an attempt to bring down a website or other online service.
a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.
stealing a user’s identity and making changes to their accounts.
an attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.
第1题:
Which software-based security threat is typically spread from user to user via e-mail?()
第2题:
A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()
第3题:
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()
第4题:
A Denial of Service (DoS) attack is:()
第5题:
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). A user named User1 has a computer named Computer1. You need to prevent changes made to User1’s desktop from being saved when User1 logs off of Computer1. What should you do? ()
第6题:
You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()
第7题:
Log on to Computer1 as an administrator. Rename User1’s user profile folder to User1.man.
Log on to Computer1 as an administrator. In User1’s user profile, rename ntuser.ini to ntuser.man.
Implement a roaming user profile for User1. In User1’s roaming user profile, rename ntuser.dat to ntuser.man.
Implement a roaming user profile for User1. In User1’s roaming user profile, deny User1 the Read permission for ntuser.ini.
第8题:
Agree with the user’s complaints
Clarify the user’s statements
Minimize the user’s criticism
Shadow the other technician on the next repair
第9题:
Instruct User2 to add a delegate
Instruct User2 to send a signed e-mail message to User1.
Instruct User1 to send a signed e-mail message to User2.
Instruct User1 to modify the sensitivity settings of the e-mail message
第10题:
an attempt to bring down a website or other online service.
a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.
stealing a user’s identity and making changes to their accounts.
an attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.
第11题:
Remotely connect to the user's laptop and review the network configuration settings
Ping the web server from inside the network to ensure it is still up and running.
Check to make sure the company's website is accessible from the Internet.
Ensure the Ethernet cable is securely plugged into the user's laptop
第12题:
Instruct the user to move the documents to the Shared Folders folder.
Add the user's user account to the local Power Users group.
Add the user's user account to the Network Configuration Operators group.
Add the user's user account to the local Adminstrators group.
第13题:
Which software-based security threat is typically spread from user to user via e-mail?()
第14题:
A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()
第15题:
A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()
第16题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named TK1 runs IIS. You install a Web-enabled application on TK1. The application includes a security feature that detects unauthorized attemptsto access the server. Whenever an authorized attempt is detected, the application automatically modifies the IIS configuration file to restrict the unauthorized user's access. To test the security feature, you try to gain unauthorized access to TK1. Twenty seconds after your first attempt, you try again. However, TK1 does not restrict your access on the second attempt. You wait five minutes, and then you examine the IIS configuration file. You verify that it was correctly modified by the application to restrict your access. You need to configure IIS to ensure that changes in the IIS configuration file will result in immediate changes in the behaviour of IIS. What should you do?()
第17题:
You install Microsoft Windows Vista on a computer. You will share the computer with another user. You need to prevent the user from making unauthorized changes to the computer. What should you do? ()
第18题:
You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()
第19题:
all those that have been created by all users
just those created by the user in the current session
all those created by the user and shared with user’s login group
just those where the connection engine specifies the user’s logon
第20题:
The website has updated the security policies.
The user’s identity has been stolen.
The browser has been hijacked.
The user typed the website address incorrectly.
第21题:
Data interception
Virus
Trojan horse
Denial of service
第22题:
Modify
Full control
Write
Read
第23题:
Log on to Computer1 as an administrator. Rename User1’s user profile folder to User1.man.
Log on to Computer1 as an administrator. In User1’s user profile, rename ntuser.ini to ntuser.man.
Implement a roaming user profile for User1. In User1’s roaming user profile, rename ntuser.dat to ntuser.man.
Implement a roaming user profile for User1. In User1’s roaming user profile, deny User1 the Read permission for ntuser.ini.
第24题:
Add the user to the Guests group.
Create a standard user account for the user.
Create an administrator account for the user.
Add the user to the Remote Desktop Users group.