网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A department of users is reporting there are lines across their printouts. They have alreadychanged the toner cartridge but the issue remains. Which of the following is the BEST item for Karen, a technician, to inspect?()

  • A、The fuser unit for damage
  • B、The toner cartridge for proper seating
  • C、The tray pickup rollers for wear
  • D、The registration assembly for damage

参考答案

更多 “A department of users is reporting there are lines across their printouts. They have alreadychanged the toner cartridge but the issue remains. Which of the following is the BEST item for Karen, a technician, to inspect?()A、The fuser unit for damageB、The toner cartridge for proper seatingC、The tray pickup rollers for wearD、The registration assembly for damage” 相关考题
考题 You are the administrator of a Windows 2000 network. You need to store secured files for your company's accounting and legal departments on a Windows 2000 Professional computer.You want to accomplish the following goals:1. Enable users in both departments to access their own files from the network2. Enable users in the accounting department to view the legal accounting department's documents3. Prevent users in the legal department from being able to view the accounting department's documents4. Enable managers within the company to access and modify both the accounting and the legal department's filesYou take the following actions:1. Create two shared folders named Accounting and Legal2. Create three groups named Accounting, Legal, and Management3. Allow the Accounting group modify permission on the Accounting folder4. Allow the Legal group modify permission on the Legal folders.5. Allow the Management group modify permission on both the Accounting and Legal folders.Which result or results do these actions produce? (Choose all that apply)A.Users in both departments can access to their own files from the network.B.Users in the accounting department can view the legal department's documents.C.Users in the legal department cannot view the accounting department's documents.D.Company managers can access and modify both departments' files.

考题 You are the administrator of a Windows 2000 Professional computer that has a shared printer. Several departments in your company use the shared printer.The Sales department frequently prints multiple-page presentation graphics, which take a long time to print. Users in other departments who have short messages to print must wait an unnecessarily long time for their jobs to print.You want to improve the efficiency of printing for all users who use the shared printer. You want to accomplish this with the least amount of administrative effort.What should you do?A.Configure the priority of the printer to 50. Add a new printer, and set the priority to 1. For the new printer, deny print permission for users in the Sales department.B.Configure the priority of the printer to 50. Add a new printer, and set the priority to 99. For the new printer, deny print permissions for users in the Sales department.C.Monitor the print queue and raise the priority of all print jobs that are sent by users who are not members of the Sales department.D.Delete the old printer. Add a new printer, and set the priority to a higher value. Pause the print queue only when graphic intensive print jobs are printing.

考题 You are the administrator of a Windows Server 2003 computer named Server4.You install Terminal Services on Server4. You add users from the technical support department to the Power Users group and to the Remote Desktop Users group on Server4. You notice that Server4 is periodically unavailable. You open Event Viewer on Server4 and discover that theserver was restarted accidentally by users in the technical support department.You need to ensure that users in the technical support department can establish a Terminal Service session and can manage local user accounts on Server4 without having the ability to restart Server 4.Which action or actions should you perform?() (Choose all that apply.)A、Remove the technical support user accounts from the Power Users group.B、Remove the technical support user accounts from the Remote Desktop Users group.C、Remove the Power Users group from the Shut down the system user right.D、Add the Power Users group to the Deny log on locally user right.E、Modify the permissions on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission.

考题 You administer a Windows 2000 Professional desktop computer. TKPrinter1 is a printer used by the engineering and research departments. The printer is shared from the Windows 2000 Professional computer that you administer. The engineering department frequently prints documents that are several pages in length, which takes a long time to print. Users in the research department who have small files to print often must wait a long time for their jobs to print. You want to reduce the time it takes for the user in research department to print their files. You want to accomplish this with the least amount of administrative effort.  What should you do?()A、Monitor the print queue, and raise the priority of all the print jobs that are sent by users who are not members of the engineering department.B、Delete the old printer. Add a new printer, and set the priority to a higher value. Pause the print queue only when the engineering print jobs are printing.C、Configure the priority of TKPrinter1 to 50. Add a new printer, and set the priority to 1. For the new printer, deny Print permission for users in the engineering department.D、Configure the priority of TKPrinter1 to 50. Add a new printer, and set the priority to 70. For the new printer, deny Print permission for users in the engineering department.

考题 You are the network administrator for Testking.com. The network consists of a single Active Directory domain named testking.com. The sales department is hiring employees. An OU named TestKingSales is created to hold objects for the new sales department users. Each sales department user has a portable computer. Each portable computer runs Windows XP Professional. The sales department users are responsible for joining their portable computers to the domain. You need to ensure that the computer accounts for the Sales department user's portable computers are created in the TestKingSales OU. You need to achieve this goal without granting any unnecessary permissions. What should you do?()A、Assign the sales department users the Allow - Read permissions for the Computer container.B、Configure the sales department users' user accounts to be trusted for delegationC、Prestage the computer accounts in the TestKingSales OU for the sales department users' portable computers.D、Assign the sales depertment users the Allow - Create all Child Objects permission for the TestKingSales OU.

考题 Your network consists of Windows XP computers. All computers are joined to a single Active  Directory directory service domain and located in a single Active Directory site. You create a new Group  Policy object (GPO) and link it to the site. The policy configures default screensaver settings. User  accounts of users in the research department are located in an organizational unit (OU) named Research.  You need to allow users in the research department to configure a different screensaver setting on their  computers.  What should you do?()A、 Move the user accounts of users in the research department to the Users container.B、 Configure a local security policy on all computers in the research department to allow users to modify their screensaver settings.C、 Add users in the research department to a domain group. Allow the group the Apply Group Policy permission for the GPO.D、 Add users in the research department to a domain group. Deny the group the Apply Group Policy permission to the GPO.

考题 You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003.  Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only.  All user accounts are located in the default Users container.  You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment.  What should you do?()A、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B、 Create a top­level OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.

考题 You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A、Install wireless network cards on all accounting department computers. Select PEAP authenticationB、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

考题 You are the network administrator for Among other duties you administer a Windows 2003 server named TestKingB. You install Terminal Services on TestKingB. You add users from the TestKing support department to the Power Users group and to the Remote Desktop Users group on TestKingB. You notice that TestKingB is periodically unavailable. You open Event Viewer on TestKingB and discover that the server was restarted accidentally by users in the TestKing support department. You need to ensure that users in the TestKing support department can establish a Terminal Services session and can manage local user accounts on TestKingB. However, they should not have the ability to restart TestKingB. Which action or actions should you perform? Select all that apply.()A、Remove the TestKing Support department user accounts from the Power Users group.B、Remove the TestKing Support department user accounts from the Remote Desktop Users group.C、Remove the Power Users group from the Shut down the system user right.D、Add the Power Users group to the Deny log on locally user right.E、Modify the permission on the RDP-Tcp connection by using Terminal Services Configuration. Assign the Power Users group the Deny - Full Control permission

考题 Which result or results do these actions produce?()A、Users in both departments can access their files from the network.B、Users in the accounting department can view the legal department’s documents.C、Users in the legal department cannot view the accounting department’s documents.D、Company managers can access and modify both departments’ files.

考题 You have an Exchange Server 2010 organization.  You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()A、A storage group for each department.B、A mailbox database for each department.C、An organizational unit for each department.D、A managed folder mailbox policy for each department.

考题 You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()A、Users in both departments can access to their own files from the network.B、Users in the Accounting department can view the Legal department’s documents.C、Users in the Legal department cannot view the Accounting department’s documents.D、Company managers can access and modify both departments’ files.

考题 You are the administrator of your company’s network. The software department is preparing to rewrite an accounting application so that it will run on Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98.  You want to configure the computers in the software department so that the users can use both Windows 98 and Windows 2000 Professional during the project. You also want to ensure that the computers are configured for optimal disk performance. In addition you want to ensure that users in the software department can access all of the files on their computers by using either operating system.  What should you do? ()A、 Create and format a FAT 32 partition.B、 Create and format an NTFS volume.C、 Configure Windows 2000 Professional to enable disk compression.D、 Configure Windows 2000 Professional to enable dynamic volume

考题 You have an Exchange Server 2010 organization. Your company’s compliance policy states the following:.Delete e-mail messages sent to legal department users that are older than 180 days. .Delete e-mail messages sent to all other users that are older than 60 days You need to recommend a solution that meets the requirements of the compliance policy. What should you recommend?()A、Configure deleted item retention for all users.B、Configure Personal Archives for the legal department users.C、Create two Managed Folder mailbox policies. Use one policy for the legal department users. Use the other policy for all other users.D、Create two new message classifications. Use one message classification for the e-mails sent to legal department users. Use the other message classification for the e-mails sent to all other users.

考题 You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?()A、Configure each application to run in a separate memory space.B、Configure each application to run in AboveNormal priority class.C、For each application, set the compatibility mode to Windows 95.  D、Configure processor affinity for each application to allow it to run on both processors.

考题 单选题You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()A Use error reporting on all servers in the development department to report errors for a custom applicationB Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the serverC Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log onD Configure the screen saver on all servers in the development department to require a password

考题 单选题You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.   After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers.   You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications.   What should you do?()A Add each user account to the Power Users group on that user’s computer.B Configure the financial and credit applications to run as services on the computers in the accounting department.C Apply the Compatws.inf security template to the local security policy of the computers in the accounting department.D Use the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.

考题 单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. TestKing.com has its headquarters in Stockholm where you are located.  A new TestKing.com compliance policy requires that e-mail messages sent to the marketing users olderthan 150 days be deleted and e-mail messages sent to users in other departments are deleted after 90days. You receive an intruction from the CIO to recommend a solution to management that will complywith the eompliance policy. What should you do?()A Your best option would be to create two Managed Folder mailbox policies.You should then use one for users in the marketing department and the other for users in the other departmens.B Your best option would be configure deleted item retention for all testking.com users.C Your best option would be to create two new message classifications.You should then use one for e-mails sent to users in the marketing department and the other for e-mails sent to users in the other departments.D Your best option would be to configure Personal Archives for users in the marketing department.

考题 单选题You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()A Modify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesB Modify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesC Modify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2D Modify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2

考题 单选题You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003.  Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only.  All user accounts are located in the default Users container.  You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment.  What should you do?()A  Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B  Create a top­level OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C  Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D  Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.

考题 单选题You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute three custom applications to the department's Windows XP Professional computers. She deploys these applications by using Group Policy. Some users report that they must log on several times before the newly deployed applications are present on their computers. You need to ensure that all software is deployed the next time the users log on. What should you do?()A Enable the Always wait for the network at computer startup and logon policy.B Enable the Always use classic logon policy. C Enable the Turn off background refresh of Group Policy policy.D Enable the Group Policy slow link detection policy. 

考题 单选题You have an Exchange Server 2010 organization.  You need to recommend a mailbox storage management solution for your organization to meet thefollowing requirements: .Apply quota limits for users by department.Automatically apply quota limits for new users What should you recommend?()A A storage group for each department.B A mailbox database for each department.C An organizational unit for each department.D A managed folder mailbox policy for each department.

考题 多选题You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()AUsers in both departments can access to their own files from the network.BUsers in the Accounting department can view the Legal department’s documents.CUsers in the Legal department cannot view the Accounting department’s documents.DCompany managers can access and modify both departments’ files.

考题 单选题You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department.   On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()A Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.B Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.C Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.D Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.

考题 单选题You are the administrator of 15 Windows XP Professional portable computers in the sales department of your ompany. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?()A Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).C Add a script to the users' desktops that changes the IP configuration between dynamic and manual.D Configure the IP properties of the portable computers so that they have an alternate configuration.