网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

cindy has created a private agent. she wants her colleagues to be able to use it. which one of the following should she do to achieve this?()

  • A、 change the agent property to shared 
  • B、 copy the agent to a domino 6 server 
  • C、 change the agent property to shared code 
  • D、 delete the agent. She must create it again as a shared agent

参考答案

更多 “cindy has created a private agent. she wants her colleagues to be able to use it. which one of the following should she do to achieve this?()A、 change the agent property to shared B、 copy the agent to a domino 6 server C、 change the agent property to shared code D、 delete the agent. She must create it again as a shared agent” 相关考题
考题 Last week Polly decided to give up her job. She is fed up with it, she finds it boring and she wants to change her career. Her employers, 慙ucky Shops? are not too bad. They give her quite good benefits, such as free lunches and paid holidays, but she does not get on with her boss. Her salary is quite good, but, because she is not happy, she wants to look for something else. Last Saturday she talked about it with David and Xiaoyan. They agreed with her. They said she should resign and try another career, so she took action. She looked at advertisements in the paper and picked out three jobs that looked interesting. She had to write out her CV to apply for a job, and she did that on Wednesday evening. Xiaoyan helped her with it. She has a lot of experience of selling and good business training but is worried about her lack of experience in some areas.(1). Polly has decided to ask for a higher salary.A、 RightB、Wrong(2). She doesn’t like her boss.A、 RightB、Wrong(3). Her friends agreed that she should resign.A、 RightB、Wrong(4). She has experience of teaching.A、 RightB、Wrong(5). She’s worried about her lack of experience in some areas.A、 RightB、Wrong

考题 What did the author’s wife do after she heard his shouting?A. She said nothing.B. She shouted at him.C. She called the agent.D. She threw the phone away.

考题 Last week Polly decided to give up her job. She is fed up with it, she finds it boring and she wants to change her career. Her employers,‘Lucky Shops',are not too bad. They give her quite good benefits,such as free lunches and paid holidays, but she does not get on with her boss. Her salary is quite goad, but,because she is not happy, she wants to lank far something else. Last Saturday she talked about it with David and Xiaoyan. They agreed with her. They said she should resign and try another career, so she took action. She lacked at advertisements in the paper and picked out three jabs that looked interesting. She had to write out her GV to apply for a jab, and she did that an Wednesday evening. Xiaayan helped her with it. She has a lot of experience of selling and goad business training but is worried about her lack of experience in some areas.1. Polly has decided to ask for a higher salary.A. RightB. Wrong2. She doesn't like her bass.A. RightB. Wrong3. Her friends agreed that she should resign.A. RightB. Wrong4. She has no experience of selling.A. RightB. Wrong5. She's worried about her lack of experience in same areas.A. RightB. Wrong

考题 You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 When would the Cisco Supervisor Desktop fail to show an agent that is logged in? ()A、The agent is not ready.  B、The agent is not on a call.  C、The agent is an IP phone agent.  D、The agent is not in the team currently being viewed by the supervisor. 

考题 jayne has asked her domino server administrator to enable doc locking on the server. which one of the following must she do to enable it for her application?()A、 enable the “allow doc locking “ db property B、 create a view column for the locked doc view icon C、 add a profile doc to the db to manage the locked doc D、 enable doc locking at the view level for each view in the db

考题 Your company has two SQL Server 2005 computers named SQL1 and SQL2. Transaction log shipping occurs from SQL1 to SQL2 by using default SQL Server Agent schedule settings. You need toreconfigure transaction log shipping to provide minimum latency on SQL2. What should you do?()A、 On SQL1, reschedule the transaction log backup job so that it occurs every minute. On SQL2, maintain default schedule settings for both the log shipping copy and the restore jobs. B、 On SQL1, change the schedule type for the transaction log backup to Start automatically when SQL Server Agent starts. On SQL2, change the schedule types for both the log shipping copy and the restore jobs to Start automatically when SQL Server Agent starts. C、 On SQL1, maintain default schedule settings for the transaction log backup job. On SQL2, change the schedule types for both the log shipping copy and the restore jobs to Start automatically when SQL Server Agent starts. D、 On SQL1, reschedule the transaction log backup job so that it occurs every minute. On SQL2, reschedule both the log shipping copy and the restore jobs so that they occur every minute. 

考题 A customer has a Linux server farm and wants to use IBM Director to manage all of their systems.  Which of the following is the preferred installation of IBM Director to fully manage the Linux systems?()A、Install Director Server on a Windows 2000 Server and install the Director agents on the Linux systems.B、Install IBM Director Agent on a Linux server and install the Director Server on the Linux systems.C、Install the Director Server on a Linux server and manage the systems via Linux native SNMP support.D、Install Director Server on a Linux server and install the Director Linux agent on the Linux systems.

考题 tony wants to create a duplicate of the video application. He wants to keep a version of the data on the same server as the production application but does not want any new documents or documents modifications to be replicated into his new database once he creates it. Which one of the following should tony do to create his archive?()A、create a new copy of the databaseB、create a replica of the databaseC、Use the windows explorer to create a copy of the database file.D、Create a replica copy of the database and disable replication on the database file.

考题 Cindy wants to set up third-party tools so she can access them via the designer. Which one of  the following should cindy do?()A、 file- inport B、 tools-import C、 tools-add tools D、 shared resources-third party tools

考题 nadia would like to position overlapping blocks of content on a form in the video application. she wants the flexibility to control the size and content of the information. which one of the following should nadia use when creating her form?()A、 layersB、 subforms C、 framesets D、 style sheets

考题 mary would like to display a collapsed section on her video catalog form, she has created a section buy when she display the form in the client the section always opens expanded. which one of the following should mary do to collapse the section?()A、 nothing. Sections always open expanded B、 modify the section default properties to collapsed C、 modify the form propenties to display all sections collapsed D、 modify the section opened for reading property to auto-collapse 

考题 norma has a form action that will allow users to create comments to the existing doc. When Norma views the form in her web browser, she sees the action. but when she opens the form in her notes client she cannot see the action . which one of the following should she do to correct the problom? ()A、delete old action and create a new one on the formB、Make sure the comments form is available for notes clients useC、Make the action a shared action and disable the hide-when setting for “web borwsers”D、Check the actions hide-when setting to make sure the action is available for “notes 4.6 later”

考题 You have an enterprise subordinate certification authority (CA) configured for key archival. Three key  recovery agent certificates are issued.   The CA is configured to use two recovery agents.   You need to ensure that all of the recovery agent certificates can be used to recover all new private keys.   What should you do()A、Add a data recovery agent to the Default Domain Policy.B、Modify the value in the Number of recovery agents to use box.C、Revoke the current key recovery agent certificates and issue three new key recovery agent certificates.D、Assign the Issue and Manage Certificates permission to users who have the key recovery agent  certificates.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? () A、You should use local Service accountB、You should use network Service accountC、You should use domain accountD、You should use local System account

考题 You need to design Group Policy object (GPO) settings to support the use of the Encrypting File System (EFS). Your solution must meet business and security requirements. Which two actions should you perform?()A、Designate a data recovery agent and issue an EFS certificate to the data recovery agent. Export the private key and restrict access to the exported keyB、Make the data recovery agent a local administrator on all client computersC、Remove the default data recovery agent from the Default Domain Policy GPO. Then, include the new data recovery agent insteadD、Delete the Default Domain Policy GPO. Configure a new GPO linked to the domain that does not specify a data recovery agent

考题 You are the administrators of your company's network. Your network has 75 Windows 2000 Professional computers and eight Windows 2000 Server computers. Users on the network drive save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. The partition also has disk quotas defined.  A user named Candy reports that she cannot save any files to her home folder. She also cannot  update files in her home folder. When she attempts to save files to the folder she receives the following error message: "insufficient disk space". Other users are not experiencing this problem with their home folders.   You want to enable Candy to save files in her home folder. What should you do? ()A、Log on to the network as a Recovery Agent. Decrypt all of candy's files in her home folderB、Log on to the network by using the Domain Administrator account. Grant Candy full control permission to her home folderC、Use Windows Backup to archive and remove old files on the serverD、Increase the server disk quota entry for Candy to accommodate the additional files

考题 TestKing.com has two SQL Server 2005 computers named SQL1 and SQL2. Transaction log shipping occurs from SQL1 to SQL2 by using default SQL Server Agent schedule settings. You need to reconfigure transaction log shipping to provide minimum latency on SQL2. What should you do?()A、On SQL1, reschedule the transaction log backup job so that it occurs every minute. On SQL2, maintain default schedule settings for both the log shipping copy and the restore jobs.B、On SQL1,change the schedule type for the transaction log backup to Start automatically when SQL server Agent starts. On SQL2, change the schedule types for both the log shipping copy and the restore jobs to Start automatically when SQL Server gent starts.C、On SQL1, maintain default schedule settings for the transaction log backup job. On SQL2, change the schedule types for both the log shipping copy and the restore jobs to Start automatically when SQL server Agent starts.D、On SQL1, reschedule the transaction log backup job so that it occurs every minute. On SQL2, reschedule both the log shipping copy and the restore jobs so that they occur every minute.

考题 单选题mary would like to display a collapsed section on her video catalog form, she has created a section buy when she display the form in the client the section always opens expanded. which one of the following should mary do to collapse the section?()A  nothing. Sections always open expanded B  modify the section default properties to collapsed C  modify the form propenties to display all sections collapsed D  modify the section opened for reading property to auto-collapse 

考题 单选题You are the administrators of your company's network. Your network has 75 Windows 2000 Professional computers and eight Windows 2000 Server computers. Users on the network drive save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. The partition also has disk quotas defined.  A user named Candy reports that she cannot save any files to her home folder. She also cannot  update files in her home folder. When she attempts to save files to the folder she receives the following error message: "insufficient disk space". Other users are not experiencing this problem with their home folders.   You want to enable Candy to save files in her home folder. What should you do? ()A Log on to the network as a Recovery Agent. Decrypt all of candy's files in her home folderB Log on to the network by using the Domain Administrator account. Grant Candy full control permission to her home folderC Use Windows Backup to archive and remove old files on the serverD Increase the server disk quota entry for Candy to accommodate the additional files

考题 单选题A customer has a Linux server farm and wants to use IBM Director to manage all of their systems.  Which of the following is the preferred installation of IBM Director to fully manage the Linux systems?()A Install Director Server on a Windows 2000 Server and install the Director agents on the Linux systems.B Install IBM Director Agent on a Linux server and install the Director Server on the Linux systems.C Install the Director Server on a Linux server and manage the systems via Linux native SNMP support.D Install Director Server on a Linux server and install the Director Linux agent on the Linux systems.

考题 单选题Cindy wants to set up third-party tools so she can access them via the designer. Which one of  the following should cindy do?()A  file- inport B  tools-import C  tools-add tools D  shared resources-third party tools

考题 单选题jayne has asked her domino server administrator to enable doc locking on the server. which one of the following must she do to enable it for her application?()A  enable the “allow doc locking “ db property B  create a view column for the locked doc view icon C  add a profile doc to the db to manage the locked doc D  enable doc locking at the view level for each view in the db

考题 单选题You have an enterprise subordinate certification authority (CA) configured for key archival. Three  key recovery agent certificates are issued.  The CA is configured to use two recovery agents.     You need to ensure that all of the recovery agent certificates can be used to recover all new  private keys.     What should you do()A Add a data recovery agent to the Default Domain Policy.B Modify the value in the Number of recovery agents to use box.C Revoke the current key recovery agent certificates and issue three new key recovery agent certificates.D Assign the Issue and Manage Certificates permission to users who have the key recovery agent certificates.

考题 单选题Any extinguishing agent used on a Class “C” fire must have which important property? ()A Cooling abilityB Leaves no residueC Penetrating powerD Nonconductivity

考题 单选题TestKing.com has two SQL Server 2005 computers named SQL1 and SQL2. Transaction log shipping occurs from SQL1 to SQL2 by using default SQL Server Agent schedule settings. You need to reconfigure transaction log shipping to provide minimum latency on SQL2. What should you do?()A On SQL1, reschedule the transaction log backup job so that it occurs every minute. On SQL2, maintain default schedule settings for both the log shipping copy and the restore jobs.B On SQL1,change the schedule type for the transaction log backup to Start automatically when SQL server Agent starts. On SQL2, change the schedule types for both the log shipping copy and the restore jobs to Start automatically when SQL Server gent starts.C On SQL1, maintain default schedule settings for the transaction log backup job. On SQL2, change the schedule types for both the log shipping copy and the restore jobs to Start automatically when SQL server Agent starts.D On SQL1, reschedule the transaction log backup job so that it occurs every minute. On SQL2, reschedule both the log shipping copy and the restore jobs so that they occur every minute.

考题 单选题cindy has created a private agent. she wants her colleagues to be able to use it. which one of the following should she do to achieve this?()A  change the agent property to shared B  copy the agent to a domino 6 server C  change the agent property to shared code D  delete the agent. She must create it again as a shared agent