A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT

A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()

  • A、EDIT
  • B、CHMOD
  • C、ATTRIB
  • D、CONVERT

相关考题:

A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?() A.EDITB.CHMODC.ATTRIBD.CONVERT

A user downloads a 4.1 GB ISO image from a website. Which of the following media types isrequired for the user to burn the image?() A.CD+RB.BD-RC.DVD-ROMD.CD-ROM

Which of the following is an accurate description of the command copy startup-configftp://kevin:cisco@192.168.1.74?()A、The configuration on the FTP server is copied to RAMB、The command is not valid on a Cisco routerC、The configuration file in RAM is copied to an FTP serverD、The configuration file in NVRAM is copied to an FTP serverE、The configuration on the FTP server is copied to NVRAMF、The configuration will be copied from NVRAM to an FTP server with a filename of Kevin

A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()A、An IEEE-1394 deviceB、A NIC deviceC、An IrDA deviceD、A FDD device

A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A、The user copied to a read-only folder share.B、The user changed the attributes of the files.C、The user copied the files from the local My Documents folder.D、The user moved instead of copied the files.

A user downloads a 4.1 GB ISO image from a website. Which of the following media types isrequired for the user to burn the image?()A、CD+RB、BD-RC、DVD-ROMD、CD-ROM

After performing a copy backup of a file server, the archive bit on the backed up files will be which of the following?()A、 DeletedB、 UnchangedC、 SetD、 Copied

When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()A、 use acl = yesB、 map group acls = yesC、 force unknown acl user = yesD、 inherit acls = no

A system administrator had a disk failure on an HMC. The disk was replaced and the HMC was loaded from the Product Recovery CD. The system administrator had performed a backup to DVD of the HMC data before the system failed. After restoring the backup files, it was noticed that no profile files were restored. What is the most likely cause of this problem?()A、The profile data was not initialized after restoring the backup CDB、The profile data was not backed up before doing the Critical Console Data backupC、A Critical Console Data backup was performed which backs up user data, but not profile dataD、A Save Upgrade data was done instead of a backup Critical Console Data and the profile files were not included

You have configured the flash recovery area to store online redo log files, control files, archived redo logs and RMAN backups. Which of the following files can you successfully delete from the flash recovery area if you want to reclaim the space within it?()A、 multiplexed control filesB、 RMAN obsolete backupsC、 multiplexed online redo log filesD、 archived redo logs that have not been copied to tape

You are the administrator of a computer named Computer1 that runs Windows 7. Several users shareComputer1. The users plan to encrypt files on the computer. You need to ensure that you can access allencrypted files on the computer.  What should you do first?()A、At a command prompt, run Cipher.exe.B、At a command prompt, run Certutil.exe.C、From the local computer policy, modify the User Rights Assignment.D、From User Accounts, run the Manage your file encryption certificates wizard.

As the administrator of your company’s network, you have implemented encryption for extra security of data on your network. A user moves an encrypted file from an NTFS partition on her Windows 2000 Workstation to an NTFS folder on a remote Windows 2000 Server. What effect will this have on the encrypted file?()A、The encrypted file will automatically be decrypted.B、Encrypted files and folders cannot be moved or copied, decrypt it first then move or copy thefile or folder.C、The encrypted file will remain encrypted in the Windows 2000 folder.D、The encrypted file will inherit the encryption state of the remote NTFS folder.

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key andcertificate. You need to ensure that your user account can decrypt all EFS files on the  computer.  Whatshould you do?( )A、From Credential Manager, add a Windows credential.B、From Credential Manager, add a certificate-based credential.C、From the local computer policy, add a data recovery agent.D、From the local computer policy, modify the Restore files and directories setting.

You have a computer that runs Windows XP Professional. The computer has a limited amount of free disk space. You need to identify the amount of disk space that is used to store the following:Temporary Internet Files, Files in the Recycle Bin, Downloaded program files. What should you do?()A、From the command prompt, run chkdsk.exe.B、From the System Tools menu, run Disk Cleanup.C、From Internet Explorer, view the Internet Options.D、From System Properties, view the User Profiles settings.

You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure user Group Policy to achieve these results:    Allow users to view the options in the Offline Files dialog box   Remove the Offline Files tab from the Folder Options dialog box   Disable the Settings button in the Offline Files Status dialog box   Remove the Settings command from the Offline Files shortcut menu    Your proposed solution is to enable the group policy setting Disable user configuration of Offline Files.    Which results does the proposed solution provide?()A、Users can view the options in the Offline Files dialog boxB、The Offline Files tab is removed from the Folder Options dialog boxC、The Settings button in the Offline Files Status dialog box is disabledD、The Settings command is removed from the Offline Files shortcut menu

单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()AAdd the list of files to /etc/exclude.rootvg.BModify the image.data file and add the files to be excluded form the backup.CModify the bosinst.data file and specify which files are to be excluded from the backup.DSpecify the files to be excluded on the command line when executing the mksysb command.

单选题When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()A use acl = yesB map group acls = yesC force unknown acl user = yesD inherit acls = no

单选题A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()AAn IEEE-1394 deviceBA NIC deviceCAn IrDA deviceDA FDD device

单选题A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()AInstruct User1 to create a new user certificate on Computer2.BInstruct User1 to take ownership of the encrypted files on Computer2.CInstruct User1 to import the user certificate from Computer1 to Computer2.  DLog on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

单选题Which of the following is an accurate description of the command copy startup-configftp://kevin:cisco@192.168.1.74?()AThe configuration on the FTP server is copied to RAMBThe command is not valid on a Cisco routerCThe configuration file in RAM is copied to an FTP serverDThe configuration file in NVRAM is copied to an FTP serverEThe configuration on the FTP server is copied to NVRAMFThe configuration will be copied from NVRAM to an FTP server with a filename of Kevin

单选题Every Sunday, consistent backups are performed on your database. Because of a user error, you performed an incomplete recovery on Tuesday and opened the database with the RESETLOGS option. A user error occurs again on Thursday, which necessitates an incomplete recovery. Sunday’s backup is the most recent backup available.What would you do in this scenario?()A recovery cannot be performed because a backup was not performed after the last incomplete recoveryB restore all the files from Sunday’s backup, and then recover up to the point in time when the RESETLOGS operation was performed on TuesdayC restore all the files from Sunday’s backup, and open the database to reset the database to the point in time when the backup was performed on SundayD restore all the files from Sunday’s backup, and then perform an incomplete recovery up to the point in time when the user error occurred on Thursday

单选题You have configured the flash recovery area to store online redo log files, control files, archived redo logs and RMAN backups. Which of the following files can you successfully delete from the flash recovery area if you want to reclaim the space within it?()A multiplexed control filesB RMAN obsolete backupsC multiplexed online redo log filesD archived redo logs that have not been copied to tape

单选题You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()AAdd Julia’s user account to the local Power Users group.BAdd Julia’s user account to the local Administrators group.CAllow Julia’s user account Write permissions to C:///Data.DAllow Julia’s user account Full Control permission to C:///Data.

多选题You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure user Group Policy to achieve these results:    Allow users to view the options in the Offline Files dialog box   Remove the Offline Files tab from the Folder Options dialog box   Disable the Settings button in the Offline Files Status dialog box   Remove the Settings command from the Offline Files shortcut menu    Your proposed solution is to enable the group policy setting Disable user configuration of Offline Files.    Which results does the proposed solution provide?()AUsers can view the options in the Offline Files dialog boxBThe Offline Files tab is removed from the Folder Options dialog boxCThe Settings button in the Offline Files Status dialog box is disabledDThe Settings command is removed from the Offline Files shortcut menu

单选题A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()AThe user copied to a read-only folder share.BThe user changed the attributes of the files.CThe user copied the files from the local My Documents folder.DThe user moved instead of copied the files.

单选题A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group namedGroup1. The computer contains a folder named Folder1. You need to configure the permissions on Folder1to meet the following requirements: User1 must be allowed to delete all files in Folder1  Members of Group1 must be able to create files in Folder1  All other members of Group1 must be prevented from deleting files they did not create in Folder1All users must be prevented from modifying the permissions on Folder1. What should you do?()AAssign Group1 the Write permission. Assign User1 the Modify permission.BAssign Group1 the Modify permission. Assign User1 the Write permission.CDeny Group1 the Write permission. Assign User1 the Modify permission.DDeny Group1 the Modify permission. Assign User1 the Write permission.

单选题You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()ALog on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. BCreate a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. CRemove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. DBack up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.