To access information on the Intemet,a user must first log on to the client computer'S______network.A.serverB.clientC.hostD.self
To access information on the Intemet,a user must first log on to the client computer'S______network.
A.server
B.client
C.host
D.self
相关考题:
Password is a secret series of(73) that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(74). The password helps ensure that(75) users do not access the computer. In addition, data files and programs may require a password.A.symbolB.signC.charactersD.characteristic
A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()A. Connection RequestsB. System ErrorsC. Enforcer EventsD. Enforcer Command Trace
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? () A. Events logB. System logC. User Access logD. Admin Access log
You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()A、The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.B、The user will be mapped to all realms available to the user.C、The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.D、The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A、Events logB、System logC、User Access logD、Admin Access log
You have a single Active Directory directory service domain. You use a Group Policy object (GPO) to apply security settings to your client computers. You configure the startup type for system services settings in a new GPO, and you link the GPO to an organizational unit (OU). You discover that the startup type for system services on one of the client computers has not been updated. You need to ensure that the Group Policy settings are applied to the client computer. What should you do?()A、 Restart the client computer.B、 Instruct the user to log off and then log on to the client computer.C、 On the client computer, run the Gpupdate.exe command with the /Force parameter.D、 On the client computer, run the Gpupdate.exe command with the /Target:computer parameter.
A user in a branch office of your company attempts to join a computer to the domain, but the attempt fails. You need to enable the user to join a single computer to the domain. You must ensure that the user is denied any additional rights beyond those required to complete the task. What should you do()A、Prestage the computer account in the Active Directory domain.B、Add the user to the Domain Administrators group for one day.C、Add the user to the Server Operators group in the Active Directory domain.D、Grant the user the right to log on locally by using a Group Policy Object (GPO).
You are the network administrator for your company. The network consists of a single Active Directory domain. All five domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. The domain's audit policy ensures that all account logon events are audited. A temporary employee named Peter uses a client computer named Client1. When Peter's temporary assignment concludes, his employment is terminated. Now you need to learn the times and dates when Peter logged on to the domain. You need to accomplish this goal by reviewing the minimum amount of information. What should you do?()A、Log on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for Peter's user account.B、Log on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for the Client1 computer account. Use Event Viewer to view the security log on each domain controller. Use the Find option to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.C、Set a filter to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.D、Set a filter to list only the events for the Client1 computer account.
You are the network administrator for . The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional. Multiple users share the same client computer. A server named TestKing2 functions as a file and print server. You set the profile path for all user accounts to //TestKing2/Profiles/username. Some domain users were added to the local Administrators group on the Windows XP Professional computers. A user reports that other users can log on to client computers that he has previously used and gain access to files stored in his My Documents folder on the local hard disk. You need to permanently prevent users from being able to access the My Documents folder of other domain users on the client computers. What should you do?()A、In Active Directory, modify the Default Domain Policy. Disable the Do not check for user ownership of Roaming Profile Folders setting.B、In Active Directory, modify the Default Domain Policy. Enable the Delete cached copies of roaming profiles setting.C、Log on to all client computers and delete all user profiles from the local hard disks.D、Log on to all client computers and configure the Number of previous logons to cache setting to 0.
Your company’s network has client computers that run Windows 7. When a user attempts to log on to the domain from a computer named Client1,she receives the following message: The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect. You need to ensure that the user can log on to the domain from Client1. What should you do?()A、Disjoin and rejoin Client1 to the domain.B、Add the computer account for Client1 to the Domain Computers Active Directory group.C、Reset the account password for Client1 through Active Directory Users and Computers.D、Reset the account password for the user through Active Directory Users and Computers.
You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A、Create an account for Peter's computer in the Computers container.B、Grant the Log on locally user right to Peter's user account.C、Enable Peter's user account.D、Change the properties of Peter's user account so he can log on to any computer.
You are the network administrator for . The network consists of a single Active Directory domain named . All servers run Windows Server 2003. All client computers run Windows XP Professional. The network contains a domain controller named TestKing3. You create a preconfigured user profile on a client computer named TKClient1. You need to ensure that all users receive the preconfigured user profile when they log on to the network for the first time. All users must still be able to personalize their desktop environments. What should you do?()A、From TKClient1, copy the user profile to //TestKing3/netlogon/Default User.B、From TKClient1, copy the user profile to //TestKing3/netlogon/Default User. Change the User Profile path for all users in the Active Directory to //TestKing3/netlogon/Default. User.C、From TKClient1, copy the user profile to the C:/Documents and Settings/Default User folder. Share the Default User profile on the network.D、Create a Folder Redirection policy in Active Directory.
Your company has an Active Directory domain. All consultants belong to a global group named TempWorkers. The TempWorkers group is not nested in any other groups. You move the computer objects of three file servers to a new organizational unit named SecureServers. These file servers contain only confidential data in shared folders. You need to prevent members of the TempWorkers group from accessing the confidential data on the file servers. You must achieve this goal without affecting access to other domain resources. What should you do()A、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this computer froB、Create a new GPO and link it to the domain. Assign the Deny access to this computer from the network user right toC、Create a new GPO and link it to the domain. Assign the Deny log on locally user right to the TempWorkers global gD、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locally user right to
You have a computer that runs Windows XP Professional. Five users share the computer. A user named User1 is a member of the Power Users group and the Administrators group. User1 has encrypted files on the computer. User1 takes an extended leave of absence. You need to ensure that users cannot access the computer as User1. You must be able to provide User1 access to the files upon User1’s return. What should you do?() A、Disable the User1 account.B、Add User1 to the Guests group. C、Reset the password for the User1 account. D、Rename ntuser.dat as ntuser.man in the User1 user profile.
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named Lilli receives a new computer named Client223. She successfully logs on to the domain. The next day, she tries to log on again. The domain name appears in the domain dropdown list in the dialog box. However, Lilli cannot log on. You try to log on by using Client223, but you are also unsuccessful. Then you use a local Administrator account to log on. You read the following error message in the system event log. "NETLOGON Event ID 3210: Failed to authenticate with //Server5, a Windows NT domain controller for domain TestKing". You search the computer account for Client223 in Active Directory Users and Computers, but the account does not appear. You need to ensure that Lilli can log on to the domain successfully. What should you do?()A、Recreate the user account for Lilli and add her to all appropriate security groups.B、Run the netdom reset 'Client223' /domain:'testking' command and then restart Client223.C、Add Client223 to a workgroup. Then join Client223 to the domain.D、Reset the computer account for Server5 in Active Directory Users and Computers.
A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()A、Instruct User1 to create a new user certificate on Computer2.B、Instruct User1 to take ownership of the encrypted files on Computer2.C、Instruct User1 to import the user certificate from Computer1 to Computer2. D、Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.
单选题You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()AThe Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authenticationBThe Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.CThe Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,DThe Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.
单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0. CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.
单选题A technician supports users in a client/server environment. A user suddenly cannot access any network resources. The user tried to logon to a known working computer but was unsuccessful.Which of the following should the technician check FIRST?()ACheck if the user account is lockedBCheck group policyCCheck the drive for fragmentationDCheck NTFS permissions
单选题You are the network administrator for The network consists of a single Active Directory domain named . For security reasons,management decides that a particular user must not be able to log on to the domain after 5:00 P.M. If the user is logged on to the domain at 5:00 P.M., he must be logged off automatically. You configure the Logon Hours setting for the appropriate user account. Thatnight, you verify that the user cannot log on to the domain after 5:00 P.M. The nextday, you notice that the user is still accessing domain resources at 6:00 P.M. Youverify that the time on the user's computer and on the domain controller arecorrect. You need to ensure that the user is logged off automatically if he is still working onthe domain after 5:00 P.M. What should you do?()AIn Active Directory Users and Computers, on the Sessions tab, configure the End Session setting for the user account. Instruct the user to log off from the domain and log on again.BModify the Default Domain Policy GPO to enforce logoff when logon hours expire. Ensure that the user's computer has the latest Group Policy settings applied.CRemove the user's domain account from the local Administrators group on the user's client computer. Instruct the user to log off from the domain and log on again.DUse Computer Management on the domain controller. Restart the Net Logon service.
单选题Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7. You need to implement Encrypting File System (EFS) for all client computers. You want to achieve this goal while meeting the following requirements: èYou must minimize the amount of data that is transferred across the network when a user logs on to or off from a client computer. èUsers must be able to access their EFS certificates on any client computers. èIf a client computer s disk fails, EFS certificates must be accessible What should you do?()AEnable credential roaming.BEnable roaming user profiles.CEnable a Data Recovery Agent.DIssue smart cards to all users.
单选题An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()AConfigure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.BConfigure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.CEnsure that merge roles is selected in the role-mapping rules.DEnsure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.
多选题A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()AConnection RequestsBSystem ErrorsCEnforcer EventsDEnforcer Command Trace
单选题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()ADownload the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.BProvide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.CAssist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.DConfigure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.
单选题You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()AThe user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.BThe user will be mapped to all realms available to the user.CThe Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.DThe endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.
单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons. Which profile must you edit?()AThe SetupUser profileBThe Default User profileCThe Administrator profileDThe System profileEThe All Users profile
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All five domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. The domain's audit policy ensures that all account logon events are audited. A temporary employee named Peter uses a client computer named Client1. When Peter's temporary assignment concludes, his employment is terminated. Now you need to learn the times and dates when Peter logged on to the domain. You need to accomplish this goal by reviewing the minimum amount of information. What should you do?()ALog on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for Peter's user account.BLog on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for the Client1 computer account. Use Event Viewer to view the security log on each domain controller. Use the Find option to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.CSet a filter to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.DSet a filter to list only the events for the Client1 computer account.