220-603

单选题A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  W

题目
单选题
A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()
A

Configuring the Windows Firewall exceptions.

B

Using Windows Messenger.

C

Configuring My Network Places.

D

Using Internet Explorer.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which remote access VPN addressing technique supports a static IP address to support a specific application?()

A. Use a staticip addresses based on incoming user policies.

B. Use DHCP to assign addresses based on incoming user policies.

C. Deploy a clientless model to assign a unique address to the user.

D. Deploy RADIUS or LDAP to assign the address to the user.


参考答案:D

第2题:

You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()

  • A、Use Computer Management to configure separate memory spaces for each financial  application on Helena’s Computer.
  • B、Use Security Templates to edit the Security Policy to include the financial applications on  Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.
  • C、Use Security Configuration and Analysis to reconfigure the default security policy .inf file to  allow the finance applications to run on Helena’s Computer.
  • D、Use secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to  loose the permission for the Local User group on Helena’s Computer.

正确答案:D

第3题:

A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()

A.Modify

B.Full control

C.Write

D.Read


参考答案:D

第4题:

Under which of the following circumstances would a technician use IPCONFIG /RENEW?()

  • A、After an unsuccessful reboot
  • B、If a user’s IP address has been spoofed
  • C、After using IPCONFIG /RELEASE
  • D、If the computer has an ARP address conflict

正确答案:C

第5题:

A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()

  • A、Modify
  • B、Full control
  • C、Write
  • D、Read

正确答案:D

第6题:

Which of the following should a technician instruct a user to do to initiate Remote Assistance for a user running Windows XP Professional?()

  • A、Network Neighborhood > navigate to the users computer > right click > select Offer Remote Assistance
  • B、Go to Help and Support Center > Pick a Task > Use Tools > Offer Remote Assistance
  • C、Run Remote Desktop Connection > Select Connect to User Enter the IP address
  • D、Start > Programs > Administrative Tools > Remote Assistance

正确答案:B

第7题:

A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user.  The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession.  Which method in HttpSession is used to accomplish this?()

  • A、 getCreationTime
  • B、 invalidateAfter
  • C、 getLastAccessedTime
  • D、 getMaxInactiveInterval

正确答案:A

第8题:

A technician needs to ensure that a specific application on a single home user‘s computerreceives Internet traffic reliably. The home network provides access to three other users and theapplication relies on a specific protocol.Which of the following should the technician use?()

A. DHCP

B. PAT

C. Proxy

D. IPX


参考答案:B

第9题:

A user is unsatisfied with the quality of the repair that another technician has completed on their PC. Which of the following should be done to help the user?()

  • A、Agree with the user’s complaints
  • B、Clarify the user’s statements
  • C、Minimize the user’s criticism
  • D、Shadow the other technician on the next repair

正确答案:B

第10题:

A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()

  • A、Configuring the Windows Firewall exceptions.
  • B、Using Windows Messenger.
  • C、Configuring My Network Places.
  • D、Using Internet Explorer.

正确答案:B

更多相关问题