption typeDThe wireless access point has SSID broadcast disabled
单选题Which statement is true about the database and database-user used during installation of IMS Server?()AA preexisting database user may be used but a new database has to be created during installation.BA preexisting database may be used but a new database user has to be created during installation.CA preexisting database and user may be used or a new database and user are created during installation.DA preexisting database and user cannot be used; a new database and user are created during installation.
多选题TestKing.com has a SQL Server 2005 computer. You have been assigned the task of retrieving information about a user who is currently logged in. You need to create a function that returns scalar information about the activity time for a particular user. What are two possible ways to achieve this goal?()ACreate a function that returns a list of values that represent the login times for the given user.BCreate a function that returns a list of values that represent the people who have logged more hours than the current user has logged.CCreate a function that returns a numeric value that represents the number of hours that a user has logged for the current day.DCreate a function that returns a numeric value that represents the number of hours that a user has logged for the current month.