单选题A department of users is reporting there are lines across their printouts. They have alreadychanged the toner cartridge but the issue remains. Which of the following is the BEST item for Karen, a technician, to inspect?()AThe fuser unit for damageBThe toner cartridge for proper seatingCThe tray pickup rollers for wearDThe registration assembly for damage

单选题
A department of users is reporting there are lines across their printouts. They have alreadychanged the toner cartridge but the issue remains. Which of the following is the BEST item for Karen, a technician, to inspect?()
A

The fuser unit for damage

B

The toner cartridge for proper seating

C

The tray pickup rollers for wear

D

The registration assembly for damage


参考解析

解析: 暂无解析

相关考题:

You are the administrator of a Windows 2000 network. You need to store secured files for your company's accounting and legal departments on a Windows 2000 Professional computer.You want to accomplish the following goals:1. Enable users in both departments to access their own files from the network2. Enable users in the accounting department to view the legal accounting department's documents3. Prevent users in the legal department from being able to view the accounting department's documents4. Enable managers within the company to access and modify both the accounting and the legal department's filesYou take the following actions:1. Create two shared folders named Accounting and Legal2. Create three groups named Accounting, Legal, and Management3. Allow the Accounting group modify permission on the Accounting folder4. Allow the Legal group modify permission on the Legal folders.5. Allow the Management group modify permission on both the Accounting and Legal folders.Which result or results do these actions produce? (Choose all that apply)A.Users in both departments can access to their own files from the network.B.Users in the accounting department can view the legal department's documents.C.Users in the legal department cannot view the accounting department's documents.D.Company managers can access and modify both departments' files.

General Telephone gave Wynonna $2,000 for an easement for power lines across her property. She must realize the gain or loss on the receipt of cash。() 此题为判断题(对,错)。

Which option provides a hierarchy of data security across lines of business?() A.AlertsB.Multi-OrgC.FlexfieldsD.Shared entitiesE.Business Intelligence

Overall objective of financial reporting is to provide financial information useful to internal users in making economic decisions.()

For users, microkernel technology promises(11), compact and sophisticated operating systems that are typically(12) across a range of hardware platforms.A.quicklyB.speedC.slowD.fast

A department of users is reporting there are lines across their printouts. They have alreadychanged the toner cartridge but the issue remains. Which of the following is the BEST item for Karen, a technician, to inspect?()A、The fuser unit for damageB、The toner cartridge for proper seatingC、The tray pickup rollers for wearD、The registration assembly for damage

Which option provides a hierarchy of data security across lines of business?()A、AlertsB、Multi-OrgC、FlexfieldsD、Shared entitiesE、Business Intelligence

You are the administrator of a Windows Server 2003 computer named Server4.You install Terminal Services on Server4. You add users from the technical support department to the Power Users group and to the Remote Desktop Users group on Server4. You notice that Server4 is periodically unavailable. You open Event Viewer on Server4 and discover that theserver was restarted accidentally by users in the technical support department.You need to ensure that users in the technical support department can establish a Terminal Service session and can manage local user accounts on Server4 without having the ability to restart Server 4.Which action or actions should you perform?() (Choose all that apply.)A、Remove the technical support user accounts from the Power Users group.B、Remove the technical support user accounts from the Remote Desktop Users group.C、Remove the Power Users group from the Shut down the system user right.D、Add the Power Users group to the Deny log on locally user right.E、Modify the permissions on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission.

You administer a Windows 2000 Professional desktop computer. TKPrinter1 is a printer used by the engineering and research departments. The printer is shared from the Windows 2000 Professional computer that you administer. The engineering department frequently prints documents that are several pages in length, which takes a long time to print. Users in the research department who have small files to print often must wait a long time for their jobs to print. You want to reduce the time it takes for the user in research department to print their files. You want to accomplish this with the least amount of administrative effort.  What should you do?()A、Monitor the print queue, and raise the priority of all the print jobs that are sent by users who are not members of the engineering department.B、Delete the old printer. Add a new printer, and set the priority to a higher value. Pause the print queue only when the engineering print jobs are printing.C、Configure the priority of TKPrinter1 to 50. Add a new printer, and set the priority to 1. For the new printer, deny Print permission for users in the engineering department.D、Configure the priority of TKPrinter1 to 50. Add a new printer, and set the priority to 70. For the new printer, deny Print permission for users in the engineering department.

What are two common reporting requirements?()A、the database connectivity methodB、the number of users in the solutionC、the number of reports being installed D、ability to send completed reports by e-mailE、reporting output available in Microsoft Excel

You are the network administrator for Testking.com. The network consists of a single Active Directory domain named testking.com. The sales department is hiring employees. An OU named TestKingSales is created to hold objects for the new sales department users. Each sales department user has a portable computer. Each portable computer runs Windows XP Professional. The sales department users are responsible for joining their portable computers to the domain. You need to ensure that the computer accounts for the Sales department user's portable computers are created in the TestKingSales OU. You need to achieve this goal without granting any unnecessary permissions. What should you do?()A、Assign the sales department users the Allow - Read permissions for the Computer container.B、Configure the sales department users' user accounts to be trusted for delegationC、Prestage the computer accounts in the TestKingSales OU for the sales department users' portable computers.D、Assign the sales depertment users the Allow - Create all Child Objects permission for the TestKingSales OU.

Your network consists of Windows XP computers. All computers are joined to a single Active  Directory directory service domain and located in a single Active Directory site. You create a new Group  Policy object (GPO) and link it to the site. The policy configures default screensaver settings. User  accounts of users in the research department are located in an organizational unit (OU) named Research.  You need to allow users in the research department to configure a different screensaver setting on their  computers.  What should you do?()A、 Move the user accounts of users in the research department to the Users container.B、 Configure a local security policy on all computers in the research department to allow users to modify their screensaver settings.C、 Add users in the research department to a domain group. Allow the group the Apply Group Policy permission for the GPO.D、 Add users in the research department to a domain group. Deny the group the Apply Group Policy permission to the GPO.

You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003.  Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only.  All user accounts are located in the default Users container.  You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment.  What should you do?()A、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B、 Create a top­level OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.

You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A、Install wireless network cards on all accounting department computers. Select PEAP authenticationB、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

You are the network administrator for Among other duties you administer a Windows 2003 server named TestKingB. You install Terminal Services on TestKingB. You add users from the TestKing support department to the Power Users group and to the Remote Desktop Users group on TestKingB. You notice that TestKingB is periodically unavailable. You open Event Viewer on TestKingB and discover that the server was restarted accidentally by users in the TestKing support department. You need to ensure that users in the TestKing support department can establish a Terminal Services session and can manage local user accounts on TestKingB. However, they should not have the ability to restart TestKingB. Which action or actions should you perform? Select all that apply.()A、Remove the TestKing Support department user accounts from the Power Users group.B、Remove the TestKing Support department user accounts from the Remote Desktop Users group.C、Remove the Power Users group from the Shut down the system user right.D、Add the Power Users group to the Deny log on locally user right.E、Modify the permission on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission

Which result or results do these actions produce?()A、Users in both departments can access their files from the network.B、Users in the accounting department can view the legal department’s documents.C、Users in the legal department cannot view the accounting department’s documents.D、Company managers can access and modify both departments’ files.

You have an Exchange Server 2010 organization.  You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()A、A storage group for each department.B、A mailbox database for each department.C、An organizational unit for each department.D、A managed folder mailbox policy for each department.

You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()A、Users in both departments can access to their own files from the network.B、Users in the Accounting department can view the Legal department’s documents.C、Users in the Legal department cannot view the Accounting department’s documents.D、Company managers can access and modify both departments’ files.

You have an Exchange Server 2010 organization. Your company’s compliance policy states the following:.Delete e-mail messages sent to legal department users that are older than 180 days. .Delete e-mail messages sent to all other users that are older than 60 days You need to recommend a solution that meets the requirements of the compliance policy. What should you recommend?()A、Configure deleted item retention for all users.B、Configure Personal Archives for the legal department users.C、Create two Managed Folder mailbox policies. Use one policy for the legal department users. Use the other policy for all other users.D、Create two new message classifications. Use one message classification for the e-mails sent to legal department users. Use the other message classification for the e-mails sent to all other users.

You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?()A、Configure each application to run in a separate memory space.B、Configure each application to run in AboveNormal priority class.C、For each application, set the compatibility mode to Windows 95.  D、Configure processor affinity for each application to allow it to run on both processors.

单选题Which option provides a hierarchy of data security across lines of business?()AAlertsBMulti-OrgCFlexfieldsDShared entitiesEBusiness Intelligence

单选题You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()AUse error reporting on all servers in the development department to report errors for a custom applicationBConfigure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the serverCCreate a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log onDConfigure the screen saver on all servers in the development department to require a password

单选题You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.   After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers.   You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications.   What should you do?()AAdd each user account to the Power Users group on that user’s computer.BConfigure the financial and credit applications to run as services on the computers in the accounting department.CApply the Compatws.inf security template to the local security policy of the computers in the accounting department.DUse the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.

单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.  A new TestKing.com compliance policy requires that e-mail messages sent to the marketing users olderthan 150 days be deleted and e-mail messages sent to users in other departments are deleted after 90days. You receive an intruction from the CIO to recommend a solution to management that will complywith the eompliance policy. What should you do?()AYour best option would be to create two Managed Folder mailbox policies.You should then use one for users in the marketing department and the other for users in the other departmens.BYour best option would be configure deleted item retention for all testking.com users.CYour best option would be to create two new message classifications.You should then use one for e-mails sent to users in the marketing department and the other for e-mails sent to users in the other departments.DYour best option would be to configure Personal Archives for users in the marketing department.

单选题You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()AModify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesBModify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesCModify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2DModify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2

单选题You have an Exchange Server 2010 organization.  You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()AA storage group for each department.BA mailbox database for each department.CAn organizational unit for each department.DA managed folder mailbox policy for each department.

多选题You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()AUsers in both departments can access to their own files from the network.BUsers in the Accounting department can view the Legal department’s documents.CUsers in the Legal department cannot view the Accounting department’s documents.DCompany managers can access and modify both departments’ files.