The incorrect gateway address is being provided to the workstation.
DHCP is not providing workstations with the proper subnet mask.
The DNS cache was cleared.
The internal zone was deleted.
第1题:
Which of the following is true about the following share access properties? ()
第2题:
Which two statements are true when using the configure exclusive CLI command?()
第3题:
A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()
第4题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第5题:
Which two are true regarding external tables? ()
第6题:
Which result or results do these actions produce?()
第7题:
External tables can be updated.
External tables are read-only tables.
Indexes can be created on external tables.
Indexes cannot be created on external tables.
第8题:
[Authorize(Users = )]
[Authorize(Roles = )]
[Authorize(Users = *)]
[Authorize(Roles = *)]
第9题:
An external hard drive connected via eSATA
An external hard drive connected via USB 2.0
An external hard drive connected via serial
A thumb drive connected via USB 2.0
第10题:
<authorization> <allow users=?/> </authorization>
<authorization> <deny users=?/> </authorization>
<authorization> <deny users=*/></authorization>
<authorization> <allow users=*/> </authorization>
第11题:
tracert
msconfig
route
net use
第12题:
It can be used to allow the access privilege settings for users but not roles.
It can be used to allow the access privilege settings for users as well as roles.
It can be used to control the time interval for which the access privilege is available to a user.
It can be used to selectively restrict the access for each user in a database to different host computers.
It can be used to selectively restrict a user's access to different applications in a specific host computer.
第13题:
A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel. Which users can be seen and what actions can be performed()
第14题:
Users can only access external websites. Which of the following is the MOST likely cause of this problem?()
第15题:
Which of the following devices can route electrical signals only when activated by an external control signal?()
第16题:
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
第17题:
You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()
第18题:
Which of the following is the new permissions model in Microsoft Exchange Server 2010, which enables you to continuous levels, what administrators and end-users can do?()
第19题:
It is a list of remote database links stored in the XML file that are available to the users of the database.
It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
第20题:
the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group
the user can see all the users except those in the Admin group, but can only modify the user’s own account
the user can see only the user’s own account, and cannot modify it
the user can see only the user’s own account, and can change the password only
第21题:
+managers will be resolved as a Winbind group.
The timo and taki users can manipulate files regardless of the file system permissions.
+managers will be resolved as a Unix group.
+managers is a builtin default Samba group.
The admin users can be applied only to print shares.
第22题:
you can apply multiple access lists with the same protocol or in different direction.
you can config one access list,per direction,per layer 3 protocol
you can place as many access lists as you want on any interface
you can apply only one access list on any interface
第23题:
A role can be given to a maximum of 1000 users.
A user can have access to a maximum of 10 roles.
A role can have a maximum of 100 privileges contained in it.
Privileges are given to a role by using the CREATE ROLE statement.
A role is a named group of related privileges that can be granted to the user.
A user can have access to several roles, and several users can be assigned the same role.