Users have stated that all their printouts from a networked printer consist of random characters.The technician should:()A、perform a virus scan.B、replace the fuser.C、reinstall the printer drivers.D、reinstall the printer firmware.

Users have stated that all their printouts from a networked printer consist of random characters.The technician should:()

  • A、perform a virus scan.
  • B、replace the fuser.
  • C、reinstall the printer drivers.
  • D、reinstall the printer firmware.

相关考题:

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT;For which database users is the audit policy now active?()A. All users except SYSB. All users except SCOTTC. All users except sys and SCOTTD. All users except sys, system, and SCOTT

Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configuration.B、All users have their own private candidate configuration.C、When a user commits, all nonconflicting changes made by all users are committed.D、When a user commits, only the user's own changes are committed.

A user states that all their incoming mail is showing that it is behind three hours. All other users have the correct time. Which of the following should the technician check?()A、The system’s local time settingsB、The system’s O/S version and patch statusC、The system’s network configurationD、The mail server’s configuration

Which two statements apply when a user has entered private configuration mode by typing configure private? ()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all nonconflicting changes made by all users are commitedD、When a user commits, only the user's own changes are commited

Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all non conflicting changes made by all users are commitedD、When a users commits, only the user's own changes are commited

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you.  So what action should you perform to achieve this goal?()  A、All the SQL Server logins of the application developers have to be added to a fixed server role. B、All the database users of the application developers have to be added to a fixed database role C、All SQL Server logins of the application developers should be given the appropriate server-level permissions. D、All database users of the application developers should be given the appropriate database-level permissions.

You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. The organization contains two Mailbox servers named Server1 and Server2.Each Mailbox server has one mailbox database and one public folder database. You discover that all users create public folders on Server1 only. You need to ensure that all users create public folders on Server2 only. What should you do?()A、Move all mailboxes to Server2.B、Modify the properties of both mailbox databases.C、Remove all public folder replicas from Server1.D、Modify the properties of both public folder databases.

You have an Exchange Server 2010 organization.  All users connect to their mailboxes by using Microsoft Office Outlook 2007 Service Pack 2 (SP2) andWindows 7.  Your companys security administrators deploy Outlook Protection Rules.  You need to recommend a client connection solution for the organization to ensure that Outlook ProtectionRules can be used.  What should you recommend?()A、Upgrade all client computers to Outlook 2010.B、Instruct all users to connect to Outlook Web App (OWA).C、Instruct all users to install the Rights Management Service (RMS) client.D、Instruct all users to install the Secure/Multipurpose Internet Mail Extensions (S/MIME) control.

You have an Exchange Server 2010 organization. Your company’s compliance policy states the following:.Delete e-mail messages sent to legal department users that are older than 180 days. .Delete e-mail messages sent to all other users that are older than 60 days You need to recommend a solution that meets the requirements of the compliance policy. What should you recommend?()A、Configure deleted item retention for all users.B、Configure Personal Archives for the legal department users.C、Create two Managed Folder mailbox policies. Use one policy for the legal department users. Use the other policy for all other users.D、Create two new message classifications. Use one message classification for the e-mails sent to legal department users. Use the other message classification for the e-mails sent to all other users.

单选题Manually, you set the consumer group of all of the newly created users to MYDB_GRP. You want the users to be able to change their consumer groups as per the application requirement. What was the first step that was needed in the process to achieve this objective?()A The user must have been granted the DBA role.B The user must have been granted the switch privilege as a part of a role.C The user must have been granted the Resource Manager administrator privilege.D The user must have been granted the switch privilege by using the DBMS_RESOURCE_MANAGER_PRIVS package.

单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers.You need to ensure that all users are authenticated by a domain controller when they log on.How should you modify the local security policy? ()ARequire authentication by a domain controller to unlock the client computer.BCache zero interactive logons.CCache 50 interactive logons.DGrant the Log on locally user right to the Users group.

单选题You have been asked to create three users, PUB1, PUB2 and PUB3, for three newly hired employees and to allocate unlimited quota on their default tablespace PUBLISHER_TBS with no other privileges. After creating the users, which method can you use for granting the required privileges?()Agrant CONNECT role to all of the three usersBgrant RESOURCE role to all of the three usersCgrant both CONNECT and RESOURCE role to all of the three usersDexecute ALTER USER .. QUOTA UNLIMITED ON publisher_tbs command for all of the three usersEcreate role with UNLIMITED TABLESPACE system privilege and assign the role to all of the three users

单选题You have an Exchange Server 2010 server that contains a single mailbox database.All users run Microsoft Office Outlook and Outlook Web App.You discover that users cannot restore e-mail messages from the Recover Deleted Items folder.You need to ensure that users can restore e-mail messages from the Recover Deleted Items folder.What should you do?()AFrom the Exchange Management Console (EMC), modify the properties of the mailbox databaseBFrom the Exchange Management Console (EMC), modify the properties of the Mailbox server objectCFrom the Exchange Management Shell, create a management role and then assign the role to all usersDFrom the Exchange Management Shell, create a retention policy and then assign the policy to all users

多选题In the admin GUI, you navigate to "System" "Status" "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()ATo forcibly sign out a single user, you should select the check box next to that user's login name, then select Delete Session.BIf you select Delete All Sessions, all users are forcibly signed out and are unable to sign in again until Enable All Users is selected.CSelecting Disable All Users prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.DSelecting Refresh Roles re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

单选题You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The network contains an internal root certification authority (CA).Users on the network use Outlook Anywhere.A Client Access server uses a wildcard certificate issued by a trusted third-party root CA.You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME. What should you do?()AInstruct all users to import the third-party root CA certificate.BImport the internal root CA certificate to the Client Access server.CInstruct all users to import the internal root CA certificate.DIssue a certificate to each user from the internal root CA

单选题You are a Windows Server 2008 systems administrator responsible for configuring FTP Publishing Servicefor use by members of your organization’s engineering department. The name of the server is FTPServer01. Several users have reported that they are able to access most files through the FTP site,but they cannot access the contents of the Drawings folder. You have verified that these users. Windowsaccounts have the correct file system permissions for this folder. You want to minimize the permissionsgranted to all the users. Which of the following changes should you make to enable users to access thisfolder?()AChange the permissions for the IUSR_FTPServer01 account on the Drawings folder.BCreate new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.CDisable the Allow Only Anonymous Connections option.DAdd the users to the local Administrators group on FTPServer02.

多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configurationBAll users have their own private candidate configurationCWhen a user commits, all non conflicting changes made by all users are commitedDWhen a users commits, only the user's own changes are commited

多选题Which two statements apply when a user has entered private configuration mode by typing configure private? ()AAll users have their own active configurationBAll users have their own private candidate configurationCWhen a user commits, all nonconflicting changes made by all users are commitedDWhen a user commits, only the user's own changes are commited

多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configuration.BAll users have their own private candidate configuration.CWhen a user commits, all nonconflicting changes made by all users are committed.DWhen a user commits, only the user's own changes are committed.

单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()AThe SetupUser profileBThe Default User profileCThe Administrator profileDThe System profileEThe All Users profile

单选题From the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries.  You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message.  Which method would you follow to achieve this?()Aset the CPU time per call in the users profileBset the CPU time per session in the users profilesCset the CPU levels for the users’ group using Resource ManagerDset the TIMED_STATISTICS parameter to TRUE in the parameter file