Your computers have both Windows NT Workstation 4.0, and Windows 2000 Professional operating systems. You configure the hard disk on each computer to have two 4-GB partitions. Windows NT Workstation is installed on drive C, and Windows 2000 Professional is installed on drive D. You configure a disk quota on drive D to prevent users from saving data on the disk.  How can you prevent users from saving files to drive D in either operating system?()A、The required result cannot be obtained with the above given solutionsB、Enable EFS on DC、Format the NT 4 partition and reload NT 4D、Use NT 4.0 NTFS permissions to deny users write access to D

Your computers have both Windows NT Workstation 4.0, and Windows 2000 Professional operating systems. You configure the hard disk on each computer to have two 4-GB partitions. Windows NT Workstation is installed on drive C, and Windows 2000 Professional is installed on drive D. You configure a disk quota on drive D to prevent users from saving data on the disk.  How can you prevent users from saving files to drive D in either operating system?()

  • A、The required result cannot be obtained with the above given solutions
  • B、Enable EFS on D
  • C、Format the NT 4 partition and reload NT 4
  • D、Use NT 4.0 NTFS permissions to deny users write access to D

相关考题:

______any computers in your office?A. Are thereB. Is thereC. Have there

You are the administrator for your company's network. The network is configured as shown in the exhibit.You want to install Windows 2000 Professional on 20 new PXE-compliant computers on the marketing segment of your network. The new computers do not have operating systems installed.You create a RIS image. You load the image onto the RIS server. You then start the new computers.You find that the new computers cannot connect to the RIS server. You verify that the new computers cannot connect to the RIS server. You verify that the existing client computers in the network can connect to the network servers, including the RIS server. You want to enable the new computers to connect to the RIS server.What should you do?A.Add a Windows 2000 Server computer running WINS to the network.B.Add a Windows 2000 Server computer running DHCP to the network.C.Add the domain Everyone group to the RIS OS image security settings.D.Place the new computers on the same segment as the RIS server.

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A.WLAN AutoConfigB.WWAN AutoConfigC.Computer BrowserD.Portable Device Enumerator Service

You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D

Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()A、 UrlScan Security ToolB、 Enterprise Scan Tool (EST)C、 Malicious Removal Tool (MRT)D、 Microsoft Baseline Security Analyzer (MBSA)

Your company has an Active Directory forest that contains Windows Server 2008 R2 domain  controllers and DNS servers. All client computers run Windows XP SP3.   You need to use your client computers to edit domain-based GPOs by using the ADMX files that are   stored in the ADMX central store.  What should you do()A、Add your account to the Domain Admins group.B、Upgrade your client computers to Windows 7.C、Install .NET Framework 3.0 on your client computers.D、Create a folder on PDC emulator for the domain in the PolicyDefinitions path. Copy the ADMX files to  the PolicyDefinitions folder.

Your company has client computers that run Windows 7 and client computers that run Windows XP Professional. You enable the Network Discovery feature on the Windows 7 computers. You discover that the Windows XP computers do not appear on the network map. You need to ensure that all client computers appear on the network map. What should you do?()A、Configure the IPv6 protocol on the Windows 7 computers.B、Configure the network shares on the Windows 7 computers to include the user names of all employees.C、Configure the network shares on the Windows XP computers to include the user names of all employees.D、Install the Link Layer Topology Discovery (LLTD) Responder on the Windows XP computers.

Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet mask on each new computer. Which 2 additional TCP/IP properties should you configure on each new computer?()A、The bindings.B、A DNS address.C、A Gateway address.D、A WINS server address.E、A DHCP server address.

Your company includes mobile computer users who frequently work offline. You are planning to deploy Windows 7 by using an image.   You have the following requirements:   Provide access to all applications when mobile computer users first start their computers. Minimize network and local storage requirements.  Provide language-pack support based on the geographic location of the user.    You need to ensure that your image-creation strategy meets the requirements.   What should you do?()A、Create a single thin image for all computers.B、Create a single hybrid image for all computers.C、Create one thin image for the mobile computers. Create one thick image for all other computers.D、Create one thick image for the mobile computers. Create one thin image for all other computers.

Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet.   You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.   You need to plan the most efficient method for activating all of the computers.   What should you do?()A、 Use the Key Management Service (KMS) for all the computers.B、 Use Multiple Activation Key (MAK) Independent for all the computers.C、 Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.D、 Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.

You are the network administrator for ExamSheet.  Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers.  What should you do?()A、On the research computers use the Local Computer Policy to disable theAccess this computer  from the networkoption.B、Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.C、Add the users of the research computers to the Power Users group on each computer.D、On the research computers configure the security settings to prevent anonymous access.

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()A、WLAN AutoConfigB、WWAN AutoConfigC、Computer BrowserD、Portable Device Enumerator Service

You are the administrator of a small network supporting Windows NT 4.0 computers. You configure a setup script to automatically upgrade Windows NT Workstation 4.0 computers to Windows 2000 Professional. When you attempt to test the process on a single computer, you receive this error message:  "The specified Setup script file (path:/unattend.txt) is inaccessible or invalid.  Contact your system administrator."    Which action will most likely resolve this error? ()A、Add the UnattendedInstall="Yes" parameter to the [Unattended] section of your Unattend.txt fileB、Add the UnattendMode=FullUnattended parameter to the [Data] section of your Unattend.txt fileC、Add the UnattendedInstall="Yes" parameter to the [GuiUnattended] section   of your Unattend.txt fileD、Add the UnattendMode=FullUnattended parameter to the [Unattended] section of your Unattend.txt file

单选题Your network consists of 1,000 client computers that run Windows XP. The computers do not have access to the Internet.   You plan to migrate 200 of the computers immediately to Windows 7. The remainder will be migrated over the next several months.   You need to plan the most efficient method for activating all of the computers.   What should you do?()A Use the Key Management Service (KMS) for all the computers.B Use Multiple Activation Key (MAK) Independent for all the computers.C Use Multiple Activation Key (MAK) Proxy for the first 200 computers, and then use the Key Management Service(KMS) for the remaining computers.D Use Multiple Activation Key (MAK) Independent for the first 200 computers, and then use Multiple Activation Key(MAK) Proxy for the remaining computers.

单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0.  CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.

多选题Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use NetBIOS names to connect to all shared resources as the network. You configure a TCP/IP address and a subnet mask on each new computer. Which 2 additional TCP/IP properties should you configure on each new computer?()AThe bindings.BA DNS address.CA Gateway address.DA WINS server address.EA DHCP server address.

多选题Your network has client computers that run Windows XP.   Users do not have administrative rights to their local computers.   You use Windows Server Update Services (WSUS) to manage software updates. You are planning to deploy Windows 7.   Your company uses a custom application that is not compatible with Windows?7.   You need to ensure that all users are able to run the custom application.    What are two possible ways to achieve this goal?()ADeploy and register the compatibility-fix database file to the client computers by using a user startup script.BDeploy and register the compatibility-fix database file to the client computers by using a computer startup script.CInstall and register a shim on the client computers by using Group Policy.DInstall and register a shim on the WSUS server.

问答题Some people say that computers are making the world lonely and dehumanized. What is your opinion? State your opinion in no less than about 160 words, and write it on the Answer Sheet.

单选题Your company has an Active Directory forest that contains Windows Server 2008 R2 domain  controllers and DNS servers. All client computers run Windows XP SP3. You need to use your client computers to edit domain-based GPOs by using the ADMX files that  are stored in the ADMX central store.     What should you do()AAdd your account to the Domain Admins group.BUpgrade your client computers to Windows 7.CInstall .NET Framework 3.0 on your client computers.DCreate a folder on PDC emulator for the domain in the PolicyDefinitions path. Copy the ADMX files to the PolicyDef

单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create a security update scan procedure for client computers. You need to choose a security tool that supports all the client computers.  Which tool should you choose? ()A UrlScan Security ToolB Enterprise Scan Tool (EST)C Malicious Removal Tool (MRT)D Microsoft Baseline Security Analyzer (MBSA)

单选题You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department.   On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()AUse Secedit.exe to import the security settings from the .inf file to the computers in the sales department.BUse a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.CCreate an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.DCreate an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.

单选题Your company has an Active Directory domain. The company has purchased 100 new computers. You want to deploy the computers as members of the domain. You need to create the computer accounts in an organizational unit. What should you do()ARun the csvde f computers.csv command.BRun the ldifde f computers.ldf command.CRun the dsadd computer  command.DRun the dsmod computer  command.

单选题Your company has an Active Directory forest that contains Windows Server 2008 domain controllers and DNS servers. All client computers run Windows XP. You need to use your client computers to edit domain- based GPOs by using the ADMX files that are stored in the ADMX central store. What should you do()AAdd your account to the Domain Admins group.BUpgrade your client computers to Windows Vista.CInstall .NET Framework 3.0 on your client computerDCreate a folder on the Primary Domain Controller (PDC) emulator for the domain in the PolicyDefinitions path. Copy the ADMX files to the PolicyDefinitions folder.

单选题Your network consists of a single Active Directory domain. Your network contains 10 servers and 500 client computers. All domain controllers run Windows Server 2008 R2. A Windows Server 2008 R2 server  has Remote Desktop Services installed. All client computers run Windows XP Service Pack 3.  Youplan to deploy a new line-of-business application. The application requires desktop themes to be  enabled.   You need to recommend a deployment strategy that meets the following requirements: èOnly authorized users must be allowed to access the application.   èAuthorized users must be able to access the application from any client computer. èYour strategy must minimize changes to the client computers.  èYour strategy must minimize software costs. What should you recommend?()AMigrate all client computers to Windows 7. Deploy the application to all client computers by using a Group Policy object (GPO).BMigrate all client computers to Windows 7. Deploy the application to the authorized users by using a Group Policy object (GPO).CDeploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Install the  application on the Remote Desktop Services server. Implement Remote Desktop Connection Broker (RD Connection Broker).DDeploy the Remote Desktop Connection (RDC) 7.0 software to the client computers. Enable the  Desktop Experience feature on the Remote Desktop Services server. Install the application on the  Remote Desktop Services server.

多选题You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a HOSTS file.BConfigure a LMHOSTS file.CConfigure a WINS server database.DConfigure a DHCP server address.EConfigure at least one DNS address.

单选题Your company has a single Active Directory directory service domain. Servers in your environment run Windows Server 2003. Client computers run Windows XP or Windows Vista. You plan to create an internal centrally managed security update infrastructure for client computers. You need to choose a security update management tool that supports all the client computers.  Which tool should you choose? ()A Microsoft Assessment and Planning (MAP) ToolkitB Microsoft Baseline Security AnalyzerC Microsoft System Center Operations ManagerD Windows Server Update Services (WSUS)

单选题Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()A Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.

单选题You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()AConfigure the network category of your wireless network connection to Private.BConfigure the network category of your wireless network connection to Public.CConfigure the TCP/IP packet filtering on the wireless network connection.DConfigure the wireless network connection with the appropriate authentication to the router.