网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
bill has an author names field named all editors that calculates a list of possible editors of the doc based on values users has entered into another field. The list only contains users’ first and last names, and only should be displayed to users who can edit doc.Which of the following hide-when formulas should bill use to control the display of the field?()
A

 @isnotmember(alleditors,@username) 

B

 @isnotmember(@name([cn]);@username) 

C

 @isnotmember(alleditors;@name([cn ];@username)) 

D

 if(@isnotmember(alleditors;@name([cn];@username);@true;@false))


参考答案

参考解析
解析: 暂无解析
更多 “单选题bill has an author names field named all editors that calculates a list of possible editors of the doc based on values users has entered into another field. The list only contains users’ first and last names, and only should be displayed to users who can edit doc.Which of the following hide-when formulas should bill use to control the display of the field?()A  @isnotmember(alleditors,@username) B  @isnotmember(@name([cn]);@username) C  @isnotmember(alleditors;@name([cn ];@username)) D  if(@isnotmember(alleditors;@name([cn];@username);@true;@false))” 相关考题
考题 Which of the following statements about internet is (are) correct?Ⅰ.Each host in internet only has a IP address.Ⅱ.It is possible to have multiple names corresponding to the same IP address.Ⅲ.In users' points, Internet means a virtual network.A.NoneB.Ⅰ and ⅡC.Ⅱ and ⅢD.All

考题 An Organization 2010 has 2 Mailbox Servers named Server1 and Server2.Each one has Mailbox Database and 1 Public Folder Database.All users create Public Folders on Server1 only.You need to ensure that all users create Public Folder on Server2 only.What should you do?()A、Move all Mailboxes to Server2B、Remove all Public Folder replicas from Server1C、Modify properties of both Mailbox DatabasesD、Modify properties of both Public Folder Databases

考题 Which one of the following describes who will be able to see an existing doc that contains a readers field ?()A、only those people listed in the access listB、anyone listed as a reader or above in the aclC、only those people list in the readers fieldD、anyone list as a reader or above in the acl and who is also list in the readers field

考题 Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a member server named Server1. Server1 has the File Server server role installed. On Server1, you create a share named Documents. The Documents share will contain the files and folders of all users. You need to ensure that when the users connect to Documents, they only see the files to which they have access. What should you do?()A、Modify the NTFS permissionsB、Modify the Share permissionsC、Enable access-based enumerationD、Configure Dynamic Access Control

考题 bill has an author names field named all editors that calculates a list of possible editors of the doc based on values users has entered into another field. The list only contains users’ first and last names, and only should be displayed to users who can edit doc.Which of the following hide-when formulas should bill use to control the display of the field?()A、 @isnotmember(alleditors,@username) B、 @isnotmember(@name([cn]);@username) C、 @isnotmember(alleditors;@name([cn ];@username)) D、 if(@isnotmember(alleditors;@name([cn];@username);@true;@false))

考题 jim has created a field hint for the address field. Users tell him this text disappears when they click in the address field. which one of the following is most likely reason?()A、 the address field is computed B、 jim should have used a text popup       C、 jim stored the field hint in the database    D、 field hint only display when the user has not clicked in the field (field hint)

考题 management has asked bob to post an introductory welcome page when notes users first open the video application in which one of the following places should bob put the welcome message?()A、 in a document named welcome B、 in the  database about doc C、 in the  database using doc D、 in the first page in the database design

考题 Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule. Which three changes in the admin GUI will enforce your managers change request?()A、Move the Preferred Members role-mapping rule to the top of the list.B、Remove the Preferred Members role from the role-mapping rule.C、Edit the Preferred Members role-mapping rule so that the username is equal to *.D、Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.E、Edit the Preferred Members role-mapping rule and select "Stop processing rules when this rule matches".

考题 Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configuration.B、All users have their own private candidate configuration.C、When a user commits, all nonconflicting changes made by all users are committed.D、When a user commits, only the user's own changes are committed.

考题 Which two statements apply when a user has entered private configuration mode by typing configure private? ()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all nonconflicting changes made by all users are commitedD、When a user commits, only the user's own changes are commited

考题 Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all non conflicting changes made by all users are commitedD、When a users commits, only the user's own changes are commited

考题 Your network contains an Active Directory forest. The forest contains an Acitve Directory site for a  remote office. The remote site contains a read-only domain controller (RODC).     You need to configure the RODC to store only the password of users in the remote site.     What should you do()A、Create a Paasword Settings object (PSO).B、Modify the Partial-Attribute-Set attribute of the forest.C、Add the users accounts of the remote site users to the Allowed RODC Password Replication Group.D、Add the users accounts of users who are not in the remote site to the Denied RODC Password Replication Group.

考题 Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are displayed. What should you do?()A、Disable referrals.B、Modify the system access control list.C、Enable access-based enumeration (ABE).D、Modify the discretionary access control list.

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. Terminal Services is installed on a member server named Terminal1 with default settings. Users in the editing department are members of a group named Editors. When these users try to make a Terminal Services connection to Terminal1, they receive the following error message: "The local policy of this system does not permit you to logon interactively". You need to enable members of the Editors group to establish Terminal Services sessions on Terminal1. What should you do?()A、Enable the Allow users to connect remotely to this computer option on Terminal1.B、Add the Editors group to the Remote Desktop Users group on Terminal1.C、Configure the RDP-Tcp connection properties on Terminal1 to assign the Allow - Full Control permission to the Editors group.D、Add the Editors group to the Remote Desktop Users group in Active Directory.

考题 Your company has two offices. Each office is configured as a separate subnet. The network contains a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). Users report that they are unable to resolve host names on the Internet. You verify that users can access all servers on both subnets.You need to ensure that users can resolve names on the Internet. The solution must ensure that users can access resources on the internal network.  What should you configure?()A、all client computers to use the IP address of a DNS server on the Internet as the primary DNS serverB、all client computers to use the IP address of a DNS server on the Internet as the secondary DNS serverC、the internal DNS servers to use a forwarderD、the internal DNS servers to use round robin

考题 单选题Your network contains an Active Directory forest. The forest contains an Acitve Directory site for a  remote office. The remote site contains a read-only domain controller (RODC).     You need to configure the RODC to store only the password of users in the remote site.     What should you do()A Create a Paasword Settings object (PSO).B Modify the Partial-Attribute-Set attribute of the forest.C Add the users accounts of the remote site users to the Allowed RODC Password Replication Group.D Add the users accounts of users who are not in the remote site to the Denied RODC Password Replication Group.

考题 单选题An Organization 2010 has 2 Mailbox Servers named Server1 and Server2.Each one has Mailbox Database and 1 Public Folder Database.All users create Public Folders on Server1 only.You need to ensure that all users create Public Folder on Server2 only.What should you do?()A Move all Mailboxes to Server2B Remove all Public Folder replicas from Server1C Modify properties of both Mailbox DatabasesD Modify properties of both Public Folder Databases

考题 多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configuration.BAll users have their own private candidate configuration.CWhen a user commits, all nonconflicting changes made by all users are committed.DWhen a user commits, only the user's own changes are committed.

考题 单选题jim has created a field hint for the address field. Users tell him this text disappears when they click in the address field. which one of the following is most likely reason?()A  the address field is computed B  jim should have used a text popup       C  jim stored the field hint in the database    D  field hint only display when the user has not clicked in the field (field hint)

考题 单选题management has asked bob to post an introductory welcome page when notes users first open the video application in which one of the following places should bob put the welcome message?()A  in a document named welcome B  in the  database about doc C  in the  database using doc D  in the first page in the database design

考题 多选题Which two statements apply when a user has entered private configuration mode by typing configure private?()AAll users have their own active configurationBAll users have their own private candidate configurationCWhen a user commits, all non conflicting changes made by all users are commitedDWhen a users commits, only the user's own changes are commited

考题 多选题Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule. Which three changes in the admin GUI will enforce your managers change request?()AMove the Preferred Members role-mapping rule to the top of the list.BRemove the Preferred Members role from the role-mapping rule.CEdit the Preferred Members role-mapping rule so that the username is equal to *.DEdit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.EEdit the Preferred Members role-mapping rule and select Stop processing rules when this rule matches.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. Terminal Services is installed on a member server named Terminal1 with default settings. Users in the editing department are members of a group named Editors. When these users try to make a Terminal Services connection to Terminal1, they receive the following error message: "The local policy of this system does not permit you to logon interactively". You need to enable members of the Editors group to establish Terminal Services sessions on Terminal1. What should you do?()A Enable the Allow users to connect remotely to this computer option on Terminal1.B Add the Editors group to the Remote Desktop Users group on Terminal1.C Configure the RDP-Tcp connection properties on Terminal1 to assign the Allow - Full Control permission to the Editors group.D Add the Editors group to the Remote Desktop Users group in Active Directory.

考题 单选题our network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a shared folder named Share1. Share1 contains the home folder of each user. All users have the necessary permissions to access only their home folder. The users report that when they access Share1, they can see the home folders of all the users. You need to ensure that the users see only their home folder when they access Share1. What should you do from Server1?()A From Windows Explorer,modify the properties of the volume that contains Share1.B From Server Manager,modify the properties of the volume that contains Share1.C From Server Manager,modify the properties of Share1.D From Windows Explorer,modify the properties of Share1.

考题 单选题Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are displayed. What should you do?()A Disable referrals.B Modify the system access control list.C Enable access-based enumeration (ABE).D Modify the discretionary access control list.

考题 单选题Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a member server named Server1. Server1 has the File Server server role installed. On Server1, you create a share named Documents. The Documents share will contain the files and folders of all users. You need to ensure that when the users connect to Documents, they only see the files to which they have access. What should you do?()A Modify the NTFS permissionsB Modify the Share permissionsC Enable access-based enumerationD Configure Dynamic Access Control

考题 多选题Which two statements apply when a user has entered private configuration mode by typing configure private? ()AAll users have their own active configurationBAll users have their own private candidate configurationCWhen a user commits, all nonconflicting changes made by all users are commitedDWhen a user commits, only the user's own changes are commited

考题 单选题bill has an author names field named all editors that calculates a list of possible editors of the doc based on values users has entered into another field. The list only contains users’ first and last names, and only should be displayed to users who can edit doc.Which of the following hide-when formulas should bill use to control the display of the field?()A  @isnotmember(alleditors,@username) B  @isnotmember(@name([cn]);@username) C  @isnotmember(alleditors;@name([cn ];@username)) D  if(@isnotmember(alleditors;@name([cn];@username);@true;@false))