A user named Tom reports that an application on his Windows 2000 Professional computer is running slowly. You notice Tom’s computer has 64 MB of RAM and 100 MB of free disk space. What should you do to improve the performance of his system? ()A、Add Tom to the Power user group.B、Set the total paging file to 75 % of physical memory.C、Perform a disk analysis and use the disk defragmenter if recommended.D、Use Disk cleanup to delete temporary files and unnecessary program files.E、Ensure that the Performance Options windows is optimized for background services.

A user named Tom reports that an application on his Windows 2000 Professional computer is running slowly. You notice Tom’s computer has 64 MB of RAM and 100 MB of free disk space. What should you do to improve the performance of his system? ()

  • A、Add Tom to the Power user group.
  • B、Set the total paging file to 75 % of physical memory.
  • C、Perform a disk analysis and use the disk defragmenter if recommended.
  • D、Use Disk cleanup to delete temporary files and unnecessary program files.
  • E、Ensure that the Performance Options windows is optimized for background services.

相关考题:

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. DB1 is available to a Windows group which is named WIIKIGO/Supervisors. A Windows user named User1 is a member of the WIIKIGO/Supervisors group. WIIKIGO/Supervisors is a member of the db_owner role in the DB1 database. You must make sure that the SQL Server instance is available to User1. In the DB1 database, which Transact-SQL statement(s) should you execute?()  A、 DROP LOGIN "WIIKIGO/User1"; B、 EXEC dbo.sp_droprolemember 'db_owner', 'WIIKIGO/User1';C、 EXEC dbo.sp_revokedbaccess 'WIIKIGO/User1';EXEC dbo.sp_revokelogin 'WIIKIGO/User1'; D、 CREATE LOGIN "WIIKIGO/User1" FROM Windows;DENY CONNECT SQL TO "WIIKIGO/User1";

You install a read-only domain controller (RODC) named RODC1.   You need to ensure that a user named User1 can administer RODC1. The solution must minimize the number of permissions assigned to User1.   Which tool should you use()A、Active Directory Administrative CenterB、Active Directory Users and ComputersC、DsaddD、Dsmgmt

You have an Exchange Server 2010 organization.You have a user named User1 and a user named User2. You need to ensure that User1 can add User2 to the From field when he sends e-mail messages. Messages that have User2 in the From field must display only User2 as the message sender to recipients Who receive the messages. What should you use?()A、Active Directory Users and ComputersB、Exchange Control Panel (ECP)C、Exchange Management Console (EMC)D、Microsoft Office Outlook

You have an Exchange 2010 organization.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can add and remove members from Group1.You must prevent User1 from modifying all other groups. What should you do first?()A、Add User1 to Group1 Managed by list.B、Assign User1 as a group moderator for Group1.C、Assign the Distributions Groups management role to User1.D、Assign the MyDistributionGroups management role to User1.

Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A、the Netsh toolB、the Network Policy Server consoleC、the Registry EditorD、the Routing and Remote Access console

Your network contains an Active Directory domain named contoso.com.   The network has a branch office site that contains a read-only domain controller (RODC) named RODC1.   RODC1 runs Windows Server 2008 R2.   A user named User1 logs on to a computer in the branch office site.   You discover that the password of User1 is not stored on RODC1.   You need to ensure that User1’s password is stored on RODC1.   What should you modify()A、the Member Of properties of RODC1B、the Member Of properties of User1C、the Security properties of RODC1D、the Security properties of User1

Your company has an Exchange Server 2010 organization. A user named User1 is configured as a Delegate for a user named User2. You need to ensure that User1 can add User2 in the From field when sending email messages. Messages that contain User2 in the From field must display User2 as the message sender when recipients receive the messages.  What should you do()?  A、Remove User1 as a delegate, and then grant User1 Send As permissions to User2¯s mailboxB、Remove User1 as a delegate, and then grant User1 Send on Behalf permissions to User2¯s mailboxC、Create a Sharing policy, and then grant User1 Modify permissions to User2¯s mailboxD、Create a Sharing policy, and then grant User1 Full Mailbox permissions to User2¯s mailbox

Your network consists of a single Active Directory domain named Contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You create an organizational unit (OU) that contains a computer account named Computer1.  A Group Policy object (GPO) is linked to the OU and contains settings to enforce the use of IPSec. You log on to Computer1 by using a user account named User1. You need to verify that the IPSec settings have been applied.  Which command should you run?()A、Dsquery user -name User1B、Dsquery computer -name Computer1C、Gpresult /s Computer1 /scope COMPUTER /vD、Gpresult /user User1 /scope USER /v

You are designing the top-level organization unit (OU) structure to meet the administrative requirements. What should you do?()A、Create a top-level OU named New York. Place all user and computer accounts from New York in the New York OU.B、Create a top-level OU named Chicago. Place all user and computer accounts from Chicago in the Chicago OU.C、Create a top-level OU named Coho. Place all user and computer accounts that are assigned to the Coho Vineyard customer project in the Coho OU.D、Create a top-level OU named Sales. Place all user and computer accounts from the sales department in the Sales OU.

单选题A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()AInstruct User1 to create a new user certificate on Computer2.BInstruct User1 to take ownership of the encrypted files on Computer2.CInstruct User1 to import the user certificate from Computer1 to Computer2.  DLog on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

单选题You are designing the top-level OU structure for the company. Which action or actions should you perform?()ACreate an OU named Sales. Place all sales user accounts in the Sales OU.BCreate an OU named Montreal. Place all Montreal user accounts in the Montreal OU.CCreate an OU named East. Place all user accounts from the East Coast offices in the East OU.DCreate an OU named NorthAmerica. Place all user accounts in the NorthAmerica OU.ECreate an OU named Servers. Place all server computer accounts in the Servers OU.

单选题Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()Athe Netsh toolBthe Network Policy Server consoleCthe Registry EditorDthe Routing and Remote Access console

单选题You are designing the top-level OU structure for the company.  Which action or actions should you perform?()A Create an OU named Sales. Place all sales user accounts in the Sales OU.B Create an OU named Montreal. Place all Montreal user accounts in the Montreal OU.C Create an OU named East. Place all user accounts from the East Coast offices in the East OU. D Create an OU named NorthAmerica. Place all user accounts in the NorthAmerica OU.E Create an OU named Servers. Place all server computer accounts in the Servers OU.

单选题You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()AInstruct User2 to add a delegateBInstruct User2 to send a signed e-mail message to User1.CInstruct User1 to send a signed e-mail message to User2.DInstruct User1 to modify the sensitivity settings of the e-mail message

单选题Your network contains an Active Directory domain named contoso.com. The domain contains a user account named User1 that resides in an organizational unit (OU) named OU1. A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to publish several applications to a user named User1. In the Users container, you create a new user named User2. You need to ensure that the same applications are published to User2. What should you do?()AModify the security of GPO1.BModify the settings in GPO1CLink a WMI filter to GPO1DMove User2 to OU1

单选题You have an Exchange Server 2010 organization named contoso.com. Your company is investigating a user named User1. You need to prevent User1 from permanently deleting the items in his mailbox.  What should you run()?ASet-Mailbox User1 -LitigationHoldEnabled $trueBSet-Mailbox User1 -ModerationEnabled $trueCSet-Mailbox User1 -RetainDeletedItemsUntilBackup $trueDSet-Mailbox User1 -RetentionHoldEnabled $true

单选题You have an Organization 2010.Internal user named User1 sends a confidential message to another internal user named User2.User1 does not have any administrative privileges in theory. You need to ensure User1 can identify whether the message was successfully delivered?. What should you instruct User1 to do?()AView the message headers in the sent item folderBOpen Microsoft Outlook and modify Read Receipt SettingsCOpen Microsoft Outlook and modify Delivery Receipt SettingsDOpen the ECP and select Organize E-Mail

单选题You are designing a security group strategy to meet the business and technical requirements. What should you do?()ACreate one global group named G_Executives. Make all executives user accounts members of that group.BCreate two global groups named G_Executives and one universal group named U_Executives. Make the two global members of U_Executives. Make the executive user accounts members of the appropriate global group.CCreate three global groups named G_NY_Executives and G_Chi_Executives and G_Executives. Make G_NY_Executives and G_Chi_Executives members of G_Executives. Make the executive user accounts members of the appropriate global group.  DCreate one domain local group named DL_Executives. Make all executive user accounts members of that group.

单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server! that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2.You need to ensure that a user named User1 can install Windows features on VM1. The solution must minimize the number of permissions assigned to User1. To which group should you add User1?()AAdministrators on VM1BPower Users on VM1CHyper-V Administrators on Server1DServer Operators on Server1

单选题Your network contains a server named Server1 that runs Windows Server 2008 R2. You have a user named User1. You need to ensure that User1 can schedule Data Collector Sets (DCSs) on Server1. The solution must minimize the number of rights assigned to User1. What should you do?()AAdd User1 to the Performance Log Users group.BAdd User1 to the Performance Monitor Users group.CAssign the Profile single process user right to User1.DAssign the Bypass traverse checking user right to User1.

单选题You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()ALog on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. BCreate a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. CRemove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. DBack up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.

多选题Your network contains an Active Directory domain named contoso.com. The domain contains 20 computer accounts in an organizational unit (OU) named OU1. A user account named User1 is in an OU named OU2.You are configuring a Group Policy object (GPO) named GPO1. You need to assign User1 the Backup files and directories user right to all of the computer accounts in OU1.Which two actions should you perform?()ALink GPO1 to OU1BLink GPO1 to OU2.CModify the Delegation settings of GPO1.DFrom User Configuration in GPO1, modify the security settings.EFrom Computer Configuration in GPO1, modify the security settings