You upgraded a computer to Windows 2000 Professional and kept the FAT32 file system. You want each of three employees who use this computer to have their own documents area that no one else can access. You create a shared folder for each of the three users. You give only the owner permission to use the folder. Later in the week you are informed that User1's folder was modified while User1 was on vacation. What is wrong with your security configuration? ()A、Local computer policy must restrict the rights of the three users.B、You gave each share the same name under the users’ Documents and Settings folders.C、Shared folder security only works when accessing the folder over the network.D、Domain authentication should be required at log on.

You upgraded a computer to Windows 2000 Professional and kept the FAT32 file system. You want each of three employees who use this computer to have their own documents area that no one else can access. You create a shared folder for each of the three users. You give only the owner permission to use the folder. Later in the week you are informed that User1's folder was modified while User1 was on vacation. What is wrong with your security configuration? ()

  • A、Local computer policy must restrict the rights of the three users.
  • B、You gave each share the same name under the users’ Documents and Settings folders.
  • C、Shared folder security only works when accessing the folder over the network.
  • D、Domain authentication should be required at log on.

相关考题:

You are the administrator of your company's network. Your network has five Windows 2000 server computers and 75 Windows 2000 Professional computers. The Windows 2000 Professional computers were installed by using a RIS image on one of the Windows 2000 Server computers. You need to upgrade several applications on the Windows 2000 Professional computers. The applications do not have built-in support for scripted installations.You want to accomplish the following goals:1. An unattended installation of the upgraded applications will be performed on the Windows 2000 Professional computers.2. Existing user environments will be maintained on the Windows 2000 Professional computers.3. The network name of each Windows 2000 Professional computer will be changed to match its asset tag.4. The RIS image and the upgraded applications will be enabled as they are added to the network.You take the following actions:1. Install the RIS image on a Windows 2000 Professional computer named Computer1.2. Install the upgraded applications on Computers1.3. Change the network name of Computer1 to %DMI-SERIAL_NUM%.4. Run RIPrep.exe on Computer1 to load the RIS image on to the RIS server.5. Start all of the Windows 2000 Professional computers, and then load the RIS image from the RIS server.Which result or results do these actions produce? (Choose all that apply.)A.An unattended installation of the upgraded applications will be performed on the Windows 2000 Professional computers.B.Existing user environments will be maintained on the Windows 2000 Professional computers.C.The network name of each Windows 2000 Professional computer will be changed to match its asset tag.D.The RIS image and the upgraded applications will be enabled as they are added to the network.

You are the network administrator for. You are the administrator of a Windows Server 2003 computer named TestKing3.Newly hired employees recently started storing files on TestKing3. Now users report that Testking3 is responding much slower than it did before the additional users were added. You suspect the disk subsystem needs to be upgraded to accommodate the additional user load.You need to confirm whether the disk subsystem on TestKing3 needs to be upgraded.What should you do?()A. Configure a Performance Logs and Alerts on the %Free space counter.B. Use Device Manager to populate volume settings and examine the properties of the disk drives on TestKing3.C. Use Event View to examine the system logs and search the system logs for event logs for events generated by the disk event source.D. Use System Monitor to monitor counters based on the PhysicalDisk object

After making changes to the router, you issue the copy running-config startup-config command to save changes. After reloading the router, the router comes up in setup mode. You again make changes, save them, and reboot. Again,the router comes up in setup mode.What is the most likely cause of this?()A. The NVRAM is corrupted.B. The boot system commands were omitted in the configuration.C. The configuration register setting is incorrect.D. The upgraded configuration incompatible with the hardware platform.E. The upgraded IOS incompatible with the hardware.

After making changes to the router, you issue the "copy running-config startup-config" command to save changes. After reloading the router, the router comes up in setup mode. You again make changes, save them, and reboot. Again,the router comes up in setup mode. What is the most likely cause of this?()A、The NVRAM is corrupted.B、The boot system commands were omitted in the configuration.C、The configuration register setting is incorrect.D、The upgraded configuration incompatible with the hardware platform.E、The upgraded IOS incompatible with the hardware.

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest named Company.com containing three sites named KingSite1, KingSite2 and KingSite3.The Company.com organization makes use of Microsoft Exchange Server 2007 Service Pack 1 (SP1) as their messaging solution.Company.com has additionally configured each site with two Client Access server, Mailbox server and Hub Transport Server.During the course of the business week you receive instruction from Company.com to install Microsoft Exchange Server 2010 in KingSite1 whilst ensuring that you use the least amount of administrative effort.What should you do?()A、You should consider having all Exchange servers in the organization upgraded to Microsoft Exchange Server 2007 Service Pack 2 (SP2).B、You should consider having all Exchange servers in KingSite1 and all Client Access servers in the organization upgraded to Microsoft Exchange Server 2007 Service Pack 2 (SP2).C、You should consider having all Client Access servers in the organization upgraded to Microsoft Exchange Server 2007 ServicePack 2 (SP2)D、You should consider having all Exchange servers in KingSite1 upgraded to Microsoft Exchange Server 2007 ServicePack 2 (SP2).

The HMC software has just been upgraded remotely via the WebSM client. It now needs to be rebooted to make the update active. How can this be accomplished?()A、Use ssh to connect to the HMC and rebootB、The upgrade will display complete and ask you to rebootC、Select shutdown in the Management section of the WebSM clientD、Once logged out of the WebSM client it will ask to logoff, shutdown or reboot. Select reboot.

A system administrator has just finished upgrading a system to AIX 5.2. If there are future problems, the system administrator would like to add an entry to the AIX errorlog to record this event. Which of the following commands can be issued for this purpose?()A、/usr/bin/errmsg "System upgraded to AIX 5.2"B、/usr/bin/errlog "System upgraded to AIX 5.2"C、/usr/bin/errupdate "System upgraded to AIX 5.2"D、/usr/bin/errlogger "System upgraded to AIX 5.2"

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory forest. The TestKing.com network contains the following: * Exchange Server 2007 Service Pack 1 (SP1) servers.* Exchange Server Service Pack 2 (SP2) servers. * Domain controllers running Windows Server 2003 Service Pack 1 (SP1). You need to install Exchange Server 2010 to the TestKing.com network; however, you need to changes tothe existing servers for the installation of the Exchange 2010 servers. What should you do?()A、You should consider having the Exchange Server 2007 SP1 servers upgraded to Exchange Server 2007 SP2.B、You should consider having the domain controllers upgraded to Windows Server 2003 (x64) SP2.C、You should consider having the domain controllers to Windows Server 2008 (x64).D、You should consider having the Exchange Server 2003 servers upgraded to Eschange Server 2007 SP2.

You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. The TestKing.com network contains the following: * Exchange 2000 Server Service Pack 3 (SP3) servers. * Exchange Server 2003 Service Pack 2 (SP2) servers. * Exchange Server 2007 Service Pack 1 (SP1) servers. You need to install Exchange Server 2010 to the TestKing.com network; however, you need to changes tothe existing servers for the installation of the Exchange Server 2010 servers. What should you do?()A、You should consider removing all Exchange 2000 Server servers.Thereafter all Exchange Server 2007 servers should be upgraded to SP2.B、You should consider removing all Exchange Server 2007 SP1 servers.C、You should consider removing all Exchange Server 2003 servers.Thereafter all Exchange Server 2007 servers should be upgraded to SP2.D、You should consider removing all Exchange 2000 Server as well as all Exchange Server 2003 servers.

You are the administrator of your company’s network. You network has five Windows 2000 server computers and 75 Windows 2000 Professional computers. The Windows 2000 Professional computers were installed by using a RIS image on one of the Windows 2000 Server computers.  You need to upgrade several applications on the Windows 2000 Professional computers. The applications do not have built-in support for scripted installations. You want to accomplish the following goals:   An unattended installation of the upgraded applications will be performed on the Windows 20000 Professional computers. Existing user environments will be maintained on the Windows 2000 Professional computers. The network name of each Windows 2000 Professional computer will be changed to match its asset tag. The RIS image and the upgraded applications will be enabled as they are added to the network. You take the following actions: Install the RIS image on a Windows 20000 Professional computer named Computer1. Install the upgraded applications on Computers1. Change the network name of Computer1 to %DMI-SERIAL_NUM%.  Run RIPrep.exe on Computer1 to load the RIS image on to the RIS server. Start all of the Windows 2000 Professional computers, and then load the RIS image from the RIS server.  Which result or results do these actions produce?( )A、An unattended installation of the upgraded applications will be performed on the Windows 2000 Professional computers.B、Existing user environments will be maintained on the Windows 2000 Professional computers.C、The network name of each Windows 2000 Professional computer will be changed to matchIts asset tag.D、The RIS image and the upgraded applications will be enabled as they are added to the N.etwork.

You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()A、Use Internet Explorer Administration Kit (IEAK) and Group Policy.B、Use Microsoft System Center Configuration Manager.C、Use Windows Server Update Services (WSUS).D、Use Microsoft System Center Essentials.

You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users’ files.   What should you do to accomplish these goals?()A、Add Maria’s user account to the system group.B、Add Maria’s user account to the interactive group.C、Add Maria’s user account to the power user group.D、Add Maria’s user account to the administrators group.E、Add Maria’s user account to the Backup Operators group.

You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()A、Enable DHCP in the TCP/IP properties.B、Replace the Token Ring network adapter with an Ethernet network adapter.C、Configure a different TCP/IP address on the same subnet.D、Configure a valid DNS Server in the TCP/IP properties.

You are the network administrator for ExamSheet.net. Your computer has Windows 2000 Professional installed. You install an upgraded driver for your video card. When you restart the computer you receive the following message:   **** Stop: 0x000000B4 - The video driver failed to initialize."  The computer will not start in safe mode. You want your computer to start properly. What should you do?()A、Start theRepairoption and select the option to locate and repair system files.B、Start the computer by enabling VGA mode.C、Use the Recovery Console and repair the Master Boot Record.D、Restart the computer in debug mode.

You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()A、Replace the network adapters with 10/100 Mbps network adapters. B、Enable TCP/IP on all of the computers on the network.C、Configure the NWLink frame type of the network adapters to be Ethernet II. D、Configure the NWLink frame type of the network adapters to be Ethernet 802.3.

You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. You upgrade 10 computers in the Accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. For security purposes you want to ensure that these computers can only communicate with other Windows 2000 computers.  What should you do?()A、On each computer configure separate memory spaces for each financial and credit applications.B、Apply Highly Secure security template to the local security policy of the computers in the Accounting department.C、Apply Compatible security template to the local security policy of the computers in the Accounting department.D、Add each user account to the Power Users group on that user’s computer.

单选题After making changes to the router, you issue the "copy running-config startup-config" command to save changes. After reloading the router, the router comes up in setup mode. You again make changes, save them, and reboot. Again,the router comes up in setup mode. What is the most likely cause of this?()AThe NVRAM is corrupted.BThe boot system commands were omitted in the configuration.CThe configuration register setting is incorrect.DThe upgraded configuration incompatible with the hardware platform.EThe upgraded IOS incompatible with the hardware.

单选题You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory forest. The TestKing.com network contains the following: * Exchange Server 2007 Service Pack 1 (SP1) servers.* Exchange Server Service Pack 2 (SP2) servers. * Domain controllers running Windows Server 2003 Service Pack 1 (SP1). You need to install Exchange Server 2010 to the TestKing.com network; however, you need to changes tothe existing servers for the installation of the Exchange 2010 servers. What should you do?()AYou should consider having the Exchange Server 2007 SP1 servers upgraded to Exchange Server 2007 SP2.BYou should consider having the domain controllers upgraded to Windows Server 2003 (x64) SP2.CYou should consider having the domain controllers to Windows Server 2008 (x64).DYou should consider having the Exchange Server 2003 servers upgraded to Eschange Server 2007 SP2.

单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest named Company.com containing three sites named KingSite1, KingSite2 and KingSite3.The Company.com organization makes use of Microsoft Exchange Server 2007 Service Pack 1 (SP1) as their messaging solution.Company.com has additionally configured each site with two Client Access server, Mailbox server and Hub Transport Server.During the course of the business week you receive instruction from Company.com to install Microsoft Exchange Server 2010 in KingSite1 whilst ensuring that you use the least amount of administrative effort.What should you do?()AYou should consider having all Exchange servers in the organization upgraded to Microsoft Exchange Server 2007 Service Pack 2 (SP2).BYou should consider having all Exchange servers in KingSite1 and all Client Access servers in the organization upgraded to Microsoft Exchange Server 2007 Service Pack 2 (SP2).CYou should consider having all Client Access servers in the organization upgraded to Microsoft Exchange Server 2007 ServicePack 2 (SP2)DYou should consider having all Exchange servers in KingSite1 upgraded to Microsoft Exchange Server 2007 ServicePack 2 (SP2).

单选题You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()AUse Internet Explorer Administration Kit (IEAK) and Group Policy.BUse Microsoft System Center Configuration Manager.CUse Windows Server Update Services (WSUS).DUse Microsoft System Center Essentials.

多选题You are the administrator of your company’s network. You network has five Windows 2000 server computers and 75 Windows 2000 Professional computers. The Windows 2000 Professional computers were installed by using a RIS image on one of the Windows 2000 Server computers.  You need to upgrade several applications on the Windows 2000 Professional computers. The applications do not have built-in support for scripted installations. You want to accomplish the following goals:   An unattended installation of the upgraded applications will be performed on the Windows 20000 Professional computers. Existing user environments will be maintained on the Windows 2000 Professional computers. The network name of each Windows 2000 Professional computer will be changed to match its asset tag. The RIS image and the upgraded applications will be enabled as they are added to the network. You take the following actions: Install the RIS image on a Windows 20000 Professional computer named Computer1. Install the upgraded applications on Computers1. Change the network name of Computer1 to %DMI-SERIAL_NUM%.  Run RIPrep.exe on Computer1 to load the RIS image on to the RIS server. Start all of the Windows 2000 Professional computers, and then load the RIS image from the RIS server.  Which result or results do these actions produce?( )AAn unattended installation of the upgraded applications will be performed on the Windows 2000 Professional computers.BExisting user environments will be maintained on the Windows 2000 Professional computers.CThe network name of each Windows 2000 Professional computer will be changed to matchIts asset tag.DThe RIS image and the upgraded applications will be enabled as they are added to the N.etwork.

单选题A system administrator has just finished upgrading a system to AIX 5.2. If there are future problems, the system administrator would like to add an entry to the AIX errorlog to record this event. Which of the following commands can be issued for this purpose?()A/usr/bin/errmsg System upgraded to AIX 5.2B/usr/bin/errlog System upgraded to AIX 5.2C/usr/bin/errupdate System upgraded to AIX 5.2D/usr/bin/errlogger System upgraded to AIX 5.2

单选题You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. You upgrade 10 computers in the Accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. For security purposes you want to ensure that these computers can only communicate with other Windows 2000 computers.  What should you do?()AOn each computer configure separate memory spaces for each financial and credit applications.BApply Highly Secure security template to the local security policy of the computers in the Accounting department.CApply Compatible security template to the local security policy of the computers in the Accounting department.DAdd each user account to the Power Users group on that user’s computer.

单选题You are the network administrator for Company.com.  Your computer has Windows 2000 Professional installed. You install an upgraded driver for your video card. When you restart the computer you receive the following message:   **** Stop: 0x000000B4 – The video driver failed to initialize.”   The computer will not start in safe mode. You want your computer to start properly.   What should you do?()AStart the Repair option and select the option to locate and repair system files.BStart the computer by enabling VGA mode.CUse the Recovery and repair the Master Boot Record.DRestart the computer in debug mode.

单选题You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()AEnable DHCP in the TCP/IP properties.BReplace the Token Ring network adapter with an Ethernet network adapter.CConfigure a different TCP/IP address on the same subnet.DConfigure a valid DNS Server in the TCP/IP properties.

单选题You are the network administrator for. You are the administrator of a Windows Server 2003 computer named TestKing3. Newly hired employees recently started storing files on TestKing3. Now users report that Testking3 is responding much slower than it did before the additional users were added. You suspect the disk subsystem needs to be upgraded to accommodate the additional user load. You need to confirm whether the disk subsystem on TestKing3 needs to be upgraded. What should you do?()AConfigure a Performance Logs and Alerts on the %Free space counter.BUse Device Manager to populate volume settings and examine the properties of the disk drives on TestKing3.CUse Event View to examine the system logs and search the system logs for event logs for events generated by the disk event source.DUse System Monitor to monitor counters based on the PhysicalDisk object

单选题You are the network administrator for Company.Company has just upgraded its network switches from 10 Mbps to 100 Mbps. After the upgrade, you findthat the 100 Windows 2000 Professional computers on the network are still communicating at only 10Mbps. Company uses NWLink as the only network protocol.You want to enable the computers to communicate at 100 Mbps.What should you do?()AReplace the network adapters with 10/100 Mbps network adapters. BEnable TCP/IP on all of the computers on the network.CConfigure the NWLink frame type of the network adapters to be Ethernet II. DConfigure the NWLink frame type of the network adapters to be Ethernet 802.3.