单选题You are the administrator of Megaton Enterprises. Your Windows 2000 network has 14-shared folders that are available to other network users. A user named Mike reports that he cannot access a shared folder named ‘FolderX’. You want to respond to Mike’s problem as quickly as possible by using an administrative tool. However, you cannot remember the server location of the shared folder. What step should you follow in order to resolve Mike’s problem as quickly as possible?()AUse Windows Explorer to display the file paths of your shared folders.BUse the Storage snap-in in Computer Management to view local drive properties.CUse Event Viewer in Computer Management to search for shared folder, look for errormessages.DUse System Tools in Computer Management to display the file paths of your shared folders.

单选题
You are the administrator of Megaton Enterprises. Your Windows 2000 network has 14-shared folders that are available to other network users. A user named Mike reports that he cannot access a shared folder named ‘FolderX’. You want to respond to Mike’s problem as quickly as possible by using an administrative tool. However, you cannot remember the server location of the shared folder. What step should you follow in order to resolve Mike’s problem as quickly as possible?()
A

Use Windows Explorer to display the file paths of your shared folders.

B

Use the Storage snap-in in Computer Management to view local drive properties.

C

Use Event Viewer in Computer Management to search for shared folder, look for errormessages.

D

Use System Tools in Computer Management to display the file paths of your shared folders.


参考解析

解析: You can Use System Tools in Computer Management to display the file paths of your shared folders.
You can also see the complete path of your shared folders with the help of windows explorer but it is not the quickest way.  
Storage snap-in is used the see the detail of your drives and their drive letters.  
Event viewer is used to see the detail of error messages but not the shared folders path.

相关考题:

You are an administrator of the Ezonexam switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in the Ezonexam network.However, you need to share the VLAN information across numerous switches. Which of the following would allow you accomplish this?A. STPB. GVRPC. SNMPD. VTPE. DHCPF. None of the above

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

The database administrator of your company created a public synonym called HR for the HUMAN_RESOURCES table of the GENERAL schema, because many users frequently use this table. As a user of the database, you created a table called HR in your schema. What happens when you execute this query? SELECT * FROM HR; ()A、You obtain the results retrieved from the public synonym HR created by the database administrator.B、You obtain the results retrieved from the HR table that belongs to your schema.C、You get an error message because you cannot retrieve from a table that has the same name as a public synonym.D、You obtain the results retrieved from both the public synonym HR and the HR table that belongs to your schema, as a Cartesian product.E、You obtain the results retrieved from both the public synonym HR and the HR table that belongs to your schema, as a FULL JOIN.

You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?()A、Bandwidth 56000B、Bandwidth 56000000C、Bandwidth 56D、Bandwidth 56kbps

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

You configure parental controls on your computer for your childs user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inappropriate Web sites.  What should you do? ()A、Enable Microsoft Windows Firewall.B、Disable the default administrator account.C、Use password protection for all user accounts.D、Configure Web sites you approve of in the list of Trusted Sites of Microsoft Windows Internet Explorer.

You are the administrator of B  G Enterprises. Your Windows 2000 Server is configured to use the NWLink IPX/SPX compatible protocol. Your network clients also use NWLink IPX/SPX protocol. Your clients complain that they are not able to connect to the Windows 2000 Server; they can however connect to each other. What is the most likely cause of the problem? ()A、The SUBNET Mask was set incorrectly.B、File permissions were set to no access.C、An incorrect frame type was selected on the server.D、The workstation service on the Windows 2000 Server failed to start.

You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files.D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B、Start the RunAs service and configure the service to start automatically.C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D、Use Scheduled Tasks to configure the task to run under the security context of your account.

You are the administrator of a small network supporting Windows NT 4.0 computers. You configure a setup script to automatically upgrade Windows NT Workstation 4.0 computers to Windows 2000 Professional. When you attempt to test the process on a single computer, you receive this error message:  "The specified Setup script file (path:/unattend.txt) is inaccessible or invalid.  Contact your system administrator."    Which action will most likely resolve this error? ()A、Add the UnattendedInstall="Yes" parameter to the [Unattended] section of your Unattend.txt fileB、Add the UnattendMode=FullUnattended parameter to the [Data] section of your Unattend.txt fileC、Add the UnattendedInstall="Yes" parameter to the [GuiUnattended] section   of your Unattend.txt fileD、Add the UnattendMode=FullUnattended parameter to the [Unattended] section of your Unattend.txt file

You are the administrator of Megaton Enterprises. Your Windows 2000 network has 14-shared folders that are available to other network users. A user named Mike reports that he cannot access a shared folder named ‘FolderX’. You want to respond to Mike’s problem as quickly as possible by using an administrative tool. However, you cannot remember the server location of the shared folder. What step should you follow in order to resolve Mike’s problem as quickly as possible?()A、Use Windows Explorer to display the file paths of your shared folders.B、Use the Storage snap-in in Computer Management to view local drive properties.C、Use Event Viewer in Computer Management to search for shared folder, look for errormessages.D、Use System Tools in Computer Management to display the file paths of your shared folders.

You are the administrator of Etechsol.com Enterprises. Your company consists of a small 20-user network. Management has decided to upgrade all computers to Windows 2000.   After having a closer examination of your company’s network, you realize that only half of the network interface cards are Net PC compliant. You decide to create Windows 2000 remote boot floppies.  What executable is used for creating RIS boot disks for non-PXE compliant clients?()A、RBFG*EXEB、RIPREP*EXEC、RIS*EXED、RISPXE*EXEE、RISBOO*EXE

多选题You have a share on your local computer. Someone has been intentionally damaging your files.  You want to be able to know which account is doing this. What do you do? ()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'.CUse Windows Explorer to turn on auditing for the specific files.DHave the administrator for domains log you on as an administrator and enable auditing for a  specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP

单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()AmsiBmstCzapDzip

多选题You are the administrator of a Windows 2000 Professional computer, which has a 56 Kbps modem, connected to itself. You want the users on your company’s network to be able to connect to the Internet using your computer. But, you do not want to allow any other operations than HTTP and FTP. Which ports will you allow through this connection? ()APort 80BPort 21CPort 25DPort 81

单选题Your network contains a single Active Directory domain. All servers on the network are members of the domain. You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has two NTFS partitions. You create and share a folder named Data in the root of a partition on Server1. You log on to your computer by using the domain Administrator account and discover that you cannot modify files in the Data share. You need to ensure that the Administrator can modify files in the Data share. The solution must use the minimum amount of permissions. What should you do? ()AModify the NTFS permissions on the Data folder.BModify the share permissions on the Data share.CAdd the domain administrator to the local Administrator’s group on Server1.DMove the Data folder to a new file allocation table (FAT) partition. Share the folder by using the default permissions.

单选题When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()Aidentify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator Bidentify CSQs and JTAPI user and designate a Cisco CRS administrator Cidentify resources and RM user and enter information about your LDAP Didentify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources

单选题You want to connect to your branch office printer through the browser. Your Windows 2000 Professional computer is running Peer Web Server. You were told the share name of the printer is HPColorL. You are unable to see it when you type its URL. What do you need to do to connect to this printer? ()ADouble-click the connect hotspot in the left pane of the printer's dialog box to view the printer. BAsk the branch office administrator to reinstall the printer by using its URL as the port. CInstall Internet Explorer 3.0 or higher on your Windows 2000 Professional.DAsk the administrator at the branch office to install IIS on the branch server.

单选题You are the administrator of B  G Enterprises. Your Windows 2000 Server is configured to use the NWLink IPX/SPX compatible protocol. Your network clients also use NWLink IPX/SPX protocol. Your clients complain that they are not able to connect to the Windows 2000 Server; they can however connect to each other. What is the most likely cause of the problem? ()AThe SUBNET Mask was set incorrectly.BFile permissions were set to no access.CAn incorrect frame type was selected on the server.DThe workstation service on the Windows 2000 Server failed to start.

单选题You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case? ()AHot backupBOnline backupCconsistent backupDincremental backupEinconsistent backup

单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.

单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.