itgle.com

单选题Users can only access external websites. Which of the following is the MOST likely cause of this problem?()A The incorrect gateway address is being provided to the workstation.B DHCP is not providing workstations with the proper subnet mask.C The DNS c

题目
单选题
Users can only access external websites. Which of the following is the MOST likely cause of this problem?()
A

The incorrect gateway address is being provided to the workstation.

B

DHCP is not providing workstations with the proper subnet mask.

C

The DNS cache was cleared.

D

The internal zone was deleted.


相似考题
更多“Users can only access external websites. Which of the follow”相关问题
  • 第1题:

    Which of the following is true about the following share access properties? ()

    • A、 +managers will be resolved as a Winbind group.  
    • B、 The timo and taki users can manipulate files regardless of the file system permissions.  
    • C、 +managers will be resolved as a Unix group.  
    • D、 +managers is a builtin default Samba group.  
    • E、 The "admin users" can be applied only to print shares.

    正确答案:B,C

  • 第2题:

    Which two statements are true when using the configure exclusive CLI command?()

    • A、Multiple users can enter configuration mode and have their own private configuration.
    • B、When a user commits, only the user's changes are committed.
    • C、A message indicates which other users are in configuration mode and what portion of the configuration they are editing.
    • D、Only a single user can edit the configuration.

    正确答案:B,D

  • 第3题:

    A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()

    • A、 tracert
    • B、 msconfig
    • C、 route
    • D、 net use

    正确答案:A

  • 第4题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第5题:

    Which two are true regarding external tables? ()

    • A、External tables can be updated. 
    • B、External tables are read-only tables. 
    • C、Indexes can be created on external tables. 
    • D、Indexes cannot be created on external tables.

    正确答案:B,D

  • 第6题:

    Which result or results do these actions produce?()

    • A、Users in both departments can access their files from the network.
    • B、Users in the accounting department can view the legal department’s documents.
    • C、Users in the legal department cannot view the accounting department’s documents.
    • D、Company managers can access and modify both departments’ files.

    正确答案:A,C,D

  • 第7题:

    多选题
    Which two are true regarding external tables? ()
    A

    External tables can be updated.

    B

    External tables are read-only tables.

    C

    Indexes can be created on external tables.

    D

    Indexes cannot be created on external tables.


    正确答案: D,B
    解析: 暂无解析

  • 第8题:

    多选题
    You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()
    A

    [Authorize(Users = )]

    B

    [Authorize(Roles = )]

    C

    [Authorize(Users = *)]

    D

    [Authorize(Roles = *)]


    正确答案: C,D
    解析: 暂无解析

  • 第9题:

    单选题
    A user works daily with video production and needs portable storage which will allow them to transport their work back and forth from home. Taking the users storage and bandwidth requirements into consideration, which of the following would BEST suit the users needs?()
    A

    An external hard drive connected via eSATA

    B

    An external hard drive connected via USB 2.0

    C

    An external hard drive connected via serial

    D

    A thumb drive connected via USB 2.0


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()
    A

    <authorization> <allow users=?/> </authorization>

    B

    <authorization> <deny users=?/> </authorization>

    C

    <authorization> <deny users=*/></authorization>

    D

    <authorization> <allow users=*/> </authorization>


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()
    A

     tracert

    B

     msconfig

    C

     route

    D

     net use


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
    A

    It can be used to allow the access privilege settings for users but not roles.

    B

    It can be used to allow the access privilege settings for users as well as roles.

    C

    It can be used to control the time interval for which the access privilege is available to a user.

    D

    It can be used to selectively restrict the access for each user in a database to different host computers.

    E

    It can be used to selectively restrict a user's access to different applications in a specific host computer.


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()

    • A、the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group
    • B、the user can see all the users except those in the Admin group, but can only modify the user’s own account
    • C、the user can see only the user’s own account, and cannot modify it
    • D、the user can see only the user’s own account, and can change the password only

    正确答案:D

  • 第14题:

    Users can only access external websites. Which of the following is the MOST likely cause of this problem?()

    • A、The incorrect gateway address is being provided to the workstation.
    • B、DHCP is not providing workstations with the proper subnet mask.
    • C、The DNS cache was cleared.
    • D、The internal zone was deleted.

    正确答案:D

  • 第15题:

    Which of the following devices can route electrical signals only when activated by an external control signal?()

    • A、Solenoid
    • B、Relay
    • C、Clutch
    • D、Capacitor

    正确答案:B

  • 第16题:

    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()

    • A、It can be used to allow the access privilege settings for users but not roles.
    • B、It can be used to allow the access privilege settings for users as well as roles.
    • C、It can be used to control the time interval for which the access privilege is available to a user.
    • D、It can be used to selectively restrict the access for each user in a database to different host computers.
    • E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

    正确答案:B,C,D

  • 第17题:

    You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()

    • A、[Authorize(Users = "")]
    • B、[Authorize(Roles = "")]
    • C、[Authorize(Users = "*")]
    • D、[Authorize(Roles = "*")]

    正确答案:A,B

  • 第18题:

    Which of the following is the new permissions model in Microsoft Exchange Server 2010, which enables you to continuous levels, what administrators and end-users can do?()

    • A、Role Based Access Control
    • B、Access Control List
    • C、Dynamic distribution group
    • D、Universal distribution group

    正确答案:A

  • 第19题:

    单选题
    ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()
    A

     It is a list of remote database links stored in the XML file that are available to the users of the database.

    B

     It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

    C

     It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.

    D

     It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()
    A

    the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group

    B

    the user can see all the users except those in the Admin group, but can only modify the user’s own account

    C

    the user can see only the user’s own account, and cannot modify it

    D

    the user can see only the user’s own account, and can change the password only


    正确答案: D
    解析: 暂无解析

  • 第21题:

    多选题
    Which of the following is true about the following share access properties? ()
    A

    +managers will be resolved as a Winbind group.

    B

    The timo and taki users can manipulate files regardless of the file system permissions.

    C

    +managers will be resolved as a Unix group.

    D

    +managers is a builtin default Samba group.

    E

    The admin users can be applied only to print shares.


    正确答案: B,C
    解析: 暂无解析

  • 第22题:

    单选题
    Which statement about access lists that are applied to an interface is true?()
    A

    you can apply multiple access lists with the same protocol or in different direction.

    B

    you can config one access list,per direction,per layer 3 protocol

    C

    you can place as many access lists as you want on any interface

    D

    you can apply only one access list on any interface


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements accurately describe a role?()
    A

    A role can be given to a maximum of 1000 users.

    B

    A user can have access to a maximum of 10 roles.

    C

    A role can have a maximum of 100 privileges contained in it.

    D

    Privileges are given to a role by using the CREATE ROLE statement.

    E

    A role is a named group of related privileges that can be granted to the user.

    F

    A user can have access to several roles, and several users can be assigned the same role.


    正确答案: F,D
    解析: 暂无解析