CompTIA认证考试

A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the fol

题目

A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()

  • A、Spam
  • B、Phishing
  • C、Adware
  • D、A Trojan
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()

  • A、User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());
  • B、User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());
  • C、User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());
  • D、User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());
  • E、User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());

正确答案:E

第2题:

A user states that email is not being received. Which of the following protocols should thetechnician check for incoming mail?()

  • A、SMTP
  • B、POP3
  • C、NNTP
  • D、HTTP

正确答案:B

第3题:

From the DX WebUI Dashboard, which steps are used for creating a new admin user? ()

A. Click Admin > Users. Enter username, password, role, account status, and email.

B. Click Admin > Users. Enter username, password, role, account status, and user class.

C. Click Users > Manage Users. Enter username, password, role, account status, and user class.

D. Click Users > Manage Users. Enter username, password, ActiveDirectory domain, account status, and role.


参考答案:B

第4题:

An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()

  • A、Implement preventative measures.
  • B、Close the issue.
  • C、Document the outcome.
  • D、Question other users to make sure they are not having the same issue

正确答案:C

第5题:

A user selects their proper domain and is unable to log into their Windows computer.The error states:‘System cannot log you on to the domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect’.Which of the following is the MOST likely cause for this error?()

  • A、The computer’s account was removed from Active Directory.
  • B、The user’s account was removed from Active Directory.
  • C、The computer was disjoined from the domain.
  • D、The user typed in the wrong password.

正确答案:A

第6题:

A technician accesses a corporate users hard drive and notices that there are inappropriate images in their My Documents folder. Accessing this kind of material is a clear violation of company policy. Which of the following should the technician do? ()

  • A、Confront the user and tell them to remove the material.
  • B、Backup the files and delete them from the users folder.
  • C、Inquire with the manager about policies and procedures.
  • D、Ignore the files, this is the users personal documents folder.

正确答案:C

第7题:

Which statement describes the Authentication Proxy feature?()

  • A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
  • B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
  • C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
  • D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

正确答案:B

第8题:

A user selects their proper domain and is unable to log into their Windows computer. The error states: system cannot log you on to the domain because the system‘s computer account in its primary domain is missing or the password on that account is incorrect.Which of the following is the MOST likely cause for this error?()

A. The computer‘s account was removed from Active Directory.

B. The user‘s account was removed from Active Directory.

C. The computer was disjoined from the domain.

D. The user typed in the wrong password


参考答案:C

第9题:

An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()

  • A、 Implement preventative measures.
  • B、 Close the issue.
  • C、 Document the outcome.
  • D、 Question other users to make sure they are not having the same issue.

正确答案:C

第10题:

An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()

  • A、 Create an action plan.
  • B、 Escalate the issue.
  • C、 Reboot the mail server.
  • D、 Document the solution.

正确答案:B

更多相关问题