网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A user named Marie uses a Windows 2000 Professional computer named Client1 to process payroll records. Marie reports that she can no longer run her financial applications. You determine that file permissions have been applied incorrectly to her computer. You want to configure Client1 to have the same security configuration and file permission settings that were applied when the computer was installed.  What should you do?()

  • A、Grant usersFull Controlpermission to the C drive and all child folders
  • B、Use the Recovery Console to restore system files
  • C、Use Security Configuration and Analysis to apply the Secure security template to Client1
  • D、Use Security Configuration and Analysis to apply the Default security template to Client 1

参考答案

更多 “ A user named Marie uses a Windows 2000 Professional computer named Client1 to process payroll records. Marie reports that she can no longer run her financial applications. You determine that file permissions have been applied incorrectly to her computer. You want to configure Client1 to have the same security configuration and file permission settings that were applied when the computer was installed.  What should you do?()A、Grant usersFull Controlpermission to the C drive and all child foldersB、Use the Recovery Console to restore system filesC、Use Security Configuration and Analysis to apply the Secure security template to Client1D、Use Security Configuration and Analysis to apply the Default security template to Client 1” 相关考题
考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. DB1 is available to a Windows group which is named WIIKIGO/Supervisors. A Windows user named User1 is a member of the WIIKIGO/Supervisors group. WIIKIGO/Supervisors is a member of the db_owner role in the DB1 database. You must make sure that the SQL Server instance is available to User1. In the DB1 database, which Transact-SQL statement(s) should you execute?()  A、 DROP LOGIN "WIIKIGO/User1"; B、 EXEC dbo.sp_droprolemember 'db_owner', 'WIIKIGO/User1';C、 EXEC dbo.sp_revokedbaccess 'WIIKIGO/User1';EXEC dbo.sp_revokelogin 'WIIKIGO/User1'; D、 CREATE LOGIN "WIIKIGO/User1" FROM Windows;DENY CONNECT SQL TO "WIIKIGO/User1";

考题 While installing an application, the administrator is instructed to perform two final tasks prior to starting the application:   1.Set the ownership of a file named ’control_file’ to be owned by the user ’database’ and the group ’appsrvr’.   2.Change the permissions of ’control_file’ to 0766.   After these two tasks have been completed, what will the file permissions look like when ’ls -l control_file’ is executed?()A、-rwxrw-rw- 1 database appsrvr 4913 Mar 17 08:24 control_fileB、-rw-r--r-- 1 appsrvr database 4913 Mar 17 08:24 control_fileC、-rw-r--r-- 1 database appsrvr 4913 Mar 17 08:24 control_fileD、-rwxrw-rw- 1 appsrvr database 4913 Mar 17 08:24 control_file

考题 You install a read-only domain controller (RODC) named RODC1.   You need to ensure that a user named User1 can administer RODC1. The solution must minimize the number of permissions assigned to User1.   Which tool should you use()A、Active Directory Administrative CenterB、Active Directory Users and ComputersC、DsaddD、Dsmgmt

考题 You have an Exchange Server 2010 organization.You have a user named User1 and a user named User2. You need to ensure that User1 can add User2 to the From field when he sends e-mail messages. Messages that have User2 in the From field must display only User2 as the message sender to recipients Who receive the messages. What should you use?()A、Active Directory Users and ComputersB、Exchange Control Panel (ECP)C、Exchange Management Console (EMC)D、Microsoft Office Outlook

考题 You have an Exchange 2010 organization.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can add and remove members from Group1.You must prevent User1 from modifying all other groups. What should you do first?()A、Add User1 to Group1 Managed by list.B、Assign User1 as a group moderator for Group1.C、Assign the Distributions Groups management role to User1.D、Assign the MyDistributionGroups management role to User1.

考题 Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A、the Netsh toolB、the Network Policy Server consoleC、the Registry EditorD、the Routing and Remote Access console

考题 Your network contains an Active Directory domain named contoso.com.   The network has a branch office site that contains a read-only domain controller (RODC) named RODC1.   RODC1 runs Windows Server 2008 R2.   A user named User1 logs on to a computer in the branch office site.   You discover that the password of User1 is not stored on RODC1.   You need to ensure that User1’s password is stored on RODC1.   What should you modify()A、the Member Of properties of RODC1B、the Member Of properties of User1C、the Security properties of RODC1D、the Security properties of User1

考题 Your company has an Exchange Server 2010 organization. A user named User1 is configured as a Delegate for a user named User2. You need to ensure that User1 can add User2 in the From field when sending email messages. Messages that contain User2 in the From field must display User2 as the message sender when recipients receive the messages.  What should you do()?  A、Remove User1 as a delegate, and then grant User1 Send As permissions to User2¯s mailboxB、Remove User1 as a delegate, and then grant User1 Send on Behalf permissions to User2¯s mailboxC、Create a Sharing policy, and then grant User1 Modify permissions to User2¯s mailboxD、Create a Sharing policy, and then grant User1 Full Mailbox permissions to User2¯s mailbox

考题 You are designing the top-level organization unit (OU) structure to meet the administrative requirements. What should you do?()A、Create a top-level OU named New York. Place all user and computer accounts from New York in the New York OU.B、Create a top-level OU named Chicago. Place all user and computer accounts from Chicago in the Chicago OU.C、Create a top-level OU named Coho. Place all user and computer accounts that are assigned to the Coho Vineyard customer project in the Coho OU.D、Create a top-level OU named Sales. Place all user and computer accounts from the sales department in the Sales OU.

考题 单选题A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()A Instruct User1 to create a new user certificate on Computer2.B Instruct User1 to take ownership of the encrypted files on Computer2.C Instruct User1 to import the user certificate from Computer1 to Computer2.  D Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

考题 单选题You are designing the top-level OU structure for the company. Which action or actions should you perform?()A Create an OU named Sales. Place all sales user accounts in the Sales OU.B Create an OU named Montreal. Place all Montreal user accounts in the Montreal OU.C Create an OU named East. Place all user accounts from the East Coast offices in the East OU.D Create an OU named NorthAmerica. Place all user accounts in the NorthAmerica OU.E Create an OU named Servers. Place all server computer accounts in the Servers OU.

考题 单选题Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A the Netsh toolB the Network Policy Server consoleC the Registry EditorD the Routing and Remote Access console

考题 单选题You are designing the top-level OU structure for the company.  Which action or actions should you perform?()A  Create an OU named Sales. Place all sales user accounts in the Sales OU.B  Create an OU named Montreal. Place all Montreal user accounts in the Montreal OU.C  Create an OU named East. Place all user accounts from the East Coast offices in the East OU. D  Create an OU named NorthAmerica. Place all user accounts in the NorthAmerica OU.E  Create an OU named Servers. Place all server computer accounts in the Servers OU.

考题 单选题You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()A Instruct User2 to add a delegateB Instruct User2 to send a signed e-mail message to User1.C Instruct User1 to send a signed e-mail message to User2.D Instruct User1 to modify the sensitivity settings of the e-mail message

考题 单选题Your network contains an Active Directory domain named contoso.com. The domain contains a user account named User1 that resides in an organizational unit (OU) named OU1. A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to publish several applications to a user named User1. In the Users container, you create a new user named User2. You need to ensure that the same applications are published to User2. What should you do?()A Modify the security of GPO1.B Modify the settings in GPO1C Link a WMI filter to GPO1D Move User2 to OU1

考题 单选题You have an Exchange Server 2010 organization named contoso.com. Your company is investigating a user named User1. You need to prevent User1 from permanently deleting the items in his mailbox.  What should you run()?A Set-Mailbox User1 -LitigationHoldEnabled $trueB Set-Mailbox User1 -ModerationEnabled $trueC Set-Mailbox User1 -RetainDeletedItemsUntilBackup $trueD Set-Mailbox User1 -RetentionHoldEnabled $true

考题 单选题You have an Organization 2010.Internal user named User1 sends a confidential message to another internal user named User2.User1 does not have any administrative privileges in theory. You need to ensure User1 can identify whether the message was successfully delivered?. What should you instruct User1 to do?()A View the message headers in the sent item folderB Open Microsoft Outlook and modify Read Receipt SettingsC Open Microsoft Outlook and modify Delivery Receipt SettingsD Open the ECP and select Organize E-Mail

考题 单选题You are designing a security group strategy to meet the business and technical requirements. What should you do?()A Create one global group named G_Executives. Make all executives user accounts members of that group.B Create two global groups named G_Executives and one universal group named U_Executives. Make the two global members of U_Executives. Make the executive user accounts members of the appropriate global group.C Create three global groups named G_NY_Executives and G_Chi_Executives and G_Executives. Make G_NY_Executives and G_Chi_Executives members of G_Executives. Make the executive user accounts members of the appropriate global group.  D Create one domain local group named DL_Executives. Make all executive user accounts members of that group.

考题 单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server! that runs Windows Server 2012 R2. Server1 contains a virtual machine named VM1 that runs Windows Server 2012 R2.You need to ensure that a user named User1 can install Windows features on VM1. The solution must minimize the number of permissions assigned to User1. To which group should you add User1?()A Administrators on VM1B Power Users on VM1C Hyper-V Administrators on Server1D Server Operators on Server1

考题 单选题Your network contains a server named Server1 that runs Windows Server 2008 R2. You have a user named User1. You need to ensure that User1 can schedule Data Collector Sets (DCSs) on Server1. The solution must minimize the number of rights assigned to User1. What should you do?()A Add User1 to the Performance Log Users group.B Add User1 to the Performance Monitor Users group.C Assign the Profile single process user right to User1.D Assign the Bypass traverse checking user right to User1.

考题 单选题You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()A Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. B Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. C Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. D Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files. 

考题 多选题Your network contains an Active Directory domain named contoso.com. The domain contains 20 computer accounts in an organizational unit (OU) named OU1. A user account named User1 is in an OU named OU2.You are configuring a Group Policy object (GPO) named GPO1. You need to assign User1 the Backup files and directories user right to all of the computer accounts in OU1.Which two actions should you perform?()ALink GPO1 to OU1BLink GPO1 to OU2.CModify the Delegation settings of GPO1.DFrom User Configuration in GPO1, modify the security settings.EFrom Computer Configuration in GPO1, modify the security settings