单选题Your Windows 2000 Professionally computer belongs to the contoso.com domain. You need to encrypt a compressed file named C:/data. You successfully encrypt the file but discover that it is no longer compressed.   What is the most likely cause of this problem?()AGroup Policy is preventing the compression of encrypted files.BThe file is stored on a FAT32 partition.COnly members of the Administrators and the Power Users groups can compress and encrypt files.DEncrypted files cannot be compressed.

单选题
Your Windows 2000 Professionally computer belongs to the contoso.com domain. You need to encrypt a compressed file named C:/data. You successfully encrypt the file but discover that it is no longer compressed.   What is the most likely cause of this problem?()
A

Group Policy is preventing the compression of encrypted files.

B

The file is stored on a FAT32 partition.

C

Only members of the Administrators and the Power Users groups can compress and encrypt files.

D

Encrypted files cannot be compressed.


参考解析

解析: A compressed file cannot be encrypted, and an encrypted file cannot be compressed. If you encrypt a compressed file, the file will first be uncompressed and then encrypted. It will no longer be compressed and neither will you be able to compress it once it has been encrypted.

相关考题:

You have a computer that runs Windows XP Professional. Two users named User1 and User2 share the computer. User1 and User2 encrypt files on the computer. User1 encrypts a file named file1. doc. You need ensure that both User1 and User2 can view the contents of file1. doc. What should you instruct User1 to do?() A、Add the certificate of User2 to file1. doc. B、Assign User2 the Full Control NTFS permission on file1. doc. C、Copy file1. doc the %systemroot%/documents and settings/all users/ folder.D、Move file1. doc to the %systemroot%/documents and settings/all users/ folder.

A co-worker uses a gadget from the Windows Sidebar feature on their computer. You examine your computer and find that the gadget is not on the list of available gadgets. You need to add this gadget to the Windows Sidebar feature on your computer.  What should you do?()A、Download and install the gadget file.B、Download the gadget file and copy the file to C:///Windows/System32.C、Instruct the co-worker to send the gadget file via e-mail and copy the file to C:///Program Files.D、Instruct the co-worker to send the gadget file via e-mail. Drag and drop the gadget file to the Windows Sidebar feature.

You are the administrator of a computer named Computer1 that runs Windows 7. Several users shareComputer1. The users plan to encrypt files on the computer. You need to ensure that you can access allencrypted files on the computer.  What should you do first?()A、At a command prompt, run Cipher.exe.B、At a command prompt, run Certutil.exe.C、From the local computer policy, modify the User Rights Assignment.D、From User Accounts, run the Manage your file encryption certificates wizard.

You have a computer that runs Windows 7 Professional. A removable drive is attached to the computer.You need to protect data on the removable drive by using BitLocker To Go.  What should you do first? ()A、Upgrade the computer to Windows 7 Enterprise.B、Install all Windows Updates for Windows 7 Professional.C、Issue a digital certificate for the Encrypting File System (EFS).D、Select the Encrypt contents to secure data checkbox from the properties on the removable drive.

You are a help desk technician for your company. All users have Windows XP Professional computers. Ten users run a custom application named Finance on their computers. Finance stores user passwords in a file named Passwords.ini. By default, the Passwords.ini file is stored in a folder named C:/Winnt/App1.  The location and name of the file can be changed by an administrator. Each Passwords.ini file is unique. Each computer contains a single logical drive, which is drive C and is formatted as NTFS. In order to comply with a new company security policy, you need to ensure that the Passwords.ini files are encrypted. What should you do?()A、In the properties of the C:/Winnt/App1 folder, use Windows Explorer to select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. B、Ask a network administrator to share a new encrypted folder named PassFiles on a network server and to permit users to read the files contained within the folder. Copy the Passwords.ini file from each computer into the PassFiles folder. On each computer, configure Finance to use the Passwords.ini file in the PassFiles folder.C、Create a folder named C:/Files. Copy the Passwords.ini file to the C:/Files folder. In the properties of the C:/Files folder, select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:/Files/Passwords.ini file. D、Create a folder named C:/Files. Move the Passwords.ini file to the C:/Files folder. Instruct the user of each computer to open the properties of the C:/Files folder and select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:/Files/Passwords.ini file.

Your Windows 2000 Professionally computer belongs to the contoso.com domain. You need to encrypt a compressed file named C:/data. You successfully encrypt the file but discover that it is no longer compressed.   What is the most likely cause of this problem?()A、Group Policy is preventing the compression of encrypted files.B、The file is stored on a FAT32 partition.C、Only members of the Administrators and the Power Users groups can compress and encrypt files.D、Encrypted files cannot be compressed.

Your network contains a file server named Server1 that runs Windows Server 2008 R2.You have a folder named Folder1.You need to ensure that files in Folder1 that are older than 365 days are automatically moved to an archive folder. What should you create from the File Server Resource Manager console?()A、a file groupB、a file management taskC、a file screenD、a quota

You are the administrator of your company’s network. You attempt to install a printer driver on a Windows 2000 Professional computer for a user named Lori. You receive the following error message: ‘CANNOT INSTALL PRINTER DRIVER’. The driver was originally downloaded for the manufacturers web site. You have successfully used the driver on other Windows 2000 Professional computers. You want to configure Lori’s computer to check the driver’s integrity and to allow you to install printer driver. What should you do?()A、Configure driver signing to display a message before installing an unsigned driver.B、Configure driver signing to ignore file signature verification. Create a local computer policy to enable windows file protection.C、Use the Add Printer wizard to install the driver and create a local computer policy to enablewindows file protection.D、Use the printer troubleshooter configures the computer to prevent the installation of unsigned drivers.

You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. contains a shared folder named TestKingProjects. You use the Backup utility once each day to back up the TestKingProjects folder. You discover that a database file in the TestKingProjects folder is corrupt. You confirm that the file corruption is not the result of a virus. You need to replace the corrupted file by using the latest backup. You do not know whether the file was corrupted before or after the latest backup was completed. You need to verify that the file in the backup can be opened successfully before you overwrite the existing file. What should you do?()A、In the Backup utility, select the Verify data after backup option.B、Run the Ntbackup //TestKing2/TestKingProjects /v:yes command.C、Restore the file to a temporary folder. Verify that the database file contains the correct data. Copy the restored file to the TestKingProjects folder.D、Restore the file to a temporary folder. Use the Windiff utility to compare the file in the temporary folder to the file in the TestKingProjects folder. Copy the restored file to the TestKingProjects folder.

You are the administrator of your company's network. Your network has 20 Windows 2000 server computers in the contoso.com domain. Your network also has 250 Windows 98 computers. You want to perform a clean installation of Windows 2000 Professional on all of the Windows 98 computers. All of the Windows 98 computers are identical models and are PXE complaint.   You want to accomplish the following goals:   • An unattended installation of Windows 2000 Professional will be performed.  • An unattended installation of company's standard applications will be performed during the     installation of Windows 2000 Professional.  • Each computer will be assigned a unique security identifier description.  • The unattended installation script will be modified so that the computers automatically join the    contoso.com domain.   You take the following actions:  • Install Windows 2000 Professional on a Windows 98 computer named computer1. • Install and configure computer standard applications on computer1.  • Use Setup Manager on computer1 to create an unattended.txt file based on the current    configuration including domain membership.  • Start the remaining Windows 98 computers and then install Windows 2000 Professional. Use    the unattended.txt file to provide the setting for the installation.   Which result or results do these actions produce?()A、 An unattended installation of Windows 2000 Professional will be performed.B、 An unattended installation of company’s standard applications will be performed during the   Installation of Windows 2000 Professional.C、 Each computer will be assigned a unique security identifier description.D、 The unattended installation script will be modified so that the computers automatically join the  contoso.com domain.

You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A、Encrypt customer information when it is stored and when it is being transmittedB、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC、Encrypt all marketing information on file servers and client computersD、Require encrypted connections to all file servers

You have updated the modem driver on your Windows 2000 Professional computer. You restart your computer. Immediately after you log on, you receive a stop error. You need to start Windows 2000. What must you do? ()A、Restart the computer in Safe Mode. Uninstall the modem driver.B、Restart the computer by using the last known good configuration.C、Restart the computer in Recovery Console. Replace the new Modem.inf file with the old modem.inf file.D、Start the computer from the Windows 2000 startup floppy disks. Repair the registry.E、Start the computer from the Windows 2000 startup floppy disks. Repair the system files.

单选题Your network contains a file server named Server1 that runs Windows Server 2008 R2.You have a folder named Folder1.You need to ensure that files in Folder1 that are older than 365 days are automatically moved to an archive folder. What should you create from the File Server Resource Manager console?()Aa file groupBa file management taskCa file screenDa quota

单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()AEncrypt customer information when it is stored and when it is being transmittedBRequire encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkCEncrypt all marketing information on file servers and client computersDRequire encrypted connections to all file servers

单选题You are a help desk technician for your company. All users have Windows XP Professional computers. Ten users run a custom application named Finance on their computers. Finance stores user passwords in a file named Passwords.ini. By default, the Passwords.ini file is stored in a folder named C:/Winnt/App1.  The location and name of the file can be changed by an administrator. Each Passwords.ini file is unique. Each computer contains a single logical drive, which is drive C and is formatted as NTFS. In order to comply with a new company security policy, you need to ensure that the Passwords.ini files are encrypted. What should you do?()AIn the properties of the C:/Winnt/App1 folder, use Windows Explorer to select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. BAsk a network administrator to share a new encrypted folder named PassFiles on a network server and to permit users to read the files contained within the folder. Copy the Passwords.ini file from each computer into the PassFiles folder. On each computer, configure Finance to use the Passwords.ini file in the PassFiles folder.CCreate a folder named C:/Files. Copy the Passwords.ini file to the C:/Files folder. In the properties of the C:/Files folder, select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:/Files/Passwords.ini file. DCreate a folder named C:/Files. Move the Passwords.ini file to the C:/Files folder. Instruct the user of each computer to open the properties of the C:/Files folder and select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:/Files/Passwords.ini file.

单选题You manage a computer running Windows 2000 Professional that belongs to a workgroup. You create a new user account (Tony) on that computer that is not a member of the Administrators group. You log on using the new account. You create a file with notepad in a folder that is on a volume formatted with NTFS. You encrypt the file. You give another user account defined on that computer, Luis the permission to take ownership of the file. Luis logs on using the account and takes ownership. However, she receives an error message reporting that access is denied when she tries to open the file. What can you do to allow Luis to open the file?()AInstruct Luis to decrypt the file before she tries to open it.BLog on with the account Tony and decrypt the file.CMove the file to a folder that is not encrypted on a different volume that is formatted with NTFS.DMove the file to a folder that is not encrypted on the same volume.

单选题A co-worker uses a gadget from the Windows Sidebar feature on their computer. You examine your computer and find that the gadget is not on the list of available gadgets. You need to add this gadget to the Windows Sidebar feature on your computer.  What should you do?()ADownload and install the gadget file.BDownload the gadget file and copy the file to C:///Windows/System32.CInstruct the co-worker to send the gadget file via e-mail and copy the file to C:///Program Files.DInstruct the co-worker to send the gadget file via e-mail. Drag and drop the gadget file to the Windows Sidebar feature.

多选题You are the administrator of your company's network. Your network has 20 Windows 2000 server computers in the contoso.com domain. Your network also has 250 Windows 98 computers. You want to perform a clean installation of Windows 2000 Professional on all of the Windows 98 computers. All of the Windows 98 computers are identical models and are PXE complaint.   You want to accomplish the following goals:   • An unattended installation of Windows 2000 Professional will be performed.  • An unattended installation of company's standard applications will be performed during the     installation of Windows 2000 Professional.  • Each computer will be assigned a unique security identifier description.  • The unattended installation script will be modified so that the computers automatically join the    contoso.com domain.   You take the following actions:  • Install Windows 2000 Professional on a Windows 98 computer named computer1. • Install and configure computer standard applications on computer1.  • Use Setup Manager on computer1 to create an unattended.txt file based on the current    configuration including domain membership.  • Start the remaining Windows 98 computers and then install Windows 2000 Professional. Use    the unattended.txt file to provide the setting for the installation.   Which result or results do these actions produce?()AAn unattended installation of Windows 2000 Professional will be performed.BAn unattended installation of company’s standard applications will be performed during the   Installation of Windows 2000 Professional.CEach computer will be assigned a unique security identifier description.DThe unattended installation script will be modified so that the computers automatically join the  contoso.com domain.

单选题Your Windows 2000 Professionally computer belongs to the contoso.com domain. You need to encrypt a compressed file named C:/data. You successfully encrypt the file but discover that it is no longer compressed.   What is the most likely cause of this problem?()AGroup Policy is preventing the compression of encrypted files.BThe file is stored on a FAT32 partition.COnly members of the Administrators and the Power Users groups can compress and encrypt files.DEncrypted files cannot be compressed.

单选题You have a computer that runs Windows XP Professional. Two users named User1 and User2 share the computer. User1 and User2 encrypt files on the computer. User1 encrypts a file named file1. doc. You need ensure that both User1 and User2 can view the contents of file1. doc. What should you instruct User1 to do?()AAdd the certificate of User2 to file1. doc. BAssign User2 the Full Control NTFS permission on file1. doc. CCopy file1. doc the %systemroot%/documents and settings/all users/ folder.DMove file1. doc to the %systemroot%/documents and settings/all users/ folder.

单选题You are the administrator of your company's network. You attempt to install a printer driver on a Windows 2000 computer for a user named Linda. You receive the following error message: “Error 11-Cannot install printer driver.” The driver was originally downloaded from the printer manufacturer’s Web site. You have successfully used the driver in the past on their Windows 2000 Professional computers. You want to configure Linda’s computer to check for driver integrity and to allow you to install this printer driver. What should you do? ()A Configure driver signing to display a message before installing an unsigned driver. B Configure driver signing to ignore File Signature Verification. Create a Local Computer Policy to enable Windows File Protection.C Use the Add Printer Driver wizard to install the driver.  Create a Local Computer Policy to enable Windows File Protection. D Use the Print Troubleshooter.  Configure the computer to prevent the installation of unsigned drivers.

单选题You are the administrator of your company’s network. You attempt to install a printer driver on a Windows 2000 Professional computer for a user named Lori. You receive the following error message: ‘CANNOT INSTALL PRINTER DRIVER’. The driver was originally downloaded for the manufacturers web site. You have successfully used the driver on other Windows 2000 Professional computers. You want to configure Lori’s computer to check the driver’s integrity and to allow you to install printer driver. What should you do?()AConfigure driver signing to display a message before installing an unsigned driver.BConfigure driver signing to ignore file signature verification. Create a local computer policy to enable windows file protection.CUse the Add Printer wizard to install the driver and create a local computer policy to enablewindows file protection.DUse the printer troubleshooter configures the computer to prevent the installation of unsigned drivers.

单选题You are the administrator of your company’s network. You attempt to install a printer driver on a Windows 2000 computer for a user named Linda.  You receive the following error message: "Error 11-Cannot install printer driver."  The driver was originally downloaded from the printer manufacturer’s Web site. You have successfully used the driver in the past on their Windows 2000 Professional computers.  You want to configure Linda’s computer to check for driver integrity and to allow you to install this printer driver.  What should you do? ()AConfigure driver signing to display a message before installing an unsigned driver.BConfigure driver signing to ignore File Signature Verification.CCreate a Local Computer Policy to enable Windows File Protection.DUse the Add Printer Driver wizard to install the driver.Create a Local Computer Policy to enable Windows File Protection.EUse the Print Troubleshooter.FConfigure the computer to prevent the installation of unsigned drivers.

单选题You have a computer that runs Windows 7 Professional. A removable drive is attached to the computer.You need to protect data on the removable drive by using BitLocker To Go.  What should you do first? ()AUpgrade the computer to Windows 7 Enterprise.BInstall all Windows Updates for Windows 7 Professional.CIssue a digital certificate for the Encrypting File System (EFS).DSelect the Encrypt contents to secure data checkbox from the properties on the removable drive.

单选题You have updated the modem driver on your Windows 2000 Professional computer. You restart your computer. Immediately after you log on, you receive a stop error. You need to start Windows 2000. What must you do? ()ARestart the computer in Safe Mode. Uninstall the modem driver.BRestart the computer by using the last known good configuration.CRestart the computer in Recovery Console. Replace the new Modem.inf file with the old modem.inf file.DStart the computer from the Windows 2000 startup floppy disks. Repair the registry.EStart the computer from the Windows 2000 startup floppy disks. Repair the system files.

单选题A folder on your Windows 2000 Professional computer contains bitmap files that have been compressed from 2MB to 1MB.  You want to copy one of the compressed bitmap files from the hard disk to 1.4-MBfloppy disk. When you attempt to copy, you receive the following error message ‘Destination drive is Full’.  What should to do?()AMove, rather than copy, the compressed bitmap file to the floppy disk.BReformat the floppy disk.Then copy the compressed bitmap file to the floppy disk.CUse another program to compress the bitmap file before copying it to the floppy disk.DCopy an empty compressed folder to the floppy disk. Then copy the compressed bitmap file to the folder on the floppy disk.

单选题You are the administrator of a computer named Computer1 that runs Windows 7. Several users shareComputer1. The users plan to encrypt files on the computer. You need to ensure that you can access allencrypted files on the computer.  What should you do first?()AAt a command prompt, run Cipher.exe.BAt a command prompt, run Certutil.exe.CFrom the local computer policy, modify the User Rights Assignment.DFrom User Accounts, run the Manage your file encryption certificates wizard.

单选题You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. contains a shared folder named TestKingProjects. You use the Backup utility once each day to back up the TestKingProjects folder. You discover that a database file in the TestKingProjects folder is corrupt. You confirm that the file corruption is not the result of a virus. You need to replace the corrupted file by using the latest backup. You do not know whether the file was corrupted before or after the latest backup was completed. You need to verify that the file in the backup can be opened successfully before you overwrite the existing file. What should you do?()AIn the Backup utility, select the Verify data after backup option.BRun the Ntbackup //TestKing2/TestKingProjects /v:yes command.CRestore the file to a temporary folder. Verify that the database file contains the correct data. Copy the restored file to the TestKingProjects folder.DRestore the file to a temporary folder. Use the Windiff utility to compare the file in the temporary folder to the file in the TestKingProjects folder. Copy the restored file to the TestKingProjects folder.