多选题You are a help desk technician for your company. All users have Windows XP Professional computers. A user named Richard reports that he cannot access www.southridgevideo.com, an Internet Web site, by using Internet Explorer. Whenever Richard types http://www.southridgevideo.com into the Internet Explorer address bar, he receives the following error message: “Your security settings prohibit the display of unsigned ActiveX Controls.” According to company policy, users should download unsigned ActiveX controls only from Internet Web sites that have been approved by the company’s information security department. You verify that www.southridgevideo.com is listed as an approved Web site. On Richard’s computer, you also verify that Internet Explorer is configured with the default settings. You need to ensure that Richard can access www.southridgevideo.com without receiving an error message. You also want to comply with company policy. You need to configure Richard’s computer. First, you open the Security properties for Internet Explorer on Richard’s computer.  Which two actions should you perform next?()AAdd www.southridgevideo.com to the Trusted Sites list.BRemove www.southridgevideo.com from the Restricted Sites list.CIn the Internet zone settings, enable the Allow unsigned ActiveX controls option.DOpen the Local intranet Sites dialog box and clear the Include all network paths check box.EOpen the Trusted Sites dialog box and clear the Require server verification for all sites in this zone check box.FOpen the Intranet Sites dialog box. In Advanced properties, add www.southridgevideo.com to the list of Web sites.

多选题
You are a help desk technician for your company. All users have Windows XP Professional computers. A user named Richard reports that he cannot access www.southridgevideo.com, an Internet Web site, by using Internet Explorer. Whenever Richard types http://www.southridgevideo.com into the Internet Explorer address bar, he receives the following error message: “Your security settings prohibit the display of unsigned ActiveX Controls.” According to company policy, users should download unsigned ActiveX controls only from Internet Web sites that have been approved by the company’s information security department. You verify that www.southridgevideo.com is listed as an approved Web site. On Richard’s computer, you also verify that Internet Explorer is configured with the default settings. You need to ensure that Richard can access www.southridgevideo.com without receiving an error message. You also want to comply with company policy. You need to configure Richard’s computer. First, you open the Security properties for Internet Explorer on Richard’s computer.  Which two actions should you perform next?()
A

Add www.southridgevideo.com to the Trusted Sites list.

B

Remove www.southridgevideo.com from the Restricted Sites list.

C

In the Internet zone settings, enable the Allow unsigned ActiveX controls option.

D

Open the Local intranet Sites dialog box and clear the Include all network paths check box.

E

Open the Trusted Sites dialog box and clear the Require server verification for all sites in this zone check box.

F

Open the Intranet Sites dialog box. In Advanced properties, add www.southridgevideo.com to the list of Web sites.


参考解析

解析: 暂无解析

相关考题:

-- Thank you for your help. -- ____________.A. All rightB. That's all rightC. That's rightD. It's very kind of you

A call logging process would be used by a technician in order to:() A. assign the appropriate status level for the problem.B. create records which enable user authentication.C. help maintain a balanced workload for the help desk technicians.D. identify common problems among many users.

Multiple users report that their Windows 7 computers take longer to start than when their computers were first installed. A help desk technician reports that the problem is related to installed applications. You need to recommend a solution that identifies the applications that run during the startup process. What should you recommend?()A.Event ForwardingB.MSConfig.exeC.Problem Steps RecorderD.Reliability Monitor

You are the domain administrator for your company. Roaming profiles are enabled for all users in the sales department. Roaming profiles are stored on a server named Server1, in a shared folder named Profiles. Roger is a user in the sales department. Susan is Roger's manager. Susan reports that Roger modifies his desktop settings, which results in the need for help desk assistance and in lost productivity for Roger. You want to ensure that Roger cannot modify his roaming profile. What should you do?() A、In Active Directory Users and Computers, on Roger's profile tab, change the profile path to //Server1/Profiles/%username%.dat. B、In Active Directory Users and Computers, on Roger's profile tab, change the profile path to //Server1/Profiles/%username%.man. C、In Roger's profile on Server1, change the file name of Ntuser.dat to Ntuser.man.D、In Roger's profile on his computer, change the file name of Ntuser.dat to Ntuser.man.

As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you in what might happen if he issues the logging trap information command. Which of the following statement will answer his quest|on?()A、Informational and debug messages are logged to the syslog server.B、All messages are sent to the logging host, where selections are made.C、An information trap is sent to the SNMP server.D、All messages from emergencies to informational are sent to the logging host.

A call logging process would be used by a technician in order to:()A、assign the appropriate status level for the problem.B、create records which enable user authentication.C、help maintain a balanced workload for the help desk technicians.D、identify common problems among many users.

You are the desktop administrator for your company. You connect a print device to a Windows XP Professional computer for the users in the help desk department. You share the printer on the network as HDPrint. You grant the HDUsers and HDManagers groups Allow - Print permission on HDPrint. Several users in the HDUsers group report that it often takes several minutes for their print jobs to print after they are submitted. You investigate and discover that under normal use, the print queue length often exceeds 50 print jobs. You want to improve printing performance for the users in the HDUsers group. What should you do?() A、Install a second printer that uses the same print device. Share the second printer as HDPrint2.  Configure a priority setting of 99 on HDPrint2.  B、Increase the print job priority settings to 99 for all print jobs that are submitted by the users in the HDUsers group. C、Connect a second, identical print device to the Windows XP Professional computer. In the properties for HDPrint, select the Enable printer pooling check box. D、In the printer properties for HDPrint, select the Print directly to the printer option and clear the Enable advanced printing features check box.

You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003.  Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only.  All user accounts are located in the default Users container.  You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment.  What should you do?()A、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B、 Create a top­level OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.

You are a help desk technician for your company. All employees use Windows XP Professional computers. A salesperson named Philippe receives a removable disk drive cartridge from his supervisor. Philippe now reports that he cannot edit files on the cartridge. When he tries to open any files or folders on the cartridge, he receives an “access denied” error message. Philippe’s supervisor is currently out of the office. You place the cartridge in the removable drive on your computer. You receive the same “access denied” error message when you try to access the files and folders. You call Philippe’s supervisor. She asks you to grant permission to access the contents of the cartridge only to Philippe. However, she also wants to prevent Philippe from changing permissions on the contents of the cartridge. Which two actions should you take?()A、As Administrator, take ownership of the files and folders. B、As Administrator, grant your help desk user account Allow - Full Control permission on the files and folders.C、Grant Philippe Allow - Modify permission on the files and folders.D、Grant Philippe Allow - Full Control permission on the files and folders.E、Grant Philippe Allow - Take Ownership permission on the files and folders.

Multiple users report that their Windows 7 computers take longer to start than when their computers were first installed. A help desk technician reports that the problem is related to installed applications. You need to recommend a solution that identifies the applications that run during the startup process. What should you recommend?()A、Event ForwardingB、MSConfig.exeC、Problem Steps RecorderD、Reliability Monitor

You need to recommend an administrative solution for the help desk technicians that meets the  museum’s technical requirements    What should you recommend?()A、Add the help desk technicians to the Domain Admins group.B、Add the help desk technicians to the Accounts Operators group.C、Assign permissions for the Groups OU and the Branch1 OU to the help desk technicians.D、Assign permissions for the domain object and the Users container to the help desk technicians.

问答题Practice 1  ● You work for a large company. You are going to be transferred to another department within your company.  ● Write an email to all staff:  ● telling them which department you are moving to  ● saying when you will be moving department  ● explaining what your new responsibility will be.  ● Write 40-50 words.

单选题You are the desktop administrator for your company. You connect a print device to a Windows XP Professional computer for the users in the help desk department. You share the printer on the network as HDPrint. You grant the HDUsers and HDManagers groups Allow - Print permission on HDPrint. Several users in the HDUsers group report that it often takes several minutes for their print jobs to print after they are submitted. You investigate and discover that under normal use, the print queue length often exceeds 50 print jobs. You want to improve printing performance for the users in the HDUsers group. What should you do?()AInstall a second printer that uses the same print device. Share the second printer as HDPrint2.  Configure a priority setting of 99 on HDPrint2.  BIncrease the print job priority settings to 99 for all print jobs that are submitted by the users in the HDUsers group. CConnect a second, identical print device to the Windows XP Professional computer. In the properties for HDPrint, select the Enable printer pooling check box. DIn the printer properties for HDPrint, select the Print directly to the printer option and clear the Enable advanced printing features check box.

单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers.You need to ensure that all users are authenticated by a domain controller when they log on.How should you modify the local security policy? ()ARequire authentication by a domain controller to unlock the client computer.BCache zero interactive logons.CCache 50 interactive logons.DGrant the Log on locally user right to the Users group.

单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0.  CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.

单选题You are the help desk manager for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. All help desk technicians are members of the Help Desk Technicians group. They use Remote Assistance to remotely control user sessions to provide online support and training to users. The users currently use Windows Messenger to submit Remote Assistance invitations to the help desk technicians. You want to reduce the time required for help desk technicians to respond to Remote Assistance requests. To accomplish this goal, you want to configure the client computers to allow help desk technicians to establish a Remote Assistance session with a client computer without requiring an invitation from a user. What should you do?()AIn the Default Domain Policy, set the Remote Assistance - Solicited Remote Assistance policy setting to Disabled. BIn the Default Domain Policy, set the Remote Assistance - Offer Remote Assistance policy setting to Enabled and add the Help Desk Technicians group to the Helpers list. CIn each computer's Local Security Policy, grant the Help Desk Technicians group the Allow logon through Terminal Services user right. DIn the System properties for each computer, select the Allow users to connect remotely to this computer option, and add the Help Desk Technicians group to the list of allowed users.

单选题You are a help desk technician for your company. Stefan and Irene are software developers for the company. Stefan is developing a Web application on his Windows XP Professional computer. The computer is named Stefan132.  All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. When Irene types http://Stefan132 in the Address bar of her Web browser, she cannot access the Web application. However, Stefan can access the Web application by typing http://localhost or http://Stefan132 in the Address bar of his Web browser. He can also access resources on the company network. When you run the Ping command on your computer, you cannot connect to Stefan’s computer. When you attempt to access http://Stefan132 from your computer, Internet Explorer displays “DNS or Server Error.” You need to ensure that Irene can access the Web application on Stefan’s computer. First, you establish a Remote Assistance connection to Stefan’s computer. What should you do next on Stefan’s computer?()ARun the IPconfig /renew command. BStop and then restart the World Wide Web Publishing service. CEnsure that the Everyone group has Allow - Full Control permission on the Inetpub folder. DIn the properties of the Local Area Connection connection, allow a Windows Firewall exception for port 80.

单选题You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003.  Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only.  All user accounts are located in the default Users container.  You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment.  What should you do?()A Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B Create a top­level OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.

单选题A call logging process would be used by a technician in order to:()Aassign the appropriate status level for the problem.Bcreate records which enable user authentication.Chelp maintain a balanced workload for the help desk technicians.Didentify common problems among many users.

单选题You have an Exchange Server 2010 organization.  You have a group named Help Desk that contains all the help desk users in the organization.  You need to ensure that the Help Desk group can manage all the mailboxes and mail-enabled contacts in the organization.  The solution must minimize the number of permissions assigned to the Help Desk group.  Which management role should you assign to the Help Desk group?()AMail RecipientsBMail Recipient CreationCOrganization Client AccessDRecipient Policies

单选题We are all very grateful______you for your help.AonBfromCwithDto

单选题You are a security administrator for your company. The network consists of a single Active Directory domain. Servers run either Windows Server 2003 or Windows 2000 Server. All client computers run Windows XP Professional.    The company’s written security policy states that user accounts must be locked if an unauthorized user attempts to guess the users, passwords. The current account policy locks out a user after two invalid password attempts in five minutes. The user remains locked out until the account is reset by an administrator. Users frequently call the help desk to have their account unlocked. Calls related to account lockout constitute 25 percent of help desk calls.    You need to reduce the number of help desk calls related to account lockout.  What should you do?()A Modify the Default Domain Controllers Policy Group Policy object(GPO). Increase the maximum lifetime for serviceB Modify the Default Domain Policy Group Policy object(GPO). Configure an account lockout threshold of 10.C Modify the Default Domain Controllers Policy Group Policy object(GPO). Disable the enforcement of user logon resD Modify the Default Domain Policy Group Policy object(GPO). Increase the minimum password age.

多选题You work as a network technician at Company. Your boss, Mrs., is interested in  the Cisco Compatible Extensions program.  What are three features of this program? ()AAccountingBAnalog and digital voiceCMobilityDSecurityERouting and switchingFVLAN and QoS

单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()AThe SetupUser profileBThe Default User profileCThe Administrator profileDThe System profileEThe All Users profile

单选题You need to identify which tool the help desk users must use to perform administrative tasks.  Which tool should you identify?()ARemoteAppBRemote AssistanceCRemote DesktopDRemote Server Administration Tools (RSAT)

单选题You are the network administrator for The network includes three office locations. Each office has one Windows Server 2003 computer that functions as a file and print server. This server hosts home folders for network users. In each office, a single printer is installed on the file and print server. The local help desk technicians have the necessary permissions to manage printers. A user named King notifies the local help desk that his documents are not printing. A help desk technician finds a list of documents waiting in the print queue. No user can successfully print. The technician cannot delete documents from the queue. You need to restore printing capabilities. What should you do?()AInstall a second instance of the printer. Redirect the original printer to the new printer.BStop and restart the Print Spooler service. Ask users to resubmit the documents for printing.CPause the printer. Reconfigure the print queue to hold mismatched documents. Unpause the printer.DInstall a second instance of the printer. Delete the original printer. Direct King to resubmit the documents for printing.

单选题A: I noticed a copy of Scientific American on your desk. May I borrow it?  B: ______AYes, you can.BYes, you could.CYes, go on.DYes, help yourself.