网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following is the administrator’s profile path in Windows 2000?()
A

C:/Profiles/Administrator

B

C:/Windows/System32

C

C:/Users/Administrator

D

C:/Documents and Settings/Administrator


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following is the administrator’s profile path in Windows 2000?()A C:/Profiles/AdministratorB C:/Windows/System32C C:/Users/AdministratorD C:/Documents and Settings/Administrator” 相关考题
考题 An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router

考题 CDE is working. However, the customized PATH environment has not been implemented. Which of the following procedures should be performed to activate he implementation?() A.Update the .kshrc fileB.Edit $HOME/.dtprofile, and uncomment the DTSOURCEPROFILE=trueC.Copy /etc/.profile $HOME/.dtprofile and edit the file as neededD.Double click on the System Administration icon and select CDE profile

考题 CDE is working. However, the customized PATH environment has not been implemented. Which of the following procedures should be performed to activate the implementation?() A.Update the .kshrc fileB.Edit $HOME/.dtprofile, and uncomment the DTSOURCEPROFILE=trueC.Copy /etc/.profile to $HOME/.dtprofile and edit the file as neededD.Double click on the System Administration icon and select CDE profile

考题 Which of the following is MOST important for an administrator to investigate prior to making a change on a server?()A、Manufacturer’s specificationsB、Organizational impactC、Vendor listsD、Compatibility requirements

考题 An administrator notes that after a recent power outage, some open files were corrupted on one affected file server. Which of the following items should the administrator consider to determine the cause of this corruption?()A、The server's memoryB、The server's RAID controller batteryC、The server's processorD、The server's NIC teaming configuration

考题 CDE is working. However, the customized PATH environment has not been implemented. Which of the following procedures should be performed to activate the implementation?()A、Update the .kshrc fileB、Edit $HOME/.dtprofile, and uncomment the DTSOURCEPROFILE=trueC、Copy /etc/.profile to $HOME/.dtprofile and edit the file as neededD、Double click on the System Administration icon and select CDE profile

考题 A system administrator has edited the necessary files for setup of an AIX system to serve as a bootp server.  Which of the following commands is required to complete the activation?()A、telinit -qB、startsrc -s bootpdC、refresh -s inetd

考题 You are the domain administrator for your company. Roaming profiles are enabled for all users in the sales department. Roaming profiles are stored on a server named Server1, in a shared folder named Profiles. Roger is a user in the sales department. Susan is Roger's manager. Susan reports that Roger modifies his desktop settings, which results in the need for help desk assistance and in lost productivity for Roger. You want to ensure that Roger cannot modify his roaming profile. What should you do?() A、In Active Directory Users and Computers, on Roger's profile tab, change the profile path to //Server1/Profiles/%username%.dat. B、In Active Directory Users and Computers, on Roger's profile tab, change the profile path to //Server1/Profiles/%username%.man. C、In Roger's profile on Server1, change the file name of Ntuser.dat to Ntuser.man.D、In Roger's profile on his computer, change the file name of Ntuser.dat to Ntuser.man.

考题 An administrator wants to use a Windows system to monitor a server that is rebooting. Which of the following commands should the administrator use to know when the NIC is back online in the server?()A、 ping i 240B、 ping -tC、 ping -aD、 ping w 240

考题 An engineer is preparing an implementation plan in which the configuration needs to influence BGP's choice of best path. Which of the following is least likely to be used by the configuration in this imple mentation plan?()A、WeightB、Origin codeC、AS_PathD、Local_Pref

考题 Which of the following would an administrator use to configure a server’s BIOS settings even if the OS crashes?()A、 VPNB、 KVM over IPC、 TelnetD、 Remote Desktop

考题 An administrator is having problems with a server’s built-in I/O devices such as keyboard and USB ports. Which of the following is the BEST solution to resolve the problem?()A、Upgrade to the latest security patchB、Reinstall the operating systemC、Update the faulty equipment driversD、Upgrade to a new service pack

考题 Which of the following would an administrator follow when disposing of equipment for a financial institution?()A、Local laws and regulationsB、Escalation procedure regulationsC、Manufacturer's regulationsD、Server OEM regulations

考题 An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router

考题 Which of the following is the administrator’s profile path in Windows 2000?()A、C:/Profiles/AdministratorB、C:/Windows/System32C、C:/Users/AdministratorD、C:/Documents and Settings/Administrator

考题 A system administrator has a filesystem called /test/data in volume group datavg. Which of the following commands will allow the administrator to create a mirrored copy of the filesystem’s data?()A、chfsB、chlvC、mklvcopyD、mkfscopy

考题 For security reasons, an administrator is asked to modify the system to prevent someone from  leaving a terminal logged in.  Which of the following options would enable a five minute timeout for all users()A、Add the following line to /etc/environment: TMOUT=300B、Add the following lines to /.profile TMOUT=5 export TMOUTC、Run the following command: chuser -u ALL -a TIMEOUT=5MD、Run the following command: chsec -u ALL -a TIMEOUT=600

考题 After making changes to the profile for an LPAR, the administrator asks the operator to bring the LPAR back up into a running state with the new changes. Which of the following is the correct way to do this?()A、Shutdown and activate the partition profileB、Reboot the partition using the reboot commandC、Reboot the partition using the 'shutdown -r' commandD、Right click on the partition profile and select the 'apply changes' option

考题 When trying to run topas on an AIX 4.3.x system, the system administrator gets the error message "ksh: topas:  not found."   Which of the following options is the most likely reason this occurred?()A、 The fileset bos.perf.tools is not loaded on this system.B、 The fileset perfagent.tools is not loaded on this system.C、 The command topas is only available in AIX version 5.x.D、 The path variable does not include /usr/samples/kernel/. Either add it to the .profile or cd to that location and run the command again.

考题 CDE is working. However, the customized PATH environment has not been implemented. Which of the following procedures should be performed to activate he implementation?()A、Update the .kshrc fileB、Edit $HOME/.dtprofile, and uncomment the DTSOURCEPROFILE=trueC、Copy /etc/.profile $HOME/.dtprofile and edit the file as neededD、Double click on the System Administration icon and select CDE profile

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional. You need to standardize the desktop environment for all client computers. Your solution must prevent domain users from permanently modifying their regional settings or the desktop background. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A、Specify the profile's network path in the user properties in Active Directory Users and Computers.B、Specify the profile's local path in the user properties in Computer Management.C、Specify the profile's network path in the user properties in Computer Management.D、In the network share where profiles reside, rename Ntuser.dat to Ntuser.man.E、In the local profile directory, rename Ntuser.dat to Ntuser.man.F、In the network share where profiles reside, rename Ntuser.ini to Ntuser.man.

考题 You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a user named Paul West. You create a user account named Paul West on the Windows 2000 server computer named server 1. You define a network profile by entering the path //server1/profile/%username% in Paul’s user account setting. When Paul logs on to a Windows 2000 Professional computer he sees the following message- “Windows can not locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server.” The details of network cannot be found. You want to configure the roaming user profile for Paul. What should you do?()A、Create a home folder for Paul.B、Share the network profile directory.C、Map a device to network profile directory.D、Use the %username% variable to allow access.

考题 单选题A storm’s track is characterized by all of the following except().A the direction the storm has come fromB the direction in which the storm is movingC the speed at which the storm is movingD the path taken by the storm

考题 单选题An administrator needs to add the /usr/vac/bin directory to their PATH environment variable for the current session.  Which of the following will accomplish this task()A path=$path:/usr/vac/bin; export pathB path.=/usr/vac/bin; export $pathC Modify the path environment variable in /etc/profileD Modify the path environment variable in /.profile

考题 单选题A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()A SSIDB WPA PassphraseC WEP KeyD Network Path

考题 单选题A System p administrator has created a customized security profile using AIX Security Expert.  Which of the following commands will apply this to a system()A aixpert -f mysec.xmlB aixpert -a mysec.xmlC chsec -f mysec.xmlD chsec -a mysec.xml

考题 单选题You are the desktop administrator for Contoso, Ltd. A graphic designer named Peter saves all his files in the My Documents folder on his Window XP Professional computer. Peter now needs to work on several computers each day to complete his work. Peter needs to be able to access his files at any time. You implement a roaming user profile and a home directory for Peter. However, Peter reports that when he uses his roaming profile, it takes 10 minutes for him to log on to computers other than his own. You need to reduce the amount of time it takes for Peter to log on to computers when using his roaming profile. What should you do?()A Change the UNC path of Peter’s roaming profile to his home directory folder. B Log on as a local administrator on Peter’s computer. Change the roaming profile to a local profile. C Log on as a local administrator on Peter’s computer. Edit the local Group Policy to exclude Directories in Roaming Profile. D Log on as a local administrator on Peter’s computer. In the properties of the My Documents folder, change the Target folder location to Peter’s home directory.

考题 多选题You are the network administrator for . The network consists of a single Active Directory domain All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional. You need to standardize the desktop environment for all client computers. Your solution must prevent domain users from permanently modifying their regional settings or the desktop background. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)ASpecify the profile's network path in the user properties in Active Directory Users and Computers.BSpecify the profile's local path in the user properties in Computer Management,CSpecify the profile's network path in the user properties in Computer Management.DIn the network share where profiles reside, rename Ntuser.dat to Ntuser.man.EIn the local profile directory, rename Ntuser.dat to Ntuser.man.FIn the network share where profiles reside, rename the Ntuser.ini to Ntuser.man.