单选题You have forgotten the root user account password. You decide to reset the password and execute the following: Shell> /etc/init.d/mysql stop Shell> /etc/init.d/mysql start – skip-grant tables Which additional argument makes this operation safer?()A–skip-networking, to prohibit access from remote locationsB–reset-grant-tables, to start the server with only the mysql database accessibleC–read-only,to set all data to read-only except for super usersD–old-passwords, to start Mysql to use the old password format while running without the grant tables
单选题
You have forgotten the root user account password. You decide to reset the password and execute the following: Shell> /etc/init.d/mysql stop Shell> /etc/init.d/mysql start – skip-grant tables Which additional argument makes this operation safer?()
A
–skip-networking, to prohibit access from remote locations
B
–reset-grant-tables, to start the server with only the mysql database accessible
C
–read-only,to set all data to read-only except for super users
D
–old-passwords, to start Mysql to use the old password format while running without the grant tables
参考解析
解析:
暂无解析
相关考题:
You have a computer that runs Windows Vista.You need to configure your computer so that you can interact with your desktop when you are prompted for user account control permissions.What should you do?()A.AB.BC.CD.D
You install Windows Vista on a new computer by using the default settings. You create an administrator account and a standard user account.You log on to the computer as the standard user and attempt to install a new application. You are prompted for user credentials to complete the installation.You need to install the application on the computer.What should you do?()A.AB.BC.CD.D
Essentially, you will be posting your work on our non-fiction book review board, which you can accessonly with an administration-approved user name and password. Since you need a password to log in,your () password is: crimson. You can change this password for your convenience after you have logged on to the site.Welcome again, and we look forward to working with you!A.temporaryB.approximateC.previousD.permanent
A user selects their proper domain and is unable to log into their Windows computer.The error states:‘System cannot log you on to the domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect’.Which of the following is the MOST likely cause for this error?()A、The computer’s account was removed from Active Directory.B、The user’s account was removed from Active Directory.C、The computer was disjoined from the domain.D、The user typed in the wrong password.
You have a computer that runs Windows 7. The computer is a member of a domain. You share D:/data asData. You assign Everyone Full control share permissions to the folder. No other share permissions areassigned to the folder. From another computer, you attempt to create a file in the Data share by using a domain account named User1. You receive the following error message: Destination Folder Access Denied.You need to ensure that you can create files in the Data share by using the User1 account. What should you do?()A、Create a local user named User1.B、Add User1 to the local Power Users group.C、Assign User1 Write NTFS permission on the D:///data folder.D、Assign User1 Full control share permissions to the Data share.
You are the administrator of your company’s network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him. Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer. You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort. What should you do?()A、Rename Mark’s user account to Eric and change the account password.B、Create Eric’s account by copying Mark’s profile to Eric’s account. Delete Mark’s account.C、Create Eric’s account by copying Marks account. Delete Mark’s account.D、Delete Mark’s account. Add Eric’s account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.
You are the administrator of a Windows 2000 network. You use a user account named User1 to log on to a Windows 2000 Professional computer. Different students in a classroom use this Computer. User does not have administrative rights. However, you prefer to use this account for most of your daily activities, because it is not a security breach if you fail to log off. You want to schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. What should you do?()A、Schedule the task to run under an Administrative accountB、Log on by using the local Administrator account. Then schedule the task to run under User1C、Take the ownership of Addusers.cmd file. Then schedule the task to run under User1D、Grant User1 Read Execute permission for AddUsers.cmd. Then schedule the task to run under User1.
You are planning the configuration of SQL1.You need to use the most appropriate Windows account for the SQL Server service. Which account should you use?()A、a domain user accountB、a local user accountC、the NETWORK SERVICE accountD、the LOCAL SYSTEM account
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. All users have Windows Mobile 6.5 devices that connect to the organization by using Exchange ActiveSync. A user named User1 reports that she lost her device and successfully performed a remote wipe of the device. User1 later reports that she located her device. User1 configures the device to connect to Exchange ActiveSync and discovers that the connection fails. You need to ensure that User1 can connect her device by using Exchange ActiveSync. What should you do?()A、Instruct User1 to perform a hardware reset on the device.B、Instruct User1 to use the Exchange Control Panel (ECP) to modify the device list.C、Run the Set-ActiveSyncDeviceAccessRule cmdlet from the Exchange Management Shell.D、Instruct User1 to change her user account password.
Your network contains an Active Directory forest. The forest contains two domains. You have a standalone root certification authority (CA). On a server in the child domain, you run the Add Roles Wizard and discover that the option to select an enterprise CA is disabled. You need to install an enterprise subordinate CA on the server. What should you use to log on to the new server()A、an account that is a member of the Certificate Publishers group in the child domainB、an account that is a member of the Certificate Publishers group in the forest root domainC、an account that is a member of the Schema Admins group in the forest root domainD、an account that is a member of the Enterprise Admins group in the forest root domain
You are the administrator of an Active Directory domain named A user reports that he forgot his password and cannot log on to the domain. You discover that yesterday morning the user reset his password and successfully logged on to the domain. You need to enable the user to log on to the domain. What should you do? ()(Choose two)A、Use Active Directory Users and Computers to move the account to the default organizational unit (OU) named Users. Instruct the user to restart his computer.B、Use Active Directory Users and Computers to open the account properties for the user's user account. Clear the Account is locked out check box, and select the User must change password at next logon check box.C、Use Active Directory Users and Computers to reset the user's password. Give the user the new password.D、Use Computer Management to reset the password for the local Administrator account.
Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA. What should you do?()A、 Assign the user account to the CA Admin role.B、 Add the user account to the local Administrators group.C、 Grant the user the Back up files and directories user right.D、 Grant the user the Manage auditing and security log user right.
You install Microsoft Windows Vista on a computer. You will share the computer with another user. You need to prevent the user from making unauthorized changes to the computer. What should you do? ()A、Add the user to the Guests group.B、Create a standard user account for the user.C、Create an administrator account for the user.D、Add the user to the Remote Desktop Users group.
You are a network administrator for ExamSheet.net's Windows 2000 network. You use a user account named User1 to log on tot a Windows 2000 Professional computer. The computer is used by different students in a classroom. User1 does not have administrative rights. However, you prefer to use this account for your daily activities. Using the Task Scheduler you schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. You configure the task to run as the administrator account. After the task was scheduled to have run you open the Task Scheduler and discover a status of "Could not start" for the task. You also discover account logon failure audit events in the computer's Security log.You want the scheduled task to successfully run AddUsers.cmd. You want to accomplish this with the least amount of administrative effort. What should you do?()A、Schedule the task using theATcommand.B、Reenter the password for the administrator account using the Task Scheduler.C、Log on with an administrative account and reschedule the task.D、Log on by using the local Administrator account. Then schedule the task to run under User1.
You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2. The company security policy requires complex passwords on all the Microsoft Windows Mobilebased devices. You provide a Microsoft Windows Mobile 5.0 smartphonebased device to a new user. The first time the user uses the device, the user is not prompted for a password. You need to ensure that the user is prompted for a password. What should you do?()A、Instruct the user to set a PIN on the mobile device.B、Instruct the user to perform Microsoft Exchange ActiveSync synchronization Over-The-Air (OTA).C、On the Device Security Settings tab, select the Require both numbers and letters option.D、Add the user account of the user to the Exceptions list on the Device Security Settings tab.
You are the network administrator for The network consists of a single Active Directory domain named The functional level of the domain is Windows Server 2003. Some user accounts have expiring passwords and some do not. You need to identify all user accounts that do not have expiring passwords. You need to modify the password property to allow the passwords on these accounts to expire. You must complete this task by using the minimum amount of administrative effort. First, you create a saved query to obtain a list of all user accounts that do not have expiring passwords. What should you do next?()A、Export the query results to a comma-delimited file. Use a CSVDE script to modify the password property of each user account.B、From the Results pane of the query, select all user accounts and modify their password properties simultaneously.C、Export the query results to a comma-delimited file. Use an LDIFDE script to modify the password property of each user account.D、From the Results pane of the query, select each user account and modify the password property, one by one.
单选题. Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You create a new domain user account named User1 and assign the account a password of P@ssw0rd. On the new account, you enable the User must change password at next logon option. A week later, you discover that User1 is still using the password P@ssw0rd to log on to the domain. You need to ensure that User1 is forced to use a different password the next time she changes her password. What should you do first? ()AIn the Default Domain Policy, select Enforce password history.BIn the Default Domain Policy, select Passwords must meet complexity requirements.CFrom the User’s account properties, select Account is sensitive and cannot be delegated.DFrom the User’s account properties, select Store password using reversible encryption.
单选题You have forgotten the root user account password. You decide to reset the password and execute the following: Shell> /etc/init.d/mysql stop Shell> /etc/init.d/mysql start – skip-grant tables Which additional argument makes this operation safer?()A–skip-networking, to prohibit access from remote locationsB–reset-grant-tables, to start the server with only the mysql database accessibleC–read-only,to set all data to read-only except for super usersD–old-passwords, to start Mysql to use the old password format while running without the grant tables
单选题Your network has a single domain with 1,000 client computers that run Windows 7. You use Microsoft System Center Configuration Manager 2007 to distribute and install software applications. All users have standard user accounts. You plan to use Group Policy to ensure that application installation functions properly. You need to design the User Account Control (UAC) policy. What should you do?()A Configure the User Account Control: Only elevate executables that are signed and validated setting to be Enabled.B Configure the User Account Control: Detect application installations and prompt for elevation setting to be Enabled.C Configure the User Account Control: Detect application installations and prompt for elevation setting to be DisabledD Configure the User Account Control: Behavior of the elevation prompt for standard users setting to be Prompt for credentials.
单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. The functional level of the domain is Windows Server 2003.Some user accounts have expiring passwords and some do not. You need to identify all user accounts that do not have expiring passwords. You need to modify the passwordproperty to allow the passwords on these accounts to expire. You must complete this task by using the minimum amount of administrative effort.First, you create a saved query to obtain a list of all user accounts that do not have expiring passwords.What should you do next? ()AExport the query results to a comma-delimited file. Use a CSVDE script to modify the password property of each user account.BFrom the Results pane of the query, select all user accounts and modify their password properties simultaneously.CExport the query results to a comma-delimited file. Use an LDIFDE script to modify the password property of each user account.DFrom the Results pane of the query, select each user account and modify the password property, one by one.
单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()ARun ipconfig /flushdns at the command prompt. BReset the password for the local administrator user account. CFrom the Internet Options in Internet Explorer, clear the AutoComplete history.DFrom the Internet Options in Internet Explorer, delete the Temporary Internet Files.
单选题A user selects their proper domain and is unable to log into their Windows computer.The error states:‘System cannot log you on to the domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect’.Which of the following is the MOST likely cause for this error?()AThe computer’s account was removed from Active Directory.BThe user’s account was removed from Active Directory.CThe computer was disjoined from the domain.DThe user typed in the wrong password.
单选题You are planning the configuration of SQL1.You need to use the most appropriate Windows account for the SQL Server service. Which account should you use?()Aa domain user accountBa local user accountCthe NETWORK SERVICE accountDthe LOCAL SYSTEM account
单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA. What should you do?()A Assign the user account to the CA Admin role.B Add the user account to the local Administrators group.C Grant the user the Back up files and directories user right.D Grant the user the Manage auditing and security log user right.
单选题Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You install an application that requires a user account enabled for constrained delegation. You create the required user account. When you attempt to configure constrained delegation, you discover that the Delegation tab does not appear in the user account properties. You need to ensure that the Delegation tab appears in the user account properties. What should you do?()ARaise the forest functional level.BAdd the user account to the Domain Admins group.CRegister a service principal name (SPN) for the user account.DSelect the Trust this computer for delegation to specified services only option on all domain controllers.
单选题You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user. What should you do? ()AEnable the User Account Control: Only elevate executables that are signed and validated option.BDisable the User Account Control: Only elevate executables that are signed and validated option.CConfigure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.DConfigure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.
单选题You have forgotten the root user account password. You decide to reset the password and execute the following: Shell> /etc/init.d/mysql stop Shell> /etc/init.d/mysql start – skip-grant tables Which additional argument makes this operation safer?()A–skip-networking, to prohibit access from remote locationsB–reset-grant-tables, to start the server with only the mysql database accessibleC–read-only,to set all data to read-only except for super usersD–old-passwords, to start Mysql to use the old password format while running without the grant tables
单选题Your network contains an Active Directory forest. The forest contains two domains. You have a standalone root certification authority (CA). On a server in the child domain, you run the Add Roles Wizard and discover that the option to select an enterprise CA is disabled. You need to install an enterprise subordinate CA on the server. What should you use to log on to the new server()Aan account that is a member of the Certificate Publishers group in the child domainBan account that is a member of the Certificate Publishers group in the forest root domainCan account that is a member of the Schema Admins group in the forest root domainDan account that is a member of the Enterprise Admins group in the forest root domain