更多“A user states that email is not being received. Which of the”相关问题
  • 第1题:

    In which two conditions are resumable statements suspended?()

    • A、 when a user exceeds the space quota
    • B、 when a user session is terminated
    • C、 when a table that is being accessed by the current transaction is not found
    • D、 when a user manually suspends the statement
    • E、 when the maximum extents of a segment is reached

    正确答案:A,E

  • 第2题:

    A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()

    • A、Phishing
    • B、Smurf attack
    • C、Denial of service
    • D、Man-in-the-middle

    正确答案:A

  • 第3题:

    An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()

    • A、 Implement preventative measures.
    • B、 Close the issue.
    • C、 Document the outcome.
    • D、 Question other users to make sure they are not having the same issue.

    正确答案:C

  • 第4题:

    A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()

    • A、Configuring the Windows Firewall exceptions.
    • B、Using Windows Messenger.
    • C、Configuring My Network Places.
    • D、Using Internet Explorer.

    正确答案:B

  • 第5题:

    A user calls about a problem with receiving email. After troubleshooting the user’s computer and finding nothing wrong, the technician contacts the email sender and finds out the user gave out their email address incorrectly. Which of the following is the BEST approach in explaining the issue to the user?()

    • A、“Sometimes computers are just strange, but it seems to be working now.”
    • B、“You gave them the wrong address and caused this problem.”
    • C、“The sender had the e-mail address wrong, but they have it correct now and the problem has been resolved.”
    • D、“The SMTP server was not getting a proper resolution of the recipient name field when it was parsing the header.”

    正确答案:C

  • 第6题:

    Users are unable to access the Internet but the users are able to send/receive email from theirdesktops. Which of the following ports is MOST likely being blocked?()

    • A、25
    • B、80
    • C、110
    • D、143

    正确答案:B

  • 第7题:

    单选题
    A user states that the laser printer is leaving a black line on all pages being printed. Which of thefollowing is the MOST likely cause and solution for this issue?()
    A

    Faulty driver; reinstall or update driver

    B

    Bad fuser; place service call to printer manufacturer.

    C

    Excess toner on drum; perform maintenance (e.g. clean drum surface).

    D

    Deteriorating rollers and worn brushes; replace rollers and brushes.


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    A user states that email is not being received. Which of the following protocols should thetechnician check for incoming mail?()
    A

    SMTP

    B

    POP3

    C

    NNTP

    D

    HTTP


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again.  Which of the following is the NEXT step that the administrator should take?()
    A

     Implement preventative measures.

    B

     Close the issue.

    C

     Document the outcome.

    D

     Question other users to make sure they are not having the same issue.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()
    A

    user

    B

    read_only

    C

    target_operator

    D

    security_operator


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    The modern Internet, first established in the mid-1980s, is based on the technology developed for the ARPANET, it was created by the United States Department of Defense in the 1960s.
    A

    ARPANET, it was created by the United States Department of Defense

    B

    ARPANET; it was created by the United States Department of Defense

    C

    ARPANET, which was created by the United States Department of Defense

    D

    ARPANET, being created by the United States Department of Defense

    E

    ARPANET; the United States Department of Defense created it


    正确答案: E
    解析:
    原句仅用一个逗号将两个独立的句子连接起来。B虽纠正了这个错误,但是不符合逻辑。E也使用了指代模糊的it。D不符合逻辑因为分词“being”将“the Internet”作为主语,是没有意义的。

  • 第12题:

    单选题
    A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()
    A

    Phishing

    B

    Smurf attack

    C

    Denial of service

    D

    Man-in-the-middle


    正确答案: B
    解析: 暂无解析

  • 第13题:

    A user has reported that they cannot access the company FTP site. The user states that they are using the IP address that was given to them “74200.92.105”. Which of the following is MOST likely the problem?()

    • A、Invalid IP address
    • B、FTP program is not working
    • C、Port 21 is blocked
    • D、The FTP site is down

    正确答案:A

  • 第14题:

    A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()

    • A、Spam
    • B、Phishing
    • C、Adware
    • D、A Trojan

    正确答案:B

  • 第15题:

    A user can receive email but cannot send email with the email client software. Which of the following protocols is incorrectly configured?()

    • A、FTP
    • B、SMTP
    • C、POP
    • D、SNMP

    正确答案:B

  • 第16题:

    An administrator receives a call from a user who is unable to receive email. After troubleshooting the administrator is able to resolve the issue and verify that user is able to access email again. Which of the following is the NEXT step that the administrator should take?()

    • A、Implement preventative measures.
    • B、Close the issue.
    • C、Document the outcome.
    • D、Question other users to make sure they are not having the same issue

    正确答案:C

  • 第17题:

    Several users are sending emails to CompTIA.org. but they are not being received. Which of thefollowing commands could be used to verify that the company is able to connect to the mailservice at CompTIA.org?()

    • A、Ping
    • B、Arp
    • C、Dig
    • D、telnet

    正确答案:D

  • 第18题:

    A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()

    • A、MAC filtering
    • B、PoE
    • C、IP filtering
    • D、802.1X

    正确答案:D

  • 第19题:

    单选题
    A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()
    A

    MAC filtering

    B

    PoE

    C

    IP filtering

    D

    802.1X


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()
    A

    Spam

    B

    Phishing

    C

    Adware

    D

    A Trojan


    正确答案: A
    解析: 暂无解析

  • 第21题:

    多选题
    In which two conditions are resumable statements suspended?()
    A

    when a user exceeds the space quota

    B

    when a user session is terminated

    C

    when a table that is being accessed by the current transaction is not found

    D

    when a user manually suspends the statement

    E

    when the maximum extents of a segment is reached


    正确答案: E,B
    解析: 暂无解析

  • 第22题:

    单选题
    变量$email=user@example.com,以下哪项能得到字符串example.com?()
    A

    substr($email,strpos($email,‘@’));

    B

    strstr($email,‘@’);

    C

    substr($email,strpos($email,‘@’)+1);

    D

    strrpos($email,‘@’);


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    A user calls about a problem with receiving email. After troubleshooting the user’s computer and finding nothing wrong, the technician contacts the email sender and finds out the user gave out their email address incorrectly. Which of the following is the BEST approach in explaining the issue to the user?()
    A

    “Sometimes computers are just strange, but it seems to be working now.”

    B

    “You gave them the wrong address and caused this problem.”

    C

    “The sender had the e-mail address wrong, but they have it correct now and the problem has been resolved.”

    D

    “The SMTP server was not getting a proper resolution of the recipient name field when it was parsing the header.”


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    A user has reported that they cannot access the company FTP site. The user states that they are using the IP address that was given to them “74200.92.105”. Which of the following is MOST likely the problem?()
    A

    Invalid IP address

    B

    FTP program is not working

    C

    Port 21 is blocked

    D

    The FTP site is down


    正确答案: C
    解析: 暂无解析