网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has fiveremovable devices. You need to ensure that users can only access removable devices that have beenpreviously installed on the computer. What should you modify in the Local Group Policy ?()
A
Enable the Prevent redirection of USB devices setting.
B
Enable the Prevent installation of removable devices setting.
C
Disable the WPD Devices: Deny read access setting.
D
Disable the Allow administrators to override Device Installation Restriction policies setting.
参考答案
参考解析
解析:
暂无解析
更多 “单选题You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has fiveremovable devices. You need to ensure that users can only access removable devices that have beenpreviously installed on the computer. What should you modify in the Local Group Policy ?()A Enable the Prevent redirection of USB devices setting.B Enable the Prevent installation of removable devices setting.C Disable the WPD Devices: Deny read access setting.D Disable the Allow administrators to override Device Installation Restriction policies setting.” 相关考题
考题
You have a computer that runs Windows Vista. You need to identify whether the computer can be upgradedto Windows 7. Which tool should you use?()A、Windows Anytime Upgrade for Windows 7.B、Windows Anytime Upgrade for Windows Vista.C、Windows 7 Upgrade Advisor.D、Windows Vista Upgrade Advisor.
考题
You have a computer that runs Windows 7. You need to view the processes that currently generate network activity. What should you do? ()A、Open Resource Monitor and click the Network tab.B、Open Windows Task Manager and click the Networking tab.C、Open Event Viewer and examine the NetworkProfile Operational log.D、Open Performance Monitor and add all the counters for network interface.
考题
You have a computer that runs Windows 7. You configure the computer to automatically install all updates.You need to verify whether a specific update is installed. What should you do?()A、In Event Viewer, examine the Application log.B、In Windows Update, examine the update history.C、At the command prompt, run Wusa.exe and specify the /kb parameter.D、At the command prompt, run Verifier.exe and specify the /query parameter.
考题
You have a computer that runs Windows 7. You install a second internal hard disk drive in the computer.You attempt to create a system image and discover that the new disk is not listed as a backup destination.You need to ensure that you can use the new disk as a backup destination for system images. What should you do?()A、Create a NTFS partition.B、Create a mirrored volume.C、Create a system repair disc.D、Log on to the computer by using a different account.
考题
You have a computer that runs Windows 7. You need to configure system image backups to meet thefollowing requirements: Automatically create a system image every day without user intervention Retain multiple copies of the system image. Which type of backup destination should you use?( )A、external hard disk driveB、network locationC、USB flash driveD、writeable DVD
考题
Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer. What should you do?()A、Remove all generic credentials from Windows Vault.B、Remove all Windows credentials from Windows Vault.C、Modify the Windows Internet Explorer certificates settings.D、Modify the Windows Internet Explorer AutoComplete settings.
考题
You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?()A、Start the Problem Steps Recorder.B、From Event Viewer, modify the properties of the Security log.C、From the local Group Policy, configure the Audit object access setting.D、From the local Group Policy, configure the Audit directory service Access setting.
考题
You have a computer that runs Windows 7. You need to provide standard users the ability to update thedrivers for display adapters. What should you modify from the Local Group Policy?()A、device installation settings for the computer.B、display settings for the user.C、driver installation settings for the computer.D、driver installation settings for the user.
考题
You have a computer that runs Windows 7. You need to capture the operating system and all the computerconfigurations to a Windows image (WIM) file. What should you do before you capture the image?()A、Run Oscdimg.exe.B、Run Windows System Image Manager (Windows SIM).C、Open a command prompt that has elevated privileges.D、Start the computer by using Windows Preinstallation Environment (Windows PE).
考题
You have a computer that runs Windows 7. Your network contains a VPN server that runs Windows Server2008. You need to authenticate to the VPN server by using a smart card. Which authentication settingshould you choose?()A、CHAPB、EAPC、MS-CHAP v2D、P.AP
考题
You have a computer that runs Windows XP and a USB drive that is protected by using BitLocker To Go.You need to ensure that you can copy files from the computer to the USB drive. The solution must retain theexisting files on the USB drive. What should you do?()A、From a computer that runs Windows 7, change the file system of the USB drive.B、From a computer that runs Windows 7, disable BitLocker To Go for the USB drive.C、Log on to Windows XP as member of the Administrators group.D、Log on to Windows XP by using a user account that has an Encrypting File System (EFS) certificate.
考题
单选题You have a standalone computer that runs Windows 7. Multiple users share the computer. You need toensure that you can read the content of all encrypted files on the computer. What should you do?()A
Run the Certificates Enrollment wizard and then run Certutil.exe importpfx.B
Run the Certificates Enrollment wizard and then run Certutil.exe installcert.C
Run Cipher.exe /r and then add a data recovery agent from the local security policy.D
Run Cipher.exe /rekey and then import a security template from the local security policy.
考题
单选题You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must appear on the desktop of new users only. What should you do?()A
Copy the shortcut to %systemdrive%/documents and settings/default user/desktop/.B
Copy the shortcut to %systemdrive%/documents and settings/all users/desktop/.C
Copy the shortcut to your desktop. Modify the %comspec% system environment variable. D
Copy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.
考题
单选题Your network contains an Active Directory domain. You have a server named Server1 that runs Windows Server 2008 R2. Server1 is an enterprise root certification authority (CA). You have a client computer named Computer1 that runs Windows 7. You enable automatic certificate enrollment for all client computers that run Windows 7. You need to verify that the Windows 7 client computers can automatically enroll for certificates. Which command should you run on Computer1()A
certreq.exe retrieveB
certreq.exe submitC
certutil.exe getkeyD
certutil.exe pulse
考题
单选题You have a computer that runs Windows 7. The computer is configured to use an intranet Microsoft updateservice location. You need to view the name of the intranet service location. What should you do?()A
At a command prompt, run Wusa.exe.B
Open Event Viewer and examine the Application log.C
Open Windows Update and click View update history.D
R.eview the contents of the C:///windows/windowsupdate.log file.
考题
单选题You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to adomain. You need to prevent the users from using more than 2 GB of disk space on drive C. What should you do?()A
From a Group Policy object (GPO), enable the Limit profile size setting.B
Enable System Protection for Local Disk (C) and set the disk space usage.C
Enable disk quota management on Computer1 and configure a default quota limit.D
From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cachesetting.
考题
单选题You have a computer that runs Windows 7. You install Windows XP in a new partition on the computer anddiscover that you can no longer start Windows 7. You need to start Windows 7 in the minimum amount oftime. What should you do?()A
From Windows XP, modify the default path in the boot.ini file.B
From Windows XP Recovery Console, run the Fixboot command.C
Start the computer from the Windows 7 installation media and select Install now.D
Start the computer from the Windows 7 installation media and run Startup Repair.
考题
单选题You have a computer named Computer1 that runs Windows 7. You need to configure Computer1 to supportthe collection of Windows system events from other computers. Which command should you run?()A
Wecutil.exe qcB
Winrm.exe quickconfigC
Winrs r:Computer1D
Wmic /aggregate
考题
单选题You have a computer that runs Windows Vista. You need to identify whether the computer can be upgradedto Windows 7. Which tool should you use?()A
Windows Anytime Upgrade for Windows 7.B
Windows Anytime Upgrade for Windows Vista.C
Windows 7 Upgrade Advisor.D
Windows Vista Upgrade Advisor.
考题
单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()A
Run ipconfig /flushdns at the command prompt. B
Reset the password for the local administrator user account. C
From the Internet Options in Internet Explorer, clear the AutoComplete history.D
From the Internet Options in Internet Explorer, delete the Temporary Internet Files.
考题
单选题You have a computer that runs Windows 7. You need to identify the disk, memory, CPU, and networkresources that an application is currently using. Which tool should you use?()A
Component ServicesB
Performance Information and ToolsC
Reliability MonitorD
Resource Monitor
考题
单选题You have a computer that runs Windows 7. You need to prevent ActiveX controls from running in WindowsInternet Explorer. Which Internet Explorer settings should you modify?()A
ContentB
EncodingC
SafetyD
Security
考题
单选题You have a computer that runs Windows 7. You configure the computer to automatically install all updates.You need to verify whether a specific update is installed. What should you do?()A
In Event Viewer, examine the Application log.B
In Windows Update, examine the update history.C
At the command prompt, run Wusa.exe and specify the /kb parameter.D
At the command prompt, run Verifier.exe and specify the /query parameter.
考题
单选题You have a computer that runs Windows 7. Multiple users share the computer. The computer contains afolder named C:/folder1. You need to identify all of the encrypted files in C:/folder1. Which command shouldyou run?()A
Cipher C:///folder1B
Dir C:///folder1 /OEC
Fsutil C:///folder1D
Wfs C:///folder1
考题
单选题You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users logon to the computer. You need to prevent the computer from displaying the username of the last user whologged on. What should you do?()A
From Control Panel, modify the User Profiles settings.B
From Control Panel, modify the Personalization settings.C
From the local computer policy, add a policy template.D
From the local computer policy, modify the local security policy.
热门标签
最新试卷