单选题You are the network administrator for Company. Eric, a user in the accounting department, runs Windows 2000 Professional on his computer. He has 50 MB of free disk space on drive C and 500 MB free disk space on drive D. Eric reports that he is unable to print large Microsoft Word documents without receiving errors. Eric wants to be able to print his large Microsoft Word documents.  What should you instruct Eric to do?()AFrom the Printer Properties dialog box, use Advanced settings to configure the spool settings to Start printing immediatelyBFrom the Print Server properties dialog box, use Advanced settings to change the location of the spool folder to an existing folder on drive DCCopy C:///Winnt/system32/Spool/Printers folder to the D:///Winnt/System32/Spool/Printers folderDMount drive C as a subdirectory in drive D

单选题
You are the network administrator for Company. Eric, a user in the accounting department, runs Windows 2000 Professional on his computer. He has 50 MB of free disk space on drive C and 500 MB free disk space on drive D. Eric reports that he is unable to print large Microsoft Word documents without receiving errors. Eric wants to be able to print his large Microsoft Word documents.  What should you instruct Eric to do?()
A

From the Printer Properties dialog box, use Advanced settings to configure the spool settings to Start printing immediately

B

From the Print Server properties dialog box, use Advanced settings to change the location of the spool folder to an existing folder on drive D

C

Copy C:///Winnt/system32/Spool/Printers folder to the D:///Winnt/System32/Spool/Printers folder

D

Mount drive C as a subdirectory in drive D


参考解析

解析: 暂无解析

相关考题:

You are the administrator of your company's network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him.Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer.You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort.What should you do?A.Rename Mark's user account to Eric and change the account password.B.Create Eric's account by copying Mark's profile to Eric's account. Delete Mark's account.C.Create Eric's account by copying Marks account. Delete Mark's account.D.Delete Mark's account. Add Eric's account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.

You are the administrator of Ezonexam's network.An employee named Mark has a local user account on a Windows 2000 Professional computer. Mark has rights and permissions to multiple files and folders on the computer. All of Mark's permissions are being granted through group membership. Mark recently hired a new employee named Eric as his assistant.You want Eric to have the same rights and permissions that Mark has on the Windows 2000 Professional computer. You want to accomplish this with the least amount of administrative effort.What should you do?A.Create a new local group. Create Eric's user account. Add Mark's user account and Eric's user account to the new group.B.Create Eric's user account. Copy Mark's profile to Eric's user account.C.Create Eric's user account. Make Eric's user account a member of all the same groups as Mark's user account.D.Create Eric's user account. Copy the registry entries in the subkey that correspond to Mark under HKEY_USERS to the subkey that corresponds to Eric.

You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A、The user will be instructed to call the network administrator.B、The user will fail authentication.C、The user will be prompted to install a new device certificate on the MAG Series device.D、The user will successfully authenticate and have full network access.

You are the network administrator for your company. The network consists of a single Active Directorydomain. All network servers run Windows Server 2003. Some client computers run Windows 2000 Professional,and the rest run Windows XP Professional.All user accounts in the sales department are located in the Sales organizational unit (OU). To store roaming user profiles, you create a shared folder named Profiles on a member server named File1. You assign the Allow - Full Control permission on the Profiles folder to the Everyone group.Now you need to create roaming user profiles for the user accounts in the Sales OU.What should you do()?A、Select all user accounts in the Sales OU. Modify the account properties to specify //File1/Profiles/%username% as the profile path.B、Select all user accounts in the Sales OU. Modify the account properties to specify //File1/Profiles as the profile path.C、Create a Group Policy object (GPO) and link it to the Sales OU. In the User Configuration section of the GPO, configure Folder Redirection to use //File1/Profiles.D、Create a Group Policy object (GPO) and link it to the Domain Controllers OU. In the User Configuration section of the GPO, configure Folder Redirection to use //File1/Profiles.

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

You are the administrator of your company’s network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him. Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer.  You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort. What should you do?()A、Rename Mark’s user account to Eric and change the account password.B、Create Eric’s account by copying Mark’s profile to Eric’s account. Delete Mark’s account.C、Create Eric’s account by copying Marks account. Delete Mark’s account.D、Delete Mark’s account. Add Eric’s account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.

You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A、Place the phone in Bluetooth discovery mode.B、Place the user’s computer in Bluetooth discovery mode.C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D、Install mobile phone synchronization software on the user’s computer.

You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup

You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional. You need to standardize the desktop environment for all client computers. Your solution must prevent domain users from permanently modifying their regional settings or the desktop background. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A、Specify the profile's network path in the user properties in Active Directory Users and Computers.B、Specify the profile's local path in the user properties in Computer Management.C、Specify the profile's network path in the user properties in Computer Management.D、In the network share where profiles reside, rename Ntuser.dat to Ntuser.man.E、In the local profile directory, rename Ntuser.dat to Ntuser.man.F、In the network share where profiles reside, rename Ntuser.ini to Ntuser.man.

You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A、Create an account for Peter's computer in the Computers container.B、Grant the Log on locally user right to Peter's user account.C、Enable Peter's user account.D、Change the properties of Peter's user account so he can log on to any computer.

You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a user named Paul West. You create a user account named Paul West on the Windows 2000 server computer named server 1. You define a network profile by entering the path //server1/profile/%username% in Paul’s user account setting. When Paul logs on to a Windows 2000 Professional computer he sees the following message- “Windows can not locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server.” The details of network cannot be found. You want to configure the roaming user profile for Paul. What should you do?()A、Create a home folder for Paul.B、Share the network profile directory.C、Map a device to network profile directory.D、Use the %username% variable to allow access.

You are a network administrator for ExamSheet.net's Windows 2000 network.  You use a user account named User1 to log on tot a Windows 2000 Professional computer. The computer is used by different students in a classroom. User1 does not have administrative rights. However, you prefer to use this account for your daily activities. Using the Task Scheduler you schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. You configure the task to run as the administrator account.  After the task was scheduled to have run you open the Task Scheduler and discover a status of "Could not start" for the task. You also discover account logon failure audit events in the computer's Security log.You want the scheduled task to successfully run AddUsers.cmd. You want to accomplish this with the least amount of administrative effort.  What should you do?()A、Schedule the task using theATcommand.B、Reenter the password for the administrator account using the Task Scheduler.C、Log on with an administrative account and reschedule the task.D、Log on by using the local Administrator account. Then schedule the task to run under User1.

You are the network administrator for Company. Eric, a user in the accounting department, runs Windows 2000 Professional on his computer. He has 50 MB of free disk space on drive C and 500 MB free disk space on drive D. Eric reports that he is unable to print large Microsoft Word documents without receiving errors. Eric wants to be able to print his large Microsoft Word documents.  What should you instruct Eric to do?()A、From the Printer Properties dialog box, use Advanced settings to configure the spool settings to Start printing immediatelyB、From the Print Server properties dialog box, use Advanced settings to change the location of the spool folder to an existing folder on drive DC、Copy C:///Winnt/system32/Spool/Printers folder to the D:///Winnt/System32/Spool/Printers folderD、Mount drive C as a subdirectory in drive D

You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology (IT) security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()A、Assign the Generate security audits user right to the ITSecurity global group.B、Assign the Manage auditing and security logs user right to the ITSecurity global group.C、Assign the Allow logon through Terminal Services user right to the ITSecurity global group.D、Assign the Act as part of the operating system user right to the ITSecurity global group.

You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()A、Instruct the user to move the documents to the Shared Folders folder.B、Add the user's user account to the local Power Users group.C、Add the user's user account to the Network Configuration Operators group.D、Add the user's user account to the local Adminstrators group.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()AAutomated System Recovery (ASR)BnormalCprimaryDauthoritative

单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0.  CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.

单选题You are the network administrator for ExamSheet inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrator group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary.  Eric wants to prevent Julia from changing the permissions on file that Eric creates. To accomplish his goal, Eric creates a folder named C:/Data. He changes the NTFS permission on C:/Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions.  Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:/Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:/Data.  What should you instruct Eric to do?()AAdd Julia’s user account to the local Power Users group.BAdd Julia’s user account to the local Administrators group.CAllow Julia’s user account Write permissions to C:///Data.DAllow Julia’s user account Full Control permission to C:///Data.

单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. All network servers run Windows Server 2003. Three thousand client computers run Windows 2000Professional, and 1,500 client computers run Windows XP Professional.A new employee named Peter is hired to assist you in installing Windows XP Professional on 150 new client computers.You need to ensure that Peter has only the minimum permissions required to add new computer accounts to the domain and to own the accounts that he creates. Peter must not be able to delete computer accounts.What should you do()?AAdd Peter's user account to the Server Operators group.BAdd Peter's user account to the Account Operators group.CUse the Delegation of Control Wizard to permit Peter's user account to create new computer objects in the Computers container.DCreate a Group Policy object (GPO) and link it to the domain. Configure the GPO to permit Peter's user account to add client computers to the domain.

单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()AmsiBmstCzapDzip

单选题You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()AAdd Julia’s user account to the local Power Users group.BAdd Julia’s user account to the local Administrators group.CAllow Julia’s user account Write permissions to C:///Data.DAllow Julia’s user account Full Control permission to C:///Data.

单选题You are the network administrator for . The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing acquires a subsidiary. You receive a comma delimited file that contains the names of all user accounts at the subsidiary. You need to import these accounts into your domain. Which command should you use?()AldifdeBcsvdeCntdsutil with the authoritative restore optionDdsadd user

单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. The functional level of the domain is Windows Server 2003.Some user accounts have expiring passwords and some do not. You need to identify all user accounts that do not have expiring passwords. You need to modify the passwordproperty to allow the passwords on these accounts to expire. You must complete this task by using the minimum amount of administrative effort.First, you create a saved query to obtain a list of all user accounts that do not have expiring passwords.What should you do next? ()AExport the query results to a comma-delimited file. Use a CSVDE script to modify the password property of each user account.BFrom the Results pane of the query, select all user accounts and modify their password properties simultaneously.CExport the query results to a comma-delimited file. Use an LDIFDE script to modify the password property of each user account.DFrom the Results pane of the query, select each user account and modify the password property, one by one.

单选题You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )AFrom System in Control Panel, select the Change Type option, and then select the Roaming profile option. BFrom Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. CUse the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. DConnect the portable computer to the network, and configure the user accounts for a roaming user profile.

单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()AThe SetupUser profileBThe Default User profileCThe Administrator profileDThe System profileEThe All Users profile

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()AAutomated System Recovery (ASR)BnormalCprimaryDauthoritative