A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()A、Instruct User1 to create a new user certificate on Computer2.B、Instruct User1 to take ownership of the encrypted files on Computer2.C、Instruct User1 to import the user certificate from Computer1 to Computer2. D、Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.
A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()
- A、Instruct User1 to create a new user certificate on Computer2.
- B、Instruct User1 to take ownership of the encrypted files on Computer2.
- C、Instruct User1 to import the user certificate from Computer1 to Computer2.
- D、Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.
相关考题:
You are writing an application that uses isolated storage to store user preferences.The application uses multiple assemblies.Multiple users will use this application on the same computer.You need to create a directory named Preferences in the isolated storage area that is scoped to the current Microsoft Windows identity and assembly.Which code segment should you use?()A.B.C.D.
You use Microsoft .NET Framework 4 to create a Windows Forms client application.You write the following code segment.The application contains a form of type Form1 that contains a FormSettings object named frmSettings1.You need to maintain the user‘s form size preference each time the user executes the application.Which code segment should you use? ()A.B.C.D.
You are the administrator of a new Microsoft Windows 2000 server computer named HQSQL5. HQSQL5 is a member server in your company's Windows NT 4.0 domain, which is named HQMAIN.After installing SQL Server 2000 on HQSQL5, you configure the MSSQLServer service account to use the HQMAIN\sqladmin user account, which is a member of the local administrators group on HQSQL5.You can use the HQMAIN\sqladmin user account to log on the HQSQL5. However, the MSSQLServer service fails to start. You need to start the service. What should you do?A.Revoke Log on interactivity rights for the HQMAIN\sqladmin user account.B.Add the HQMAIN\sqladmin user account to the HQMAIN\Domain Admins group.C.Select the Password Never Expires check box for the HQMAIN\sqladmin user account.D.Grant Log on as a service rights to the HQMAIN\sqladmin user account.
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named King uses a client computer named TestKing1. This computer has a locally attached tape device. You grant King the necessary permission to perform backups of a member server named TestKingSrvB. King runs the Backup utility on TestKing1 to back up the files located on TestKingSrvB. You need to use your client computer to view the most recent backup logs for TestKingSrvB. What should you do?()A、Use Notepad to view the contents of the backup report located on TestKingSrvb.B、Use Notepad to view the contents of the backup report located on TestKing1.C、Use Event Viewer to view the contents of the application log located on TestKingSrvb.D、Use Event Viewer to view the contents of the application log located on TestKing1
You are the network administrator for . The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Some client computers run Windows 2000 Professional, and the rest run Windows XP Professional. All user accounts in the Sales department are located in the Sales organizational unit (OU). To store roaming user profiles, you create a shared folder named Profiles on a member server named TK1. You assign the Allow - Full Control permission on the Profiles folder to the Everyone group. Now you need to create roaming user profiles for the user accounts in the Sales OU. What should you do?()A、Select all user accounts in the Sales OU. Modify the account properties to specify //TK1/Profiles/%username% as the profile path.B、Select all user accounts in the Sales OU. Modify the account properties to specify //TK1/Profiles as the profile path.C、Create a Group Policy object (GPO) and link it to the Sales OU. In the User Configuration section of the GPO, configure Folder Redirection to use //TK1/Profiles.D、Create a Group Policy object (GPO) and link to the Domain Controllers OU. In the User Configuration section of the GPO, configure Folder Redirection to use //TK1/Profiles.
You install a read-only domain controller (RODC) named RODC1. You need to ensure that a user named User1 can administer RODC1. The solution must minimize the number of permissions assigned to User1. Which tool should you use()A、Active Directory Administrative CenterB、Active Directory Users and ComputersC、DsaddD、Dsmgmt
You are the administrator of a Windows 2000 network. You use a user account named User1 to log on to a Windows 2000 Professional computer. Different students in a classroom use this Computer. User does not have administrative rights. However, you prefer to use this account for most of your daily activities, because it is not a security breach if you fail to log off. You want to schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. What should you do?()A、Schedule the task to run under an Administrative accountB、Log on by using the local Administrator account. Then schedule the task to run under User1C、Take the ownership of Addusers.cmd file. Then schedule the task to run under User1D、Grant User1 Read Execute permission for AddUsers.cmd. Then schedule the task to run under User1.
You have an Exchange Server 2010 organization.You have a user named User1 and a user named User2. You need to ensure that User1 can add User2 to the From field when he sends e-mail messages. Messages that have User2 in the From field must display only User2 as the message sender to recipients Who receive the messages. What should you use?()A、Active Directory Users and ComputersB、Exchange Control Panel (ECP)C、Exchange Management Console (EMC)D、Microsoft Office Outlook
Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A、the Netsh toolB、the Network Policy Server consoleC、the Registry EditorD、the Routing and Remote Access console
You are the administrator of an Active Directory domain named A user reports that he forgot his password and cannot log on to the domain. You discover that yesterday morning the user reset his password and successfully logged on to the domain. You need to enable the user to log on to the domain. What should you do? ()(Choose two)A、Use Active Directory Users and Computers to move the account to the default organizational unit (OU) named Users. Instruct the user to restart his computer.B、Use Active Directory Users and Computers to open the account properties for the user's user account. Clear the Account is locked out check box, and select the User must change password at next logon check box.C、Use Active Directory Users and Computers to reset the user's password. Give the user the new password.D、Use Computer Management to reset the password for the local Administrator account.
You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution. What actions must you take to stop a user named Mia Hamm from removing information from her mailbox?()A、You must use log transactions.B、You must use a legal hold.C、You must use Outlook Protection Rules.D、You must use the Set-Mailbox Mia Hamm -LitigationHoldEnabled $true.
You work as an administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. You are required to remove the graphical user interface (GUI) from a server named ABC_SR06. Which of the following actions should you take?()A、You should use Server Manager console on ABC_SR06 to remove the User Interfaces.B、You should use TS Manager console on ABC_SR06 to remove the User Interfaces.C、You should use Server Manager console on ABC_SR06 to remove the Infrastructure feature.D、You should use TS Manager console on ABC_SR06 to remove the Infrastructure feature.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of two SQL Server 2008 instance. The two instances are respectively named InstanceA and InstanceB. There is a database named Dworks on InstanceA. You move the Dworks database to InstanceB. A user use a SQL Server login named Mary to access the database on InstanceA with the password "Tk@87#34". On InstanceB, you create the same SQL Server login. The user tries to use the SQL Server login Mark to access the Dworks database on InstanceB. But the user gets an error message, according to the indication of the message, the access to the Dworks database has been denied. You must make sure that the user can access the Dworks database on InstanceB successfully. So on InstanceB, which Transact-SQL statements should you execute?() A、USE AdventureWorks;ALTER USER Mary WITH LOGIN = Mary; B、USE AdventureWorks;ALTER LOGIN Mary ENABLE; C、USE AdventureWorks;ALTER LOGIN Mary WITH PASSWORD = "Tk@87#34" UNLOCK; D、USE AdventureWorks;ALTER LOGIN Mary WITH DEFAULT_DATABASE = AdventureWorks;
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to allow a user named Mia Hamm to access the resource mailbox?()A、You must change the resource mailbox’s propertiesB、You must use log transactionsC、You must use Outlook Protection RulesD、You must use the Set-Mailbox Mia Hamm -LitigationHoldEnabled $true
You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a user named Paul West. You create a user account named Paul West on the Windows 2000 server computer named server 1. You define a network profile by entering the path //server1/profile/%username% in Paul’s user account setting. When Paul logs on to a Windows 2000 Professional computer he sees the following message- “Windows can not locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server.” The details of network cannot be found. You want to configure the roaming user profile for Paul. What should you do?()A、Create a home folder for Paul.B、Share the network profile directory.C、Map a device to network profile directory.D、Use the %username% variable to allow access.
Your network consists of a single Active Directory domain named Contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You create an organizational unit (OU) that contains a computer account named Computer1. A Group Policy object (GPO) is linked to the OU and contains settings to enforce the use of IPSec. You log on to Computer1 by using a user account named User1. You need to verify that the IPSec settings have been applied. Which command should you run?()A、Dsquery user -name User1B、Dsquery computer -name Computer1C、Gpresult /s Computer1 /scope COMPUTER /vD、Gpresult /user User1 /scope USER /v
You have a computer named Computer1 that runs Windows 7. You plan to migrate the user state on Computer1 by using User State Migration Tool (USMT) 4.0. You need to identify which user documents willbe included in the migration. What should you do?()A、Run Usmtutils.exe and use the /ec option.B、Run Sysprep.exe and use the /audit option.C、Run Loadstate.exe and use the /v:12 option.D、Run Scanstate.exe and use the /genmigxml option.
You discover that a particular group of settings named UserPreferences changes.You need to store the UserPreference settings to prevent affecting other applications. Which two actions should you perform?()A、Use the Properties.USerPreferences objectB、Use the Properties.Settings.Default.Userprefences objectC、Use the ConfigurationManager.AppSettings object during runtimeD、Create the settings by using Application scopeE、Create the settings by using User scope
You work as an ASP.NET Web Application Developer for SomeCompany. The company uses Visual Studio .NET 2010 as its application development platform.You create an ASP.NET Web site using .NET Framework 4.0. Only registered users of the company will be able to use the application. The application holds a page named UserAccount.aspx that enables new users to register them to the registered users„ list of the company. The UserAccount page hold numerous TextBox controls that accept users personal details, such as user name, password, home address, zipcode, phone number, etc. One of the TextBox controls on the page is named ZipCode in which a user enters a zip code. You must ensure that when a user submits the UserAccount page, ZipCode must contain five numeric digits. What will you do to accomplish this?()A、Use RangeValidator.B、Use RegularExpressionValidatorC、Use RequiredValidatorD、Use CompareValidatorE、Use RequiredFieldValidator
单选题You create a method that runs by using the credentials of the end user. You need to use Microsoft Windows groups to authorize the user. You must add a code segment that identifies whether a user is in the local group named Clerk.Which code segment should you use?()A AB BC CD D
单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All user files are stored in home folders on a member server named Testking3. Full backups are performed on Testking3 every day. A user named Mark leaves the company. A technical support specialist deletes Mark's user account and his files. You need to restore certain files from Mark's folder and enable another user named Anne to access them. What should you do?()AClear the Restore security check box. Use the Backup utility to restore Mark's files to the original location.BSelect the Restore security check box. Use the Backup utility to restore Mark's files to the original location.CClear the Restore security check box. Use the Backup utility to restore Mark's files to Anne's home folder.DSelect the Restore security check box. Use the Backup utility to restore Mark's files to Anne's home folder.
单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed. A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol (CHAP) for remote connections. CHAP is enabled on Server1. You need to ensure that User1 can connect to Server1 and authenticate to the domain. What should you do from Active Directory Users and Computers?()AFrom the properties of Server1, select Trust this computer for delegation to any service (Kerberos only).BFrom the properties of Server1, assign the Allowed to Authenticate permission to User1.CFrom the properties of User1, select Use Kerberos DES encryption types for this account.DFrom the properties of User1, select Store password using reversible encryption
单选题Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()Athe Netsh toolBthe Network Policy Server consoleCthe Registry EditorDthe Routing and Remote Access console
单选题You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time. The application that you are developing provides an interface for administrators and an interface for users to create message reports.You want to ensure that all user messages stored in the MyQueue object are removed when an administrator selects the reset option.What should you do?()A Use the Enqueue method of the MyQueue object.B Use the Clear method of the MyQueue object.C Use the Dequeue method of the MyQueue object.D Use the TrimToSize method of the MyQueue object.
单选题Your network contains an Active Directory domain named contoso.com. The domain contains a user account named User1 that resides in an organizational unit (OU) named OU1. A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to publish several applications to a user named User1. In the Users container, you create a new user named User2. You need to ensure that the same applications are published to User2. What should you do?()AModify the security of GPO1.BModify the settings in GPO1CLink a WMI filter to GPO1DMove User2 to OU1
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of two SQL Server 2008 instance. The two instances are respectively named InstanceA and InstanceB. There is a database named Dworks on InstanceA. You move the Dworks database to InstanceB. A user use a SQL Server login named Mary to access the database on InstanceA with the password "Tk@87#34". On InstanceB, you create the same SQL Server login. The user tries to use the SQL Server login Mark to access the Dworks database on InstanceB. But the user gets an error message, according to the indication of the message, the access to the Dworks database has been denied. You must make sure that the user can access the Dworks database on InstanceB successfully. So on InstanceB, which Transact-SQL statements should you execute?()AUSE AdventureWorks;ALTER USER Mary WITH LOGIN = Mary; BUSE AdventureWorks;ALTER LOGIN Mary ENABLE; CUSE AdventureWorks;ALTER LOGIN Mary WITH PASSWORD = Tk@87#34 UNLOCK; DUSE AdventureWorks;ALTER LOGIN Mary WITH DEFAULT_DATABASE = AdventureWorks;
单选题You work as an application developer at Certkiller .com. You are developing an application that makes use of a Queue class object named MyQueue. This Queue class object will be used to store messages sent by the user during application run time.You would like to access the message at the beginning of the queue, prior to processing the user messages, without removing it. What should you do?()A Use the Enqueue method of the MyQueue object.B Use the Contains method of the MyQueue object.C Use the Dequeue method of the MyQueue object.D Use the Peek method of the MyQueue object.
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. When you are absent, a user will use a login named Mary to log in and maintain the database snapshots. The user has to delete the database snapshots for DB1, so you have to give the appropriate permissions to the user. So which database permission should you give the user?()ADELETE BCONTROL CDROP DATABASE DALTER ANY DATASPACE