网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You delete content from a file named Speed.doc that is stored in the C:///Data folder. You edit 20 files in this folder over the next two days.  You need to restore the version of the file that had the correct data. You also need to ensure that the other files in the folder remain unaffected.  What should you do? ()
A

From the Previous Versions tab, restore the version of the file that contains the correct data.

B

Restore a version of the folder that contains the correct version of the file.

C

Open a version of the folder that contains the correct version of the file.

D

Copy a version of the folder that contains the correct version of the file. Replace the existing version of the folder with the older version.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You delete content from a file named Speed.doc that is stored in the C:///Data folder. You edit 20 files in this folder over the next two days.  You need to restore the version of the file that had the correct data. You also need to ensure that the other files in the folder remain unaffected.  What should you do? ()A From the Previous Versions tab, restore the version of the file that contains the correct data.B Restore a version of the folder that contains the correct version of the file.C Open a version of the folder that contains the correct version of the file.D Copy a version of the folder that contains the correct version of the file. Replace the existing version of the folder with the older version.” 相关考题
考题 You are the administrator of several SQL Server 2000 computers. A data Transformation Services (DTS) package uses native OLE DB providers to transfer data between the servers. Connection details for the servers are specified in .udl files. The .udl files are frequently updated as connection details change.You want to distribute the DTS package as a file to developers in your company. You want to make sure connection details are available to developers who receive the DTS package.Which two tasks should you perform? (Each correct answer presents part of the solution. Choose two)A.Enable the Always read properties from UDL file option in the Connection Properties dialog box.B.Disable the Always read properties from UDL file option in the Connection Properties dialog box.C.Delete the .udl files and store connection details in the registry by using system data source names.D.Delete the .udl files, and store connection details in the registry by using user data source names.E.Make the .udl files available on a network share.

考题 You create a master page named PageBase.master. The master page contains a Label control named lblTitle.You create a content page that references the master page.You need to change the Text property of the master page‘s lblTitle control from the content page.Which code segment should you use?()A.B.C.D.

考题 You delete content from a file named Speed.doc that is stored in the C:\Data folder. You edit 20 files in this folder over the next two days. You need to restore the version of the file that had the correct data. You also need to ensure that the other fiels in the folder remain unaffected.What should you do?()A.AB.BC.CD.D

考题 You are the administrator of a Windows 2000 Server computer. A folder named HR-Data on the system partition of the server is shared on the network as HR-Data. The owner of the HR-Data folder is Administrators.The shared permissions and NTFS permissions are shown in the following table.Share permissions:Everyone: FULL ControlNTFS permissionsDomain Admins: ReadKatrin: Full ControlKatrin creates a file in the HR-Data folder. She sets the NTFS permissions for the file to list only herself on the access control list, with Full Control permission. Katrin then leaves on vacation and cannot be contacted.Later, you discover that the file contains sensitive information and must be removed from the server as soon as possible. You want to delete the file without modifying any of the permissions for other files in the HR-Data folder. You want your actions to have least possible impact on users who may be using other files in the HR-Data folder. You want to use the minimum amount of authority necessary to delete the file.What should you do?A.Grant yourself Full Control permission for only the HR-data folder and not its subobjects. Delete the file. Then remove Full Control permission for HR-Data folder.B.Take ownership of the HR-Data folder. When prompted, take ownership of the existing files. Grant yourself Full Control permission for the file. Delete the file.C.Take ownership of the file. Grant yourself Modify permission for the file. Delete the file.D.Grant yourself Modify permission for the HR-Data folder and its subobjects. Delete the file. Then remove Modify permission for the HR-Data folder.

考题 Which of the following answer choices are correct characteristics of named access list?() A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists.

考题 Which content network component is primarily used to store and deliver content from the network edge?()A、Content switchB、Content routerC、Content engineD、Content Distribution Manager (CDM)

考题 Which content network component is primarily used to store and deliver content from the network edge?()A、Content routerB、Content switchC、Content Distribution Manager (CDM)D、Content engine

考题 Which of the following answer choices are correct characteristics of named access list?()A、You can delete individual statements in a named access listB、Named access lists require a numbered range from 1000 to 1099.C、Named access lists must be specified as standard or extended.D、You can use the ip access-list command to create named access lists.E、You cannot delete individual statements in a named access list.F、You can use the ip name-group command to apply named access lists.

考题 Your network contains a file server named Server1 that runs Windows Server 2008 R2.On Server1, you create a disk quota for volume E that limits storage to 200 MB for all users.You need to ensure that a user named User1 can store files that are larger than 200 MB on volume E. What should you do? ()A、From a command prompt, run dirquota.exe.B、From Disk Management, create a new quota entry.C、From Windows Explorer, modify the security properties of the volume.D、From File Server Resource Manager, create a file screen exception.

考题 Which of the following are contained in a store archive?()A、a JAR file containing commands and JSPsB、an XML file defining the content of the store archiveC、a ZIP file of Java properties files containing translated textD、a database backup file used to define store dataE、a number of ZIP files used to define store data

考题 You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) for backup and recovery of your database. You executed the delete command in RMAN to delete a backup of a tablespace. Which statement is true in this scenario?()A、The backup status will be marked expired in RMAN recovery catalog.B、The backup status will be marked deleted in RMAN recovery catalog after you execute the crosscheck command.C、The backup will be deleted physically from the OS (Operating system)and the backup information is removed from the recovery cataloglD、The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system).E、The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system), if you are not using Oracle Managed Files (OMF).

考题 You have a computer named Computer1 that runs Windows 7. The computer is a member of an ActiveDirectory domain. The network contains a file server named Server1 that runs Windows Server 2008. Youlog on to the computer by using an account named User1. You need to ensure that when you connect toServer1, you authenticate by using an account named Admin1.  What should you do on Computer1?()A、From User Accounts, select Link online IDs.B、From Windows CardSpace, select Add a card.C、From Credential Manager, select Add a Windows credential.D、From Local Security Policy, modify the Access this computer from the network user right

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. A member server named Testking1 runs IIS and hosts all content for company Web sites. One Web site is redesigned. When you browse the redesigned site, you select a hyperlink and receive the following error message: "HTTP Error 404 - File or directory not found." You verify that a necessary content file is missing from Testking1. You need to discover whether the same error was generated by any other Web server requests. What should you do?()A、Open the most recent file in C:/windows/system32/inetsrv/History. Search for error entries of type 404.B、Open the most recent file in C:/windows/system32/LogFiles/W3SVC1. Search for error entries of type 404.C、Open Event Viewer and connect to Testking1. Filter the system event log to display only events from the IISLOG event source with event ID 404.D、Open Event Viewer and connect to Testking1. Filter the application event log to display only events from the WebClient event source with event ID 404.

考题 You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You enable Shadow Copies on all drives by using the default options. You run a full backup every Monday at 02:00. You run an incremental backup every day at 02:00, except on Monday. On Thursday at 14:00, a user reports that he accidentally deleted a file named File1.doc in a shared folder named //Server1/Data/. The user reports that the file was last updated at 09:00 on Thursday. You need to restore the latest version of File1.doc. What should you restore? ()A、the file by using the Previous Versions ClientB、the file from the full backup performed on MondayC、the file from the incremental backup performed on ThursdayD、the user’s computer by using Automated System Recovery (ASR)

考题 You are the network administrator for Company.A user named Bruno has limited dexterity, which prevents him from using the standard keyboardcompleting his daily computing tasks. You configure his Windows 2000 Professional computer to use theon-screen keyboard and ToggleKeys option. You save the accessibility option settings to a floppy disk.You copy the .acw file to the desktop of another user named Peter. Peter’s domain user account is amember of the local Power Users group. Peter executes the .acw file. Peter informs you that theaccessibility options are not to his liking.You want to remove the accessibility options enabled by the .acw file on Peter’s computer.What should you do? ()A、Delete the .acw file from Peter’s desktop.B、Remove Peter’s account from the local Power Users group.C、Run the Accessibility wizard and select Restore Defaults.D、Use Task Manager to end the Explorer.exe process.

考题 You delete content from a file named Speed.doc that is stored in the C:///Data folder. You edit 20 files in this folder over the next two days.  You need to restore the version of the file that had the correct data. You also need to ensure that the other files in the folder remain unaffected.  What should you do? ()A、From the Previous Versions tab, restore the version of the file that contains the correct data.B、Restore a version of the folder that contains the correct version of the file.C、Open a version of the folder that contains the correct version of the file.D、Copy a version of the folder that contains the correct version of the file. Replace the existing version of the folder with the older version.

考题 You have a server named Server 1.Server1 runs Windows Server 2012 R2. Server1 has a thin provisioned disk named Disk1.You need to expand Disk1.Which two actions should you perform?()A、From File and Storage Services, extend Disk1B、From File and Storage Services, add a physical disk to the storage poolC、From Disk Management, extend the volumeD、From Disk Management, delete the volume, create a new volume, and then format the volumeE、From File and Storage Services, detach Disk1

考题 You have a computer named Computer1 that runs Windows XP Professional. Computer1 is a member of a workgroup. You need to prevent all users from encrypting files on Computer1. What should you do?() A、For all files, deny the Take ownership permission to the Everyone group. B、From the Local Security Policy, modify the Encrypting File System (EFS) properties.C、From the Certificates snap-in, delete the recovery agent certificate. D、From the Certificates snap-in, delete all trusted root certification authority (CA) certificates. 

考题 You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()A、Map a network drive to the AccSecured/intern folder from Richard’s computer.B、Map a network drive to the AccSecured shared folder from Richard’s computer.C、Allow the intern user account modify permissions on the intern subfolder.D、Allow the intern user account traverse folder/execute file permission on the AccSecured folder.E、Allow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.

考题 You create a master page named Template.master. Template.master contains the following ContentPlaceHolder server controls.You also create 10 Web Forms. The Web Forms reference Template.master as their master page. Each Web Form has the following Content controls that correspond to the ContentPlaceHolder controls in Template.master.You need to configure the Web pages so that default content will be shown in the area2 ContentPlaceHolder control whenever a Web Form does not provide that content. What should you do? ()A、Move default content inside area2 in Template.master. Remove area2 from Web Forms that do not provide content.B、Move default content inside area2 in Template.master. Leave area2 blank in Web Forms that do not provide content.C、Move default content inside area2 in the Web Forms. Remove area2 from Template.master.D、Create an additional ContentPlaceHolder control in Template.master named area2_default. Place default content inside area2_default. Remove area2 from Web Forms that do not provide content.

考题 Your network contains a file server named Server1 that runs Windows Server 2008 R2.You have a folder named Folder1.You need to ensure that files in Folder1 that are older than 365 days are automatically moved to an archive folder. What should you create from the File Server Resource Manager console?()A、a file groupB、a file management taskC、a file screenD、a quota

考题 多选题Which of the following are contained in a store archive?()Aa JAR file containing commands and JSPsBan XML file defining the content of the store archiveCa ZIP file of Java properties files containing translated textDa database backup file used to define store dataEa number of ZIP files used to define store data

考题 单选题Your network contains a file server named Server1 that runs Windows Server 2008 R2. Server1 has a volume named E.From the File Server Resource Manager console, you create a new quota for volume E. The quota is derived from the 100 MB limit quota template.You need to prevent users from storing audio and video files on volume E. What should you do?()A Create a file screen.B Create a file management task.C Modify the properties of the quota.D Modify the properties of the Audio and Video Files file group.

考题 单选题You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) for backup and recovery of your database. You executed the delete command in RMAN to delete a backup of a tablespace. Which statement is true in this scenario?()A The backup status will be marked expired in RMAN recovery catalog.B The backup status will be marked deleted in RMAN recovery catalog after you execute the crosscheck command.C The backup will be deleted physically from the OS (Operating system)and the backup information is removed from the recovery cataloglD The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system).E The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system), if you are not using Oracle Managed Files (OMF).

考题 单选题You have a computer named Computer1 that runs Windows XP Professional. Computer1 is a member of a workgroup. You need to prevent all users from encrypting files on Computer1. What should you do?()A For all files, deny the Take ownership permission to the Everyone group. B From the Local Security Policy, modify the Encrypting File System (EFS) properties.C From the Certificates snap-in, delete the recovery agent certificate. D From the Certificates snap-in, delete all trusted root certification authority (CA) certificates. 

考题 单选题You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You enable Shadow Copies on all drives by using the default options. You run a full backup every Monday at 02:00. You run an incremental backup every day at 02:00, except on Monday. On Thursday at 14:00, a user reports that he accidentally deleted a file named File1.doc in a shared folder named //Server1/Data/. The user reports that the file was last updated at 09:00 on Thursday. You need to restore the latest version of File1.doc. What should you restore? ()A the file by using the Previous Versions ClientB the file from the full backup performed on MondayC the file from the incremental backup performed on ThursdayD the user’s computer by using Automated System Recovery (ASR)

考题 单选题Your network contains a file server named Server1 that runs Windows Server 2008 R2.You have a folder named Folder1.You need to ensure that files in Folder1 that are older than 365 days are automatically moved to an archive folder. What should you create from the File Server Resource Manager console?()A a file groupB a file management taskC a file screenD a quota