多选题A user in the accounting department reports that their office is able to connect to the network, but they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).APhysical network diagramBJob logCAcceptable use policyDBaseline documentationEWiring schematic

多选题
A user in the accounting department reports that their office is able to connect to the network, but they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).
A

Physical network diagram

B

Job log

C

Acceptable use policy

D

Baseline documentation

E

Wiring schematic


参考解析

解析: 暂无解析

相关考题:

You are the administrator of a Windows 2000 network. You need to store secured files for your company's accounting and legal departments on a Windows 2000 Professional computer.You want to accomplish the following goals:1. Enable users in both departments to access their own files from the network2. Enable users in the accounting department to view the legal accounting department's documents3. Prevent users in the legal department from being able to view the accounting department's documents4. Enable managers within the company to access and modify both the accounting and the legal department's filesYou take the following actions:1. Create two shared folders named Accounting and Legal2. Create three groups named Accounting, Legal, and Management3. Allow the Accounting group modify permission on the Accounting folder4. Allow the Legal group modify permission on the Legal folders.5. Allow the Management group modify permission on both the Accounting and Legal folders.Which result or results do these actions produce? (Choose all that apply)A.Users in both departments can access to their own files from the network.B.Users in the accounting department can view the legal department's documents.C.Users in the legal department cannot view the accounting department's documents.D.Company managers can access and modify both departments' files.

PURPOSE OF ACCOUNTING Every company has an accounting office or a finance department that looks ()its accounting details. An accounting department is the backbone(脊梁)of every business. It records all the business transactions(交易), and keeps a track(记录) of the incomes(收入) and expenses(支出)of the business. The accounting department also helps to determine the correct financial position and standing of the business. For a systematic(系统的)and ()recording of transactions, accounting is important. The purpose of accounting is recording all the transactions honestly and accurately in the “Books of Accounts(账本)”. The accounting process can be defined ()“the process that begins when the transaction takes place and ends ()the transaction is recorded in the books of accounts”. It includes a series of steps that ()to analyze(分析)and record the business transactions for a particular period.1.A. forB. afterC. up2.A. accurateB. simpleC. correct3.A. toB. atC. as4.A. whenB. whichC. what5.A. useB. is usedC. uses

One of the file servers in the domain is a Windows 2000 Server computer named Ezonexamfiles.Ezonexamfiles contains a shared folder named Accounting, which is used to store data for the company's accounts payable department.The permissions on the Accounting folder are configured as shown in the following table.Mr. King is an employee in the operations department. He uses a Windows 2000 Professional client computer. His manager requests that King be granted access to the files in the Accounting folder.You add King's user account to the AcctPay domain local group, but he still cannot access the files in the Accounting folder.You need to ensure that King can access the files. What should you do?A.Instruct King to log off his computer and log on again.B.Move King's user account to the same Active Directory organizational unit (OU) as Ezonexamfiles.C.Modify the NTFS permissions on the Accounting folder to grant King Full Control permissions.D.Modify the NTFS permissions on the Accounting folder to grant the AcctPay domain local group Full Control permission.

A user in the accounting department reports that their office is able to connect to the network, butthey are unable to connect to the Internet.Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).A. Physical network diagramB. Job logC. Acceptable use policyD. Baseline documentationE. Wiring schematic

You are the administrator of a SQL Server 2000 computer. Your company purchased an accounting application from a vendor. The application stores its data in a database named Accounting on the server. The tables in this database contain columns that function as primary keys, but PRIMARY KEY and FOREIGN KEY constraints are not used.You need to replicate data from this database to another SQL Server computer. This server will use the replicated data to generate reports. Most reports will run each month, but the accounting department needs to have the ability to run reports at any time. Reports should be accurate through the last full working day.You cannot make any changes to the database, but you need to implement replication. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)A.Implement merge replication.B.Implement snapshot replication.C.Implement transactional replication.D.Schedule replication to run continuously.E.Schedule replication to run during off-peak hours.

The Managers shall establish an accounting system which meets the requirements of ______ and provide regular accounting services,supply regular reports and records.A.the OwnersB.ShippersC.CharterersD.Carriers

While the accounting department is closed, all billing questions will be __________by the customer service department.A.expiredB.attendedC.repliedD.handled

A user in the accounting department reports that their office is able to connect to the network, but they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).A、Physical network diagramB、Job logC、Acceptable use policyD、Baseline documentationE、Wiring schematic

Your business has departmental reports that are generated every day. Each department must use the same set of queries, but access a different subset of data in the tables, depending on which department generates the report. The format of the reports is being developed; currently, the format changes daily. How would you configure the database to ensure that each department generates its report (based on its target data) using the most recent report format every day?()A、 By having each user run the report generation procedure at the scheduled time, supplying the necessary input variables.B、 By creating a program using DBMS_JOB that accepts one or more variables, and creating a job that calls this program using DBMS_JOB.C、 By having each user schedule a job using DBMS_JOB that accepts one or more input variables and calls a procedure that generates the report.D、 By having each user create a job using DBMS_SCHEDULER that includes all the information and commands necessary to generate the report.E、 By creating a program using DBMS_SCHEDULER that accepts one or more variables, and creating a job that calls this program using DBMS_SCHEDULER.

You are the network administrator for Your network consists of two Active Directory domains. Each department has its own organizational unit (OU) for departmental user accounts. Each OU has a separate Group Policy object (GPO) A single terminal server named TestKingTerm1 is reserved for remote users. In addition, several departments have their own terminal servers for departmental use. Your help desk reports that user sessions on TestKingTerm1 remain connected even if the sessions are inactive for days. Users in the accounting department report slow response times on their terminal server. You need to ensure that users of TestKingTerm1 are automatically logged off when their sessions are inactive for more than two hours. Your solution must not affect users of any other terminal servers. What should you do?()A、For all accounting users, change the session limit settings.B、On TestKingTerm1, use the Terminal Services configuration tool to change the session limit settings.C、Modify the GPO linked to the Accounting OU by changing the session limit settings in user-level group polices.D、Modify the GPO linked to the Accounting OU by changing the session limit settings in computer-level group polices.

You are the administrator of your company’s network. You configure a local group named accounting to have a mandatory user profile. The mandatory profile has been configured to include a custom logo that was saved with 16-bit color and 1025x768 resolution. Some of the Windows 2000 Professional computers in the accounting department have standard VGA video adapters, and others have SVGA video adapters. Several users report that when they log on to certain Windows 2000 Professional computers, the custom bitmap becomes very pixilated and distorted, and does not reflect the proper color depth. You want users to be able to correctly view the custom bitmap on any computer in the accounting department. What should you do? ()A、Configure a roaming user profile for each user in the accounting groupB、Configure a separate user profile for each user in the accounting GroupC、Change the custom bitmap to a 16-color bitmap that has 640x480 resolution, and reconfigure  the mandatory user profileD、Reinstall the appropriate WDM-compliant drivers for the computers that do not display the  custom bitmap correctly.

You are the desktop administrator for Contoso, Ltd. Philippe is a user in the accounting department. Philippe reports that he is not able to download a file from an FTP server by using Internet Explorer on his Windows XP Professional computer. When Philippe attempts to access the FTP server by using the URL ftp://ftp.contoso.com, Internet Explorer displays the following error message: "The password was rejected." Philippe informs you that he has a user name and password for the FTP server, but that Internet Explorer does not prompt him to type the user name or password. You need to ensure that Philippe can access the FTP server by using Internet Explorer on his computer. Which URL should you instruct Philippe to use?() A、ftp://ftp.contoso.com/Philippe B、ftp://Philippe:password@ftp.contoso.comC、ftp://Philippe/ftp.contoso.com D、ftp://ftp.contoso.com@Philippe:password

You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A、Install wireless network cards on all accounting department computers. Select PEAP authenticationB、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

Which result or results do these actions produce?()A、Users in both departments can access their files from the network.B、Users in the accounting department can view the legal department’s documents.C、Users in the legal department cannot view the accounting department’s documents.D、Company managers can access and modify both departments’ files.

You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()A、Users in both departments can access to their own files from the network.B、Users in the Accounting department can view the Legal department’s documents.C、Users in the Legal department cannot view the Accounting department’s documents.D、Company managers can access and modify both departments’ files.

You are the Exchange administrator for the Xxx Corporation’s Exchange 2010organization.Jennifer Brown is a user in the Accounting department who will be on leave for 30 to 40 days.You would like to forward all mail for Jennifer Brown’s mailbox to Ann Garcia during her absence.When Jennifer returns from leave, she should be able to see all the messages that were forwarded to Ann Garcia. What should you configure?()A、Set-Mailbox -Identity "Jennifer Brown" -ForwardingAddress "ann@Xxx " -DeliverToMailboxAndForward $falseB、Set-Mailbox -Identity "Jennifer Brown" -ForwardingAddress "ann@Xxx " - DeliverToMailboxAndForward $trueC、Add-ADPermission -Identity ’CN=Jennifer Brown,OU=Accounting,DC=Xxx,DC=com’ - User ’XXX/Ann’ -ExtendedRights ’Send-as’D、Add-MailboxPermission -Identity ’CN=Jennifer Brown,OU=Accounting,DC=Xxx,DC=com’ -User ’XXX/Ann’ -AccessRights ’FullAccess’

You are the administrator of ExamSheet's Windows 2000 network.  You need to store secured files for ExamSheet's accounting and legal departments on a Windows 2000 Professional computer. You create two shared folders named Accounting and Legal with the default NTFS and share permissions. You also create two groups named Accounting and Legal and add the appropriate user accounts into the appropriate groups. To meet the security requirements for the shared folders the following criteria must be met:  1.Users in both departments must be able to update their own files from the network.  2.Users in the accounting department must be able to view the legal department's documents from the network.  3.Users in the legal department must be prevented from being able to view the accounting department's documents from the network.You want to ensure that all security requirements are met using the least amount of administrative effort.  What should you do? ()A、Allow the Accounting groupReadpermission on the Accounting share and the Legal shared folder. Allow the Legal groupReadpermissions on the Legal shared folder.B、Allow the Accounting groupFull Controlpermissions on the Accounting shared folder and the Legal shared folder. Allow the Legal groupFull Controlpermission on the Legal shared folder.C、Deny the Everyone groupFull Controlpermissions on the Accounting shared folder.D、Deny the Legal groupFull Controlpermission on the Accounting shared folder.

单选题You are the network administrator for Company.  You have been assigned the task to upgrade the 23 Windows NT Workstation 4.0 computers in the accounting department to Windows 2000 Professional. Users in the accounting department run a peer-to-peer financial and credit application on their computers. The application requires that information is passed between the accounting department computers over the network. You upgrade all the computers and configure them to have the default security settings. You want to ensure that network traffic between accounting computers is secure. What should you do? ()ADisable NetBIOS over TCP/IP on the accounting department computers.BApply the Hisecws.inf security template to the local security policy on the accounting department computers.CEnable the Encrypting File System (EFS) on all files used by the financial and credit application on the accounting department computers.DConfigure port filters for each port used by the financial and credit application on the accounting department computers.

单选题You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.   After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers.   You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications.   What should you do?()AAdd each user account to the Power Users group on that user’s computer.BConfigure the financial and credit applications to run as services on the computers in the accounting department.CApply the Compatws.inf security template to the local security policy of the computers in the accounting department.DUse the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.

单选题You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()AModify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesBModify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesCModify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2DModify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2

单选题You are the administrator of your company’s network. You configure a local group named accounting to have a mandatory user profile. The mandatory profile has been configured to include a custom logo that was saved with 16-bit color and 1025x768 resolution. Some of the Windows 2000 Professional computers in the accounting department have standard VGA video adapters, and others have SVGA video adapters. Several users report that when they log on to certain Windows 2000 Professional computers, the custom bitmap becomes very pixilated and distorted, and does not reflect the proper color depth. You want users to be able to correctly view the custom bitmap on any computer in the accounting department. In addition to this, you also want to allow the users to modify, change and save their desktop settings. What should you do?()AConfigure a roaming user profile for each user in the accounting groupBConfigure a separate user profile for each user in the accounting Group. CChange the custom bitmap to a 16-color bitmap that has 640x480 resolution, and reconfigure the mandatory user profile DReinstall the appropriate WDM-compliant drivers for the computers that do not display the custom bitmap correctly.

单选题You have two database servers SEMP and SACCT. The database in the SEMP server maintains theemployee information and the database in the SACCT server maintains the accounts payable  information.The employees submit the expense reports to the accounts payable department. A user of the accountspayable database wants to extract the employee information from the database in the SEMP server for cross-verification.  Which schema object enables the user to access the information from the remote database()AClusterBDatabase linkCMapping tableDMaterialized view

单选题You have two database servers SEMP and SACCT. The database in the SEMP server maintains the employeeinformation and the database in the SACCT server maintains the accounts payable information. The employeessubmit the expense reports to the accounts payable department. A user of the accounts payable databasewants to extract the employee information from the database in the SEMP server for cross-verification.  Whichschema object enables the user to access the information from the remote database()AClusterBDatabase linkCMapping tableDMaterialized view

单选题You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. You upgrade 10 computers in the Accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. For security purposes you want to ensure that these computers can only communicate with other Windows 2000 computers.  What should you do?()AOn each computer configure separate memory spaces for each financial and credit applications.BApply Highly Secure security template to the local security policy of the computers in the Accounting department.CApply Compatible security template to the local security policy of the computers in the Accounting department.DAdd each user account to the Power Users group on that user’s computer.

单选题The medical board, concerned by the drop in insurance payments and the failure of the accounting department to obtain the anticipated funds, resolved to pursue legal action against the insurance company.Aconcerned by the drop in insurance payments and the failure of the accounting department to obtainBconcerning the drop in payments by insurance and the failure of the accounting department to obtainCbecause of its concern for the dropping insurance payments and the accounting department’s failure at obtainingDin its concern that the drop in insurance payments and the failure of the accounting department to obtainEbeing concerned about the drop in insurance payments and the accounting department falling to obtain

单选题Saul needs access to files that are in the Accounting folder on his computer. A local group named accounting is granted full control permission to the accounting folder and the files within it. Saul is a member of the accounting local group but he cannot access the files that he needs.  What should you do?()AGrant Saul NTFS permission so that he can access any parent folder or files in the shared sales folder.BShare the Sales folder and grant Saul shared folder permission to access the shared sales folder.CRemove Saul from any other groups that have been explicitly denied access to the accounting folder.DDelete the Sales local group and recreate, add individual user accounts from the sales department back into sales local group.

单选题You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute a custom application to the Windows XP Professional computers in the sales department. He deploys the software by using Group Policy. Susan is a user in the sales department. She reports that the custom application is not available. You examine her computer, and you verify that the application is not present on her computer. You want to ensure that the software is deployed the next time Susan logs on. Which command should you run?()ASecedit /refreshpolicy user_policy /enforceBSecedit /refreshpolicy machine_policy /enforceCGpupdate /target:computer /syncDGpupdate /target:user /sync