单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A Guest user accountB Limited user accountC Power user accountD Administrator user account

单选题
A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()
A

 Guest user account

B

 Limited user account

C

 Power user account

D

 Administrator user account


参考解析

解析: 暂无解析

相关考题:

A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?() A. Warn the userB. Report through proper channelsC. Wipe the driveD. Give the computer back to the user

Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?() A. Put all other work orders on hold and assist the user with all their computer issues.B. Have another technician take over support calls for this user.C. Explain that the user needs to fill out a work order for the computer problems.D. Ask the user to call another technician for more in-depth assistance.

A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? () A. ESD matB. ESD wrist strapC. Sealable plastic bagD. Anti-static bag

A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()A、Check if the user account is lockedB、Check group policyC、Check the drive for fragmentationD、Check NTFS permissions

If a technician needs to convert a hard drive from Basic to Dynamic, which of the following utilities would the technician use?()A、Add Hardware WizardB、Device ManagerC、Computer ManagementD、Disk Management

A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()A、ESD matB、ESD wrist strapC、Sealable plastic bagD、Anti-static bag

Under which of the following circumstances would a technician use IPCONFIG /RENEW?()A、After an unsuccessful rebootB、If a user’s IP address has been spoofedC、After using IPCONFIG /RELEASED、If the computer has an ARP address conflict

A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING

To force a user to use Ctrl-Alt-Delete to log into the computer, a technician can go to Control Panel then:()A、Accessibility options.B、Security Center.C、User accounts and the Advanced tab.D、Windows Firewall.

A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()A、Configuring the Windows Firewall exceptions.B、Using Windows Messenger.C、Configuring My Network Places.D、Using Internet Explorer.

A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?()A、Warn the userB、Report through proper channelsC、Wipe the driveD、Give the computer back to the user

A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A、DHCPB、PATC、ProxyD、IPX

Which of the following tools would a technician use to map a drive to a user’s machine?()A、SSHB、NETUSEC、NETSTATD、SSL

Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?()A、Put all other work orders on hold and assist the user with all their computer issues.B、Have another technician take over support calls for this user.C、Explain that the user needs to fill out a work order for the computer problems.D、Ask the user to call another technician for more in-depth assistance.

The technician needs to map a network share to the user’s Windows 7 computer from thecommand prompt. Which of the following commands will the technician execute?()A、NET SENDB、NET CONFIGC、NET USED、NET NAME

A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A、 Guest user accountB、 Limited user accountC、 Power user accountD、 Administrator user account

单选题A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()ADHCPBPATCProxyDIPX

单选题Which of the following describes the BEST course of action when a user continuously calls atechnician with computer issues instead of the helpdesk?()APut all other work orders on hold and assist the user with all their computer issues.BHave another technician take over support calls for this user.CExplain that the user needs to fill out a work order for the computer problems.DAsk the user to call another technician for more in-depth assistance.

单选题Under which of the following circumstances would a technician use IPCONFIG /RENEW?()AAfter an unsuccessful rebootBIf a user’s IP address has been spoofedCAfter using IPCONFIG /RELEASEDIf the computer has an ARP address conflict

单选题Which of the following commands would a technician MOST likely use to map a printer from aremote computer?()ANET USEBIPCONFIGCNSLOOKUPDTRACERT

单选题The technician needs to map a network share to the user’s Windows 7 computer from thecommand prompt. Which of the following commands will the technician execute?()ANET SENDBNET CONFIGCNET USEDNET NAME

单选题Which of the following tools would a technician use to map a drive to a user’s machine?()ASSHBNETUSECNETSTATDSSL

单选题A technician replaces a computer’s NIC with a wireless card. The user wants to save the NIC.Which of the following should the technician use to preserve the NIC? ()AESD matBESD wrist strapCSealable plastic bagDAnti-static bag

单选题A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()ACheck if the user account is lockedBCheck group policyCCheck the drive for fragmentationDCheck NTFS permissions

单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A Guest user accountB Limited user accountC Power user accountD Administrator user account

单选题A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()ADHCPBARPCDNSDPING

单选题A technician has identified prohibited content on a user’s hard drive. Which of the following should be done NEXT?()AWarn the userBReport through proper channelsCWipe the driveDGive the computer back to the user

单选题A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()AConfiguring the Windows Firewall exceptions.BUsing Windows Messenger.CConfiguring My Network Places.DUsing Internet Explorer.