单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A Set folder permissions to 760.B Set folder permissions to 770.C Set folder permissions to modify.D Set folder permissions to full control.

单选题
A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()
A

 Set folder permissions to 760.

B

 Set folder permissions to 770.

C

 Set folder permissions to modify.

D

 Set folder permissions to full control.


参考解析

解析: 暂无解析

相关考题:

One of the file servers in the domain is a Windows 2000 Server computer named Ezonexamfiles.Ezonexamfiles contains a shared folder named Accounting, which is used to store data for the company's accounts payable department.The permissions on the Accounting folder are configured as shown in the following table.Mr. King is an employee in the operations department. He uses a Windows 2000 Professional client computer. His manager requests that King be granted access to the files in the Accounting folder.You add King's user account to the AcctPay domain local group, but he still cannot access the files in the Accounting folder.You need to ensure that King can access the files. What should you do?A.Instruct King to log off his computer and log on again.B.Move King's user account to the same Active Directory organizational unit (OU) as Ezonexamfiles.C.Modify the NTFS permissions on the Accounting folder to grant King Full Control permissions.D.Modify the NTFS permissions on the Accounting folder to grant the AcctPay domain local group Full Control permission.

A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read

A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A. Set folder permissions to 760.B. Set folder permissions to 770.C. Set folder permissions to modifyD. Set folder permissions to full control

User2 is complaining that he is unable to list the contents of a directory. What is the most likely cause?() A. User2 needs write permission to the directory.B. User2 needs both read and write permissions to the directory.C. User2 needs both read and execute permissions to the directory.D. User2 needs both write and execute permissions to the directory.

A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()A、Request the user to logoff and log back on.B、Add the user as an administrator on their local machine.C、Add the user as an administrator on the server.D、Run an ipconfig /renew on the user’s machine.

A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、 Set folder permissions to 760.B、 Set folder permissions to 770.C、 Set folder permissions to modify.D、 Set folder permissions to full control.

Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A、 Configure a directory service access audit policy. Increase the maximum size of the security log.B、 Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C、 Configure an object access audit policy for the directory. Increase the maximum size of the system log.D、 Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、Set folder permissions to 760.B、Set folder permissions to 770.C、Set folder permissions to modifyD、Set folder permissions to full control

A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A、 That there are no DHCP relay serversB、 That the user account on Active Directory is not lockedC、 That the network card driver is not installed incorrectlyD、 The network connection is functioning

User2 is complaining that he is unable to list the contents of a directory. What is the most likely cause?()A、User2 needs write permission to the directory.B、User2 needs both read and write permissions to the directory.C、User2 needs both read and execute permissions to the directory.D、User2 needs both write and execute permissions to the directory.

A user would like their shell prompt to reflect the current directory. Which of the following environment variables can be set to accomplish this?()A、PS1B、PATHC、PROMPTD、LOCPATH

You are the network administrator for ExamSheet and you support the portable computer users. An Account Executive named Hildegard frequently travels to meet with customers and uses her portable computer to demonstrate the company’s new software products.  Hildegard needs to update these products frequently so customers can evaluate the latest software releases. You need to allow Hildegard to install the product updates while limiting her ability to perform other administrative duties on her portable computer. What should you do?()A、Add Hildegard’s user accounts to the Pre-Windows 2000 Compatible Access  group. B、Add Hildegard’s user account to the local Power Users group. C、Allow Hildegard’s user account Full Control permission to the Program Files  folder.  Propagate the permissions to all the subdirectories and files in that directory. D、Allow Hildegard’s user account Write permissions to the Program Files folder.  Propagate the permissions to all the subdirectories and files in that directory.

You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer.  Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.  What should you do? ()A、Grant Paul NTFS permission so that he can access any parent folder to files in the shared   folder.B、Share the Sales folder and grant Paul shared folder permission to access the shared Sales   folder.C、Remove Paul from any other group that has been explicitly denied access to the Sales folder. D、Delete the Sales local group and recreate it. Add individual user accounts from the Sales   Department back into Sales local group.

You are the network administrator for Company and you support the portable computer users. An Account Executive named Hildegard frequently travels to meet with customers and uses her portable computer to demonstrate the company’s new software products.  Hildegard needs to update these products frequently so customers can evaluate the latest software releases. You need to allow Hildegard to install the product updates while limiting her ability to perform  ther administrative duties on her portable computer.  What should you do? ()A、 Add Hildegard’s user accounts to the Pre-Windows 2000 Compatible Access group.B、 Add Hildegard’s user account to the local Power Users group.C、 Allow Hildegard’s user account Full Control permission to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.D、 Allow Hildegard’s user account Write permissions to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.

单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()ASet folder permissions to 760.BSet folder permissions to 770.CSet folder permissions to modifyDSet folder permissions to full control

单选题User2 is complaining that he is unable to list the contents of a directory. What is the most likely cause?()AUser2 needs write permission to the directory.BUser2 needs both read and write permissions to the directory.CUser2 needs both read and execute permissions to the directory.DUser2 needs both write and execute permissions to the directory.

单选题Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A Configure a directory service access audit policy. Increase the maximum size of the security log.B Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C Configure an object access audit policy for the directory. Increase the maximum size of the system log.D Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

单选题A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A That there are no DHCP relay serversB That the user account on Active Directory is not lockedC That the network card driver is not installed incorrectlyD The network connection is functioning

单选题A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()ARequest the user to logoff and log back on.BAdd the user as an administrator on their local machine.CAdd the user as an administrator on the server.DRun an ipconfig /renew on the user’s machine.

单选题You are the network administrator for Company and you support the portable computer users. An Account Executive named Hildegard frequently travels to meet with customers and uses her portable computer to demonstrate the company’s new software products.  Hildegard needs to update these products frequently so customers can evaluate the latest software releases. You need to allow Hildegard to install the product updates while limiting her ability to perform  ther administrative duties on her portable computer.  What should you do? ()A Add Hildegard’s user accounts to the Pre-Windows 2000 Compatible Access group.B Add Hildegard’s user account to the local Power Users group.C Allow Hildegard’s user account Full Control permission to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.D Allow Hildegard’s user account Write permissions to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.

单选题You are the network administrator for ExamSheet and you support the portable computer users. An Account Executive named Hildegard frequently travels to meet with customers and uses her portable computer to demonstrate the company’s new software products.  Hildegard needs to update these products frequently so customers can evaluate the latest software releases. You need to allow Hildegard to install the product updates while limiting her ability to perform other administrative duties on her portable computer. What should you do?()AAdd Hildegard’s user accounts to the Pre-Windows 2000 Compatible Access  group. BAdd Hildegard’s user account to the local Power Users group. CAllow Hildegard’s user account Full Control permission to the Program Files  folder.  Propagate the permissions to all the subdirectories and files in that directory. DAllow Hildegard’s user account Write permissions to the Program Files folder.  Propagate the permissions to all the subdirectories and files in that directory.

单选题A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()AModifyBFull controlCWriteDRead

单选题You install a read-only domain controller (RODC) named RODC1.   You need to ensure that a user named User1 can administer RODC1. The solution must minimize the number of permissions assigned to User1.   Which tool should you use()AActive Directory Administrative CenterBActive Directory Users and ComputersCDsaddDDsmgmt

单选题You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer.  Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.  What should you do? ()AGrant Paul NTFS permission so that he can access any parent folder to files in the shared   folder.BShare the Sales folder and grant Paul shared folder permission to access the shared Sales   folder.CRemove Paul from any other group that has been explicitly denied access to the Sales folder. DDelete the Sales local group and recreate it. Add individual user accounts from the Sales   Department back into Sales local group.

单选题A user would like their shell prompt to reflect the current directory. Which of the following environment variables can be set to accomplish this?()APS1BPATHCPROMPTDLOCPATH

单选题You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Testking32 contains a folder that is shared as ManagerData$. A global group named AllManagers has permission to access the shared folder. A user reports that he needs access to the ManagerData$ shared folder. You add his user account to the All Managers global group. When the user attempts to connect to the shared folder by typing //Testking32/ManagerData$/ , he receives the following error message: "//Testking32/ManagerData$/ is not accessible. You might not have permissions to use the network resource. Contact the administrator of this server to find out if you have access permissions. Access is denied. You need to ensure that the user can access the ManagerData$ shared folder on Testking32. What should you do?()AInstruct the user to type //Testking32/ManagerData/ when he attempts to access the folder.BAdd the Anonymous Logon group to the ACL for the ManagerData$ shared folder.CSelect the Replace permission entries on all child object with entries shown here that apply to child objects check box.DInstruct the user to log off and log on again before he accesses the folder.