CompTIA认证考试

Several users are sending emails to CompTIA.org. but they are not being received. Which of thefollowing commands could be used to verify that the company is able to connect to the mailservice at CompTIA.org?()A、PingB、ArpC、DigD、telnet

题目

Several users are sending emails to CompTIA.org. but they are not being received. Which of thefollowing commands could be used to verify that the company is able to connect to the mailservice at CompTIA.org?()

  • A、Ping
  • B、Arp
  • C、Dig
  • D、telnet
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an(71)from a friend who asks you to open it. This is what happens with Melissa and several other similar email(72). Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages(73)As administrators seek to block dangerous email attachments through the recognition of well-known(74), virus writers use other extensions to circumvent such protection. Executable(.exe)files are renamed to .bat and .cmd plus a whole list of other extensions and will still nm and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the(75)access to your network.

A.attachment

B.packet

C.datagram

D.message


正确答案:A
解析:Melissa和LoveLetter利用了朋友和同事之间的信任。设想你收到了一个附件,朋友要求你打开它。这就是Melissa和其他类似的电子邮件蠕虫危害的方式。一旦被运行,这种蠕虫常常就从受害人的地址簿、以前的电子邮件、Web页面缓存区等地方发现邮件地址,并且把它们发送出去。在管理人员通过识别众所周知的扩展名企图阻挡危险的email附件时,病毒的作者们则使用了其他的扩展名来破坏这种保护。可执行文件(.exe)被重新命名为.bat和.cmd,再加上其他的扩展名,而且仍然可以运行,成功地危害目标用户。黑客们经常试图穿透网络发送一种像是flash影像的附件,当这种flash演示引人入胜的动画时,同时就在后台运行命令来偷窃你的口令,给了那些解密高手访问你的网络的机会。

第2题:

Users are unable to stay connected to the company‘s wireless network. Several times throughoutthe day the users‘ signals are dropped and they are forced to reconnect to the network.A technician determines the network cabling that supplies the WAP has been run inside with severalpower lines.Which of the following is the MOST likely cause of the network issue?()

A.Ashort

B.Open pairs

C.ESD

D.EMI


参考答案:D

第3题:

●Melissa and Love Letter made use of the trust that exists between friends or colleagues.Imagine receiving an (66) from a friend who asks you to open it.This is what happens with Melissa and several other similar email (67) .Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book,previous emails, web pages (68) .

As administrators seek to block dangerous email attachments through the recognition of well-known (69) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (70) access to your network.

(66) A.attachment

B.packet

C.datagram

D.message

(67) A.virtual

B.virus

C.worms

D.bacteria

(68) A.memory

B.caches

C.ports

D.registers

(69) A.names

B.cookies

C.software

D.extensions

(70) A.cracker

B.user

C.customer

D.client


正确答案:A,B,D,C,A
【解析】梅丽莎病毒和爱虫病毒都是利用同事或朋友之间的信任。假设收到一封来自朋友的附近,并让你打开看看,这就是梅丽落以及其他类似的邮件病毒贯用的方式。不断地前进,这些"蠕虫"会将自己寄给那些从牺牲者的邮件薄里或上一封邮件或网页登陆得来的邮箱地址。
当管理员致力于阻危险邮件通过知名软件的识别时,那些病毒制造者又在利用其他途径来回避这种保护,可执行文件被重新命名为批处理文件或dos文件加上一系列扩展名,将仍旧成功地感染终端使用者,黑客们经常会努力发一些看起来像动画电影的附件来进入网络,这些附件可以一边展现极具吸引力的动画制作技术、一边暗地里执行一些命令来获取你的密码,并安装一个炸弹进入你的网络。

第4题:

You have an Exchange Server 2010 organization.You need to prevent internal users from sending messages that contains the phrase °Company Confidentia?± to external use.What should you create?()

  • A、a Transport rule
  • B、a managed folder mailbox policy
  • C、a message classification
  • D、a Send connector

正确答案:A

第5题:

The Internet is a () system of interconnected computer networks that use the standard Internet protocol suits(TCP/IP) to serve several billion users worldwide。

A.global B.regional C.local D.national


正确答案: A

第6题:

When sending emails to professionals, you should take the time to check your message for spelling errors and to proofread your text.()


正确答案:对

第7题:

Refer to the exhibit. Router RTA has been configured as a DHCP server. The two debug commands will generate output on RTA when Ho st A requests an IP address. Which set of DHCPD debug messages is in the correct sequence?()

A.DHCPD: Sending DHCPOFFER to client DHCPD: DHCPDISCOVER received from client DHCPD: DHCPREQUEST received from client DHCPD: Sending DHCPACK to client

B.DH CPD: DHCPDISCOVER received from client DHCPD: DHCPREQUEST received from client DHCPD: Sending DHCPOFFER to client DHCPD: Sending DHCPACK to client

C.DHCPD: DHCPDISCOVER received from client DHCPD: Sending DHCPOFFER to client DHCPD: DHCPREQUEST received from client DHCPD: Sending DHCPACK to client

D.DHCPD: DHCPREQUEST received from client DHCPD: Sending DHCPOFFER to client DHCPD: DHCPDISCOVER received from client DHCPD: Sending DHCPACK to client

E.DHCPD: Sending DHCPACK to client DHCPD: DHCPD ISCOVER received from client DHCPD: Sending DHCPOFFER to client DHCPD: DHCPREQUEST received from client

F.DHCPD: DHCPDISCOVER received from client DHCPD: Sending DHCPACK to client DHCPD: Sending DHCPOFFER to client DHCPD: DHCPREQUEST received from client


参考答案:C

第8题:

The Internet is a ()system of interconnected computer networks that use thestandard Internet protocol suite (TCP/IP) to serve several billion users worldwide.

A.global

B.regional

C.local

D.national


参考答案:A
本题翻译为:因特网是一种连通的计算机网络的()系统,该网络使用标准因特网协议系列来为全世界数十亿用户提供服务。A.全球的B.局部的C.本地的D.国家的根据因特网的定义,是一种全球性的服务,选A。

第9题:

资料:It's almost considered sacrilegious today to leave work at the end of your workday or(for shamel)on a Friday and simply not check your email until you return the office during normal working hours.
The constant need to check email is the trade-off the modern workforce has made for the ability to work anytime, anywhere, thanks to smartphones and tablets that keep us always connected.
But three university researchers have found that it's not just doing a bit of work after hours that cause burn out. The true culprit is actually the constant worrying about off-hour email.
A new study "Exhausted But Unable to Disconnect." by Lehigh University's Liuba Belkin, Virginia Tech’s William Becker and Colorado State University's Samantha Conroy shows that employees are growing exhausted by the expectation that they will always be available, never knowing what kind of work requests will asked of them off hours.
Typically, companies don't mean to stress employees out like that. Most companies don't have formal policies that say people must answer work emails after-hours. (expect, perhaps, in cases where an employee is on call during specific times).
But policies and culture tend to be two different things. If supervisors routinely email employee after hours and expect a fast response (often because their supervisors are doing the same to them), then the message is clear: whenever the boss emails, the employee is expected to be available.
The solution is for bosses to tell employees that an after-hours email doesn't necessarily require a response before the next work day, and to also set some times when after-hours emailing is considered acceptable and prohibited, such as no emails via the dinner hour, on weekends, or after 10 p. m, the researchers say.

What is this passage mainly about?

A.Bosses push employees to work by sending emails anytime.
B.Employees are exhausted by the constant need to check emails.
C.Companies mean to stress the workers out by sending emails.
D.None of above.

答案:B
解析:
本题考查主旨大意。
【关键词】 this passage mainly about
【主题句】第四自然段A new study "Exhausted But Unable to Disconnect." by Lehigh University's Liuba Belkin, Virginia Tech’s William Becker and Colorado State University's Samantha Conroy shows that employees are growing exhausted by the expectation that they will always be available, never knowing what kind of work requests will asked of them off hours.一项新的研究“精疲力竭,但又无法断开”。由莱赫伊大学的卢巴贝尔金、弗吉尼亚理工大学的威廉贝克尔和科罗拉多州立大学的萨曼莎康罗伊共同完成的一项新研究显示,员工们越来越疲惫,因为他们需要随时待命,永远不知道在休息时间会有什么样的工作要求需要他们。
【解析】题目意为“这篇文章主要讲的是什么?”选项A意为“老板们在任何时候都通过发送电子邮件来督促员工工作”;选项B意为“员工因经常查看电子邮件而疲惫不堪”;选项C意为“公司的意思是通过发电子邮件来给员工施加压力”;选项D意为“以上都不是”。
故正确选项为B。

第10题:

A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()

  • A、The RADIUS server
  • B、The EAPoL server
  • C、The workstation's network adapter
  • D、The Ethernet switch

正确答案:D

更多相关问题