网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()
A

Map a network drive to the AccSecured/intern folder from Richard’s computer.

B

Map a network drive to the AccSecured shared folder from Richard’s computer.

C

Allow the intern user account modify permissions on the intern subfolder.

D

Allow the intern user account traverse folder/execute file permission on the AccSecured folder.

E

Allow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.


参考答案

参考解析
解析: The traverse folder/execute file permission” enables Richard to traverse the AccSecured folder to reach the intern folder, while the modify permissions on the intern folder allow Richard to modify information in the intern subfolder.
更多 “多选题You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()AMap a network drive to the AccSecured/intern folder from Richard’s computer.BMap a network drive to the AccSecured shared folder from Richard’s computer.CAllow the intern user account modify permissions on the intern subfolder.DAllow the intern user account traverse folder/execute file permission on the AccSecured folder.EAllow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.” 相关考题
考题 You have a file serve that runs windows server 2008. The serve has a shared folder. You need to receive a notification when a user stores more than 500MB of data in the shared folder. You must allow users to store more than 500MB of data in the shared folder.What should you do?()A.Create a soft quota.B.Create a hard quota.C.Create an active screening file screen.D.Create a passive screening file screen.

考题 You are the administrator of a SQL Server 2000 computer. The server contains confidential information about contracts on which your company has placed bids.Company policy requires that bid information be removed permanently from the database one year after the bid closes. You need to comply with this policy and minimize server overhead.What should you do?A.Create a Data Transformation Services (DTS) package to remove bids that have a closing data older than one year.B.Create a trigger to delete any bids that have a closing data older than one year. Bind the trigger to the bids table for all INSERT, UPDATE, and DELETE events.C.Create a stored procedure to delete any bids that have a closing data order than one year. Use SQL server agent to schedule the stored procedure to run every night.D.Create a view that contains a WHERE clause to exclude bids that have a closing date older than one year.

考题 You are the administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of Ezonexam.com's client computers are connected to this server.A shared folder named Data on the server is on an NTFS partition. The data folder contains more than 200 files. The permissions for the data folder are shown in the following table.Type of permission Account PermissionShare Users ChangeNTFS Users Full ControlYou discover that users are connected to the Data folder. You have an immediate need to prevent 10 of the files in the Data folder from being modified. You want your actions to have the smallest possible effects on the users who are using other files on the server.What two actions should you take? (Choose Two)A.Modify the NTFS permissions for the 10 files.B.Modify the NTFS permissions for the Data folder.C.Modify the shared permissions for the Data folder.D.Log off the users from the network.E.Disconnect the users from the Data folder.

考题 Please put up your hands if you have any questions.A:raise B:reach C:wave D:fold

考题 A customer is planning to migrate a financial application to a 12-way p5-570 system with 96GB of memory.  The application data is stored on an ESS Model 800 attached to a p670 server with AIX 5.2.  They will have a short outage window to perform the data migration.  What is the quickest way to move all the data stored on the attached ESS from the p670 to the new p5-570?()A、Use rsync to synchronize the data across servers.B、Use exportvg and importvg to move the data to the target system.C、Use NFS to copy the data from the source system to the target system.D、Backup the data from the source system and restore to the target system.

考题 You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

考题 Your network consists of a single Active Directory domain. All network servers run Windows Server2003 Service Pack 2 (SP2).Your organization has a storage area network (SAN). All shared folders on file servers are stored on theSAN.The Change permission for all shared folders is assigned to Domain Users. Different NTFS permissionsare also applied to the shared folders.You perform a daily full backup of all the files stored in the shared folders.A file server fails and requires several hours to repair.You need to provide users access to the shared folders that were on the failed file server as quickly aspossible. Existing permissions must be retained for all files.What should you do? ()A、Attach an existing file server to the SAN storage locations. Configure the shared folders on the server.B、Attach an existing file server to the SAN storage locations. Configure NTFS permissions for the folders.C、On an existing file server, restore the data from the tape backup. Configure NTFS permissions for the folders.D、On an existing file server, restore the data from the tape backup. Configure the shared folders on the server.

考题 Your company has a single active directory domain. All servers run windows server 2008. The company network has 10 servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network, you notice that the confidential files are stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()A、Deactivate all LM and NTLM authentication methods on the FSS1 server.B、Use IIS to publish the confidentials files. Activate SSL on the ISS server, and then open the files as a web folder.C、Use IPSec encryption between the FSS 1 server and the computers of the users who need to access the confidential files.D、Use the server messager block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.E、Activate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties dialog box, select the encrypt contents to secure data option.

考题 You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notification when a user stores more than 500 MB of data in the shared folder. You must allow users to store more than 500 MB of data in the shared folder. What should you do? ()A、Create a soft quota.B、Create a hard quota.C、Create an Active Screening File Screen.D、Create a Passive Screening File Screen.

考题 You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All TestKing data is stored in shared folders on network file servers. The data for each department is stored in a departmental shared folder. Users in each department are members of the departmental global group. Each departmental global group is assigned the Allow - Full Control permission for the corresponding departmental shared folder. TestKing requirements state that all access to shared folders must be configured by using global groups. A user named Dr King works in the sales department. Dr King needs to be able to modify files in the Marketing shared folder. You need to ensure that Dr King has the minimum permissions for the Marketing shared folder that he needs to do his job. You need to achieve this goal while meeting TestKing requirements and without granting unnecessary permissions. What should you do?()A、Add Dr King's user account to the Marketing global group.B、Assign the Sales global group the Allow - Change permission for the Marketing shared folder.C、Create a new global group. Add Dr King' user account to the group.Assign the new global group the Allow - Change permission for the Marketing shared folder.D、Assign Dr King's user account the Allow - Change permission for the Marketing shared folder.

考题 You need to cleanse and standardize the data on potential survey participants prior to inserting it into the staging database. What should you do?()A、Import the data into a staging table by using the OPENROWSET BULK statement. Execute a Transact-SQL stored procedure to cleanse the data and to insert the data into the database.B、Import the data into a staging table by using the BULK INSERT statement. Execute a Transact-SQL stored procedure to cleanse the data and to insert the data into the database.C、Create a SQL Server Integration Services (SSIS) package to import, standardize, and cleanse the data.D、Create a CLR stored procedure to import the data into a staging table, to cleanse and standardize the data, and to insert the data into the database.

考题 All consultants belong to a global group named TempWorkers.     You place three file servers in a new organizational unit named SecureServers. The three file  servers contain confidential data located in shared folders.     You need to record any failed attempts made by the consultants to access the confidential data.     Which two actions should you perform()A、Create and link a new GPO to the SecureServers organizational unit. Configure the Audit privilege use Failure audiB、Create and link a new GPO to the SecureServers organizational unit. Configure the Audit object access Failure audC、Create and link a new GPO to the SecureServers organizational unit. Configure the Deny access to this computer fD、On each shared folder on the three file servers, add the three servers to the Auditing tab.  Configure the Failed Full control setting in the Auditing Entry dialog box.E、On each shared folder on the three file servers, add the TempWorkers global group to the Auditing tab. Configure th

考题 You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()A、Map a network drive to the AccSecured/intern folder from Richard’s computer.B、Map a network drive to the AccSecured shared folder from Richard’s computer.C、Allow the intern user account modify permissions on the intern subfolder.D、Allow the intern user account traverse folder/execute file permission on the AccSecured folder.E、Allow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.

考题 You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notifcation when a user stores more than 500MB of data int he shared folder. You must allow users to store more than 500MB of data in the shared folder.  What should you do()?  A、Create a soft quotaB、Create a hard quotaC、create an active screening file screenD、create a passive screening file screen

考题 You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A、Use Windows Explorer to receive the offline filesB、Using the Windows Explorer, disable the cache for the reports on the network shareC、Use the Windows NT explorer to grant the special access for the reports on the network  shareD、Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 多选题Some data storage and transfer media have fixed-length physical records.  When the data records are short, more then one can be stored in a single, physical record to use the storage space efficiently. Consider this data:   1119 Smith 1120 Yvonne 1121 Albert 1130 Thomas   Which two statements can you use to load the data into the EMP table?()AABBCCDD

考题 单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A Encrypt customer information when it is stored and when it is being transmittedB Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC Encrypt all marketing information on file servers and client computersD Require encrypted connections to all file servers

考题 多选题You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal?() (Each correct answer presents a complete solution. Choose two)AEnable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.BUse IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.CUse Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.DDisable all LM and NTLM authentication methods on TestKing1.EUse IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.

考题 单选题You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A Control Panel  Data Sources (ODBC).B Control Panel  System Tools  Shared Folders.C Computer Management  System Tools  System Information.D Computer Management  System Tools  Shared Folders  Open Files.E Computer Management  System Tools  Shared Folders  Sessions.F Computer Management  System Tools  Shared Folders  Shares.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All company data is stored in shared folders on network file servers. The data for each department is stored in a departmental shared folder. Users in each department are members of the departmental global group. Each departmental global group is assigned the Allow - Full Control permission for the corresponding departmental shared folder. Company requirements state that all access to shared folders must be configured by using global groups. A user named Richard works in the sales department. Richard needs to be able to modify files in the Marketing shared folder. You need to ensure that Richard has the minimum permissions for the Marketing shared folder that he needs to do his job. You need to achieve this goal while meeting company requirements and without granting unnecessary permissions. What should you do? ()A Add Richard's user account to the Marketing global group.B Assign the Sales global group the Allow - Change permission for the Marketing shared folder.C Create a new global group. Add Richard's user account to the group. Assign the new global group the Allow - Change permission for the Marketing shared folder.D Assign Richard's user account the Allow - Change permission for the Marketing shared folder.

考题 单选题You need to ensure that old data and current data can be queried according to the business requirements. What should you do?()A Specify a view based on the archival data table and current data tables.B Specify that the data must be queried by using a stored procedure.C Specify that both the archival data table and the current data tables must have indexes created on the same columns.D Specify that a SQL Server Agent job must be used to copy current data into the archival data table each night.

考题 多选题Your company has a single active directory domain. All servers run windows server 2008. The company network has servers that perform as web servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always used when the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()ADeactivate all LM and NTLM authentication methods on FSS1 server.BUse IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folder.CUse IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.DUse the server message block (SMB) signing between the FSS1 serve and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the folder advanced properties box, select the encrypt contents to secure data option.

考题 多选题Your company has a single Active Directory domain. All servers run Windows Server 2008. The company network has servers that perform as Web Servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always usedwhen the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()ADeactivate all LM and NTLM authentication methods on FSS1 serverBUse IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folderCUse IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.DUse the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the Folder avanced Properties box, select the Encrypt contents to secure data optiion