单选题A Denial of Service (DoS) attack is:()A an attempt to bring down a website or other online service.B a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.C stealing a user’s identity and making changes to their

题目
单选题
A Denial of Service (DoS) attack is:()
A

an attempt to bring down a website or other online service.

B

a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.

C

stealing a user’s identity and making changes to their accounts.

D

an attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.


相似考题
更多“单选题A Denial of Service (DoS) attack is:()A an attempt to bring down a website or other online service.B a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.C stealing a user’s identity and making changes to their”相关问题
  • 第1题:

    Which software-based security threat is typically spread from user to user via e-mail?()

    • A、Virus
    • B、Trojan horse
    • C、Denial of service
    • D、Data interception

    正确答案:A

  • 第2题:

    A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()

    • A、Remotely connect to the user's laptop and review the network configuration settings
    • B、Ping the web server from inside the network to ensure it is still up and running.
    • C、Check to make sure the company's website is accessible from the Internet.
    • D、Ensure the Ethernet cable is securely plugged into the user's laptop

    正确答案:C

  • 第3题:

    You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()

    • A、Executable
    • B、Trojan
    • C、Virus
    • D、Worm

    正确答案:C,D

  • 第4题:

    A Denial of Service (DoS) attack is:()

    • A、an attempt to bring down a website or other online service.
    • B、a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.
    • C、stealing a user’s identity and making changes to their accounts.
    • D、an attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.

    正确答案:A

  • 第5题:

    Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). A user named User1 has a computer named Computer1. You need to prevent changes made to User1’s desktop from being saved when User1 logs off of Computer1. What should you do? ()

    • A、Log on to Computer1 as an administrator. Rename User1’s user profile folder to User1.man.
    • B、Log on to Computer1 as an administrator. In User1’s user profile, rename ntuser.ini to ntuser.man.
    • C、Implement a roaming user profile for User1. In User1’s roaming user profile, rename ntuser.dat to ntuser.man.
    • D、Implement a roaming user profile for User1. In User1’s roaming user profile, deny User1 the Read permission for ntuser.ini.

    正确答案:C

  • 第6题:

    You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()

    • A、Instruct User2 to add a delegate
    • B、Instruct User2 to send a signed e-mail message to User1.
    • C、Instruct User1 to send a signed e-mail message to User2.
    • D、Instruct User1 to modify the sensitivity settings of the e-mail message

    正确答案:B

  • 第7题:

    单选题
    Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). A user named User1 has a computer named Computer1. You need to prevent changes made to User1’s desktop from being saved when User1 logs off of Computer1. What should you do? ()
    A

    Log on to Computer1 as an administrator. Rename User1’s user profile folder to User1.man.

    B

    Log on to Computer1 as an administrator. In User1’s user profile, rename ntuser.ini to ntuser.man.

    C

    Implement a roaming user profile for User1. In User1’s roaming user profile, rename ntuser.dat to ntuser.man.

    D

    Implement a roaming user profile for User1. In User1’s roaming user profile, deny User1 the Read permission for ntuser.ini.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()
    A

    Agree with the user’s complaints

    B

    Clarify the user’s statements

    C

    Minimize the user’s criticism

    D

    Shadow the other technician on the next repair


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()
    A

    Instruct User2 to add a delegate

    B

    Instruct User2 to send a signed e-mail message to User1.

    C

    Instruct User1 to send a signed e-mail message to User2.

    D

    Instruct User1 to modify the sensitivity settings of the e-mail message


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    A Denial of Service (DoS) attack is:()
    A

    an attempt to bring down a website or other online service.

    B

    a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.

    C

    stealing a user’s identity and making changes to their accounts.

    D

    an attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()
    A

    Remotely connect to the user's laptop and review the network configuration settings

    B

    Ping the web server from inside the network to ensure it is still up and running.

    C

    Check to make sure the company's website is accessible from the Internet.

    D

    Ensure the Ethernet cable is securely plugged into the user's laptop


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()
    A

    Instruct the user to move the documents to the Shared Folders folder.

    B

    Add the user's user account to the local Power Users group.

    C

    Add the user's user account to the Network Configuration Operators group.

    D

    Add the user's user account to the local Adminstrators group.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which software-based security threat is typically spread from user to user via e-mail?()

    • A、Data interception
    • B、Virus
    • C、Trojan horse
    • D、Denial of service

    正确答案:B

  • 第14题:

    A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()

    • A、Agree with the user’s complaints
    • B、Clarify the user’s statements
    • C、Minimize the user’s criticism
    • D、Shadow the other technician on the next repair

    正确答案:B

  • 第15题:

    A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()

    • A、The website has updated the security policies.
    • B、The user’s identity has been stolen.
    • C、The browser has been hijacked.
    • D、The user typed the website address incorrectly.

    正确答案:C

  • 第16题:

    You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TK1 runs IIS. You install a Web-enabled application on TK1. The application includes a security feature that detects unauthorized attemptsto access the server. Whenever an authorized attempt is detected, the application automatically modifies the IIS configuration file to restrict the unauthorized user's access. To test the security feature, you try to gain unauthorized access to TK1. Twenty seconds after your first attempt, you try again. However, TK1 does not restrict your access on the second attempt. You wait five minutes, and then you examine the IIS configuration file. You verify that it was correctly modified by the application to restrict your access. You need to configure IIS to ensure that changes in the IIS configuration file will result in immediate changes in the behaviour of IIS. What should you do?()

    • A、Select the Enable Direct Metabase Edit option.
    • B、Specify the service account for the Application Pool as the IIS service account.
    • C、Select the Enable Rapid-Fail protection option.
    • D、Specify the status of the Internet Data Connector Web service extension as Allow.

    正确答案:A

  • 第17题:

    You install Microsoft Windows Vista on a computer.  You will share the computer with another user.  You need to prevent the user from making unauthorized changes to the computer.  What should you do? ()

    • A、Add the user to the Guests group.
    • B、Create a standard user account for the user.
    • C、Create an administrator account for the user.
    • D、Add the user to the Remote Desktop Users group.

    正确答案:B

  • 第18题:

    You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()

    • A、Instruct the user to move the documents to the Shared Folders folder.
    • B、Add the user's user account to the local Power Users group.
    • C、Add the user's user account to the Network Configuration Operators group.
    • D、Add the user's user account to the local Adminstrators group.

    正确答案:B

  • 第19题:

    单选题
    When using the Tivoli Dynamic Workload Console, which monitor tasks are available to the user?()
    A

     all those that have been created by all users

    B

     just those created by the user in the current session

    C

     all those created by the user and shared with user’s login group

    D

     just those where the connection engine specifies the user’s logon


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()
    A

    The website has updated the security policies.

    B

    The user’s identity has been stolen.

    C

    The browser has been hijacked.

    D

    The user typed the website address incorrectly.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Which software-based security threat is typically spread from user to user via e-mail?()
    A

    Data interception

    B

    Virus

    C

    Trojan horse

    D

    Denial of service


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()
    A

    Modify

    B

    Full control

    C

    Write

    D

    Read


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). A user named User1 has a computer named Computer1. You need to prevent changes made to User1’s desktop from being saved when User1 logs off of Computer1. What should you do? ()
    A

    Log on to Computer1 as an administrator. Rename User1’s user profile folder to User1.man.

    B

    Log on to Computer1 as an administrator. In User1’s user profile, rename ntuser.ini to ntuser.man.

    C

    Implement a roaming user profile for User1. In User1’s roaming user profile, rename ntuser.dat to ntuser.man.

    D

    Implement a roaming user profile for User1. In User1’s roaming user profile, deny User1 the Read permission for ntuser.ini.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    You install Microsoft Windows Vista on a computer.  You will share the computer with another user.  You need to prevent the user from making unauthorized changes to the computer.  What should you do? ()
    A

    Add the user to the Guests group.

    B

    Create a standard user account for the user.

    C

    Create an administrator account for the user.

    D

    Add the user to the Remote Desktop Users group.


    正确答案: B
    解析: 暂无解析