网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()
A

Administrator

B

User

C

Guest

D

Power user


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A AdministratorB UserC GuestD Power user” 相关考题
考题 A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?() A.EDITB.CHMODC.ATTRIBD.CONVERT

考题 A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()A. An IEEE-1394 deviceB. A NIC deviceC. An IrDA deviceD. A FDD device

考题 A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read

考题 Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?() A.Add the list of files to /etc/exclude.rootvg.B.Modify the image.data file and add the files to be excluded form the backup.C.Modify the bosinst.data file and specify which files are to be excluded from the backup.D.Specify the files to be excluded on the command line when executing the mksysb command.

考题 A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()A、An IEEE-1394 deviceB、A NIC deviceC、An IrDA deviceD、A FDD device

考题 A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A、system /vB、winnt /sC、sfc /scannowD、chkdsk /f

考题 You are the network administrator for ExamSheet inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrator group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary.  Eric wants to prevent Julia from changing the permissions on file that Eric creates. To accomplish his goal, Eric creates a folder named C:/Data. He changes the NTFS permission on C:/Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions.  Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:/Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:/Data.  What should you instruct Eric to do?()A、Add Julia’s user account to the local Power Users group.B、Add Julia’s user account to the local Administrators group.C、Allow Julia’s user account Write permissions to C:///Data.D、Allow Julia’s user account Full Control permission to C:///Data.

考题 A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A、 Enable audit object access and specify files and folders to monitor using Task Manager.B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.D、 Open Performance Monitor and monitor folder activity.

考题 A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

考题 A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT

考题 Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A、AdministratorB、UserC、GuestD、Power user

考题 Which of the following BEST describes the purpose of user account control (UAC) in WindowsVista?()A、UAC ensures that standard users cannot access the files and folders of administrative users.B、UAC allows a computer administrator to add new user accounts to the system, configure passwords and settings for existing users, or remove existing user accounts.C、UAC ensures that viruses and other malware cannot infect the computer, eliminating the need for third-party antivirus solutions.D、UAC ensures that important changes cannot be made to Windows Vista without the permission of a computer administrator.

考题 After moving files from one folder to another, the technician cannot access them. Which of the following MUST the technician do to regain access to these files?()A、In folder options, select show hidden files and folders.B、Perform the transfer again.C、Reboot the system; access will be reset automatically.D、Take ownership of the files.

考题 You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()A、Add Julia’s user account to the local Power Users group.B、Add Julia’s user account to the local Administrators group.C、Allow Julia’s user account Write permissions to C:///Data.D、Allow Julia’s user account Full Control permission to C:///Data.

考题 You are the network administrator for ExamSheet and you support the portable computer users. An Account Executive named Hildegard frequently travels to meet with customers and uses her portable computer to demonstrate the company’s new software products.  Hildegard needs to update these products frequently so customers can evaluate the latest software releases. You need to allow Hildegard to install the product updates while limiting her ability to perform other administrative duties on her portable computer. What should you do?()A、Add Hildegard’s user accounts to the Pre-Windows 2000 Compatible Access  group. B、Add Hildegard’s user account to the local Power Users group. C、Allow Hildegard’s user account Full Control permission to the Program Files  folder.  Propagate the permissions to all the subdirectories and files in that directory. D、Allow Hildegard’s user account Write permissions to the Program Files folder.  Propagate the permissions to all the subdirectories and files in that directory. 

考题 A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()A、Instruct User1 to create a new user certificate on Computer2.B、Instruct User1 to take ownership of the encrypted files on Computer2.C、Instruct User1 to import the user certificate from Computer1 to Computer2.  D、Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

考题 A user named Tom reports that an application on his Windows 2000 Professional computer is running slowly. You notice Tom’s computer has 64 MB of RAM and 100 MB of free disk space. What should you do to improve the performance of his system? ()A、Add Tom to the Power user group.B、Set the total paging file to 75 % of physical memory.C、Perform a disk analysis and use the disk defragmenter if recommended.D、Use Disk cleanup to delete temporary files and unnecessary program files.E、Ensure that the Performance Options windows is optimized for background services.

考题 单选题A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A EDITB CHMODC ATTRIBD CONVERT

考题 单选题Which of the following BEST describes the purpose of user account control (UAC) in WindowsVista?()A UAC ensures that standard users cannot access the files and folders of administrative users.B UAC allows a computer administrator to add new user accounts to the system, configure passwords and settings for existing users, or remove existing user accounts.C UAC ensures that viruses and other malware cannot infect the computer, eliminating the need for third-party antivirus solutions.D UAC ensures that important changes cannot be made to Windows Vista without the permission of a computer administrator.

考题 单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A system /vB winnt /sC sfc /scannowD chkdsk /f

考题 单选题A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()A  Enable audit object access and specify files and folders to monitor using Task Manager.B  Enable audit policy change and specify files and folders to monitor using Windows Explorer.C  Enable audit object access and specify files and folders to monitor using Windows Explorer.D  Open Performance Monitor and monitor folder activity.

考题 单选题You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()A Add Julia’s user account to the local Power Users group.B Add Julia’s user account to the local Administrators group.C Allow Julia’s user account Write permissions to C:///Data.D Allow Julia’s user account Full Control permission to C:///Data.

考题 单选题You are the network administrator for Company and you support the portable computer users. An Account Executive named Hildegard frequently travels to meet with customers and uses her portable computer to demonstrate the company’s new software products.  Hildegard needs to update these products frequently so customers can evaluate the latest software releases. You need to allow Hildegard to install the product updates while limiting her ability to perform  ther administrative duties on her portable computer.  What should you do? ()A  Add Hildegard’s user accounts to the Pre-Windows 2000 Compatible Access group.B  Add Hildegard’s user account to the local Power Users group.C  Allow Hildegard’s user account Full Control permission to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.D  Allow Hildegard’s user account Write permissions to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.

考题 单选题A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A ModifyB Full controlC WriteD Read

考题 单选题A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()A An IEEE-1394 deviceB A NIC deviceC An IrDA deviceD A FDD device

考题 单选题A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()A Instruct User1 to create a new user certificate on Computer2.B Instruct User1 to take ownership of the encrypted files on Computer2.C Instruct User1 to import the user certificate from Computer1 to Computer2.  D Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

考题 单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A Add the list of files to /etc/exclude.rootvg.B Modify the image.data file and add the files to be excluded form the backup.C Modify the bosinst.data file and specify which files are to be excluded from the backup.D Specify the files to be excluded on the command line when executing the mksysb command.