A user is attempting to access

题目

A user is attempting to access a website but is getting a ‘Page cannot be displayed’ error. The technician checks the IP address of the computer and sees that it has been assigned 169.254.10.70. Which of the following is the MOST likely cause?()

  • A、The device is located behind a firewall.
  • B、The network card is disabled.
  • C、The device is not configured for DHCP.
  • D、The device cannot locate a DHCP server.
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).

An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.

In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.

A.cooperates

B.coordinates

C.connects

D.mediates


正确答案:C

第2题:

All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()

  • A、The wireless access point is using MAC address filtering
  • B、The user has connected to a nearby wireless access point from another office
  • C、The user has configured the wireless settings with the wrong encryption type
  • D、The wireless access point has SSID broadcast disabled

正确答案:B

第3题:

A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()

A.Modify

B.Full control

C.Write

D.Read


参考答案:D

第4题:

Which of the following statements allows USER1 to take away read access on the table ORG.TAB1 from USER2?()

  • A、REVOKE SELECT FROM user2 ON TABLE org.tab1
  • B、REVOKE SELECT ON TABLE org.tab1 FROM user2
  • C、REVOKE READ ACCESS FROM user2 ON TABLE org.tab1
  • D、REVOKE READ ACCESS ON TABLE org.tab1 FROM user2

正确答案:B

第5题:

A Denial of Service (DoS) attack is:()

  • A、an attempt to bring down a website or other online service.
  • B、a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.
  • C、stealing a user’s identity and making changes to their accounts.
  • D、an attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.

正确答案:A

第6题:

Which of the following is enabled in the BIOS that will prompt a user to enter their password every time the laptop performs a POST?()

  • A、Power User access
  • B、Power on password
  • C、Administrative password
  • D、User profile access

正确答案:B

第7题:

A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()

  • A、Modify
  • B、Full control
  • C、Write
  • D、Read

正确答案:D

第8题:

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()

A.REVOKE ACCESS ON DATABASE FROM USER bob

B.REVOKE CONNECT ON DATABASE FROM USER tom

C.REVOKE tom FROM ACCESS ON DATABASE BY USER bob

D.REVOKE tom FROM CONNECT ON DATABASE BY USER bob


参考答案:B

第9题:

Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()

  • A、REVOKE ACCESS ON DATABASE FROM USER bob
  • B、REVOKE CONNECT ON DATABASE FROM USER tom
  • C、REVOKE tom FROM ACCESS ON DATABASE BY USER bob
  • D、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

正确答案:B

第10题:

Under which configuration hierarchy is an access profile configured for firewall user authentication?()

  • A、[edit access]
  • B、[edit security access]
  • C、[edit firewall access]
  • D、[edit firewall-authentication]

正确答案:A

更多相关问题