网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You are the administrator of Redington Incorporation. Your optical disks are managed by one of your assistants named Jane and she is having a problem with one application failing to get requested information. You ask her to show you some history on the operation. Where will Jane find the information you want?()
A
Under Administrative Tools, click on Performance. From Performance Logs and Alerts, view the Alerts.
B
Right click My Computer, Manage, Storage, Removable Storage, Work Queue.
C
Right click My Computer, and under System Tools, click on System Information. Expand Software Enironment. Double click on Running Tasks.
D
Right click My Computer, and under System Tools, click on Event Viewer, then Application. Click on the Source column to sort the application data.
参考答案
参考解析
解析:
暂无解析
更多 “单选题You are the administrator of Redington Incorporation. Your optical disks are managed by one of your assistants named Jane and she is having a problem with one application failing to get requested information. You ask her to show you some history on the operation. Where will Jane find the information you want?()A Under Administrative Tools, click on Performance. From Performance Logs and Alerts, view the Alerts.B Right click My Computer, Manage, Storage, Removable Storage, Work Queue. C Right click My Computer, and under System Tools, click on System Information. Expand Software Enironment. Double click on Running Tasks.D Right click My Computer, and under System Tools, click on Event Viewer, then Application. Click on the Source column to sort the application data.” 相关考题
考题
The ring gesture, where you form. an "O" by holding the tip of your forefinger to the tip of your thumb, means in France that you think something is().
A、worthlessB、"I'll kill you!"C、goodD、great
考题
The ring gesture, where you form. an "O" by holding the tip of your forefinger to thetip of your thumb, means in France that you think something is_____.A. goodB. "I'll kill you!”C. worthlessD. great
考题
The ring gesture, where you form. an “O” by holding the tip of your forefinger to the tip of your thumb, means in France that you think something is _______.
A.goodB.greatC.worthlessD.expensive
考题
You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.
考题
You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D
考题
You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP
考题
You are a senior network administrator at TestKing, and while performing thepassword recovery procedure on your 2500 series Cisco router, you type in thefollowing command:o/r 0x2142What is the purpose of this command?()A、It is used to restart the router.B、It is used to bypass the configuration in NVRAM.C、It is used to enter ROM Monitor mode.D、It is used to view the lost password.E、It is used to save the changes to the configuration.
考题
The database administrator of your company created a public synonym called HR for the HUMAN_RESOURCES table of the GENERAL schema, because many users frequently use this table. As a user of the database, you created a table called HR in your schema. What happens when you execute this query? SELECT * FROM HR; ()A、You obtain the results retrieved from the public synonym HR created by the database administrator.B、You obtain the results retrieved from the HR table that belongs to your schema.C、You get an error message because you cannot retrieve from a table that has the same name as a public synonym.D、You obtain the results retrieved from both the public synonym HR and the HR table that belongs to your schema, as a Cartesian product.E、You obtain the results retrieved from both the public synonym HR and the HR table that belongs to your schema, as a FULL JOIN.
考题
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter
考题
You use OSPF as your network routing protocol. You use the command show ip route and you see several routes described as O,O IA,O E1,and O E2. What routes are in your area?()A、O IAB、O E1C、O E2D、O
考题
You are the administrator of Redington Incorporation. Your optical disks are managed by one of your assistants named Jane and she is having a problem with one application failing to get requested information. You ask her to show you some history on the operation. Where will Jane find the information you want?()A、Under Administrative Tools, click on Performance. From Performance Logs and Alerts, view the Alerts.B、Right click My Computer, Manage, Storage, Removable Storage, Work Queue. C、Right click My Computer, and under System Tools, click on System Information. Expand Software Enironment. Double click on Running Tasks.D、Right click My Computer, and under System Tools, click on Event Viewer, then Application. Click on the Source column to sort the application data.
考题
You configure parental controls on your computer for your childs user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inappropriate Web sites. What should you do? ()A、Enable Microsoft Windows Firewall.B、Disable the default administrator account.C、Use password protection for all user accounts.D、Configure Web sites you approve of in the list of Trusted Sites of Microsoft Windows Internet Explorer.
考题
You are the administrator of WXYZ.com Incorporation. Your company’s network consists of Windows 2000 Professional clients and Windows 2000 Servers. Users have started reporting that the network performance has degraded in recent times. Most of the Windows 2000 Professional clients on your network use the TCP/IP protocol to communicate with the Server. You want to increase network performance. Where do you change the binding order?()A、Windows 2000 Server Network Binding Server TCP/IP on the top.B、Windows 2000 Server Network Binding Workstation TCP/IP on the top.C、Windows 2000 Professional Network Binding Server TCP/IP on the top.D、Windows 2000 Professional Network Binding Server TCP/IP on the bottom.E、Windows 2000 Professional Network Binding Workstation TCP/IP on the top.F、Windows 2000 Professional Network Binding Workstation TCP/IP on thebottom.
考题
You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files.D、Have the administrator for domains log you on as an administrator and enable auditing for a specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
考题
You are a network administrator for ExamSheet.net's Windows 2000 network. Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully. What should you do? ()A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B、Start the RunAs service and configure the service to start automatically.C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D、Use Scheduled Tasks to configure the task to run under the security context of your account.
考题
You are the administrator of a small network supporting Windows NT 4.0 computers. You configure a setup script to automatically upgrade Windows NT Workstation 4.0 computers to Windows 2000 Professional. When you attempt to test the process on a single computer, you receive this error message: "The specified Setup script file (path:/unattend.txt) is inaccessible or invalid. Contact your system administrator." Which action will most likely resolve this error? ()A、Add the UnattendedInstall="Yes" parameter to the [Unattended] section of your Unattend.txt fileB、Add the UnattendMode=FullUnattended parameter to the [Data] section of your Unattend.txt fileC、Add the UnattendedInstall="Yes" parameter to the [GuiUnattended] section of your Unattend.txt fileD、Add the UnattendMode=FullUnattended parameter to the [Unattended] section of your Unattend.txt file
考题
多选题You have a share on your local computer. Someone has been intentionally damaging your files. You want to be able to know which account is doing this. What do you do? ()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'.CUse Windows Explorer to turn on auditing for the specific files.DHave the administrator for domains log you on as an administrator and enable auditing for a specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
考题
单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A
STPB
GVRPC
SNMPD
VTPE
DHCP
考题
单选题You use OSPF as your network routing protocol. You use the command show ip route and you see several routes described as O, O IA, O E1, and O E2. What routes are in your area?()A
O IAB
O E1C
O E2D
O
考题
单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()A
msiB
mstC
zapD
zip
考题
单选题When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()A
identify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator B
identify CSQs and JTAPI user and designate a Cisco CRS administrator C
identify resources and RM user and enter information about your LDAP D
identify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources
考题
单选题You want to connect to your branch office printer through the browser. Your Windows 2000 Professional computer is running Peer Web Server. You were told the share name of the printer is HPColorL. You are unable to see it when you type its URL. What do you need to do to connect to this printer? ()A
Double-click the connect hotspot in the left pane of the printer's dialog box to view the printer. B
Ask the branch office administrator to reinstall the printer by using its URL as the port. C
Install Internet Explorer 3.0 or higher on your Windows 2000 Professional.D
Ask the administrator at the branch office to install IIS on the branch server.
考题
单选题You work as a database administrator for Supportcenter.cn. You want to be notified when the number of disk I/O increases by 10% of what it was yesterday. You create a baseline metric for yesterday’s disk I/O performance. How do you use the baseline metrics to achieve your objective?()A
Save the baseline in the databaseB
Save the baseline in the Database Control Home PageC
Create a procedure to read and apply the baseline to disk I/O metricsD
Apply the baseline to the disk I/O metrics in the Mange Metrics pageE
Alter the disk I/O metrics to include baseline by using the ALTER METRICScommnd
考题
单选题You use OSPF as your network routing protocol. You use the command show ip route and you see several routes described as O, O IA, O E1, and O E2. What routes are in your area? ()A
O IAB
O E1C
O E2D
O
考题
多选题You work as a database administrator at Certkiller .com. In your production database, you observe that users’ transactions are consuming a lot of resource and you plan to impose resource restrictions by using Resource Manager. For which three resources can you enable usage restrictions by using Resource Manager? ()ACPU usageBdegree of parallelismCnumber of open cursorsDnumber of sorts performedEidle time for blocking sessionsFnumber of disk I/O operations performedGnumber of memory I/O operations performed
考题
单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()A
Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B
Log on by using your Administrator account and run the ntbackup /D command.C
Log on by using your Administrator account and run the schtasks /delete command.D
Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.
热门标签
最新试卷