单选题An internal user has deleted a file named, pagefile.sys and is concerned this deletion may affect the computer. The user should be instructed to:()Areboot the computer because Windows automatically generates a new page file.Badd a new hard drive, format the drive and install Windows.Cback up all data, reboot the computer and notify a desktop technician.Dreformat the hard drive and reinstall Windows.

单选题
An internal user has deleted a file named, pagefile.sys and is concerned this deletion may affect the computer. The user should be instructed to:()
A

reboot the computer because Windows automatically generates a new page file.

B

add a new hard drive, format the drive and install Windows.

C

back up all data, reboot the computer and notify a desktop technician.

D

reformat the hard drive and reinstall Windows.


参考解析

解析: 暂无解析

相关考题:

Given that the current directory is empty, and that the user has read and write permissions, and the following:Which statement is true?() A.Compilation fails.B.The file system has a new empty directory named dir.C.The file system has a new empty directory named newDir.D.The file system has a directory named dir, containing a file f1.txt.E.The file system has a directory named newDir, containing a file f1.txt.

下列Java标识符,错误的是 ( )A._sys_varlB.$changeC.User_nameD.1_file

Files /tmp/file2 and /tmp/file3 are hard linked to /tmp/file1.What will the result be if a user makes changes to /tmp/file2 at the same time another user tries to delete /tmp/file1?() A.All three files will contain the updates and will remain available.B.All three files will be deleted and no changes will be made to /tmp/file2.C.Only /tmp/file2 will contain the updates, but /tmp/file3 will remain available.D.Both /tmp/file2 and /tmp/file3 will contain the updates and will remain available.

You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003.A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup.You need to enable the user to log on to the domain. You must ensure that the user retains access to resources.What should you do?()A. Install a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.B. Decrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.C. Perform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.D. Re-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.

A user is browsing to a newly created internal site called www.comptia.org. After putting incredentials the page comes up blank. Which of the following is MOST likely the cause?()A、The user must add the new site to the local log file.B、A proxy exception has not been configured.C、SMTP has not been configured.D、The loopback address has not been configured.

Files /tmp/file2 and /tmp/file3 are hard linked to /tmp/file1. What will the result be if a user makes changes to /tmp/file2 at the same time another user tries to delete /tmp/file1?()A、All three files will contain the updates and will remain available.B、All three files will be deleted and no changes will be made to /tmp/file2.C、Only /tmp/file2 will contain the updates, but /tmp/file3 will remain available.D、Both /tmp/file2 and /tmp/file3 will contain the updates and will remain available.

Your network contains a domain controller that has two network connections named Internal and  Private. Internal has an IP address of 192.168.0.20. Private has an IP address of 10.10.10.5.  You need to prevent the domain controller from registering Host (A) records for the 10.10.10.5 IP address.   What should you do()A、Modify the netlogon.dns file on the domain controller.B、Modify the Name Server settings of the DNS zone for the domain.C、Modify the properties of the Private network connection on the domain controller.D、Disable netmask ordering on the DNS server that hosts the DNS zone for the domain.

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a user account named User1. You need to identify which permissions User1 has on a file. What should you do? ()A、At a command prompt, run Net file.B、At a command prompt, run Attrib.exe.C、From the file properties, view the Summary settings.D、From the file properties, view the Advanced Security settings.

You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You enable Shadow Copies on all drives by using the default options. You run a full backup every Monday at 02:00. You run an incremental backup every day at 02:00, except on Monday. On Thursday at 14:00, a user reports that he accidentally deleted a file named File1.doc in a shared folder named //Server1/Data/. The user reports that the file was last updated at 09:00 on Thursday. You need to restore the latest version of File1.doc. What should you restore? ()A、the file by using the Previous Versions ClientB、the file from the full backup performed on MondayC、the file from the incremental backup performed on ThursdayD、the user’s computer by using Automated System Recovery (ASR)

You are the network administrator for Company.A user named Bruno has limited dexterity, which prevents him from using the standard keyboardcompleting his daily computing tasks. You configure his Windows 2000 Professional computer to use theon-screen keyboard and ToggleKeys option. You save the accessibility option settings to a floppy disk.You copy the .acw file to the desktop of another user named Peter. Peter’s domain user account is amember of the local Power Users group. Peter executes the .acw file. Peter informs you that theaccessibility options are not to his liking.You want to remove the accessibility options enabled by the .acw file on Peter’s computer.What should you do? ()A、Delete the .acw file from Peter’s desktop.B、Remove Peter’s account from the local Power Users group.C、Run the Accessibility wizard and select Restore Defaults.D、Use Task Manager to end the Explorer.exe process.

单选题Your network contains an Exchange Server 2010 Mailbox server.The server has one mailbox database.A user named User1 reports that he has multiple corrupted e-mail messages in his mailbox.You need to recover User1ˉs -mail messages.The solution must not delete any other e-mail messages in the mailbox database.What should you do?()ACreate a new Mailbox Recovery Database, restore a backup of the database file, and then run the Export-Mailbox cmdlet.BCreate a new Mailbox Recovery Database, restore a backup of the database file, and then run the Restore-Mailbox cmdlet.CCreate a database availability group (DAG), restore a backup of the mailbox database file, and then run the Restore-Mailbox cmdlet.DCreate a database availability group (DAG), restore a backup of the mailbox database file, and then run the Export-Mailbox cmdlet.

单选题You issue the following RMAN command to set a retention policy on a database:   RMANCONFIGURE RETENTION POLICY TO REDUNDANCY 2;   What will be the outcome of issuing this command?()A After two days,a backup will be marked obsoleteB After two days,a backup will be deleted from the mediaC If the RMAN repository has records of two or more recent backups of a file,then older backups will be deleted from the media.D If the RMAN repository has records of two or more recent backups of a file then older backups will be marked obsolete.

单选题MySQL is installed on a Linux server and has the following configuration: What is the purpose of changing ownership of datadir to the ‘mysql’ user?()A MySQL requires correct file ownership while remaining secureB MySQL needs to be run as the root user, but file cannot be owned by itC MySQL cannot be run as the root user

单选题In a Windows Server 2003 environment using PKI, a user encrypts several documents on a shared file server. That user account is then accidentally deleted. Which of the following must be configured in order to decrypt those files?()AKey recovery administratorBKey recovery agentCTrusted root certificate storeDRoot certificate store

单选题A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()AInstruct User1 to create a new user certificate on Computer2.BInstruct User1 to take ownership of the encrypted files on Computer2.CInstruct User1 to import the user certificate from Computer1 to Computer2.  DLog on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

单选题You issue the following RMAN command to set a retention policy on a database:       RMANCONFIGURE RETENTION POLICY TO REDUNDANCY 2;   What will be the outcome of the above command?()A After two days, the backup will be marked obsolete.B After two days, the backup will be deleted from the media.C If the RMAN repository has records of two or more recent backups of a file, then the older backup will be deleted from the media.D If the RMAN repository has records of two or more recent backups of a file, then the older backup will be marked obsolete.

单选题Which statements are true, given the code new FileOutputStream("data", true) for creating an object of class FileOutputStream?()AFileOutputStream has no constructors matching the given arguments.BAn IOExeception will be thrown if a file named data already exists.CAn IOExeception will be thrown if a file named data does not already exist.DIf a file named data exists, its contents will be reset and overwritten.EIf a file named data exists, output will be appended to its current contents.

单选题A user is browsing to a newly created internal site called www.comptia.org. After putting incredentials the page comes up blank. Which of the following is MOST likely the cause?()AThe user must add the new site to the local log file.BA proxy exception has not been configured.CSMTP has not been configured.DThe loopback address has not been configured.

单选题You have a computer that runs Windows XP Professional. Two users named User1 and User2 share the computer. User1 and User2 encrypt files on the computer. User1 encrypts a file named file1. doc. You need ensure that both User1 and User2 can view the contents of file1. doc. What should you instruct User1 to do?()AAdd the certificate of User2 to file1. doc. BAssign User2 the Full Control NTFS permission on file1. doc. CCopy file1. doc the %systemroot%/documents and settings/all users/ folder.DMove file1. doc to the %systemroot%/documents and settings/all users/ folder.

单选题You issue the following RMAN command to set a retention policy on a database: RMANCONFIGURE RETENTION POLICY TO REDUNDANCY 2; What will be the outcome of issuing this command?()AAfter two days, a backup will be marked obsoleteBAfter two days, a backup will be deleted from the mediaCIf the RMAN repository has records of two or more recent backups of a file, then older backups will be deleted from the media.DIf the RMAN repository has records of two or more recent backups of a file, then older backups will be marked obsolete.

单选题You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You enable Shadow Copies on all drives by using the default options. You run a full backup every Monday at 02:00. You run an incremental backup every day at 02:00, except on Monday. On Thursday at 14:00, a user reports that he accidentally deleted a file named File1.doc in a shared folder named //Server1/Data/. The user reports that the file was last updated at 09:00 on Thursday. You need to restore the latest version of File1.doc. What should you restore? ()Athe file by using the Previous Versions ClientBthe file from the full backup performed on MondayCthe file from the incremental backup performed on ThursdayDthe user’s computer by using Automated System Recovery (ASR)

单选题You have an Organization 2010.Internal user named User1 sends a confidential message to another internal user named User2.User1 does not have any administrative privileges in theory. You need to ensure User1 can identify whether the message was successfully delivered?. What should you instruct User1 to do?()AView the message headers in the sent item folderBOpen Microsoft Outlook and modify Read Receipt SettingsCOpen Microsoft Outlook and modify Delivery Receipt SettingsDOpen the ECP and select Organize E-Mail

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a user account named User1. You need to identify which permissions User1 has on a file. What should you do? ()AAt a command prompt, run Net file.BAt a command prompt, run Attrib.exe.CFrom the file properties, view the Summary settings.DFrom the file properties, view the Advanced Security settings.

单选题You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003. A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup. You need to enable the user to log on to the domain. You must ensure that the user retains access to resources. What should you do?()AInstall a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.BDecrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.CPerform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.DRe-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.