网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()
A

Set folder permissions to 760.

B

Set folder permissions to 770.

C

Set folder permissions to modify

D

Set folder permissions to full control


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A Set folder permissions to 760.B Set folder permissions to 770.C Set folder permissions to modifyD Set folder permissions to full control” 相关考题
考题 One of the file servers in the domain is a Windows 2000 Server computer named Ezonexamfiles.Ezonexamfiles contains a shared folder named Accounting, which is used to store data for the company's accounts payable department.The permissions on the Accounting folder are configured as shown in the following table.Mr. King is an employee in the operations department. He uses a Windows 2000 Professional client computer. His manager requests that King be granted access to the files in the Accounting folder.You add King's user account to the AcctPay domain local group, but he still cannot access the files in the Accounting folder.You need to ensure that King can access the files. What should you do?A.Instruct King to log off his computer and log on again.B.Move King's user account to the same Active Directory organizational unit (OU) as Ezonexamfiles.C.Modify the NTFS permissions on the Accounting folder to grant King Full Control permissions.D.Modify the NTFS permissions on the Accounting folder to grant the AcctPay domain local group Full Control permission.

考题 A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read

考题 A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A. Set folder permissions to 760.B. Set folder permissions to 770.C. Set folder permissions to modifyD. Set folder permissions to full control

考题 Which command will configure a directory /commonfiles so that a user cannot delete files owned by other users in the same group?() A.chmod +S /commonfilesB.chmod 4775 /commonfilesC.chmod 1777 /commonfilesD.chmod -orgx /commonfiles

考题 You are the network administrator for The network consists of a single Active Directory domain named.You configure a new Windows Server 2003 file server named TestKingSrv1.You restore user files from a tape backup, and you create a logon script that maps driveletters to shared files on TestKingSrv1.Users report that they cannot access TestKingSrv1 through the drive mappings youcreated. Users also report that TestKingSrv1 does not appear in My NetworkPlaces.You log on to TestKingSrv1 and confirm that the files are present and that theNTFS permissions and share permissions are correct. You cannot access anynetwork resources. You run the ipconfig command and see the following output.You need to configure the TCP/IP properties on TestKingSrv1 to resolve theproblem.What should you do?()A. Add testking.com to the DNS suffix for this connection field.B. Configure the default gateway.C. Configure the DNS server address.D. Configure a static IP address.

考题 A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A、 Set folder permissions to 760.B、 Set folder permissions to 770.C、 Set folder permissions to modify.D、 Set folder permissions to full control.

考题 A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

考题 A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A、 That there are no DHCP relay serversB、 That the user account on Active Directory is not lockedC、 That the network card driver is not installed incorrectlyD、 The network connection is functioning

考题 Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A、AdministratorB、UserC、GuestD、Power user

考题 Which of the following BEST describes the purpose of user account control (UAC) in WindowsVista?()A、UAC ensures that standard users cannot access the files and folders of administrative users.B、UAC allows a computer administrator to add new user accounts to the system, configure passwords and settings for existing users, or remove existing user accounts.C、UAC ensures that viruses and other malware cannot infect the computer, eliminating the need for third-party antivirus solutions.D、UAC ensures that important changes cannot be made to Windows Vista without the permission of a computer administrator.

考题 After moving files from one folder to another, the technician cannot access them. Which of the following MUST the technician do to regain access to these files?()A、In folder options, select show hidden files and folders.B、Perform the transfer again.C、Reboot the system; access will be reset automatically.D、Take ownership of the files.

考题 Which command will configure a directory /commonfiles so that a user cannot delete files owned by other users in the same group?()A、chmod +S /commonfilesB、chmod 4775 /commonfilesC、chmod 1777 /commonfilesD、chmod -orgx /commonfiles

考题 Examine the command: SQL ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()A、The SKD user cannot log in to the database instance.B、The objects owned by the SKD user are not accessible to any user.C、The other users can access the objects owned by the SKD user, on which they have access.D、The password for the SKD user expires and the user is forced to change the password at the next log in

考题 You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer.  Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.  What should you do? ()A、Grant Paul NTFS permission so that he can access any parent folder to files in the shared   folder.B、Share the Sales folder and grant Paul shared folder permission to access the shared Sales   folder.C、Remove Paul from any other group that has been explicitly denied access to the Sales folder. D、Delete the Sales local group and recreate it. Add individual user accounts from the Sales   Department back into Sales local group.

考题 You have a computer that runs Windows XP Professional. Five users share the computer. A user named User1 is a member of the Power Users group and the Administrators group. User1 has encrypted files on the computer. User1 takes an extended leave of absence. You need to ensure that users cannot access the computer as User1. You must be able to provide User1 access to the files upon User1’s return. What should you do?() A、Disable the User1 account.B、Add User1 to the Guests group. C、Reset the password for the User1 account. D、Rename ntuser.dat as ntuser.man in the User1 user profile.

考题 单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A Set folder permissions to 760.B Set folder permissions to 770.C Set folder permissions to modifyD Set folder permissions to full control

考题 单选题A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A  That there are no DHCP relay serversB  That the user account on Active Directory is not lockedC  That the network card driver is not installed incorrectlyD  The network connection is functioning

考题 多选题Which two about WAR files are true?()AWAR files must be located in the web application library directory.BWAR files must contain the web application deployment descriptor.CWAR files must be created by using archive tools designed specifically for that purpose.DThe web container must serve the content of any META-INF directory located in a WAR file.EThe web container must allow access to resources in JARs in the web application library directory.

考题 单选题How can permissions be set up on /tmp so that a user cannot delete another user’s files?()A chmod +s /tmpB chmod 775 /tmpC chmod 1777 /tmpD chmod 4755 /tmp

考题 多选题Examine the command: SQL ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()AThe SKD user cannot log in to the database instance.BThe objects owned by the SKD user are not accessible to any user.CThe other users can access the objects owned by the SKD user, on which they have access.DThe password for the SKD user expires and the user is forced to change the password at the next log in

考题 单选题After moving files from one folder to another, the technician cannot access them. Which of the following MUST the technician do to regain access to these files?()A In folder options, select show hidden files and folders.B Perform the transfer again.C Reboot the system; access will be reset automatically.D Take ownership of the files.

考题 单选题An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()A Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.B Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.C Ensure that merge roles is selected in the role-mapping rules.D Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.

考题 单选题You are the network administrator for Company and you support the portable computer users. An Account Executive named Hildegard frequently travels to meet with customers and uses her portable computer to demonstrate the company’s new software products.  Hildegard needs to update these products frequently so customers can evaluate the latest software releases. You need to allow Hildegard to install the product updates while limiting her ability to perform  ther administrative duties on her portable computer.  What should you do? ()A  Add Hildegard’s user accounts to the Pre-Windows 2000 Compatible Access group.B  Add Hildegard’s user account to the local Power Users group.C  Allow Hildegard’s user account Full Control permission to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.D  Allow Hildegard’s user account Write permissions to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.

考题 单选题How can permissions be set up on /tmp so that one user in a group cannot delete another user’s files in that same group()A chmod +s /tmpB chmod 755 /tmpC chmod 1777 /tmpD chmod 4755 /tmp

考题 单选题Saul needs access to files that are in the Accounting folder on his computer. A local group named accounting is granted full control permission to the accounting folder and the files within it. Saul is a member of the accounting local group but he cannot access the files that he needs.  What should you do?()A Grant Saul NTFS permission so that he can access any parent folder or files in the shared sales folder.B Share the Sales folder and grant Saul shared folder permission to access the shared sales folder.C Remove Saul from any other groups that have been explicitly denied access to the accounting folder.D Delete the Sales local group and recreate, add individual user accounts from the sales department back into sales local group.

考题 单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()A  Set folder permissions to 760.B  Set folder permissions to 770.C  Set folder permissions to modify.D  Set folder permissions to full control.

考题 多选题A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()APerform a policy trace for the specific user and review the output to isolate the problem.BReview the Events log.CReview the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.DReview the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.