网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A computer ( )allows users to exchange date quickly,access and share resources

A.device

B.network

C.storage

D.database


参考答案

更多 “ A computer ( )allows users to exchange date quickly,access and share resourcesA.deviceB.networkC.storageD.database ” 相关考题
考题 ●A multimedia system allows end users to share,transfer and process avariety of forms of information in a (75) manller.(75) A.fixedB.fixC.unifyingD.unified

考题 Which configuration statement allows local non-root users access to the router only when theRADIUS server is unreachable?() A.B.C.D.

考题 You share your computer with other users. You install a new Microsoft add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require.You need to ensure that you are able to view videos without affecting other users.What should you do?()A.AB.BC.CD.D

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You create two shares as shown in the following table.You need to ensure that only members of the HR group can access files in the HR folder without affecting other users’ access to files in the CorpData folder.What should you do? ()A. Modify the NTFS permissions on the HR folder to deny Read access to the Domain Users group.B. Disable NTFS permission inheritance on the HR folder and copy the inherited permissions.C. Move the HR folder to D:\. Share D:\HR as HRData and assign the HR group Allow - Change.D. Modify the share permissions for the HRData share to deny read access to the Domain Users group.

考题 Which description best characterizes the Cisco mobility solution?() A. provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transitB. authenticates users and devices so that it is impossible for a rogue device to be connected to the networkC. allows you to centralize management, automate repetitive tasks, and provision IP services easilyD. centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN

考题 Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the networkA.complex B.unique C.catchy D.long

考题 Which description best characterizes the Cisco mobility solution? ()A、provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transitB、authenticates users and devices so that it is impossible for a rogue device to be connected to the networkC、allows you to centralize management, automate repetitive tasks, and provision IP services easilyD、centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN

考题 Which of the following BEST describes the purpose of user account control (UAC) in WindowsVista?()A、UAC ensures that standard users cannot access the files and folders of administrative users.B、UAC allows a computer administrator to add new user accounts to the system, configure passwords and settings for existing users, or remove existing user accounts.C、UAC ensures that viruses and other malware cannot infect the computer, eliminating the need for third-party antivirus solutions.D、UAC ensures that important changes cannot be made to Windows Vista without the permission of a computer administrator.

考题 Which feature allows multiple partitions to share access to the network through the same physical adapter?()A、VLANB、EtherChannelC、Virtual I/O ServerD、IP address aliasing

考题 You have a computer that runs Windows 7. The computer is a member of a domain. You share D:/data asData. You assign Everyone Full control share permissions to the folder. No other share permissions areassigned to the folder. From another computer, you attempt to create a file in the Data share by using a domain account named User1. You receive the following error message: Destination Folder Access Denied.You need to ensure that you can create files in the Data share by using the User1 account.  What should you do?()A、Create a local user named User1.B、Add User1 to the local Power Users group.C、Assign User1 Write NTFS permission on the D:///data folder.D、Assign User1 Full control share permissions to the Data share.

考题 You need to design a solution so that users in the retail outlets can access their e-mail on the Exchange 2003 servers. What should you do?()A、Install an Exchange 2003 server infrastructure that will support POP3 connections from the Internet. Install a user certificate on each client computer at the retail outlets. Instruct the users to sign and encrypt all outbound e-mail messagesB、Install an Exchange 2003 server infrastructure that will support encrypted POP3 connections from the Internet. Configure the client computer in the retail outlets to use an encrypted connection to the POP3 serverC、Install an Exchange 2003 server infrastructure that will support encrypted Microsoft Outlook Web Access connections from the Internet. Instruct all users at the retail outlets to access their e-mail by using Microsoft Internet Explorer 5.5 or later to connect to the secure Microsoft Outlook Web Access serverD、Install an Exchange 2003 server infrastructure that will support encrypted IMAP4 connections from the Internet. Configure the client computers in the retail outlets to use an encrypted connection to the IMAP4 server

考题 You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel  Data Sources (ODBC).B、Control Panel  System Tools  Shared Folders.C、Computer Management  System Tools  System Information.D、Computer Management  System Tools  Shared Folders  Open Files.E、Computer Management  System Tools  Shared Folders  Sessions.F、Computer Management  System Tools  Shared Folders  Shares.

考题 Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer.  You need to ensure that other users are able to access only the shared files.  What should you do? ()A、Restart the Workstation service on your computer.B、Change all of your TCP port exceptions to UDP port exceptions.C、Ensure parental controls are not configured to block file sharing.D、Clear the Block all incoming connections check box in Windows Firewall.

考题 You have a computer that runs Windows XP Professional. Many users share the computer. You install a local print device on the computer. You need to ensure that only members of a local group named Engineering can print documents to the local print device. Which settings should you modify on the printer?() A、portB、priorityC、securityD、share

考题 You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant users Special access for the reports on the network share.C、Use Windows Explorer to disable caching for the reports on the network share.D、Use Windows Explorer to disable Offline files.

考题 You have an Exchange Server 2007 organization.All users on your network run Microsoft Office Outlook 2007 to access their mailboxes.Outlook 2007 is configured to connect by using RPC over HTTP and Auto discover. You perform a Typical installation of Exchange Server 2010 on a new server, and then move mailboxes to the new server.Users now report that they cannot access their mailboxes.You need to ensure that all users can access their mailboxes. What should you do from the new server?()A、Select the Switchover Server option.B、Enable and configure Outlook Anywhere.C、Create and configure a Client Access array.D、Rename the OWA virtual directory to Exchange.

考题 You have an Exchange Server 2003 organization.  Users access public folders by using Microsoft Office Outlook 2003 and Outlook Web App. You plan to transition the organization to Exchange Server 2010.  You need to ensure that users can access public folders after their mailboxes have been moved to Exchange Server 2010.  What should you do?()A、Enable public folder referrals.B、Run the New Organization Relationship wizard.C、Create public folder replicas on an Exchange Server 2010 server.D、Run the Microsoft Exchange Inter-Organization Replication tool from an Exchange Server 2003server.

考题 You have a computer that runs Windows XP Professional. Five users share the computer. A user named User1 is a member of the Power Users group and the Administrators group. User1 has encrypted files on the computer. User1 takes an extended leave of absence. You need to ensure that users cannot access the computer as User1. You must be able to provide User1 access to the files upon User1’s return. What should you do?() A、Disable the User1 account.B、Add User1 to the Guests group. C、Reset the password for the User1 account. D、Rename ntuser.dat as ntuser.man in the User1 user profile.

考题 our network contains an Active Directory domain named contoso.com. The domain contains a file server named Server1 that runs Windows Server 2012 R2. Server1 contains a shared folder named Share1. Share1 contains the home folder of each user. All users have the necessary permissions to access only their home folder. The users report that when they access Share1, they can see the home folders of all the users. You need to ensure that the users see only their home folder when they access Share1. What should you do from Server1?()A、From Windows Explorer,modify the properties of the volume that contains Share1.B、From Server Manager,modify the properties of the volume that contains Share1.C、From Server Manager,modify the properties of Share1.D、From Windows Explorer,modify the properties of Share1.

考题 You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner.  What should you modify?()A、the Federation TrustB、the EWS virtual directoryC、the default sharing policyD、the Organizational Relationship

考题 Your Windows 2000 Professional computer has 10 shared folders that are available to other network users. A user reports that he cannot access a shared folder named Share A.  You want to respond to the user’s problem as quickly as possible by using an administrative tool. However, you cannot remember the server location of Share A.  What should you do?()A、Use Windows Explorer to display the file paths of your shared folders.B、Use Storage in Computer Management to view logical drive properties.C、Use Event Viewer in Computer Management to search for shared folder error messages.D、Use System Tools in Computer Management to display the file paths of your shared folders.

考题 单选题You have an Exchange Server 2010 organization that contains five Mailbox servers and five Client Access servers.All users in the organization connect to their mailboxes by using Outlook Anywhere.You create a Client Access server array.You need to ensure that all users can connect to the Client Access server array.What should you do?()A From the Exchange Management Shell, run the Set-Mailbox cmdletB From the Exchange Management Shell, run the Set-MailboxDatabase cmdletC From the Exchange Management Console (EMC), modify the properties of each mailbox databaseD From the Exchange Management Console (EMC), modify the properties of each Client Access server object

考题 单选题You have an Exchange Server 2010 organization.Users report that they can share free/busy information with users at a federated partner, but they cannot share contacts with those users. You need to ensure that your users can share contacts with users at the federated partner.  What should you modify?()A the Federation TrustB the EWS virtual directoryC the default sharing policyD the Organizational Relationship

考题 单选题You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network. What should you do?()A On Folder1, modify the share permissions.B On Folder1, modify the NTFS permissions.C Add all local user accounts to the Guests group. D Add all local user accounts to the Network Configuration Operators group.

考题 单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A Use Windows Explorer to receive the offline filesB Using the Windows Explorer, disable the cache for the reports on the network shareC Use the Windows NT explorer to grant the special access for the reports on the network  shareD Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

考题 单选题You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information.  What should you do?()A Use Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.B Use Windows Explorer to grant Sales Staff Special access for the reports on the network share.C Use Windows Explorer to enable automatic caching for documents on the network share.D Create a new share for the Sales users only and enable caching on that share only.

考题 单选题You have an Exchange Server 2003 organization.  All users connect to their mailboxes by using Microsoft Office Outlook.  You start to transition the organization to new Exchange Server 2010 servers. The new servers are on a secured subnet that is separated by a firewall. You will move half of the mailboxes to the new servers.  Client Access servers and Mailbox servers are on the secured subnet. Client computers on the network can access the Client Access servers.  You need to recommend a solution that allows users to connect to Public Folders by using Outlook orOutlook Web App (OWA).  What should you include in the solution?()A Public Folder referrals and forms-based authenticationB Public Folder referrals and HTTP connections to the Mailbox serversC Public Folder replicas and MAPI connections to the Mailbox serversD Public Folder replicas and WebReady Document Viewing