You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()A、 Map a network drive to the AccSecuredintern folder from Richard’s computer. B、 Map a network drive to the AccSecured shared folder from Richard’s computer. C、 Allow the intern user account modify permissions on the intern subfolder. D、 Allow the intern user account traverse folder/execute file permission on the AccSecured  folder. E、 Allow the intern user account list folder content permission on the AccSecured folder.  Remove read extended attributes and read permissions.

You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()

  • A、 Map a network drive to the AccSecuredintern folder from Richard’s computer. 
  • B、 Map a network drive to the AccSecured shared folder from Richard’s computer. 
  • C、 Allow the intern user account modify permissions on the intern subfolder. 
  • D、 Allow the intern user account traverse folder/execute file permission on the AccSecured  folder. 
  • E、 Allow the intern user account list folder content permission on the AccSecured folder.  Remove read extended attributes and read permissions.

相关考题:

you have recently written the code shown below:Hashtable emailAddresses = new Hashtable ();emailAddresses.Add (Mia, mia@ Certkiller .com);emailAddresses.Add (Andy, andy@ Certkiller .com);emailAddresses.Add (Kara, kara@ Certkiller .com);You need to ensure that these e-mail addresses are stored in the Email.dat file so that you can load them againwhen the user restarts the application.What should you do?()A.B.C.D.

You create a Web site that is for members only. The Web site allows members to create lists of users that have access to information about member profiles. The name of the list is stored in the listName variable. The user name of the user to whom access is given is stored in the username variable.You need to enable members to manage their lists of users.Which code segment should you use?()A.B.C.D.

You are the administrator of a SQL Server 2000 computer. The server contains confidential information about contracts on which your company has placed bids.Company policy requires that bid information be removed permanently from the database one year after the bid closes. You need to comply with this policy and minimize server overhead.What should you do?A.Create a Data Transformation Services (DTS) package to remove bids that have a closing data older than one year.B.Create a trigger to delete any bids that have a closing data older than one year. Bind the trigger to the bids table for all INSERT, UPDATE, and DELETE events.C.Create a stored procedure to delete any bids that have a closing data order than one year. Use SQL server agent to schedule the stored procedure to run every night.D.Create a view that contains a WHERE clause to exclude bids that have a closing date older than one year.

You are the administrator of a SQL Server 2000 database. Using the default options configures the database. You drop indexes to facilitate a large import of data, and rebuild them after the import is complete.Users report that response times from a stored procedure have become slower. In the stored procedure, you examine the following code.CREATE PROCEDURE GetCustomer( @CustomerID Int )ASSELECT FirstName, LastName, Address1, Address2, City,State, Zip, MAX(PurchaseDate) AS LastPurchaseFROM Customers CJOIN Addresses A ON A.AddressID = C.AddressIDJOIN Purchases P ON P.CustomerID = C.CustomerIDWHERE C.CustomerID = @CustomerIDGROUP BY FirstName, LastName, Address1, Address2, City, State, ZipYou want to improve the performance of the procedure by using the least amount of administrative effort. What should you do?A.Recompile the stored procedure.B.Update the database statistics.C.Check the consistency of the database and repair errors.D.Create a view and modify the stored procedure to use the view.

You have a DNS zone that is stored in a custom application directory partition.     You install a new domain controller.   You need to ensure that the custom application directory partition replicates to the new domain  controller.     What should you use()A、the Active Directory Administrative Center consoleB、the Active Directory Sites and Services consoleC、the DNS Manager consoleD、the Dnscmd tool

You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()A、EAP-MD5 is not supported by the Junos Pulse Access Control ServiceB、EAP-MD5 requires passwords to be stored in an encrypted format.C、EAP-MD5 requires passwords to be stored in a clear text format.D、EAP-MD5 performs a real time hash of the handset's MAC address.

In which scenario will you perform a cancel-based recovery?()A、 when a tablespace is dropped and you have only RMAN-based backup of the databaseB、 when a table is dropped and stored in the Recycle BinC、 when you are required to recover an existing table to its previous stateD、 when a tablespace is dropped and you have only a user-managed full backup of the database

Which statement about using RMAN stored scripts is true?()A、To create and execute an RMAN stored script, you must use a recovery catalog.B、When executing a stored script and a command fails, the remainder of the script is executed, and a message is written to the alert log file.C、RMAN stored scripts can always be executed against any target database that is registered in the recovery catalog.D、When you execute a stored script, it always executes using the persistent channel settings previously set with the CONFIGURE command.

You have a computer that runs Windows XP Professional. The computer is part of a workgroup. You need to configure advanced NTFS permissions on a folder stored on the computer. What should you do first? ()A、Run cipher.exe.B、Disable simple file sharing.C、Enable folder encryption for the folder.D、Request that an administrator adds your user account to the local Power Users group.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()A、You should create a discover imageB、You should create an install imageC、You should create a capture imageD、You should create a CD-ROM that contains PXE drivers

You install the Windows Deployment Services (WDS) role on a server that runs Windows Server 2008. You plan to install Windows Vista on a computer that does not support Preboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server.  You need to start the computer and install the image that is stored on the WDS server. What should you create?()A、a capture imageB、a CD-ROM that contains PXE driversC、a discover imageD、an install image

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a remote SQL Server 2008 instance. You notice that the application has a poor performance. On the remote SQL Server instance, you capture a workload of the remote instance to a trace table by using SQL Profiler. Now you have to use the Database Engine Tuning Advisor to analyze the workload of the remote SQL Server instance on a local SQL Server instance.  So what action should you perform to achieve this goal?()A、You should recapture the workload by using the data collector.B、You should enable the XP_MSVER stored procedure on the local server.C、You should enable the XP_MSVER stored procedure on the remote serverD、You should recapture the workload to a trace file by using SQL Profiler.

You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.You have to have the Application Identifier of xxx stored in a DNS record.The Application Identifier is used for the federated trust.What actions must you take on the DNS?()A、You must set up recipient filtering.B、You must set up a Host (A).C、You must use a TXT record.D、You must use a Pointer (PTR) record.E、You must use a Mail exchange (MX) record.

单选题In which scenario will you perform a cancel-based recovery?()A when a tablespace is dropped and you have only RMAN-based backup of the databaseB when a table is dropped and stored in the Recycle BinC when you are required to recover an existing table to its previous stateD when a tablespace is dropped and you have only a user-managed full backup of the database

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You have the Windows Deployment Services (WDS) role installed on a serverthat runs Windows Server 2008. You plan to install Windows Vista on a computer that does not supportPreboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server. You have to start the computer and install the image that is stored on the WDS server. What should you create?()AYou should create a discover imageBYou should create an install imageCYou should create a capture imageDYou should create a CD-ROM that contains PXE drivers

单选题You have configured the ASM instance for the PROD database of iPod Corporation. You have specified the following parameter values in the initialization parameter file:   DB_CREATE_FILE_DEST=’devices/grp1/P’   DB_CREATE_ONLINE_LOG_DEST_1=’devices/d_grp2/Q’        DB_CREATE_ONLINE_LOG_DEST_2=’devices/d_grp3/R’        BACKGROUND_DUMP_DEST=’devices/d_grp1/S’   You have added a new redo log group that contains two redo log members. Where are the redo log members stored?()A Both the members will be stored in the ’devices/grp1/P’ directory.B Both the members will be stored in the ’devices/d_grp2/Q’ directory.C Both the members will be stored in the ’devices/d_grp3/R’ directory.D One member will be stored in the ’devices/d_grp2/Q’ directory and the other in the ’devices/d_grp3/R’ directory.

单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.You have to have the Application Identifier of xxx stored in a DNS record.The Application Identifier is used for the federated trust.What actions must you take on the DNS?()AYou must set up recipient filtering.BYou must set up a Host (A).CYou must use a TXT record.DYou must use a Pointer (PTR) record.EYou must use a Mail exchange (MX) record.

多选题You upgrade your Oracle database in a multiprocessor environment. As a recommended you execute thefollowing script:SQL @utlrp.sqlWhich two actions does the script perform?()AParallel compilation of only the stored PL/SQL codeBSequential recompilation of only the stored PL/SQL codeCParallel recompilation of any stored PL/SQL codeDSequential recompilation of any stored PL/SQL codeEParallel recompilation of Java codeFSequential recompilation of Java code

单选题You have a computer that runs Windows 7. You manually create a system restore point. You need torestore a copy of a file stored on drive C from two days ago. You must achieve this goal in the minimumamount of time. What should you do?()AFrom Recovery, select System Restore.BFrom Backup and Restore, select Restore my files.CFrom the command prompt, run Wbadmin get items.DFrom the properties of the file, select Previous Versions.

单选题You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()AEAP-MD5 is not supported by the Junos Pulse Access Control ServiceBEAP-MD5 requires passwords to be stored in an encrypted format.CEAP-MD5 requires passwords to be stored in a clear text format.DEAP-MD5 performs a real time hash of the handset's MAC address.

单选题Which script must you to query to display the code associated with RMAN stored scripts?()ARC_STORED_SCRIPTBRC_STORED_SCRIPT_LINECRC_SCRIPTSDRC_STORED_LINE_SCRIPTENone of the other alternatives apply

单选题You install the Windows Deployment Services (WDS) role on a server that runs Windows Server 2008. You plan to install Windows Vista on a computer that does not support Preboot Execution Environment (PXE). You have a Windows Vista image that is stored on the WDS server.  You need to start the computer and install the image that is stored on the WDS server. What should you create?()Aa capture imageBa CD-ROM that contains PXE driversCa discover imageDan install image

单选题Your application must access data that is located on two SQL Server 2005 computers. One of these servers is named SQL1 and the other is SQL2. You have permissions to create a stored procedure on SQL1 to support your application. However,on SQL2 you only have permissions to select data. You write the stored procedure on SQL1. The stored procedure accesses SQL2 by using the OPENQUERY Transact-SQL statement. However,the query fails when executed.You need to troubleshoot the cause of the error. What should you do?()AJoin the two servers by using the four-part syntax of server.database.schema.table.BReference SQL2 by using an alias.CAdd SQL2 as a remote server to SQL1.DAdd SQL2 as a linked server to SQL1.

单选题Your network consists of a single Active Directory domain named contoso.com. The functional level ofthe domain is Windows Server 2003.You have a file server named Server1 that is used to store users’ home folders and profiles.On Server1, you create a folder named D:/data/ and share the folder as UserData. You create a new useraccount named TemplateUser in Active Directory.You need to ensure that each user account you create by copying TemplateUser is configured to have aunique home folder stored in the UserData share. Which home folder path should you specify? ()AD:/data/%homedrive%BD:/data/%username%C//server1/userdata/%homedrive%D//server1/userdata/%username%

单选题You have a DNS zone that is stored in a custom application directory partition.     You install a new domain controller.   You need to ensure that the custom application directory partition replicates to the new domain  controller.     What should you use()Athe Active Directory Administrative Center consoleBthe Active Directory Sites and Services consoleCthe DNS Manager consoleDthe Dnscmd tool

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. According to the company requirement, the names of all user-defined stored procedures must contain the prefix usp_ on all instances. Besides this, you must make sure that stored procedures that do not contain this prefix cannot be created by you. What should you do?()AA policy should be created. The policy targets the name of the stored procedure that is evaluated on demand. BA policy should be created. The policy targets the name of the stored procedure that is evaluated on change. CA condition should be created. The condition targets the name of the stored procedure that is evaluated on change DA condition should be created. The condition targets the name of stored procedure that is evaluated on demand.

单选题You have a computer that runs Windows 7. You run Runas and specify the /savecred parameter to start anapplication. You need to delete the stored password. What should you do?()ARun Del and specify the /p parameter.BRun Runas and specify the /noprofile parameter.CFrom Credential Manager, modify the Windows credentials.DFrom Authorization Manager, modify the Authorization Manager options.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There are user-defined stored procedures. Now you have to make sure two things, first, the names of all user-defined stored procedures must contain the prefix usp_ on all instances; second, stored procedures that do not contain this prefix cannot be created by you.  So what should you do to ensure this two?()AYou should create a policy that targets the name of the stored procedure that is evaluated on change. BYou should create a policy that targets the name of the stored procedure that is evaluated on demand.CYou should create a condition that targets the name of stored procedure that is evaluated on demand. DYou should create a condition that targets the name of the stored procedure that isevaluated on change.