You are a system administrator at ExamSheet. The network includes 100 Windows 2000 Professional computers. A user named Peter wants to share a local printing device directly connected to his computer. Peter needs to share this device among three groups:  Engineering, Accounting, and Operations. Peter wants to delegate printer administration to one print administrator from each group. Each print administrator must be able to delete print jobs generated by their own group on the print device. They should not be able to delete print jobs from other groups. You want to configure Peter’s client computer to support these requirements. What should you do?()A、Create a single shared printer to be used by all three groups.  Allow each print administrator Manage Documents permission. B、Create a separate shared printer for each group.   For each shared printer, allow the respective print administrator Manage Documents  permission. C、Create a single shared printer to be used by all three groups.   Add the print administrator’s user account from each group to the Power Users group on  Peter’s client computer. D、Create a separate shared printer for each group.   Add the print administrator’s user account from each group to the Power Users group on  Peter’s client computer.

You are a system administrator at ExamSheet. The network includes 100 Windows 2000 Professional computers. A user named Peter wants to share a local printing device directly connected to his computer. Peter needs to share this device among three groups:  Engineering, Accounting, and Operations. Peter wants to delegate printer administration to one print administrator from each group. Each print administrator must be able to delete print jobs generated by their own group on the print device. They should not be able to delete print jobs from other groups. You want to configure Peter’s client computer to support these requirements. What should you do?()

  • A、Create a single shared printer to be used by all three groups.  Allow each print administrator Manage Documents permission. 
  • B、Create a separate shared printer for each group.   For each shared printer, allow the respective print administrator Manage Documents  permission. 
  • C、Create a single shared printer to be used by all three groups.   Add the print administrator’s user account from each group to the Power Users group on  Peter’s client computer. 
  • D、Create a separate shared printer for each group.   Add the print administrator’s user account from each group to the Power Users group on  Peter’s client computer. 

相关考题:

It is a kind of online service system, on which you can publish and exchange information with others who also are the members of the system.On which you can paste your articles and answer the questions asked by the members of the system and you can also look for help here.It isA.BBSB.WWWC.E-mailD.TELNET

Only in this way ____ to make improvements in the operating system. A.you can hopeB.you did hopeC.can you hope

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as shown in the following table.You need to ensure that you can restore the server and all its data in the event of a complete system failure.You perform an Automated System Recovery (ASR) backup.What else should you backup? ()A.volume CB.volume DC.volume ED.the system state

You have a computer that runs Windows XP Professional. You run a background application named app1. exe. The application becomes unresponsive. You need to forcibly shut down the application. You must achieve this goal without restarting the computer.Which tool should you use?() A、System Configuration UtilityB、System InformationC、Task ManagerD、tasklist.exe

How do you know the system loading PAK version

You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel  Data Sources (ODBC).B、Control Panel  System Tools  Shared Folders.C、Computer Management  System Tools  System Information.D、Computer Management  System Tools  Shared Folders  Open Files.E、Computer Management  System Tools  Shared Folders  Sessions.F、Computer Management  System Tools  Shared Folders  Shares.

You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()A、Microsoft System Center Operations ManagerB、Microsoft System Center Virtual Machine ManagerC、Microsoft System Center Data Protection ManagerD、Microsoft System Center Configuration Manager

You have a computer that runs Windows 7. You need to configure system image backups to meet thefollowing requirements: Automatically create a system image every day without user  intervention Retain multiple copies of the system image. Which type of backup destination should you use?( )A、external hard disk driveB、network locationC、USB flash driveD、writeable DVD

You have a computer that runs Windows 7. Windows Backup is configured to store backups on an externaldrive. You create a new NTFS volume on the computer. You need to configure Windows Backup to includethe files on the new volume as part of regularly scheduled backups.  What should you do?()A、From Backup and Restore, select Change settings.B、From Backup and Restore, select Create a system image.C、From the System Protection tab, create a restore point.D、From the System Protection tab, enable system protection for the new volume.

You need to identify a type that meets the following criteria:          Is always a number.          Is not greater than 65,535.  Which type should you choose?()A、System.UInt16B、intC、System.StringD、System.IntPtr

You have a computer that runs Windows 7. You perform regular data backups and system image backups.The computer experiences a hard disk failure. You replace the failed hard disk. You need to recover thecomputer to the previous Windows 7 environment. You start the computer from the Windows 7 installationmedia. Which recover option should you select?()A、Command PromptB、Startup RepairC、System Image RecoveryD、System Restore

You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. The Active Directory Rights Management Services (AD RMS) isinstalled within the organization. You receive an instruction from the CIO to recommend a messaging security solution that will make surethat a disclaimer is applied to all e-mail messages and that all e-mail messages from the Financedepartment is unable to be printed. What should you do?()A、You should recommend that Secure/Multipurpose Internet Mail Extensions (S/MIME) be included in the system.B、You should recommend that Transport Protection Rules be included in the system.C、You should recommend that Retention policies be included in the system.D、You should recommend that Journal Report Decryption be included in the system.

You need to ensure that you can recover system configuration and data if your computer hard disk fails.  What should you do? ()A、Create a system restore point.B、Create a backup of all file categories.C、Create a Complete PC Backup and Restore image.D、Perform an Automated System Recovery (ASR) backup.

单选题You have a computer that runs Windows 7. You add a new hard disk drive to the computer and create anew NTFS partition. You need to ensure that you can use the Previous Versions feature on the new drive. What should you do?()AFrom Disk Management, convert the new disk to a dynamic disk.BFrom System Properties, configure the System Protection settings.CFrom System and Security, enable BitLocker Drive Encryption (BitLocker).DFrom the properties of the new drive, create a share and modify the caching settings.

单选题You have a computer that runs Windows 7. The computer has System Protection enabled. You need toretain only the last System Protection snapshot of the computer. All other snapshots must be deleted.  Whatshould you do?()ARun Disk Cleanup for Programs and Features.BRun Disk Cleanup for System Restore and Shadow Copies.CFrom the System Protection Restore settings, select Turn off System Restore.DFrom the System Protection Restore settings, select Only restore previous versions of files.

单选题You are the network administrator for You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data. You need to select the correct method for performing a restoration of a backup of the System State data. What should you do?()ARun the following command: ntbackup.exe backup /F {FileName}BRun the following command: ntbackup.exe backup systemstate /F {FileName}CIn Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.DUse NTBackup interactively.

单选题You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()AControl Panel  Data Sources (ODBC).BControl Panel  System Tools  Shared Folders.CComputer Management  System Tools  System Information.DComputer Management  System Tools  Shared Folders  Open Files.EComputer Management  System Tools  Shared Folders  Sessions.FComputer Management  System Tools  Shared Folders  Shares.

单选题You are the administrator of your company's network. You are preparing to deploy 20 new Windows 2000 Professional computers on your network. You want to be able to recover from disk failures and corrupt system files on the new computers. You want to configure the computers to automatically update their system configuration and emergency repair files on a scheduled bases.   What should you do?()AUse the at command to schedule a weekly job to back up the boot partition.BUse the at command to schedule a weekly job to run the system file checker.CUse Windows backup to schedule a backup of the System State Data.DUse Windows backup to schedule a backup of the system partition and the boot partition.

单选题You need to increase the size of a paging file. What should you do? ()AFrom Disk Management, shrink the boot partition.BFrom Disk Management, shrink the system partition.CFrom System, modify the Advanced system settings.DFrom System, modify the System protection settings.

单选题You are a network administrator for The network contains a Windows Server 2003 computer named Testking1. You need to install an application on Testking1. The installation will cause several changes to the registry. You plan to use the Backup utility to create a backup that will enable you to restore the registry. TestKing requirements for network management state that all backups must be performed during an eight-hour period at night. Because of this time constraint, you need to ensure that the backup can be recovered as quickly as possible. You need to create a backup that meets the requirements. What should you do?()ACreate a backup of the system partition.BCreate a backup of the boot partition.CCreate a backup of the System State.DCreate an Automated System Recovery (ASR) backup.ECreate a backup of the Systemroot/System32/Config folder.

多选题You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?()Auser@router request system storage cleanupBuser@router show system storageCuser@router request system storage cleanup dry-runDuser@router show system storage detail

多选题You are evaluating the implementation of two Hyper-V hosts for the application servers. You need to design a solution that will move the application servers automatically between the Hyper-V hosts based on the physical resources available. The solution must minimize the number of Microsoft System Center products deployed to the network. Which software should you include in the design?()AMicrosoft System Center Operations ManagerBMicrosoft System Center Virtual Machine ManagerCMicrosoft System Center Data Protection ManagerDMicrosoft System Center Configuration Manager

单选题You have a computer that runs Windows 7. You install a second internal hard disk drive in the computer.You attempt to create a system image and discover that the new disk is not listed as a backup destination.You need to ensure that you can use the new disk as a backup destination for system images.  What should you do?()ACreate a NTFS partition.BCreate a mirrored volume.CCreate a system repair disc.DLog on to the computer by using a different account.

单选题How can you verify that you have correctly configured SSH access to your Junos device?()Auser@router# show system servicesBuser@router show configuration servicesCuser@router# show configuration system servicesDuser@router# show system login

多选题Which two commands allow you to return to a previous version of software on the device?()Arequest system software addBrequest system software downgradeCrequest system software replaceDrequest system software rollback

单选题From the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries and are consuming a lot of CPU time. This causes problems for you when you try to log on as the system user and perform small maintenance tasks. You would like to ensure that users SYS and SYSTEM get priority over all other users.   Which method would you use to achieve this objective?()Acreate a plan directive in the SYS_GROUPBcreate the pending area for the consumer groupCactivate the provided SYSTEM_PLAN in Resource ManagerDset the TIMED_STATISTICS parameter to TRUE in the parameter fileEset the execution time limit for all users, except SYS and SYSTEM, in their profiles