Ten users at your office run an accounting application on their Windows NT Workstation 4.0 computers. The application stores its data in a shared network folder named Accdata on a Windows 2000 Server computer named Server1. You upgrade all 10 computers to Windows 2000Professional and verify that all applications are compatible with Windows 2000. After the upgrade,some users report that they are receiving intermittent data-corruption error messages. They are also receiving data file-version mismatch error messages. When these errors occur, your only method of recovery is to restore the entire contents of the Accdata folder from a known good backup copy. You need to prevent these errors from occurring in the future. What should you do?()A、Configure Accdata folder to allow a maximum of one user.B、Configure the Accdata folder to disable client caching.C、Create a group policy that removes the Bypass Traverse Checking user right on server1.D、Create a group policy that increases the amount of idle time required before a session disconnects on server1.

Ten users at your office run an accounting application on their Windows NT Workstation 4.0 computers. The application stores its data in a shared network folder named Accdata on a Windows 2000 Server computer named Server1. You upgrade all 10 computers to Windows 2000Professional and verify that all applications are compatible with Windows 2000. After the upgrade,some users report that they are receiving intermittent data-corruption error messages. They are also receiving data file-version mismatch error messages. When these errors occur, your only method of recovery is to restore the entire contents of the Accdata folder from a known good backup copy. You need to prevent these errors from occurring in the future. What should you do?()

  • A、Configure Accdata folder to allow a maximum of one user.
  • B、Configure the Accdata folder to disable client caching.
  • C、Create a group policy that removes the Bypass Traverse Checking user right on server1.
  • D、Create a group policy that increases the amount of idle time required before a session disconnects on server1.

相关考题:

What do you mean, there are only ten tickets? There _________ be twelve.A.shouldB.wouldC.willD.shall

You create an intranet Web site for management of project documents. You need to enable all users to browse documents on the site. Only members of the administrators group must be able to upload files. Which code segment of the Web.config file should you use? ()A. allow verbs=GET users=* /deny verbs=POST users=* /allow verbs=POST roles=Administrators /B. allow roles=Administrators /deny users=* /C. allow u sers=Administrators /allow users=* /D. allow v erbs = POST roles=Administrators /deny verbs=POST users=* /allow verbs=GET users=* /

You must tell us what you are doing at ten yesterday evening .()

Had you arrived at the station ten minutes earlier yesterday, you could catch the train.() 此题为判断题(对,错)。

You are the administrator of a Windows 2000 Server computer named Ezonexam1. A printer named PrinterColor is configured on Ezonexam1.You want to allow only users in the Administrators group and users in the Managers group to print to PrinterColor. You also want to allow users in the Managers group to pause and resume their print jobs, and you want to ensure that users in the Administrators group have full control permission for PrinterColor.What should you do?To answer, click the Simulation button and then perform. the appropriate actions in the simulation of the Printers folder.

You share your computer with other users. You install a new Microsoft add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require.You need to ensure that you are able to view videos without affecting other users.What should you do?()A.AB.BC.CD.D

—You are late. The meeting _________ for about ten minutes. 学科网 —I’m sorry. The t —You are late. The meeting _________ for about ten minutes.—I’m sorry. The traffic is heavy.A. has begun B. began C. has been on

If you have someone accompanying you, ten miles () a long way to walk.AisBaren’tCisn’tDare

If you have someone accompanying you, ten miles () a long way to walk.A、isB、aren’tC、isn’tD、are

You are the administrator of a Windows Server 2003 computer named Server4.You install Terminal Services on Server4. You add users from the technical support department to the Power Users group and to the Remote Desktop Users group on Server4. You notice that Server4 is periodically unavailable. You open Event Viewer on Server4 and discover that theserver was restarted accidentally by users in the technical support department.You need to ensure that users in the technical support department can establish a Terminal Service session and can manage local user accounts on Server4 without having the ability to restart Server 4.Which action or actions should you perform?() (Choose all that apply.)A、Remove the technical support user accounts from the Power Users group.B、Remove the technical support user accounts from the Remote Desktop Users group.C、Remove the Power Users group from the Shut down the system user right.D、Add the Power Users group to the Deny log on locally user right.E、Modify the permissions on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission.

You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()A、[Authorize(Users = "")]B、[Authorize(Roles = "")]C、[Authorize(Users = "*")]D、[Authorize(Roles = "*")]

You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant users Special access for the reports on the network share.C、Use Windows Explorer to disable caching for the reports on the network share.D、Use Windows Explorer to disable Offline files.

You are the network administrator for Among other duties you administer a Windows 2003 server named TestKingB. You install Terminal Services on TestKingB. You add users from the TestKing support department to the Power Users group and to the Remote Desktop Users group on TestKingB. You notice that TestKingB is periodically unavailable. You open Event Viewer on TestKingB and discover that the server was restarted accidentally by users in the TestKing support department. You need to ensure that users in the TestKing support department can establish a Terminal Services session and can manage local user accounts on TestKingB. However, they should not have the ability to restart TestKingB. Which action or actions should you perform? Select all that apply.()A、Remove the TestKing Support department user accounts from the Power Users group.B、Remove the TestKing Support department user accounts from the Remote Desktop Users group.C、Remove the Power Users group from the Shut down the system user right.D、Add the Power Users group to the Deny log on locally user right.E、Modify the permission on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission

You are the network administrator for ExamSheet.  Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers.  What should you do?()A、On the research computers use the Local Computer Policy to disable theAccess this computer  from the networkoption.B、Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.C、Add the users of the research computers to the Power Users group on each computer.D、On the research computers configure the security settings to prevent anonymous access.

You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. Computers on the network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. The users of the Windows 2000 Professional computers run legacy applications which are not certified for Windows 2000. These applications will not run for those users who only have User rights on the computers. You want to uniformly grant the users of these computers with the least possible administrative rights and still allow them to run the applications. What should you do? ()A、On the research computers user the Local Computer Policy to disable theAccess this computer  from the networkoption.B、Apply the Compatws.inf security template to the research computers.C、Apply the Hisecws.inf security template to the research computers.D、On the research computers configure the computer default security settings to prevent anonymous access.

You create an intranet Web site for management of project documents. You need to enable all users to browse documents on the site. Only members of the administrators group must be able to upload files. Which code segment of the Web.config file should you use? ()A、allow verbs="GET" users="*" /deny verbs="POST" users="*" /allow verbs="POST" roles="Administrators" /B、allow role s="Administrators" /deny users="*" /C、allow u sers="Administrators" /allow users="*" /D、allow v erbs = "POST" roles="Administrators" /deny verbs="POST" users="*" /allow verbs="GET" users="*" /

You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner.  What should you modify?()A、the Federation TrustB、the EWS virtual directoryC、the default sharing policyD、the Organizational Relationship

单选题If you take a ten-or fifteen-minutes vacation into the realm of imagination each day, you may add much to the excitement and enjoyment of your life.Aa ten-or fifteen-minutesBintoCeach dayDadd much to

多选题You are implementing an ASP.NET MVC 2 Web application that allows users to view and edit data. You need to ensure that only logged-in users can access the Edit action of the controller. What are two possible attributes that you can add to the Edit action to achieve this goal? ()A[Authorize(Users = )]B[Authorize(Roles = )]C[Authorize(Users = *)]D[Authorize(Roles = *)]

单选题You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner.  What should you modify?()Athe Federation TrustBthe EWS virtual directoryCthe default sharing policyDthe Organizational Relationship

单选题"May I get are fund for my ticket?"以下()回答正确。AYes,certainly.But you have to pay ten yuan.BI don’t know.CYes,certainly.But you have to pay are fund service of ten yuan.DI can not help you.

单选题They are two dollars each but if you buy ten, you get a()of ten per cent.AdiscountBrecessionCdepressionDdischarge

单选题You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()Aauthorization allow users=?/ /authorizationBauthorization deny users=?/ /authorizationCauthorization deny users=*//authorizationDauthorization allow users=*/ /authorization

单选题You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer.  What should you do? ()AConfigure File signature verification to block driver installation, and set driver signing as a system default.BRemove all users from the Power User group.CCreate a Local Computer Policy to prevent users from installing drivers.DCreate a Local Computer Policy to enable Windows File Protection.

单选题You work as an application developer at Certkiller .com. You have created a Windows service application for the purpose of monitoring the number of active service requests running on Certkiller .com’s server.  You want to configure this Windows service application to produce a report every ten minutes. You start by placing the reporting logic in the GenerateReport method of this Windows service.You want to create a Timer object that invokes this method every ten minutes.What should you do? ()A AB BC CD D

单选题From the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries.  You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message.  Which method would you follow to achieve this?()Aset the CPU time per call in the users profileBset the CPU time per session in the users profilesCset the CPU levels for the users’ group using Resource ManagerDset the TIMED_STATISTICS parameter to TRUE in the parameter file

单选题_____ ten minutes earlier, you wouldn't have missed the train. But you were late.AHad you comeBDid you comeCHave you comeDShould you come

单选题If you have someone accompanying you, ten miles () a long way to walk.AisBaren’tCisn’tDare