单选题When setting security permissions on a folder, which of the following properties apply?()AGuest users are allowed changed permissions.BAll sub-folders inherit the most restrictive permissions within the folder.CAll sub-folders within that folder are given a password.DBy default, read permissions are denied on all files within the folder.

单选题
When setting security permissions on a folder, which of the following properties apply?()
A

Guest users are allowed changed permissions.

B

All sub-folders inherit the most restrictive permissions within the folder.

C

All sub-folders within that folder are given a password.

D

By default, read permissions are denied on all files within the folder.


参考解析

解析: 暂无解析

相关考题:

One of the file servers in the domain is a Windows 2000 Server computer named Ezonexamfiles.Ezonexamfiles contains a shared folder named Accounting, which is used to store data for the company's accounts payable department.The permissions on the Accounting folder are configured as shown in the following table.Mr. King is an employee in the operations department. He uses a Windows 2000 Professional client computer. His manager requests that King be granted access to the files in the Accounting folder.You add King's user account to the AcctPay domain local group, but he still cannot access the files in the Accounting folder.You need to ensure that King can access the files. What should you do?A.Instruct King to log off his computer and log on again.B.Move King's user account to the same Active Directory organizational unit (OU) as Ezonexamfiles.C.Modify the NTFS permissions on the Accounting folder to grant King Full Control permissions.D.Modify the NTFS permissions on the Accounting folder to grant the AcctPay domain local group Full Control permission.

A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A. Set folder permissions to 760.B. Set folder permissions to 770.C. Set folder permissions to modifyD. Set folder permissions to full control

Which of the following is true when Bob, a technician, is setting default security permissions on a folder?()A、There are no significant changes to other files.B、The created folder inherits the most restrictive permissions within the folder.C、The permissions are inherited by all files and folders within that folder.D、All folders within that folder are given a restrictive password.

A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、 Set folder permissions to 760.B、 Set folder permissions to 770.C、 Set folder permissions to modify.D、 Set folder permissions to full control.

Which of the following describes how to set the Read-only attribute on a folder?()A、Right-click the folder  Properties  Security tab  select the username from the list  Permissions  clear the box labeled Read  OKB、Open the folder  Tool  Folder Options  General tab  Read-only  OKC、Open the Command Prompt  type attrib r [drive:][path]  EnterD、Open the Command Prompt  type attrib +r [drive:][path]  EnterE、Right-click the folder  Properties  General tab  Attributes  select Read-only  OK

An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues.  All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs

When setting up roaming profiles in a Windows network which includes Windows 98 desktops, which Samba parameter must be set?()A、 logon driveB、 logon homeC、 logon pathD、 logon script

When setting security permissions on a folder, which of the following properties apply?()A、Guest users are allowed changed permissions.B、All sub-folders inherit the most restrictive permissions within the folder.C、All sub-folders within that folder are given a password.D、By default, read permissions are denied on all files within the folder.

Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. ABC.com has a server, named ABC-SR13. ABC-SR13 hosts a shared folder, named ABCShare, which has been shared as ABCShare$. Which of the following is TRUE with regards to sharing the folder in this manner?()A、It allows all users to view ABCShare when browsing the network.B、It prevents users from viewing ABCShare when browsing the network.C、It only allows ABC-SR13’s users to view ABCShare.D、It removes the permissions configured for ABCShare.

Your network consists of a single Active Directory domain. The domain includes a group named SalesUsers. You have a file server that runs Windows Server 2003 Service Pack 2 (SP2). The server has a folder named CorpData. You share the CorpData folder and assign the Domain Users group the Full Control share permission. In the CorpData folder, you create a folder named Sales. You need to configure security for the Sales folder to meet the following requirements: ·Members of the SalesUsers group must be able to read, create, and modify all files and folders. ·All other users must be able to view items in the folder. What should you do? ()A、On the Sales folder, block permission inheritance and remove permissions. Assign the Allow - Modify permission to the SalesUsers group.B、On the Sales folder, block permission inheritance and copy permissions. On the Sales folder, assign the Allow - Modify permission to the SalesUsers group.C、On the CorpData share, change the share permission for Domain Users to Read. On the Sales folder, assign the Allow - Modify permissions to the SalesUsers group.D、On the CorpData folder, block permission inheritance and remove permissions. In the Sales folder, assign the Allow - Modify permissions to the SalesUsers group.

You are the network administrator for Testking.com. The network consists of a single Active Directory forest that contains three domains. The functional level of the forest is Windows Server 2003. The domain names are testking.com, europe.testking.com, and asia.testking.com. Each domain contains 500 user accounts. TestKing.com is in the process of acquiring several other companies whose networks will be add to the testking.com Windows Server 2003 domain. These acquisitions will entail the addition of several new offices, which will be connected to TestKing's network by means of dedicated 56-Kbps WAN connections. You create a new shared folder named NewProjects on a file server in testking.com. Several users in each existing domain need access to the NewProjects folder. These users are not in the same group in any domain. All users who need access to the NewProjects folder must be able to add, delete, and modify files and folders in the NewProjects folder. Users in the acquired companies also will require access to this folder. You need to create the required Active Directory groups and configure the required permissions for the NewProjects folder. Your solution must minimize ongoing administrative effort as you add new companies to the network. You must also minimize unnecessary traffic across the WAN connections. What should you do?()A、Create a single universal security group. Add all users that require access to the folder to the group. Create a domain local group in the testking.com domain. Add the universal group to the domain local group. Assign permissions to the shared folder by using the domain local group.B、Create a global security group in each domain. Add all users that require access to the folder to the global group in their domain. Create a domain local group in testking.com domain. Add the global groups to the domain local group. Assign permissions to the shared folder by using the domain local group.C、Create a universal security group in each domain. Add all users that require access to the folder to the group in their domain. Assign permissions to the shared folder by using the universal groups.D、Create a global security group in each domain. Add all users that require access to the folder to the group in their domain. Assign permissions to the shared folder by using the global groups.

All of the client computers in your company’s network are Windows 2000 portable computers. A usernamed Maria stores Sales files in her My Documents folder. She uses these files when she travels.  Mariainforms you that when she takes her portable computer to trade shows, she can access some of the Salesfiles but not all of them. When her portable computer is connected to the network at the office, she canaccess all of the files.You need to enable Maria to access all of the files in her My Documents folder when she is working remotely.  What should you do? ()A、 Allow Maria full control permissions on the %systemroot%/Documents and Settings/Maria/My      Documents folder. B、 Allow Maria full control permissions on the %systemroot%/ Documents and Settings/All Users/My Documents folder. C、 Configure Maria’s computer to automatically copy the entire contents of her network My Documents folder to her offline files folder. D、 Configure Maria’s computer to automatically copy the entire contents of her network My  Documents folder to her local My Documents folder.

You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged.  What should you do?()A、Start the Problem Steps Recorder.B、From Event Viewer, modify the properties of the Security log.C、From the local Group Policy, configure the Audit object access setting.D、From the local Group Policy, configure the Audit directory service Access setting.

You are the network administrator for The network consists of a single Active Directory domain named Some client computers run Windows NT 4.0 Workstation. Others run Windows 2000 Professional, and the rest run Windows XP Professional. Users in the accounting department require a shared folder for their own use only. The accounting users must be able to read, edit, and delete files in the shared folder. You create the shared folder and use default share permissions. You assign the Allow - Full Control NTFS permission to members of the Administrators group. You assign the Allow - Modify NTFS permission to the accounting users. However, accounting users report that they cannot access the shared folder. How should you solve this problem?()A、Change the type of setting on the folder to Documents (for any file types).B、Change the NTFS permissions on the folder to assign the Allow - Delete Sub-Folders and Files permission to the accounting users.C、Add the accounting users as owners of the folder.D、Change the share permissions to assign the Allow - Full Control permission to the accounting users.

You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Your network includes a shared folder named TestKingDocs. This folder must not be visible in a browse list. However, users report that they can see TestKingDocs when they browse for shared folders. How should you solve this problem?()A、Modify the share permissions to remove the All - Read permission on TestKingDocs from the Users group.B、Modify the NTFS permissions to remove the Allow - Read permissions on TestKingDocs from the Users group.C、Change the share name to TestKingDocs#.D、Change the share name to TestKingDocs$.

单选题Which of the following is true when Bob, a technician, is setting default security permissions on a folder?()AThere are no significant changes to other files.BThe created folder inherits the most restrictive permissions within the folder.CThe permissions are inherited by all files and folders within that folder.DAll folders within that folder are given a restrictive password.

单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. ABC.com has a server, named ABC-SR13. ABC-SR13 hosts a shared folder, named ABCShare, which has been shared as ABCShare$. Which of the following is TRUE with regards to sharing the folder in this manner?()AIt allows all users to view ABCShare when browsing the network.BIt prevents users from viewing ABCShare when browsing the network.CIt only allows ABC-SR13’s users to view ABCShare.DIt removes the permissions configured for ABCShare.

单选题You have a computer that runs Windows 7. The computer contains a folder named C:/data. You use Advanced Sharing to share C:/data by using the default share permissions. When a user tries to access theshare over the network, he gets an Access is Denied error message. You need to ensure that the user canaccess the share.  What should you do?()AAllow file and printer sharing through Windows Firewall.BChange the network location from a Public network to a Home or Work network.CFrom the Security settings of the folder, assign the user the Read NTFS permission.DFrom the Advanced Sharing settings of the folder, assign the user the Read share permission.

单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()ASet folder permissions to 760.BSet folder permissions to 770.CSet folder permissions to modifyDSet folder permissions to full control

单选题Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A/etc/security/userB/etc/security/passwdC/etc/security/mkuser.sysD/etc/security/mkuser.default

多选题When setting up the Flashback Data Archive, which of these key parameters are required?()ATablespace nameBStorage quotaCRetentionDTable nameECreate a default archive

单选题You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network. What should you do?()AOn Folder1, modify the share permissions.BOn Folder1, modify the NTFS permissions.CAdd all local user accounts to the Guests group. DAdd all local user accounts to the Network Configuration Operators group.

单选题You have an Exchange Server 2010 organization.You need to modify the permissions of a public folder.Which tool should you use?()AExchange Control Panel (ECP)BExchange Management Console (EMC)CMicrosoft Office OutlookDPublic Folder Management Console

单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A Set folder permissions to 760.B Set folder permissions to 770.C Set folder permissions to modify.D Set folder permissions to full control.

单选题You are the administrator of the Windows XP Professional portable computers that are used by your company's sales representatives. The computers are members of a Windows 2000 domain. A Windows 2000 Server computer named Server1 contains the sales data used by the sales representatives in a shared folder named Data. When sales representatives travel, they use the Offline Files feature to access the files in the //Server1/Data shared folder. You want to ensure that the offline files on the portable computers are not accessible by unauthorized persons, in the event that a portable computer is lost. What should you do?()AInstruct the sales representatives to configure the permissions on the offline files on their portable computers to allow access for only their user accounts. BOn Server1, configure the permissions on all files in the Data shared folder to allow access for only the sales representatives. CUse a Group Policy object (GPO) to enable the Encrypt the Offline Files cache option for the portable computers. DOn the portable computers, enable encryption of the %systemroot%/CSC folder.EApply this setting to the folder and files in the CSC folder.FOn Server1, encrypt all files in the Data shared folder.

单选题All of the client computers in your company network are Windows 2000 portable computers. A user named Maria stores Sales files in her My Documents folder. She uses these files when she travels. Maria informs you that when she takes her portable computer to trade shows, she can access some of the Sales files but not all of them. When her portable computer is connected to the network at the office, she can access all of the files. You need to enable Maria to access all of the files in her My Documents folder when she is working remotely. What should you do?()A Allow Maria full control permissions on the %systemroot%/documents and settings/Maria/MyDocuments folderB Allow Maria full control permissions on the %systemroot%/documents and settings/all  users/My Documents folderC Configure Maria’s computer to automatically copy the entire contents of her network My  Documents folder to her offline files folder.D Configure Maria’s computer to automatically copy the entire contents of her network My  Documents folder to her local My Documents folder.