网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()
A

Set the group’s folder permissions to deny.

B

Use Event Viewer to monitor changes to the file.

C

Store a backup copy of the file on a USB drive.

D

Change the file attribute to read only.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A Set the group’s folder permissions to deny.B Use Event Viewer to monitor changes to the file.C Store a backup copy of the file on a USB drive.D Change the file attribute to read only.” 相关考题
考题 What will a new Ezonexam router do during startup if a configuration file is not located in NVRAM?A.It will search for the configuration file in the locations specified by boot system commands.B.It will search for the configuration file in flash and if no configuration file is found there, it will enter the setup dialog.C.It will search for the configuration file on a TFTP server and if no configuration file is found there, it will enter the setup dialog.D.It will search for the configuration file in flash and if no configuration file is found there, it will load a limited configuration file from ROM.E.It will search for the configuration file on a TFTP server and if no configuration file is found there, it will load a limited configuration file from ROM.

考题 Your Windows 2000 Professional computer has 10 shared folders that are available to other network users. A user reports that he cannot access a shared folder named ShareA.You want to respond to the user's problem as quickly as possible by using an administrative tool.However, you cannot remember the server location of ShareA. What should you do?A.Use Windows Explorer to display the file paths of your shared folders.B.Use Storage in Computer Management to view logical drive properties.C.Use Event Viewer in Computer Management to search for shared folder error messages.D.Use System Tools in Computer Management to display the file paths of your shared folders.

考题 Ezonexam.com's network consists of Windows 2000 Professional and UNIX client computers. You install a Windows 2000 Server computer on the network. All computers that are connected to the network use TCP/IP as their only network protocol.Several laser print devices are attached to the UNIX computers. You want to enable the Windows 2000 Professional computers to print to these printers. You want to make the minimum number of configuration changes necessary to achieve this goal.What should you do?A.Install Simple TCP/IP services on the Windows 2000 Server computer. Configure printers on the Windows 2000 Server computer to print to the print device attached to the UNIX computers.B.Install Print Services for UNIX on the Windows 2000 Server computer. Configure shared printers on the Windows 2000 Server computer. Configure the UNIX computers to print to these shared printers.C.Disconnect the print devices from the UNIX computers and connect them to the Windows 2000 Server computer. Share the printers, and configure the Windows 2000 Professional computers and the UNIX computers to print to the shared printers.D.On the Windows 2000 Server computer, configure shared printers that connect to the print devices attached to the UNIX computers. Configure the Windows 2000 Professional computers to print to the shared printers on the Windows 2000 Server computer.

考题 You have a computer that runs Windows Vista.You need to configure the computer to meet the following requirements:·You must be able to make configuration changes remotely.·You must be able to make the changes without the permission of the locally logged-on user.What should you do?()A.AB.BC.CD.D

考题 You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D

考题 What will a router do during startup if a configuration file is not located in NVRAM?()A、it will search for the configuration file in the locations specified by boot system commands.B、it will search for the configuration file in flash and if no configuration file is found there, it will enter the setup dialog.C、it will search for the configuration file on a TFTP server and if no configuration file is found there, it will enter the setup dialog.D、it will search for the configuration file in flash and if no configuration file is found there, it will load a limited configuration file from ROM.E、it will search for the configuration file on a TFTP server and if no configuration file is found there, it will load a limited configuration file from ROM.

考题 Which statement correctly describes the change tracking writer (CTWR) background process?()A、 It keeps track of changes in the background processes.B、 It records the system change number (SCN) in the control file.C、 It writes audit records for user changes to the change tracking file.D、 It records any changes to the listened configuration in the listener.ora file.E、 It records any changes to the database parameters in the change tracking file.F、 It records the physical location of all the changes that are made to the database in the change tracking file.

考题 A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

考题 A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()A、Application logB、File Replication logC、System logD、Security log

考题 After making changes to the monitoring configuration file for the event monitoring engine on an agent,  which conman command will force  the change immediately?()A、 loadconfB、 resetconfC、 deployconfD、 deploymonman

考题 You have a file server that runs windows server 2008. A user restores a large file by using the previous versions tab.You need to view the progress of the file restoration. What should you do?()A、From the command prompt, run shadow.exe /v.B、From the command prompt, run vssadmin.exe query reverts.C、From computer managerment, click on the shared folders node and then click on sessions.D、From computer managerment, click on the shared folders node and then click on open files.

考题 You are designing a Windows 7 deployment image.   You plan to partition the hard disk of each client computer during deployment.  You need to modify the unattended answer file by using a text editor.   Where should you add the disk information?()A、to the Specialize configuration passB、to the Generalize configuration passC、to the WindowsPE configuration passD、to the AuditSystem configuration pass

考题 You have a portable computer and a desktop computer that both run Windows XP Professional. Both computers are members of a domain named Contoso. The desktop computer hosts a shared folder named Share1. You need to ensure that all files in the Share1 folder are automatically available on the portable computer when the computer is disconnected from the network.  Which two actions should you perform?()A、From the portable computer, enable offline files. B、From the portable computer, modify the properties of the Shared Documents folder.C、From the desktop computer, enable simple file sharing.D、From the desktop computer, modify the properties of Share1.

考题 You are the administrator of Megaton Enterprises. Your Windows 2000 network has 14-shared folders that are available to other network users. A user named Mike reports that he cannot access a shared folder named ‘FolderX’. You want to respond to Mike’s problem as quickly as possible by using an administrative tool. However, you cannot remember the server location of the shared folder. What step should you follow in order to resolve Mike’s problem as quickly as possible?()A、Use Windows Explorer to display the file paths of your shared folders.B、Use the Storage snap-in in Computer Management to view local drive properties.C、Use Event Viewer in Computer Management to search for shared folder, look for errormessages.D、Use System Tools in Computer Management to display the file paths of your shared folders.

考题 You have a file server that runs Windows Server 2008. A user restores a large file by using the Previous Versions tab. You need to view the progress of the file restoration  what should you do()?  A、From the command prompt, rum shadow.exe /vB、From the command prompt, run vssadmin.exe query revertsC、From Computer management, click on the shared folders node and then click on sessionsD、From computer management, click on the shared folders node and then click on open files.

考题 Your company plans to distribute an application to all of its client computers by using GroupPolicy. You save a file named setup.msi to a local folder on the domain controller. You assign the Authenticated Users group the Read and Read  Execute permissions for the folder. You create a new Group Policy  object (GPO) and a new Computer Configuration software installation package, and you point the package to the setup.msi file in the local folder. You link the GPO to an organizational unit (OU) that contains a computer object for a test client computer. When you log on to the test client computer, you  notice that the application is not installed. You need to ensure that the application is installed on the test computer.  What should you do?()A、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Log off the client computer and then log on.B、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Restart the client computer.C、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Log off the client computer and then log on.D、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Restart the client computer.

考题 单选题After making changes to the monitoring configuration file for the event monitoring engine on an agent,  which conman command will force  the change immediately?()A  loadconfB  resetconfC  deployconfD  deploymonman

考题 单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A system /vB winnt /sC sfc /scannowD chkdsk /f

考题 单选题You have a computer that runs Windows 7. You log on to the computer by using a user account that is amember of Administrators group. From Windows Explorer you open C:/windows system32/drivers/etc/hostsin Notepad. You attempt to save the file and receive the Save As dialog box. You need to ensure that youcan save changes to C:/windows/system32/drivers/etc hosts. What should you do?( )A Stop the Windows Search service.B Remove the inherited permissions from the file.C Start Windows Notepad by using elevated privileges.D Change the User Account Control (UAC) settings to Notify me only when program try to make changesto my computer.

考题 单选题You have a stand-alone computer that runs Windows XP Professional. Five users use the computer. Each user has a local user account. The user accounts are member of only the Users group. You need to share a document between all users of the computer. What should you do?()A Copy the file to the Shared Documents folder. B Copy the file to the My Documents folder of the local administrator. C Copy the file to the %SystemRoot%/CSC folder. Add all user accounts to the guests group.D Enable Offline File and Folder Caching. Copy the file to the %SystemRoot%/CSC folder.

考题 单选题You have a file server that runs Windows Server 2008. A user restores a large file by using thePrevious Versions tab. You need to view the progress of the file restoration. What should you do? ()A  From the command prompt, run shadow.exeB  From the command prompt, run vssadmin.exe query revertsC  From Computer Management, click on the Shared Folders node and then click on Sessions.D  From Computer Management, click on the Shared Folders node and then click on Open Files

考题 单选题A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A Set the group’s folder permissions to deny.B Use Event Viewer to monitor changes to the file.C Store a backup copy of the file on a USB drive.D Change the file attribute to read only.

考题 单选题Your company has 1,000 computers in the main office and 20 computers in store kiosks.All the computers run Windows 7 Enterprise.   The kiosk computers do not have network connections.  The company brands the Internet Explorer program window on all computers by displaying the company logo at the left end of the title bar.  The company changes its logo.   You have the following requirements:   Display the new logo on the Internet Explorer program window title bar on the main office computers and the kiosk computers.  Modify the search providers that are available to main office computers. You need to define Internet Explorer settings to support the requirements.   What should you do?()A  Save the logo as Logo.png and copy the file to the C:///Windows/Branding/ directory on each kiosk computer. Createand distribute a new OpenSearch description file for the main office computers.B  Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package on the main office computers. Enable automatic version synchronization and specify a flash drive for the path. Distribute the configuration package to the kiosk computers.C  Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package on the main office computers. Create a deployment CD for the kioskcomputers.D  Use the Internet Explorer Administration Kit (IEAK) to create a custom configuration-only deployment package. Copy the setup file to a flash drive,and distribute the file to all computers.

考题 单选题You administer a Windows 2000 Professional computer that is shared by a couple of employees. During one of your sessions at the computer, you notice that one of the other users has installed hardware drivers that have caused the computer to become unstable. You want to determine which of these newly installed drivers are not included in the Hardware Compatibility List (HCL). What should you do? ()A Run the sysprep tool with the -pnp and -noreboot options on the computer.B Run the File Signature Verification tool on the computer.C Run the System File Checker tool on the computer.D Configure driver signing to prevent the installation of unsigned drivers.

考题 单选题An uninstalled program is still attempting to load when Windows starts. Which of the following options can the technician suggest to stop this unwanted program from loading?()A ServicesB Add or Remove ProgramsC System Configuration UtilityD System File Checker

考题 单选题You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer.  What should you do? ()A Configure File signature verification to block driver installation, and set driver signing as a system default.B Remove all users from the Power User group.C Create a Local Computer Policy to prevent users from installing drivers.D Create a Local Computer Policy to enable Windows File Protection.

考题 单选题Your company plans to distribute an application to all of its client computers by using GroupPolicy. You save a file named setup.msi to a local folder on the domain controller. You assign the Authenticated Users group the Read and Read  Execute permissions for the folder. You create a new Group Policy  object (GPO) and a new Computer Configuration software installation package, and you point the package to the setup.msi file in the local folder. You link the GPO to an organizational unit (OU) that contains a computer object for a test client computer. When you log on to the test client computer, you  notice that the application is not installed. You need to ensure that the application is installed on the test computer.  What should you do?()A  Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Log off the client computer and then log on.B  Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Restart the client computer.C  Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Log off the client computer and then log on.D  Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Restart the client computer.

考题 单选题A co-worker uses a gadget from the Windows Sidebar feature on their computer. You examine your computer and find that the gadget is not on the list of available gadgets. You need to add this gadget to the Windows Sidebar feature on your computer.  What should you do?()A Download and install the gadget file.B Download the gadget file and copy the file to C:///Windows/System32.C Instruct the co-worker to send the gadget file via e-mail and copy the file to C:///Program Files.D Instruct the co-worker to send the gadget file via e-mail. Drag and drop the gadget file to the Windows Sidebar feature.