单选题To force a user to use Ctrl-Alt-Delete to log into the computer, a technician can go to Control Panel then:()AAccessibility options.BSecurity Center.CUser accounts and the Advanced tab.DWindows Firewall.

单选题
To force a user to use Ctrl-Alt-Delete to log into the computer, a technician can go to Control Panel then:()
A

Accessibility options.

B

Security Center.

C

User accounts and the Advanced tab.

D

Windows Firewall.


参考解析

解析: 暂无解析

相关考题:

You are the administrator of a Windows 2000 Professional computer that is shared by several users in the Sales department. User accounts have been created for current users. Current users can log on to the computers. To accommodate new users, you add two new user accounts named User7 and User8 to computer5. When User7 attempts to log on o the computer, she receives the following error message: "Windows cannot copy file C:\Documents and Settings\Default User\ to location C:\Documents and Settings\User7. Contact your network administrator. Detail - Access is denied." When User8 attempts to log on to the computer, he receives the same type of error message.You want to allow the two new users, as well as other users in the Sales department, to be able to log on to the computer.Which two methods can you use to accomplish your goal? (Choose two.)A.Add the User7 and User8 user accounts to the DACL for the Profiles shared folder on the network server.B.Add the User7 and User8 user accounts to the DACL for the C:\Documents and Settings\Default User folder.C.Add the Everyone group to the DACL for the C:\Documents and Settings\Default User folder.D.Add a Group Policy object (GPO) for the Sales OU that redirects user profiles to a shared folder.E.Log on by using the local Administrator account and create new folders for User7 and User8 in the C:\Documents and Settings folder.F.Select the allow inheritable permissions from parent to propagate to this object option on the C:\Documents and Settings\Default User folder, and reset the permissions on all child objects.G.Move and retain permissions and compressions.

You are the administrator of a new Microsoft Windows 2000 server computer named HQSQL5. HQSQL5 is a member server in your company's Windows NT 4.0 domain, which is named HQMAIN.After installing SQL Server 2000 on HQSQL5, you configure the MSSQLServer service account to use the HQMAIN\sqladmin user account, which is a member of the local administrators group on HQSQL5.You can use the HQMAIN\sqladmin user account to log on the HQSQL5. However, the MSSQLServer service fails to start. You need to start the service. What should you do?A.Revoke Log on interactivity rights for the HQMAIN\sqladmin user account.B.Add the HQMAIN\sqladmin user account to the HQMAIN\Domain Admins group.C.Select the Password Never Expires check box for the HQMAIN\sqladmin user account.D.Grant Log on as a service rights to the HQMAIN\sqladmin user account.

You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D

You are the network administrator for The network consists of a single Active Directory domain named All five domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. The domain's audit policy ensures that all account logon events are audited. A temporary employee named King uses a client computer named TestKing1. When King's temporary assignment concludes, his employment is terminated. Now you need to learn the times and dates when King logged on to the domain. You need to accomplish this goal by reviewing the minimum amount of information. What should you do?()A、Log on to TestKing1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for King's user account.B、Log on to TestKing1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for the TestKing1 computer account.C、Use Event Viewer to view the security log on each domain controller. Use the Find option to list only the events for King's user account.D、Use Event Viewer to view the security log on each domain controller. Set a filter to list only the events for King's user account.E、Use Event Viewer to view the security log on each domain controller. Set a filter to list only the events for the TestKing1 computer account.

To force a user to use Ctrl-Alt-Delete to log into the computer, a technician can go to Control Panel then:()A、Accessibility options.B、Security Center.C、User accounts and the Advanced tab.D、Windows Firewall.

When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()A、 use acl = yesB、 map group acls = yesC、 force unknown acl user = yesD、 inherit acls = no

The IBM Tivoli Access Manager for Enterprise Single Sign-On IMS is configured to cache user’s wallets. The SLA for network reliability between the IMS Server and the desktop machines is 95%. The customer wants to use Graphical Identification and Authentication (GINA) replacement, and has enabled Active Directory (AD) password synchronization. The user has a cached wallet on their private desktop. Which statement is true when the network is unavailable?()A、The user would not be able to log in to the wallet.B、The user is able to log in with their wallet password, but the wallet is not synchronized with the server.C、A user must be re-assigned to another policy template in order to change any aspects of the applied policy.D、The user experiences normal operation, but AccessAgent will be unable to store newly captured  passwords.

A new LPAR has been created that needs SAN attached disk for a database. After AIX has been installed, the fibre cables are attached to the adapters. How should the administrator configure the disks?()A、Run 'mkdev' to force the FC adapter to log into the SAN, have the SAN LUNs zoned to the server, run 'cfgmgr' to discover and configure the disks.B、Run 'mkpath' to force the FC adapter to log into the SAN, have the SAN LUNs zoned to the server, run 'cfgmgr' to discover and configure the disks.C、Run 'chpath' to force the FC adapter to log into the SAN, have the SAN LUNs zoned to the server, run 'cfgmgr' to discover and configure the disks.D、Run 'cfgmgr' to force the FC adapter to log into the SAN, have the SAN LUNs zoned to the server, run 'cfgmgr' to discover and configure the disks.

public class MyLogger {  private StringBuilder logger = new StringBuuilder();  public void log(String message, String user) {  logger.append(message);  logger.append(user);  }  }  The programmer must guarantee that a single MyLogger object works properly for a multi-threaded system. How must this code be changed to be thread-safe?() A、 synchronize the log methodB、 replace StringBuilder with StringBufferC、 No change is necessary, the current MyLogger code is already thread-safe.D、 replace StringBuilder with just a String object and use the string concatenation (+=) within the log method

You have a single Active Directory directory service domain. You use a Group Policy object (GPO) to apply security settings to your client computers. You configure the startup type for system services settings in a new GPO, and you link the GPO to an organizational unit (OU).  You discover that the startup type for system services on one of the client computers has not been updated. You need to ensure that the Group Policy settings are applied to the client computer. What should you do?()A、  Restart the client computer.B、 Instruct the user to log off and then log on to the client computer.C、 On the client computer, run the Gpupdate.exe command with the /Force parameter.D、 On the client computer, run the Gpupdate.exe command with the /Target:computer parameter.

You are the administrator of a Windows 2000 network. You use a user account named User1 to log on to a Windows 2000 Professional computer. Different students in a classroom use this Computer. User does not have administrative rights. However, you prefer to use this account for most of your daily activities, because it is not a security breach if you fail to log off. You want to schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. What should you do?()A、Schedule the task to run under an Administrative accountB、Log on by using the local Administrator account. Then schedule the task to run under User1C、Take the ownership of Addusers.cmd file. Then schedule the task to run under User1D、Grant User1 Read  Execute permission for AddUsers.cmd. Then schedule the task to run  under User1.

You want users to log on to Active Directory by using a new User Principal Name (UPN).  You  need to modify the UPN suffix for all user accounts.     Which tool should you use()A、DsmodB、NetdomC、RedirusrD、Active Directory Domains and Trusts

You are the administrator of an Active Directory domain named A user reports that he forgot his password and cannot log on to the domain. You discover that yesterday morning the user reset his password and successfully logged on to the domain. You need to enable the user to log on to the domain. What should you do? ()(Choose two)A、Use Active Directory Users and Computers to move the account to the default organizational unit (OU) named Users. Instruct the user to restart his computer.B、Use Active Directory Users and Computers to open the account properties for the user's user account. Clear the Account is locked out check box, and select the User must change password at next logon check box.C、Use Active Directory Users and Computers to reset the user's password. Give the user the new password.D、Use Computer Management to reset the password for the local Administrator account.

You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to allow a user named Mia Hamm to access the resource mailbox?()A、You must change the resource mailbox’s propertiesB、You must use log transactionsC、You must use Outlook Protection RulesD、You must use the Set-Mailbox Mia Hamm -LitigationHoldEnabled $true

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You discover that when the application runs, a user control is not rendered correctly. You need to find out the user interface (UI) element of the window that is causing the rendering problem. What should you do?()A、Use the Local Window.B、Use the WPF Visualizer.C、Generate a trace log by using IntelliTrace.D、Set a breakpoint at the control. Run the application.

You are a network administrator for ExamSheet.net's Windows 2000 network.  You use a user account named User1 to log on tot a Windows 2000 Professional computer. The computer is used by different students in a classroom. User1 does not have administrative rights. However, you prefer to use this account for your daily activities. Using the Task Scheduler you schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. You configure the task to run as the administrator account.  After the task was scheduled to have run you open the Task Scheduler and discover a status of "Could not start" for the task. You also discover account logon failure audit events in the computer's Security log.You want the scheduled task to successfully run AddUsers.cmd. You want to accomplish this with the least amount of administrative effort.  What should you do?()A、Schedule the task using theATcommand.B、Reenter the password for the administrator account using the Task Scheduler.C、Log on with an administrative account and reschedule the task.D、Log on by using the local Administrator account. Then schedule the task to run under User1.

You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()A、Configure the terminal server so that users log on by using local user accountsB、Configure the terminal server so that users log on by using domain accountsC、Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverD、Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverE、Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverF、Use Appsec.exe to restrict applications on the terminal server

You are the network administrator for The network consists of a single Active Directory domain named . For security reasons,management decides that a particular user must not be able to log on to the domain after 5:00 P.M. If the user is logged on to the domain at 5:00 P.M., he must be logged off automatically. You configure the Logon Hours setting for the appropriate user account. Thatnight, you verify that the user cannot log on to the domain after 5:00 P.M. The nextday, you notice that the user is still accessing domain resources at 6:00 P.M. Youverify that the time on the user's computer and on the domain controller arecorrect. You need to ensure that the user is logged off automatically if he is still working onthe domain after 5:00 P.M. What should you do?()A、In Active Directory Users and Computers, on the Sessions tab, configure the End Session setting for the user account. Instruct the user to log off from the domain and log on again.B、Modify the Default Domain Policy GPO to enforce logoff when logon hours expire. Ensure that the user's computer has the latest Group Policy settings applied.C、Remove the user's domain account from the local Administrators group on the user's client computer. Instruct the user to log off from the domain and log on again.D、Use Computer Management on the domain controller. Restart the Net Logon service.

单选题You are the administrator of a Windows 2000 network. You use a user account named User1 to log on to a Windows 2000 Professional computer. Different students in a classroom use this Computer. User does not have administrative rights. However, you prefer to use this account for most of your daily activities, because it is not a security breach if you fail to log off. You want to schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. What should you do?()ASchedule the task to run under an Administrative accountBLog on by using the local Administrator account. Then schedule the task to run under User1CTake the ownership of Addusers.cmd file. Then schedule the task to run under User1DGrant User1 Read  Execute permission for AddUsers.cmd. Then schedule the task to run  under User1.

单选题You are the network administrator for The network consists of a single Active Directory domain named All five domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. The domain's audit policy ensures that all account logon events are audited. A temporary employee named King uses a client computer named TestKing1. When King's temporary assignment concludes, his employment is terminated. Now you need to learn the times and dates when King logged on to the domain. You need to accomplish this goal by reviewing the minimum amount of information. What should you do?()ALog on to TestKing1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for King's user account.BLog on to TestKing1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for the TestKing1 computer account.CUse Event Viewer to view the security log on each domain controller. Use the Find option to list only the events for King's user account.DUse Event Viewer to view the security log on each domain controller. Set a filter to list only the events for King's user account.EUse Event Viewer to view the security log on each domain controller. Set a filter to list only the events for the TestKing1 computer account.

单选题When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()A use acl = yesB map group acls = yesC force unknown acl user = yesD inherit acls = no

单选题public class MyLogger {  private StringBuilder logger = new StringBuuilder();  public void log(String message, String user) {  logger.append(message);  logger.append(user);  }  }  The programmer must guarantee that a single MyLogger object works properly for a multi-threaded system. How must this code be changed to be thread-safe?()A synchronize the log methodB replace StringBuilder with StringBufferC No change is necessary, the current MyLogger code is already thread-safe.D replace StringBuilder with just a String object and use the string concatenation (+=) within the log method

单选题You have two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2). Both servers have Remote Desktop disabled. A user named User1 logs on to Server1 locally. You log on to Server2 locally. You need to log User1 off Server1 remotely. You must achieve this goal without restarting Server1. Which tool should you use on Server2? ()Anet.exeBlogoff.exeCtaskmgr.exeDcompmgmt.msc

单选题You want users to log on to Active Directory by using a new Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()ADsmodBNetdomCRedirusrDActive Directory Domains and Trusts

多选题A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()APerform a policy trace for the specific user and review the output to isolate the problem.BReview the Events log.CReview the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.DReview the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

单选题Your company has an Active Directory domain. The company runs Terminal Services.  A user has remotely logged on to the Terminal Server. The user requires help to use an application. When you connect to the Terminal Server session, you cannot operate any applications. You need to ensure that you can assist any user on the Terminal Server. What should you do?()A From the Terminal Server run the Tscon /v command. Then reconnect to the session.B Run the Chgusr /execute command on the Terminal Server. Then reconnect to the session.C Enable Use remote control with default user settings in the RDP-Tcp Properties.D Enable Use remote control with the following settings in the RDP-Tcp Properties. Configure the Level of control policy setting to Interact with the session. Instruct the user to log off and log back on.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All five domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. The domain's audit policy ensures that all account logon events are audited. A temporary employee named Peter uses a client computer named Client1. When Peter's temporary assignment concludes, his employment is terminated. Now you need to learn the times and dates when Peter logged on to the domain. You need to accomplish this goal by reviewing the minimum amount of information. What should you do?()ALog on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for Peter's user account.BLog on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for the Client1 computer account. Use Event Viewer to view the security log on each domain controller. Use the Find option to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.CSet a filter to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.DSet a filter to list only the events for the Client1 computer account.