网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A user on your network downloads a video card driver from the Internet. You are unsure of the source of the driver. You want to ensure that the user does not lose production time because of an incompatible driver. What should you do?()
- A、Install the driver into the computer. Restart the computer. Use the last known good configuration to recover the original driver if necessary.
- B、Install the driver in the computer. Use the hardware troubleshooter and then use the recovery console to recover the original driver if necessary.
- C、Display the advanced attributes of the video card driver file. Install the file only if the contents have been secured.
- D、Run file signature verification utility to verify that the driver has been digitally signed.
参考答案
更多 “A user on your network downloads a video card driver from the Internet. You are unsure of the source of the driver. You want to ensure that the user does not lose production time because of an incompatible driver. What should you do?()A、Install the driver into the computer. Restart the computer. Use the last known good configuration to recover the original driver if necessary. B、Install the driver in the computer. Use the hardware troubleshooter and then use the recovery console to recover the original driver if necessary. C、Display the advanced attributes of the video card driver file. Install the file only if the contents have been secured. D、Run file signature verification utility to verify that the driver has been digitally signed. ” 相关考题
考题
Which command would allow you to compare two files stored on your router?()
A.user@hostfile show filename1 compare filename2B.user@hostfile compare files filename1 filename2C.user@hostcompare files filename1 filename2D.user@hostcompare filename1 filename2
考题
You configure parental controls on your computer for your child‘s user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inapproriate Web sites.What should you do?()A.AB.BC.CD.D
考题
You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D
考题
How can you verify that you have correctly configured SSH access to your Junos device?()A、user@router# show system servicesB、user@router show configuration servicesC、user@router# show configuration system servicesD、user@router# show system login
考题
You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?()A、user@router request system storage cleanupB、user@router show system storageC、user@router request system storage cleanup dry-runD、user@router show system storage detail
考题
For which database operation would you need the database to be in the MOUNT state()A、renaming the control filesB、re-creating the control filesC、dropping a user in your databaseD、dropping a tablespace in your databaseE、configuring the database instance to operate in the ARCHIVELOG or NOARCHIVELOG modes
考题
You executed the STARTUP MOUNT command to start your database. For which database operation do you need to start the database in the MOUNT state?()A、renaming the control filesB、dropping a user in your databaseC、enabling or disabling redo log archivingD、dropping a tablespace in your databaseE、re-creating the control files, after you lost all the control files in your database
考题
Your network contains an Exchange Server 2010 server.You need to prevent a user named User1 from downloading attachments larger than 50 KB when using Exchange ActiveSync.Your solution must not affect other users. What should you do first?()A、Modify User1 Mailbox propertiesB、Create a New ActiveSync Mailbox PolicyC、Create a New Exchange ActiveSync Mailbox policyD、Modify properties of Default Exchange ActiveSync Mailbox policy
考题
You configure parental controls on your computer for your childs user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inappropriate Web sites. What should you do? ()A、Enable Microsoft Windows Firewall.B、Disable the default administrator account.C、Use password protection for all user accounts.D、Configure Web sites you approve of in the list of Trusted Sites of Microsoft Windows Internet Explorer.
考题
Your company has an Active Directory domain. A user attempts to log on to the domain from a client computer and receives the following message: "This user account has expired Ask your administrator to reactivate the account." You need to ensure that the user is able to log on to the domain. What should you do()A、Modify the properties of the user account to set the account to never expire.B、Modify the properties of the user account to extend the Logon Hours setting.C、Modify the properties of the user account to set the password to never expire.D、Modify the default domain policy to decrease the account lockout duration.
考题
Your network contains an Active Directory forest. The forest schema contains a custom attribute for user objects. You need to modify the custom attribute value of 500 user accounts. Which tool should you use()A、CsvdeB、DsmodC、DsrmD、Ldifde
考题
Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA. What should you do?()A、 Assign the user account to the CA Admin role.B、 Add the user account to the local Administrators group.C、 Grant the user the Back up files and directories user right.D、 Grant the user the Manage auditing and security log user right.
考题
Your network contains an Active Directory domain. A user named User1 takes a leave of absence for one year. You need to restrict access to the User1 user account while User1 is away. What should you do()A、From the Default Domain Policy, modify the account lockout settings.B、From the Default Domain Controller Policy, modify the account lockout settings.C、From the properties of the user account, modify the Account options.D、From the properties of the user account, modify the Session settings.
考题
Your computer has Microsoft Windows Firewall enabled. Your child plays an online game that uses connectionless traffic over port 5678 for inbound and outbound traffic. You need to prevent your child from playing this game. What should you do? ()A、Enable the User Account Control feature.B、Configure the user account of your child as a standard user.C、Create an outbound rule in Windows Firewall to block UDP port 5678.D、Create an outbound rule in Windows Firewall to block TCP port 5678.
考题
单选题You are ready to implement RMAN in the backup and recover strategy for your company. Which system privilege must the RMAN user have to be able to connect and execute RMAN commands on a target database?()A
SYSDBAB
SYSOPERC
No system privileges are required for the RMAN user.D
Only SYS user can connect and execute RMAN commands on a target database.
考题
单选题For which database operation would you need the database to be in the MOUNT state()A
renaming the control filesB
re-creating the control filesC
dropping a user in your databaseD
dropping a tablespace in your databaseE
configuring the database instance to operate in the ARCHIVELOG or NOARCHIVELOG modes
考题
单选题You executed the STARTUP MOUNT command to start your database. For which database operation do you need to start the database in the MOUNT state?()A
renaming the control filesB
dropping a user in your databaseC
enabling or disabling redo log archivingD
dropping a tablespace in your databaseE
re-creating the control files, after you lost all the control files in your database
考题
单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()A
Enable the Require domain controller to unlock policy.B
Set the Number of previous logons to cache policy to 0. C
Remove all user and group accounts from the Log on locally user right. D
Remove all user and group accounts from the Access this computer from the network user right.
考题
单选题You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?()A
Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. B
Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. C
Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. D
Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account.
考题
单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a file server that contains two volumes named C and D. Volume C contains a folder named User1data. User1 is the owner of all files in the User1data folder. You copy the User1data folder to volume D. You examine the ownership of the User1data folder on volume D and discover that your user account is listed as the owner. You need to ensure that User1 is the owner of the User1data folder on volume D. What should you do? ()A
Modify the Advanced Security settings for the User1data folder.B
Modify the Advanced Attributes settings for the User1data folder.C
Delete the User1data folder on volumeD
From Windows Explorer, move the User1data folder from volume C to volume
考题
单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA. What should you do?()A
Assign the user account to the CA Admin role.B
Add the user account to the local Administrators group.C
Grant the user the Back up files and directories user right.D
Grant the user the Manage auditing and security log user right.
考题
单选题When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()A
identify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator B
identify CSQs and JTAPI user and designate a Cisco CRS administrator C
identify resources and RM user and enter information about your LDAP D
identify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources
考题
单选题You have an Exchange Server 2010 organization named contoso.com. Your company is investigating a user named User1. You need to prevent User1 from permanently deleting the items in his mailbox. What should you run()?A
Set-Mailbox User1 -LitigationHoldEnabled $trueB
Set-Mailbox User1 -ModerationEnabled $trueC
Set-Mailbox User1 -RetainDeletedItemsUntilBackup $trueD
Set-Mailbox User1 -RetentionHoldEnabled $true
考题
单选题You are attempting to connect to your ISP. You view the status change from Dialing to Verifying user name and password. After several seconds, the status changes to Disconnecting. You are then disconnected from the computer you dialed. You verify that your user name and password are entered correctly. You want to enable your Computer to connect to your ISP correctly. What should you do? ()A
Configure your connection to enable data encryption.B
Configure your connection to use the UNIX SLIP server.C
Configure your connection to allow unsecured passwords.D
Instruct your ISP to configure your account to support Multilink.
考题
单选题You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user. What should you do? ()A
Enable the User Account Control: Only elevate executables that are signed and validated option.B
Disable the User Account Control: Only elevate executables that are signed and validated option.C
Configure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.D
Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.
考题
单选题You would like to configure your PC's IP address of 10.10.0.156 as an FTP host with a username of user and a password of mypass.Which configuration command accomplishes this goal?()A
host user pc 10.10.0.156 ftp user mypassB
host user pc 10.10.0.156 tftp user mypassC
host name user pc 10.10.0.156 ftp user mypassD
host name user pc 10.10.0.156 tftp user mypass
热门标签
最新试卷