单选题Which of the following terms describes files and folders in sub-directories having the samepermissions as the root or parent directory?()ALeast privilegeBDefault permissionsCLocal sharesDInheritance

单选题
Which of the following terms describes files and folders in sub-directories having the samepermissions as the root or parent directory?()
A

Least privilege

B

Default permissions

C

Local shares

D

Inheritance


参考解析

解析: 暂无解析

相关考题:

Your data recovery strategy must meet the following requirements:·Back up all data files and folders in C:\Data.·Restore individual files and folders in C:\Data.·Ensure that data is backed up to and restored from external media.What should you do?()A.AB.BC.CD.D

Which of the following is true when Bob, a technician, is setting default security permissions on a folder?()A、There are no significant changes to other files.B、The created folder inherits the most restrictive permissions within the folder.C、The permissions are inherited by all files and folders within that folder.D、All folders within that folder are given a restrictive password.

A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A、The user copied to a read-only folder share.B、The user changed the attributes of the files.C、The user copied the files from the local My Documents folder.D、The user moved instead of copied the files.

A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.

Which of the following terms describes files and folders in sub-directories having the samepermissions as the root or parent directory?()A、Least privilegeB、Default permissionsC、Local sharesD、Inheritance

Which of the following BEST describes the purpose of user account control (UAC) in WindowsVista?()A、UAC ensures that standard users cannot access the files and folders of administrative users.B、UAC allows a computer administrator to add new user accounts to the system, configure passwords and settings for existing users, or remove existing user accounts.C、UAC ensures that viruses and other malware cannot infect the computer, eliminating the need for third-party antivirus solutions.D、UAC ensures that important changes cannot be made to Windows Vista without the permission of a computer administrator.

Which of the following tools is used to consolidate files and folders on a local drive?()A、CHKDSKB、DEFRAGC、DISK CLEANUPD、Computer Management

Which of the following server types stores users’ home directory folders?()A、ApplicationB、FileC、Directory servicesD、Print

After moving files from one folder to another, the technician cannot access them. Which of the following MUST the technician do to regain access to these files?()A、In folder options, select show hidden files and folders.B、Perform the transfer again.C、Reboot the system; access will be reset automatically.D、Take ownership of the files.

When integrating a media server into a home theater, which of the following terms BEST describes the technology used to protect the interest of copyright holders (e.g. multimedia content)?()A、Digital Rights Management (DRM)B、MPEG Layer-3 (MP3)C、Internet Key Exchange (IKE)D、Content Management System (CMS)

Which of the following commands are used to create folders in a command prompt?()A、CDB、RDC、MDD、SD

Which of the following BEST describes RAID 1?()A、MirroringB、StripingC、Striping with parityD、Striping with mirroring

Which of the following describes an area where communications equipment is stored?()A、HVACB、MDFC、110 blockD、Demarc

When setting security permissions on a folder, which of the following properties apply?()A、Guest users are allowed changed permissions.B、All sub-folders inherit the most restrictive permissions within the folder.C、All sub-folders within that folder are given a password.D、By default, read permissions are denied on all files within the folder.

You are a help desk technician for your company. All employees use Windows XP Professional computers. A salesperson named Philippe receives a removable disk drive cartridge from his supervisor. Philippe now reports that he cannot edit files on the cartridge. When he tries to open any files or folders on the cartridge, he receives an “access denied” error message. Philippe’s supervisor is currently out of the office. You place the cartridge in the removable drive on your computer. You receive the same “access denied” error message when you try to access the files and folders. You call Philippe’s supervisor. She asks you to grant permission to access the contents of the cartridge only to Philippe. However, she also wants to prevent Philippe from changing permissions on the contents of the cartridge. Which two actions should you take?()A、As Administrator, take ownership of the files and folders. B、As Administrator, grant your help desk user account Allow - Full Control permission on the files and folders.C、Grant Philippe Allow - Modify permission on the files and folders.D、Grant Philippe Allow - Full Control permission on the files and folders.E、Grant Philippe Allow - Take Ownership permission on the files and folders.

Your data recovery strategy must meet the following requirements: Back up all data files and folders in C:///Data.  Restore individual files and folders in C:///Data.  Ensure that data is backed up to and restored from external media.  What should you do?()A、Use the Previous Versions feature to restore the files and folders.B、Use the System Restore feature to perform backup and restore operations.C、Use the NTBackup utility to back up and restore individual files and folders.D、Use the Backup and Restore Center to back up and restore files.

单选题Which of the following is true when Bob, a technician, is setting default security permissions on a folder?()AThere are no significant changes to other files.BThe created folder inherits the most restrictive permissions within the folder.CThe permissions are inherited by all files and folders within that folder.DAll folders within that folder are given a restrictive password.

单选题which of the following terms best describes the pair of words kill and dill?Aminimal pairBphonemic contrastCClosed class wordsDBound morphemes

单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A Enable audit object access and specify files and folders to monitor using Task Manager.B Enable audit policy change and specify files and folders to monitor using Windows Explorer.C Enable audit object access and specify files and folders to monitor using Windows Explorer.D Open Performance Monitor and monitor folder activity.

单选题After moving files from one folder to another, the technician cannot access them. Which of the following MUST the technician do to regain access to these files?()AIn folder options, select show hidden files and folders.BPerform the transfer again.CReboot the system; access will be reset automatically.DTake ownership of the files.

单选题Which of the following describes a secure connection over the Internet between two sites?()AFTPBVLANCVPNDHTTP

单选题When setting security permissions on a folder, which of the following properties apply?()AGuest users are allowed changed permissions.BAll sub-folders inherit the most restrictive permissions within the folder.CAll sub-folders within that folder are given a password.DBy default, read permissions are denied on all files within the folder.

单选题You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You back up the shared folders on the servers by using the following schedule: ·Full backup at 01:00 every Sunday ·Incremental backup at 01:00 every Monday to Friday On a Wednesday afternoon, the hard disk drive that contains the shared folders fails. You need to restore the latest version of all files in the shared folders. The solution must use as few backup tapes as possible. What should you restore?()Athe files from the full backupBthe files from the full backup and from the Monday, Tuesday, and Wednesday backupsCthe files from the full backup and from the Wednesday backupDthe files from the Wednesday backup

单选题A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()AThe user copied to a read-only folder share.BThe user changed the attributes of the files.CThe user copied the files from the local My Documents folder.DThe user moved instead of copied the files.

单选题Which of the following best describes a full backup? ()AAll datafiles of a database BAll datafiles, archive logs, and control files CAll datafiles and control files DAll the used blocks in a datafile

单选题Which of the following best describes the organization of the text as a whole?AA phenomenon is described and an interpretation presented and rejected.BA generalization is made and supporting evidence is supplied and weighed.CA contradiction is noted and a resolution is suggested and then modified.DA series of observations is presented and explained in terms of the dominant theory.