A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A、Set the group’s folder permissions to deny.B、Use Event Viewer to monitor changes to the file.C、Store a backup copy of the file on a USB drive.D、Change the file attribute to read only.

A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()

  • A、Set the group’s folder permissions to deny.
  • B、Use Event Viewer to monitor changes to the file.
  • C、Store a backup copy of the file on a USB drive.
  • D、Change the file attribute to read only.

相关考题:

下面程序运行时输出的结果为C:\Program Files is a directory.将程序补充完整。Import java.io.*;public class DirTest {public static void main(String[] args) {File myDir=Flew File("C:/Program Files/");System.out.println(myDir+(______.isDirectory()?"is":"is not")+"a directory.");}}

在Windows 7中,下列文件名中错误的是______。A.My Program GroupB.file1.file2.basC.A\B.CD.ABC.FOR

What will a new Ezonexam router do during startup if a configuration file is not located in NVRAM?A.It will search for the configuration file in the locations specified by boot system commands.B.It will search for the configuration file in flash and if no configuration file is found there, it will enter the setup dialog.C.It will search for the configuration file on a TFTP server and if no configuration file is found there, it will enter the setup dialog.D.It will search for the configuration file in flash and if no configuration file is found there, it will load a limited configuration file from ROM.E.It will search for the configuration file on a TFTP server and if no configuration file is found there, it will load a limited configuration file from ROM.

在Windows中,下列正确的文件名是()。 A:My Program Group.TXTB:file1|file2C:A<>B.CD:A?B.DOC

在Windows 中,下列文件名中错误的是______。 A.My Program GroupB.file1.file2.basC.AB.CD.ABC.FOR

Given the following router output,which configuration file will the router use at its next reload?() A.configB.clientqos.cnfC.startup-configD.running-configuration

Refer to the exhibit. What can be determined about the router from the console output?() A.No configuration file was found in NVRAM.B.No configuration file was found in flash.C.No configuration file was found in the PCMCIA card.D.Configuration file is normal and will load in 15 seconds.

使用MML命令"ZUSU:MCMU,0:R=WARM,C=DSK"重启备份MCMU, 此MCMU会()A、Load software and configuration file from Hard diskB、Load software only, no configuration file loadingC、Load configuration file from working MCMU and load software from hard diskD、Load configuration file only, no software loading

What will a router do during startup if a configuration file is not located in NVRAM?()A、it will search for the configuration file in the locations specified by boot system commands.B、it will search for the configuration file in flash and if no configuration file is found there, it will enter the setup dialog.C、it will search for the configuration file on a TFTP server and if no configuration file is found there, it will enter the setup dialog.D、it will search for the configuration file in flash and if no configuration file is found there, it will load a limited configuration file from ROM.E、it will search for the configuration file on a TFTP server and if no configuration file is found there, it will load a limited configuration file from ROM.

Which of the following is an accurate description of the command copy startup-configftp://kevin:cisco@192.168.1.74?()A、The configuration on the FTP server is copied to RAMB、The command is not valid on a Cisco routerC、The configuration file in RAM is copied to an FTP serverD、The configuration file in NVRAM is copied to an FTP serverE、The configuration on the FTP server is copied to NVRAMF、The configuration will be copied from NVRAM to an FTP server with a filename of Kevin

You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()A、the Pulse Diagnostics Tool in the "File" "Tools" menu option in the Pulse GUIB、the Pulse Diagnostics Tool in the "Start" "All Programs" "Juniper Networks" "Junos Pulse" menu folder next to the Junos Pulse applicationC、the Pulse Diagnostics Viewer, which you access by simultaneously pressing "Ctrl" and "F2"D、the Pulse Diagnostics Viewer in the "File" "Tools" menu option in the Pulse GUI

Select the action that results from executing these commands.()Switch(config-if)# switchport port-securitySwitch(config-if)# switchport port-security mac-address stickyA、A dynamically learned MAC address is saved in the startup-configuration file.B、A dynamically learned MAC address is saved in the running-configuration file.C、A dynamically learned MAC address is saved in the VLAN database.D、Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.E、Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

A customer purchased a new PC with Windows XP but wants to run a program designed forWindows 98. Which of the following will allow this program to run under Windows XP?()A、Change the file permissions for the executable file.B、Use the convert utility to change the attributes of the executable file.C、Make sure that Windows XP has FAT32 file system.D、Run the executable file under compatibility mode.

Which method will configure an e-mail notification when permanent hardware errors are logged in the errorlog?()  A、Create or update the errnotify stanza in the ODmB、Update errpt daemon configuration file /etc/errpt.conf.C、Update errpt daemon configuration file /var/adm/errpt.conf.D、Define a notification alias in the /etc/syslog.conf file with the *.error stanza

Which two statements are true about the rescue configuration file?()A、It must include a root passwordB、It is roll back file number 50, and you can recover it by issuing rollback 50C、It is created by issuing request system configuration rescue saveD、It is updated automatically when you commit

You have recently created and distributed RDP files for a certain RemoteApp program. However,you findthat the application performs poorly and needs to be migrated to a more powerful server. What should youdo to ensure that users can connect to the RemoteApp program after it is migrated?()A、Create a new TS Web Access site for the new terminal server and publish the application to the newsite.B、Re-create an RDP file for the RemoteApp program after the migration and distribute the file to users.C、Modify the properties of the existing RDP file and re-distribute the file to users.D、In TS RemoteApp Manager on the old terminal server, change the Terminal Server settings so that the server name listed is the new terminal server.

You are designing a Windows 7 deployment image.  You plan to install Windows 7 Enterprise with a Multiple Activation Key (MAK).    You need to add the MAK to the configuration pass by using an answer file.   To which configuration pass should you add the MAK?()A、the Specialize configuration passB、the Generalize configuration passC、the WindowsPE configuration passD、the AuditSystem configuration pass

多选题You work as an application developer at Certkiller .com. You are in the process of creating an application for Certkiller .com’s Human Resources department that tracks employee benefits. You have to store current employee data without recompiling the application. You elect to store this employee data as a custom section in the application configuration file. The relevant portion of the application configuration file is shown in the following exhibit:          You want to use the .NET 2.0 Configuration API to access the custom section. You need to ensure that programmatic access of the EmployeeSection element is enabled. What should you do?()ACreate a custom section handler class that inherits the ConfigurationSection interface.BAdd a section element to the EmployeeSection element of the application configuration file.CCreate a custom section handler class that implements the IConfigurationSectionHandler interface.DAdd an EmployeeSection element to the configSections element of the application configuration file.ECreate a custom section handler class that implements the IApplicatioSettingsProvider interface.FAdd a section element to the configSections element of the application configuration file.

单选题Which of the following is an accurate description of the command copy startup-configftp://kevin:cisco@192.168.1.74?()AThe configuration on the FTP server is copied to RAMBThe command is not valid on a Cisco routerCThe configuration file in RAM is copied to an FTP serverDThe configuration file in NVRAM is copied to an FTP serverEThe configuration on the FTP server is copied to NVRAMFThe configuration will be copied from NVRAM to an FTP server with a filename of Kevin

单选题What is the name of the file that is used to provide the configuration setting in unattended mode?()AAnswer file.BStartup file.CUnattended configuration file.DNetwork file.

单选题You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()Athe Pulse Diagnostics Tool in the File Tools menu option in the Pulse GUIBthe Pulse Diagnostics Tool in the Start All Programs Juniper Networks Junos Pulse menu folder next to the Junos Pulse applicationCthe Pulse Diagnostics Viewer, which you access by simultaneously pressing Ctrl and F2Dthe Pulse Diagnostics Viewer in the File Tools menu option in the Pulse GUI

单选题Which command will delete the current rescue configuration?()Auser@router# system delete configuration rescueBuser@router request system configuration rescue deleteCuser@router# delete rescue configurationDuser@router file delete rescue-configuration

单选题A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()ASet the group’s folder permissions to deny.BUse Event Viewer to monitor changes to the file.CStore a backup copy of the file on a USB drive.DChange the file attribute to read only.

单选题Your company has 1,000 computers in the main office and 20 computers in store kiosks.All the computers run Windows 7 Enterprise.   The kiosk computers do not have network connections.  The company brands the Internet Explorer program window on all computers by displaying the company logo at the left end of the title bar.  The company changes its logo.   You have the following requirements:   Display the new logo on the Internet Explorer program window title bar on the main office computers and the kiosk computers.  Modify the search providers that are available to main office computers. You need to define Internet Explorer settings to support the requirements.   What should you do?()A Save the logo as Logo.png and copy the file to the C:///Windows/Branding/ directory on each kiosk computer. Createand distribute a new OpenSearch description file for the main office computers.B Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package on the main office computers. Enable automatic version synchronization and specify a flash drive for the path. Distribute the configuration package to the kiosk computers.C Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package on the main office computers. Create a deployment CD for the kioskcomputers.D Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package. Copy the setup file to a flash drive,and distribute the file to all computers.

单选题You delete a trace options file and later notice that no new entries are being written to this file. What would allow the entries to be written to the file again?()AIssue a commit of the current configuration.BIssue a commit full of the current configuration.CIssue a commit all of the current configuration.DIssue a commit confirmed of the current configuration.

单选题An uninstalled program is still attempting to load when Windows starts. Which of the following options can the technician suggest to stop this unwanted program from loading?()AServicesBAdd or Remove ProgramsCSystem Configuration UtilityDSystem File Checker

单选题You are the top of the hierarchy in configuration mode. How would you save your configuration to a file on the router?()Asave configuration filenameBsave config filenameCsave filenameDsave run filename

单选题Which interface is used to configure debug parameters for log files?()ADatastore Control Center  BAlarm and Trace Configuration  CCustom File Configuration  DControl Center