A user notices the department laser printer is printing light. Which of the following items should a technician do FIRST to fix this issue? ()A、Remove and clean the fuser assembly with an alcohol based cleaner.B、Install a maintenance kit and reset all page counts to zero.C、Perform a full power cycle on the printer.D、Clean the paper path with a damp cloth and canned air to remove any debris.

A user notices the department laser printer is printing light. Which of the following items should a technician do FIRST to fix this issue? ()

  • A、Remove and clean the fuser assembly with an alcohol based cleaner.
  • B、Install a maintenance kit and reset all page counts to zero.
  • C、Perform a full power cycle on the printer.
  • D、Clean the paper path with a damp cloth and canned air to remove any debris.

相关考题:

A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()A. Persistent sessionB. Dynamic evaluationC. Roaming sessionD. Browser request follow-through

Your network contains an Active Directory forest. The forest schema contains a custom attribute  for user objects.     You need to give the human resources department a file that contains the last logon time and the  custom attribute values for each user in the forest.     Which should you use()A、the Dsquery toolB、the Export-CSV cmdletC、the Get-ADUser cmdletD、the Net.exe user command

A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()A、The user has a UID less than 200B、The user has been defined as an administrative userC、The file /usr/es/sbin/cluster/clpasswd is not executable by the userD、The user needs explicit authorization to change their password cluster-wide

You are the administrator of a Windows Server 2003 computer named Server4.You install Terminal Services on Server4. You add users from the technical support department to the Power Users group and to the Remote Desktop Users group on Server4. You notice that Server4 is periodically unavailable. You open Event Viewer on Server4 and discover that theserver was restarted accidentally by users in the technical support department.You need to ensure that users in the technical support department can establish a Terminal Service session and can manage local user accounts on Server4 without having the ability to restart Server 4.Which action or actions should you perform?() (Choose all that apply.)A、Remove the technical support user accounts from the Power Users group.B、Remove the technical support user accounts from the Remote Desktop Users group.C、Remove the Power Users group from the Shut down the system user right.D、Add the Power Users group to the Deny log on locally user right.E、Modify the permissions on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission.

现有表user,字段:userid,username,salary,deptid,email;表department,字段:deptid,deptname;下面()应采用检查约束来实现。A、若department中不存在deptid为2的纪录,则不允许在user表中插入deptid为2的数据行。B、若user表中已经存在userid为10的记录,则不允许在user表中再次插入userid为10的数据行。C、User表中的salary(薪水)值必须在1000元以上。D、若User表的email列允许为空,则向user表中插入数据时,可以不输入email值。

A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()A、SpamB、PhishingC、AdwareD、A Trojan

If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A、DLL injectionB、DDoS attackC、DNS poisoningD、ARP poisoning

You are the network administrator for Testking.com. The network consists of a single Active Directory domain named testking.com. The sales department is hiring employees. An OU named TestKingSales is created to hold objects for the new sales department users. Each sales department user has a portable computer. Each portable computer runs Windows XP Professional. The sales department users are responsible for joining their portable computers to the domain. You need to ensure that the computer accounts for the Sales department user's portable computers are created in the TestKingSales OU. You need to achieve this goal without granting any unnecessary permissions. What should you do?()A、Assign the sales department users the Allow - Read permissions for the Computer container.B、Configure the sales department users' user accounts to be trusted for delegationC、Prestage the computer accounts in the TestKingSales OU for the sales department users' portable computers.D、Assign the sales depertment users the Allow - Create all Child Objects permission for the TestKingSales OU.

You are the network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All domain controllers run Windows Server 2003. The sales department recently hired 10 new employees. User accounts for these employees were created in Active Directory. The manager of the sales department sent you a list of a new users and asked you to add the user accounts to an existing global group named SalesDept. You need to add the users to the SalesDept global group. What are two possible ways to achieve this goal? Each correct answer presents a complete solution. Choose two.()A、Use the dsadd user command to add the user accounts to the SalesDept global group.B、Use the dsadd group command to add the user accounts to the SalesDept global group.C、In Active Directory Users and Computers, select all 10 user accounts. Right-click the selected users, and then select the Properties menu command.D、In Active Directory Users and Computers, select all 10 user accounts. Right-click the selected users, and then select the Add to a Group menu command.

Your network consists of Windows XP computers. All computers are joined to a single Active  Directory directory service domain and located in a single Active Directory site. You create a new Group  Policy object (GPO) and link it to the site. The policy configures default screensaver settings. User  accounts of users in the research department are located in an organizational unit (OU) named Research.  You need to allow users in the research department to configure a different screensaver setting on their  computers.  What should you do?()A、 Move the user accounts of users in the research department to the Users container.B、 Configure a local security policy on all computers in the research department to allow users to modify their screensaver settings.C、 Add users in the research department to a domain group. Allow the group the Apply Group Policy permission for the GPO.D、 Add users in the research department to a domain group. Deny the group the Apply Group Policy permission to the GPO.

You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003.  Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only.  All user accounts are located in the default Users container.  You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment.  What should you do?()A、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B、 Create a top­level OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.

You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A、Install wireless network cards on all accounting department computers. Select PEAP authenticationB、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

You are the network administrator for Among other duties you administer a Windows 2003 server named TestKingB. You install Terminal Services on TestKingB. You add users from the TestKing support department to the Power Users group and to the Remote Desktop Users group on TestKingB. You notice that TestKingB is periodically unavailable. You open Event Viewer on TestKingB and discover that the server was restarted accidentally by users in the TestKing support department. You need to ensure that users in the TestKing support department can establish a Terminal Services session and can manage local user accounts on TestKingB. However, they should not have the ability to restart TestKingB. Which action or actions should you perform? Select all that apply.()A、Remove the TestKing Support department user accounts from the Power Users group.B、Remove the TestKing Support department user accounts from the Remote Desktop Users group.C、Remove the Power Users group from the Shut down the system user right.D、Add the Power Users group to the Deny log on locally user right.E、Modify the permission on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission

You need to design a security strategy that will ensure that unauthorized users cannot access personnel data. Your solution must comply with security requirements and the company’s new administrative model.What should you do?()A、In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA/HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members listB、In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA/HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members listC、In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA/HRUsers group and the CORP/Backup Operators group to the Restricted Groups list. Add only the HR department user accounts and the administrator user accounts to the Allowed Members list for each groupD、In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA/HRUsers group and the CORP/Backup Operators group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list for the LA/HRUsers group. Add only the administrator user accounts to the Allowed Members list for the CORP/Backup Operators group

Your company has a single Active Directory directory service domain that includes a main office and two branch offices. Each branch office has its own Active Directory site. All user accounts are placed into organizational units (OUs) based on department. Multiple Group Policy objects (GPOs) are linked at the domain, the site, and the OU levels. A user in Atlanta transfers to a different branch office and joins a different department. You move her user account into the corresponding OU. After logging on to her new client computer, the user notices that the desktop settings are different from the settings she had in her previous location. You need to find out the effect of all GPOs on the user.  What should you do?()A、 Use the Security Configuration and Analysis snap-in.B、 Use the Resultant Set of Policy snap-in.C、 Run the Secedit /analyze command.D、 Run the Secedit /validate command.

You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()A、Instruct the user to move the documents to the Shared Folders folder.B、Add the user's user account to the local Power Users group.C、Add the user's user account to the Network Configuration Operators group.D、Add the user's user account to the local Adminstrators group.

单选题现有表user,字段:userid,username,salary,deptid,email;表department,字段:deptid,deptname;下面()应采用检查约束来实现。A若department中不存在deptid为2的纪录,则不允许在user表中插入deptid为2的数据行。B若user表中已经存在userid为10的记录,则不允许在user表中再次插入userid为10的数据行。CUser表中的salary(薪水)值必须在1000元以上。D若User表的email列允许为空,则向user表中插入数据时,可以不输入email值。

单选题You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.   After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers.   You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications.   What should you do?()AAdd each user account to the Power Users group on that user’s computer.BConfigure the financial and credit applications to run as services on the computers in the accounting department.CApply the Compatws.inf security template to the local security policy of the computers in the accounting department.DUse the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.

单选题A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()AThe user has a UID less than 200BThe user has been defined as an administrative userCThe file /usr/es/sbin/cluster/clpasswd is not executable by the userDThe user needs explicit authorization to change their password cluster-wide

单选题A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()ASpamBPhishingCAdwareDA Trojan

单选题You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )AFrom System in Control Panel, select the Change Type option, and then select the Roaming profile option. BFrom Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. CUse the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. DConnect the portable computer to the network, and configure the user accounts for a roaming user profile.

单选题Your network contains an Active Directory forest. The forest schema contains a custom attribute for  user objects.   You need to give the human resources department a file that contains the last logon time and the custom  attribute values for each user in the forest.   What should you use()Athe Dsquery toolBthe Export-CSV cmdletCthe Get-ADUser cmdletDthe Net.exe user command

单选题A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()APersistent sessionBDynamic evaluationCRoaming sessionDBrowser request follow-through

单选题Your network consists of a single Active Directory domain. User accounts for engineering department  are located in an OU named Engineering.    You need to create a password policy for the engineering department that is different from your domain  password policy.    What should you do()ACreate a new GPO. Link the GPO to the Engineering OU.BCreate a new GPO. Link the GPO to the domain. Block policy inheritance on all OUs except for the  Engineering OU.CCreate a global security group and add all the user accounts for the engineering department to the  group. Create a new Password Policy Object (PSO) and apply it to the group.DCreate a domain local security group and add all the user accounts for the engineering department to  the group. From the Active Directory Users and Computer console, select the group and run the  Delegation of Control Wizard.

单选题Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()A Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.

单选题Your network consists of a single Active Directory domain. User accounts for engineering  department are located in an OU named Engineering.     You need to create a password policy for the engineering department that is different from your  domain password policy.     What should you do()ACreate a new GPO. Link the GPO to the Engineering OU.BCreate a new GPO. Link the GPO to the domain. Block policy inheritance on all OUs except for the Engineering OUCCreate a global security group and add all the user accounts for the engineering department to the group. Create aDCreate a domain local security group and add all the user accounts for the engineering department to the group. Fr

单选题You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute a custom application to the Windows XP Professional computers in the sales department. He deploys the software by using Group Policy. Susan is a user in the sales department. She reports that the custom application is not available. You examine her computer, and you verify that the application is not present on her computer. You want to ensure that the software is deployed the next time Susan logs on. Which command should you run?()ASecedit /refreshpolicy user_policy /enforceBSecedit /refreshpolicy machine_policy /enforceCGpupdate /target:computer /syncDGpupdate /target:user /sync