网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
You share your computer with two users who belong to the Users group. You need to ensure that all users are informed of new updates. What should you do?()
A
Enable the Turn on recommended updates via Automatic Updates option.
B
Enable the Allow non-administrators to receive update notifications option.
C
Enable the Enable client-side targeting option and specify the target group.
D
Disable the Do not display Install Updates and Shut Down option in Shut Down Windows Dialog box option.
参考答案
参考解析
解析:
暂无解析
更多 “单选题You share your computer with two users who belong to the Users group. You need to ensure that all users are informed of new updates. What should you do?()A Enable the Turn on recommended updates via Automatic Updates option.B Enable the Allow non-administrators to receive update notifications option.C Enable the Enable client-side targeting option and specify the target group.D Disable the Do not display Install Updates and Shut Down option in Shut Down Windows Dialog box option.” 相关考题
考题
Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers. You purchase a new computer. You install Microsoft Windows Vista on the new computer. You need to migrate the following content from the old computer to the new computer:All system and program settingsAll users settingsOnly the content in the C:\Appdata folderWhich tool should you use?()A.AB.BC.CD.D
考题
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless netework is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile.What should you do?()A.AB.BC.CD.D
考题
You share your computer with other users. You install a new Microsoft add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require.You need to ensure that you are able to view videos without affecting other users.What should you do?()A.AB.BC.CD.D
考题
You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D
考题
You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information. What should you do?()A、Use Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant Sales Staff Special access for the reports on the network share.C、Use Windows Explorer to enable automatic caching for documents on the network share.D、Create a new share for the Sales users only and enable caching on that share only.
考题
You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
考题
You need to design a permission structure for registry objects that enables the legacy application at the resorts to run. Your solution must comply with the written security policy. What should you do?()A、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application, Use the GPO to give the Domain Users security group full control on the partitions of the registry that the legacy application usesB、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application. Use the GPO to give the Domain Users security group full control on the HKEY_USERS partition of the registryC、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to make all users who require access to the application members of Local Administrators group on each computerD、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to give all users who require access to the application full control for the Ntuser.dat file
考题
You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.
考题
You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel Data Sources (ODBC).B、Control Panel System Tools Shared Folders.C、Computer Management System Tools System Information.D、Computer Management System Tools Shared Folders Open Files.E、Computer Management System Tools Shared Folders Sessions.F、Computer Management System Tools Shared Folders Shares.
考题
You share your computer with a co-worker by using separate user accounts to log on. Your co-worker modifies the wireless network properties. When you use the computer, the change in properties is not reflected. You need to ensure that you can view all the changes made to the wireless network properties. What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network with the Save this network for me only option.
考题
Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer. You need to ensure that other users are able to access only the shared files. What should you do? ()A、Restart the Workstation service on your computer.B、Change all of your TCP port exceptions to UDP port exceptions.C、Ensure parental controls are not configured to block file sharing.D、Clear the Block all incoming connections check box in Windows Firewall.
考题
Your network contains a computer that runs Windows XP Professional. Multiple users share the computer. You create a custom user profile on the computer. You need to ensure that all new users of the computer receive the custom user profile. What should you do?() A、Run the Files and Settings Transfer Wizard.B、At the command prompt, run scanstate.exe. C、Use the Copy To function from the User Profiles settings. D、Rename the folder that contains the custom user profile to winnt_user.
考题
You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()A、Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.B、Use Windows Explorer to grant users Special access for the reports on the network share.C、Use Windows Explorer to disable caching for the reports on the network share.D、Use Windows Explorer to disable Offline files.
考题
Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers. You purchase a new computer. You install Microsoft Windows Vista on the new computer. You need to migrate the following content from the old computer to the new computer: All system and program settings All users settings Only the content in the C:///Appdata folder Which tool should you use? ()A、File and Settings Transfer wizardB、Application Compatibility toolkitC、Windows Automated Installation toolkitD、Microsoft Windows Easy Transfer wizard
考题
You use Microsoft .NET Framework 4 to create a Windows application. You use ClickOnce technology to install the application on computers that run Windows 7 with User Access Control (UAC) enabled. The application requires access to environment variables on each computer. You need to ensure that users who do not have administrative permissions can install the application. Which deployment method should you use? ()A、Start from Web.B、Install from Web.C、Start from network shareD、Install from network share.
考题
You upgraded a computer to Windows 2000 Professional and kept the FAT32 file system. You want each of three employees who use this computer to have their own documents area that no one else can access. You create a shared folder for each of the three users. You give only the owner permission to use the folder. Later in the week you are informed that User1's folder was modified while User1 was on vacation. What is wrong with your security configuration? ()A、Local computer policy must restrict the rights of the three users.B、You gave each share the same name under the users’ Documents and Settings folders.C、Shared folder security only works when accessing the folder over the network.D、Domain authentication should be required at log on.
考题
Your Windows 2000 Professional computer has 10 shared folders that are available to other network users. A user reports that he cannot access a shared folder named Share A. You want to respond to the user’s problem as quickly as possible by using an administrative tool. However, you cannot remember the server location of Share A. What should you do?()A、Use Windows Explorer to display the file paths of your shared folders.B、Use Storage in Computer Management to view logical drive properties.C、Use Event Viewer in Computer Management to search for shared folder error messages.D、Use System Tools in Computer Management to display the file paths of your shared folders.
考题
You need to design the network to support the company’s VPN requirements for mobile users who connect to the network in Seattle. Which two actions should you perform?()A、Use a password generator application to create a preshared key, and distribute it to all mobile usersB、Use computer autoenrollment to create digital certificates that can be used to authenticate to a VPN serverC、Acquire a digital certificate that can be used for SSL from a commercial CA for each computer that established a VPN connectionD、Configure IPSec policies on all Routing and Remote Access servers to require the use of digital certificates
考题
You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A、Use Windows Explorer to receive the offline filesB、Using the Windows Explorer, disable the cache for the reports on the network shareC、Use the Windows NT explorer to grant the special access for the reports on the network shareD、Use the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
考题
单选题You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker. You need to prevent your co-worker from modifying your wireless network profile. What should you do?()A
Disable the Connect even if the network is not broadcasting option.B
In the Network and Sharing Center window, click the Diagnose and repair option.C
Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D
Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.
考题
单选题You use a Windows 2000 Professional computer.You are responsible for maintaining Company’s client contact list. You want other users on the networkto be able to read the client contact list. You use Windows Explorer to share the client contact list folderon the network.You want users touse the most current available information when contacting clients. You want toprevent users from enabling offline access for the network share that contains the client contact list.What should you do?()A
Use Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.B
Use Windows Explorer to grant users Special access for the reports on the network share.C
Use Windows Explorer to disable caching for the reports on the network share.D
Use Windows Explorer to disable Offline files.
考题
单选题You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A
Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B
Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C
Use Windows Explorer to turn on auditing for the specific files. D
Have the administrator for domains log you on as an administrator and enable auditing for a specific file.E
Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F
Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
考题
单选题You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A
Control Panel Data Sources (ODBC).B
Control Panel System Tools Shared Folders.C
Computer Management System Tools System Information.D
Computer Management System Tools Shared Folders Open Files.E
Computer Management System Tools Shared Folders Sessions.F
Computer Management System Tools Shared Folders Shares.
考题
单选题You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must appear on the desktop of new users only. What should you do?()A
Copy the shortcut to %systemdrive%/documents and settings/default user/desktop/.B
Copy the shortcut to %systemdrive%/documents and settings/all users/desktop/.C
Copy the shortcut to your desktop. Modify the %comspec% system environment variable. D
Copy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.
考题
单选题You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information. What should you do?()A
Use Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.B
Use Windows Explorer to grant Sales Staff Special access for the reports on the network share.C
Use Windows Explorer to enable automatic caching for documents on the network share.D
Create a new share for the Sales users only and enable caching on that share only.
考题
单选题From your Windows 2000 Professional computer, you need to map drive G to the default administrative share on drive C of a server named srv01. Which command can you use? ()A
Net share C$=G:///B
Net share Admin$=G:///C
Net use G:// //AppSrv01/C$D
Net use G; //AppSrv01/Admin$
考题
单选题You upgraded a computer to Windows 2000 Professional and kept the FAT32 file system. You want each of three employees who use this computer to have their own documents area that no one else can access. You create a shared folder for each of the three users. You give only the owner permission to use the folder. Later in the week you are informed that User1’s folder was modified while User1 was on vacation. What is wrong with your security configuration? ()A
Local computer policy must restrict the rights of the three users.B
You gave each share the same name under the users’ Documents and Settings folders.C
Shared folder security only works when accessing the folder over the network.D
Domain authentication should be required at log on.
热门标签
最新试卷