A user on your network downloads a video card driver from the Internet. You are unsure of the source of the driver. You want to ensure that the user does not lose production time because of an incompatible driver. What should you do?()A、Install the driver into the computer. Restart the computer. Use the last known good configuration to recover the original driver if necessary. B、Install the driver in the computer. Use the hardware troubleshooter and then use the recovery console to recover the original driver if necessary. C、Display the advanced attributes of the video card driver file. Install the file only if the contents have been secured. D、Run file signature verification utility to verify that the driver has been digitally signed.

A user on your network downloads a video card driver from the Internet. You are unsure of the source of the driver. You want to ensure that the user does not lose production time because of an incompatible driver. What should you do?()

  • A、Install the driver into the computer. Restart the computer. Use the last known good configuration to recover the original driver if necessary. 
  • B、Install the driver in the computer. Use the hardware troubleshooter and then use the recovery console to recover the original driver if necessary. 
  • C、Display the advanced attributes of the video card driver file. Install the file only if the contents have been secured. 
  • D、Run file signature verification utility to verify that the driver has been digitally signed. 

相关考题:

Which command would allow you to compare two files stored on your router?() A.user@hostfile show filename1 compare filename2B.user@hostfile compare files filename1 filename2C.user@hostcompare files filename1 filename2D.user@hostcompare filename1 filename2

You configure parental controls on your computer for your child‘s user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inapproriate Web sites.What should you do?()A.AB.BC.CD.D

You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D

How can you verify that you have correctly configured SSH access to your Junos device?()A、user@router# show system servicesB、user@router show configuration servicesC、user@router# show configuration system servicesD、user@router# show system login

You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?()A、user@router request system storage cleanupB、user@router show system storageC、user@router request system storage cleanup dry-runD、user@router show system storage detail

For which database operation would you need the database to be in the MOUNT state()A、renaming the control filesB、re-creating the control filesC、dropping a user in your databaseD、dropping a tablespace in your databaseE、configuring the database instance to operate in the ARCHIVELOG or NOARCHIVELOG modes

You executed the STARTUP MOUNT command to start your database. For which database operation do you need to start the database in the MOUNT state?()A、renaming the control filesB、dropping a user in your databaseC、enabling or disabling redo log archivingD、dropping a tablespace in your databaseE、re-creating the control files, after you lost all the control files in your database

Your network contains an Exchange Server 2010 server.You need to prevent a user named User1 from downloading attachments larger than 50 KB when using Exchange ActiveSync.Your solution must not affect other users.  What should you do first?()A、Modify User1 Mailbox propertiesB、Create a New ActiveSync Mailbox PolicyC、Create a New Exchange ActiveSync Mailbox policyD、Modify properties of Default Exchange ActiveSync Mailbox policy

You configure parental controls on your computer for your childs user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inappropriate Web sites.  What should you do? ()A、Enable Microsoft Windows Firewall.B、Disable the default administrator account.C、Use password protection for all user accounts.D、Configure Web sites you approve of in the list of Trusted Sites of Microsoft Windows Internet Explorer.

Your company has an Active Directory domain. A user attempts to log on to the domain from a client computer and receives the following message: "This user account has expired Ask your administrator to reactivate the account." You need to ensure that the user is able to log on to the domain. What should you do()A、Modify the properties of the user account to set the account to never expire.B、Modify the properties of the user account to extend the Logon Hours setting.C、Modify the properties of the user account to set the password to never expire.D、Modify the default domain policy to decrease the account lockout duration.

Your network contains an Active Directory forest. The forest schema contains a custom attribute for  user objects.   You need to modify the custom attribute value of 500 user accounts.   Which tool should you use()A、CsvdeB、DsmodC、DsrmD、Ldifde

Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA.  What should you do?()A、 Assign the user account to the CA Admin role.B、 Add the user account to the local Administrators group.C、 Grant the user the Back up files and directories user right.D、 Grant the user the Manage auditing and security log user right.

Your network contains an Active Directory domain.   A user named User1 takes a leave of absence for one year.   You need to restrict access to the User1 user account while User1 is away.     What should you do()A、From the Default Domain Policy, modify the account lockout settings.B、From the Default Domain Controller Policy, modify the account lockout settings.C、From the properties of the user account, modify the Account options.D、From the properties of the user account, modify the Session settings.

Your computer has Microsoft Windows Firewall enabled.  Your child plays an online game that uses connectionless traffic over port 5678 for inbound and outbound traffic.  You need to prevent your child from playing this game.  What should you do? ()A、Enable the User Account Control feature.B、Configure the user account of your child as a standard user.C、Create an outbound rule in Windows Firewall to block UDP port 5678.D、Create an outbound rule in Windows Firewall to block TCP port 5678.

单选题You are ready to implement RMAN in the backup and recover strategy for your company. Which system privilege must the RMAN user have to be able to connect and execute RMAN commands on a target database?()ASYSDBABSYSOPERCNo system privileges are required for the RMAN user.DOnly SYS user can connect and execute RMAN commands on a target database.

单选题For which database operation would you need the database to be in the MOUNT state()Arenaming the control filesBre-creating the control filesCdropping a user in your databaseDdropping a tablespace in your databaseEconfiguring the database instance to operate in the ARCHIVELOG or NOARCHIVELOG modes

单选题You executed the STARTUP MOUNT command to start your database. For which database operation do you need to start the database in the MOUNT state?()Arenaming the control filesBdropping a user in your databaseCenabling or disabling redo log archivingDdropping a tablespace in your databaseEre-creating the control files, after you lost all the control files in your database

单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0.  CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.

单选题You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?()AGrant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. BGrant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. CGrant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. DGrant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account.

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a file server that contains two volumes named C and D. Volume C contains a folder named User1data. User1 is the owner of all files in the User1data folder. You copy the User1data folder to volume D. You examine the ownership of the User1data folder on volume D and discover that your user account is listed as the owner. You need to ensure that User1 is the owner of the User1data folder on volume D. What should you do? ()AModify the Advanced Security settings for the User1data folder.BModify the Advanced Attributes settings for the User1data folder.CDelete the User1data folder on volumeDFrom Windows Explorer, move the User1data folder from volume C to volume

单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA.  What should you do?()A Assign the user account to the CA Admin role.B Add the user account to the local Administrators group.C Grant the user the Back up files and directories user right.D Grant the user the Manage auditing and security log user right.

单选题When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()Aidentify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator Bidentify CSQs and JTAPI user and designate a Cisco CRS administrator Cidentify resources and RM user and enter information about your LDAP Didentify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources

单选题You have an Exchange Server 2010 organization named contoso.com. Your company is investigating a user named User1. You need to prevent User1 from permanently deleting the items in his mailbox.  What should you run()?ASet-Mailbox User1 -LitigationHoldEnabled $trueBSet-Mailbox User1 -ModerationEnabled $trueCSet-Mailbox User1 -RetainDeletedItemsUntilBackup $trueDSet-Mailbox User1 -RetentionHoldEnabled $true

单选题You are attempting to connect to your ISP. You view the status change from Dialing to Verifying user name and password. After several seconds, the status changes to Disconnecting. You are then disconnected from the computer you dialed. You verify that your user name and password are entered correctly. You want to enable your Computer to connect to your ISP correctly. What should you do? ()AConfigure your connection to enable data encryption.BConfigure your connection to use the UNIX SLIP server.CConfigure your connection to allow unsecured passwords.DInstruct your ISP to configure your account to support Multilink.

单选题You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.  What should you do? ()AEnable the User Account Control: Only elevate executables that are signed and validated option.BDisable the User Account Control: Only elevate executables that are signed and validated option.CConfigure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.DConfigure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.

单选题You would like to configure your PC's IP address of 10.10.0.156 as an FTP host with a username of user and a password of mypass.Which configuration command accomplishes this goal?()Ahost user pc 10.10.0.156 ftp user mypassBhost user pc 10.10.0.156 tftp user mypassChost name user pc 10.10.0.156 ftp user mypassDhost name user pc 10.10.0.156 tftp user mypass