网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user is reporting that access to a file server is much slower than it has been. The system administrator completes a test of the server using a system monitoring tool and compares it to the previously taken baseline. The comparison shows that there are no significant changes in the use ofsystem resources.  Which of the following actions should be taken to resolve this users problem?()
A

 Add additional RAM to the users PC

B

 Troubleshoot the users PC

C

 Add additional RAM to the server

D

 Add additional hard drive space to the server


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user is reporting that access to a file server is much slower than it has been. The system administrator completes a test of the server using a system monitoring tool and compares it to the previously taken baseline. The comparison shows that there are no significant changes in the use ofsystem resources.  Which of the following actions should be taken to resolve this users problem?()A  Add additional RAM to the users PCB  Troubleshoot the users PCC  Add additional RAM to the serverD  Add additional hard drive space to the server” 相关考题
考题 you configure a new file server that runs windows server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files.The TCP/IP properties for the file server are configured as shown in the following exhibit.You need to ensure that users are able to access the shared files. What should you do?()A.Configure a static IP address.B.Configure the default gateway.C.Configure the DNS server address.D.Add the domain to the DNS suffix on the network interface.

考题 You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.What should you do?A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.C.Create a Windows 2000 Group Policy that denies user access to My Network Places.D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.

考题 A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read

考题 A Windows file server has run out of space. In the interim the administrator is moving sever alarchived  confidential folders that have been encrypted off the file server and onto an older servers fileshares. After the move, a manager reports that they are able to access and modify some of the items that have been moved.  Which of the following is the MOST likely issue?()A、 The temporary server was formatted as NTFS.B、 The manager is a power user on the temporary server.C、 The temporary server was formatted as FAT32.D、 The manager is an administrator on the temporary server.

考题 A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

考题 A user is reporting that access to a file server is much slower than it has been. The system administrator completes a test of the server using a system monitoring tool and compares it to the previously taken baseline. The comparison shows that there are no significant changes in the use ofsystem resources.  Which of the following actions should be taken to resolve this users problem?()A、 Add additional RAM to the users PCB、 Troubleshoot the users PCC、 Add additional RAM to the serverD、 Add additional hard drive space to the server

考题 A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()A、 Reboot the file server.B、 Ask the user what they were doing when they noticed the problem.C、 Ask the user to reboot their PC.D、 Ask the user to ping the default gateway and report the response times back to the administrator.

考题 A user states that they cannot access a network shared drive. The technician has verified that the clients network cable is good. The IP address of the machine is 169.254.10.15. Which of the following is the cause of the problem?()A、The WINS server is not resolving names properly.B、The DNS server is not resolving names.C、The DHCP server is out of IP address leases.D、The hosts file is corrupted.

考题 On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which of the following is the cause of the problem?()A、The file server is offline.B、The DNS server is not resolving correctly.C、The DHCP server is not assigning correct IP addresses.D、The domain controller is not responding.

考题 A Windows file server has run out of space. In the interim the administrator is moving several archived confidential folders that have been encrypted off the file server and onto an older server file shares. After the move, a manager reports that they are able to access and modify some of the items that have been moved. Which of the following is the MOST likely issue?()A、The temporary server was formatted as NTFS.B、The manager is a power user on the temporary server.C、The temporary server was formatted as FAT32.D、The manager is an administrator on the temporary server

考题 User "twsuser" is logged on to the IBM Tivoli Workload Scheduler  Master Domain Manager server using Job Scheduling Console to update  calendar. The user receives a message: MODIFY on   CALENDAR access not granted.  What is the cause of this error?()A、 Batchman process is down.B、 User password has expired.C、 WebSphere security is damaged.D、 There are insufficient permissions in Security file.

考题 You develop a Web application that writes data to a file on a server. You restrict access to the file to specific Windows users. The Web application runs as CONTOSO/ASPNET. You deny anonymous access to the application in IIS. You add the following XML segment in the Web.config file.You need to ensure that the application meets the following requirements:It must impersonate the user when it writes data to the file.It must run as CONTOSO/ASPNET when a user does not access the file. Which two actions should you perform? ()A、Use the following XML segment in the Web.config file. identity impersonate="false"/B、Use the following XML segment in the Web.config file. identity impersonate="true"/C、Use the following code segment to access the file. Dim wp As WindowsPrincipal = _CType(HttpContext.Current.User, WindowsPrincipal) Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent() Dim wic As WindowsImpersonationContext = wi.Impersonate()' Access the file herewic.Undo()D、Use the following code segment to access the file. Dim wi As WindowsIdentity = WindowsIdentity.GetCurrent()Dim wic As WindowsImpersonationContext = _WindowsIdentity.Impersonate(wi.Token)' Access the file herewic.Undo()

考题 Your company has two branch offices that connect by using a WAN link. Each office contains a server that runs Windows Server 2008 R2 and that functions as a file server.   Users in each office store data on the local file server. Users have access to data from the other office.   You need to plan a data access solution that meets the following requirements: èFolders that are stored on the file servers must be available to users in both offices. èNetwork bandwidth usage between offices must be minimized.   èUsers must be able to access all files in the event that a WAN link fails. What should you include in your  plan?()A、On both servers, implement DFS Replication.B、On both servers, install and configure File Server Resource Manager (FSRM) and File Replication  service (FRS).C、On one server, install and configure File Server Resource Manager (FSRM). On the other server,install and configure File Replication Service (FRS).D、On one server, install and configure Distributed File System (DFS). On the other server, install and configure the Background Intelligent Transfer Service (BITS).

考题 单选题User "twsuser" is logged on to the IBM Tivoli Workload Scheduler  Master Domain Manager server using Job Scheduling Console to update  calendar. The user receives a message: MODIFY on   CALENDAR access not granted.  What is the cause of this error?()A  Batchman process is down.B  User password has expired.C  WebSphere security is damaged.D  There are insufficient permissions in Security file.

考题 单选题A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()A Request the user to logoff and log back on.B Add the user as an administrator on their local machine.C Add the user as an administrator on the server.D Run an ipconfig /renew on the user’s machine.

考题 单选题You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()A The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authenticationB The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.C The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,D The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.

考题 单选题You manage a computer running Windows 2000 Professional that belongs to a workgroup. You create a new user account (Tony) on that computer that is not a member of the Administrators group. You log on using the new account. You create a file with notepad in a folder that is on a volume formatted with NTFS. You encrypt the file. You give another user account defined on that computer, Luis the permission to take ownership of the file. Luis logs on using the account and takes ownership. However, she receives an error message reporting that access is denied when she tries to open the file. What can you do to allow Luis to open the file?()A Instruct Luis to decrypt the file before she tries to open it.B Log on with the account Tony and decrypt the file.C Move the file to a folder that is not encrypted on a different volume that is formatted with NTFS.D Move the file to a folder that is not encrypted on the same volume.

考题 单选题Your company has two branch offices that connect by using a WAN link. Each office contains a server that runs Windows Server 2008 R2 and that functions as a file server.   Users in each office store data on the local file server. Users have access to data from the other office.   You need to plan a data access solution that meets the following requirements: èFolders that are stored on the file servers must be available to users in both offices. èNetwork bandwidth usage between offices must be minimized.   èUsers must be able to access all files in the event that a WAN link fails. What should you include in your  plan?()A On both servers, implement DFS Replication.B On both servers, install and configure File Server Resource Manager (FSRM) and File Replication  service (FRS).C On one server, install and configure File Server Resource Manager (FSRM). On the other server,install and configure File Replication Service (FRS).D On one server, install and configure Distributed File System (DFS). On the other server, install and configure the Background Intelligent Transfer Service (BITS).

考题 单选题On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which of the following is the cause of the problem?()A The file server is offline.B The DNS server is not resolving correctly.C The DHCP server is not assigning correct IP addresses.D The domain controller is not responding.

考题 单选题A user states that they cannot access a network shared drive. The technician has verified that the clients network cable is good. The IP address of the machine is 169.254.10.15. Which of the following is the cause of the problem?()A The WINS server is not resolving names properly.B The DNS server is not resolving names.C The DHCP server is out of IP address leases.D The hosts file is corrupted.

考题 单选题A Windows file server has run out of space. In the interim the administrator is moving several archived confidential folders that have been encrypted off the file server and onto an older server file shares. After the move, a manager reports that they are able to access and modify some of the items that have been moved. Which of the following is the MOST likely issue?()A The temporary server was formatted as NTFS.B The manager is a power user on the temporary server.C The temporary server was formatted as FAT32.D The manager is an administrator on the temporary server

考题 单选题A user is reporting that access to a file server is much slower than it has been. The system administrator completes a test of the server using a system monitoring tool and compares it to the previously taken baseline. The comparison shows that there are no significant changes in the use of system resources. Which of the following actions should be taken to resolve this user problem?()A Add additional RAM to the user PCB Troubleshoot the user PCC Add additional RAM to the serverD Add additional hard drive space to the server

考题 单选题A user is reporting that access to a file server is much slower than it has been. The system administrator completes a test of the server using a system monitoring tool and compares it to the previously taken baseline. The comparison shows that there are no significant changes in the use ofsystem resources.  Which of the following actions should be taken to resolve this users problem?()A  Add additional RAM to the users PCB  Troubleshoot the users PCC  Add additional RAM to the serverD  Add additional hard drive space to the server

考题 单选题An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()A Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.B Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.C Ensure that merge roles is selected in the role-mapping rules.D Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.

考题 单选题A Windows file server has run out of space. In the interim the administrator is moving sever alarchived  confidential folders that have been encrypted off the file server and onto an older servers fileshares. After the move, a manager reports that they are able to access and modify some of the items that have been moved.  Which of the following is the MOST likely issue?()A  The temporary server was formatted as NTFS.B  The manager is a power user on the temporary server.C  The temporary server was formatted as FAT32.D  The manager is an administrator on the temporary server.

考题 单选题you configure a new file server that runs windows server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files.The TCP/IP properties for the file server are configured as shown in the following exhibit.You need to ensure that users are able to access the shared files. What should you do?()A Configure a static IP address.B Configure the default gateway.C Configure the DNS server address.D Add the domain to the DNS suffix on the network interface.

考题 单选题You configure a new file server that runs Windows Server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files. The TCP/IP properties for the file server are configured as shown in the following exhibit.(exhibit not there again wtf!) You need to ensure that users are able to access the shared files. How should you configure the TCP/IP properties in the file server?()A Configure a static IP addressB Configure the default gatewayC Configure the DNS server addressD Add the domain to the DNS suffix on the network interface

考题 单选题A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()A  Reboot the file server.B  Ask the user what they were doing when they noticed the problem.C  Ask the user to reboot their PC.D  Ask the user to ping the default gateway and report the response times back to the administrator.