网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?()
A

Configure each application to run in a separate memory space.

B

Configure each application to run in AboveNormal priority class.

C

For each application, set the compatibility mode to Windows 95.  

D

Configure processor affinity for each application to allow it to run on both processors.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?()A Configure each application to run in a separate memory space.B Configure each application to run in AboveNormal priority class.C For each application, set the compatibility mode to Windows 95.  D Configure processor affinity for each application to allow it to run on both processors.” 相关考题
考题 You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)You need to ensure that Paul can establish Remote Desktop connections with DC1.What should you do? ()

考题 You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

考题 You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.

考题 You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D

考题 You are the network administrator for . All network servers run Windows Server 2003. A server named TestKing6 functions as a file server. All client computers run Windows XP Professional and are members of the domain. TestKing.com periodically hires temporary employees. You need to prepare a custom user profile for all temporary employees. You log on to a client computer as an administrator, and you configure the desktop settings. You copy the profile to a folder named //TestKing6/Profiles/Temp_profile. You rename the Ntuser.dat file in the //TestKing6/Profiles/Temp_profile folder to Ntuser.man. You create three new user accounts for the temporary employees. The user accounts are named temp_user1, temp_user2, and temp_user3. You need to configure the temporary user accounts to receive the new desktop settings that you created on TestKing6. The temporary employees must not be allowed to retain customized desktop settings? What should you do?()A、Specify a user profile path of //TestKing6/Profiles/username for each of the three user accounts.B、Specify a user profile path of //TestKing6/Profiles/username.man for each of the three user accounts.C、Specify a home folder path of //TestKing6/Profiles/username for each of the three user accounts.D、Specify a user profile path of //TestKing6/Profiles/Temp_profile for each of the three user accounts.E、Specify a user profile path of //TestKing6/Profiles/Temp_profile.man for each of the three user accounts.

考题 You configure parental controls on your computer for your childs user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inappropriate Web sites.  What should you do? ()A、Enable Microsoft Windows Firewall.B、Disable the default administrator account.C、Use password protection for all user accounts.D、Configure Web sites you approve of in the list of Trusted Sites of Microsoft Windows Internet Explorer.

考题 You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A、Place the phone in Bluetooth discovery mode.B、Place the user’s computer in Bluetooth discovery mode.C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D、Install mobile phone synchronization software on the user’s computer.

考题 You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional. You need to standardize the desktop environment for all client computers. Your solution must prevent domain users from permanently modifying their regional settings or the desktop background. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A、Specify the profile's network path in the user properties in Active Directory Users and Computers.B、Specify the profile's local path in the user properties in Computer Management.C、Specify the profile's network path in the user properties in Computer Management.D、In the network share where profiles reside, rename Ntuser.dat to Ntuser.man.E、In the local profile directory, rename Ntuser.dat to Ntuser.man.F、In the network share where profiles reside, rename Ntuser.ini to Ntuser.man.

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. XML Web services for the internal network run on a member server named TestKingSrv1, which is configured with default settings. You are a member of the local Administrators group on TestKingSrv1. You need the ability to remotely manage TestKingSrv1. You have no budget to purchase any additional licensing for your network until the next fiscal year. How should you reconfigure TestKingSrv1?()A、In the System Properties dialog box, enable Remote Desktop.B、Add your user account to the Remote Desktop Users local group.C、In the System Properties dialog box, enable Remote Assistance.D、Install Terminal Services by using Add or Remove Programs.

考题 You are the desktop administrator for your company. All employees have Windows XP Professional computers. All employees are members of the local Users group on their own computers. A user in the graphics department has a removable disk cartridge drive on his computer. The disk cartridge contains an unsupported, third-party file system. When he tries to save data to the disk cartridge, the user is prompted to reformat the disk cartridge. However, he receives an “access denied” error message when attempting to reformat. You need to enable the user to save data to the disk cartridge. What should you do?()A、Instruct the user to format the cartridge as FAT32.B、Remove the Read-only attribute from the disk cartridge.C、Add the user to the Power Users local group on the computer.D、Grant the user Allow - Full Control permission on the disk cartridge. E、Configure the local security settings to allow the user to format and eject removable media.

考题 You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()A、Configure each computer to join a workgroup.      Create a user account and a local profile for each user. B、Configure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. C、Configure each computer to join the domain.      Create a user account for each user on a domain controller. D、Configure each computer to join the domain.      Create domain user accounts that use roaming user profiles.

考题 You are a desktop administrator for your company. You need to deploy a new application. The application is packaged in an .msi file. The application will be used by only a small number of users. You plan to install the application by using the Msiexec.exe program. You need to ensure that the installation process does not display a user interface. What should you do?()A、Manually perform a passive installation of the application.B、Manually perform a quiet installation of the application.C、Use a logon script to run the Msiexec.exe program.D、Use the Runas utility to run the Msiexec.exe program.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A、Create an account for Peter's computer in the Computers container.B、Grant the Log on locally user right to Peter's user account.C、Enable Peter's user account.D、Change the properties of Peter's user account so he can log on to any computer.

考题 You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?()A、Use the Msiexec.exe program to perform a quiet installation of the application.B、Use the Msiexec.exe program to perform a passive installation of the application. C、Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application. D、Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain. 

考题 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You use a virtual desktop infrastructure (VDI) environment to provide access to applications. All virtual desktop computer object s are located in an organizational unit (OU) named VirtualDesktops. All client computer objects are located in an OU named Desktops. You need to ensure that all existing users receive the same desktop shortcuts, and that they are not able to modify the sho rtcuts from virtual desktops. Which two actions should you perform?()A、Create a mandatory user profile.B、Create a new default user profile.C、Create a Group Policy object (GPO) that configure s the user profile. Link the GPO to the Desktops OU.D、Create a Group Policy object (GPO) that configures the user profile. Link the GPO to the VirtualDesktops OU.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. User and group objects for the sales department are located in an organizational unit (OU) named Sales.  Peter and Mary are administrators for your company. Peter is responsible for managing Sales user objects. Mary is responsible for managing Sales group objects.  You need to delegate Peter and Mary control over only the objects for which they are responsible.  What should you do?()A、 In the Sales OU, create two new OUs. Name one OU SalesUsers and place all user objects for the sales department in this OU. Name the other OU SalesGroups and place all group objects for the sales department in this OU. Grant Peter and Mary full control over the Sales OU.B、 On the Sales OU, grant Peter the right to manage user objects. On the Sales OU, grant Mary the right to manage group objects.C、 In the Sales OU, create a new OU. Name this OU SalesGroups. Place all Sales groups in theSalesGroups OU.Grant Peter the right to manage all objects in the Sales OU. Grant Mary the right to manage all objects in the SalesGroups OU.D、 On the Sales OU, deny Peter the right to manage group objects. On the Sales OU, deny Mary the right to manage user objects.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()A Automated System Recovery (ASR)B normalC primaryD authoritative

考题 单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers.You need to ensure that all users are authenticated by a domain controller when they log on.How should you modify the local security policy? ()A Require authentication by a domain controller to unlock the client computer.B Cache zero interactive logons.C Cache 50 interactive logons.D Grant the Log on locally user right to the Users group.

考题 单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()A Enable the Require domain controller to unlock policy.B Set the Number of previous logons to cache policy to 0.  C Remove all user and group accounts from the Log on locally user right. D Remove all user and group accounts from the Access this computer from the network user right. 

考题 多选题Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. You use a virtual desktop infrastructure (VDI) environment to provide access to applications. All virtual desktop computer objects are located in an organizational unit (OU) named VirtualDesktops. All client computer objects are located in an OU named Desktops. You need to ensure that all existing users receive the same desktop shortcuts, and that they are not able to modify the shortcuts from virtual desktops. Which two actions should you perform?()ACreate a mandatory user profile.BCreate a new default user profile.CCreate a Group Policy object (GPO) that configures the user profile. Link the GPO to the Desktops OU.DCreate a Group Policy object (GPO) that configures the user profile. Link the GPO to the VirtualDesktops OU.

考题 单选题You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must appear on the desktop of new users only. What should you do?()A Copy the shortcut to %systemdrive%/documents and settings/default user/desktop/.B Copy the shortcut to %systemdrive%/documents and settings/all users/desktop/.C Copy the shortcut to your desktop. Modify the %comspec% system environment variable. D Copy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.

考题 单选题You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?()A Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. B Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. C Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. D Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. 

考题 单选题You are the network administrator for . The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing acquires a subsidiary. You receive a comma delimited file that contains the names of all user accounts at the subsidiary. You need to import these accounts into your domain. Which command should you use?()A ldifdeB csvdeC ntdsutil with the authoritative restore optionD dsadd user

考题 单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()A The SetupUser profileB The Default User profileC The Administrator profileD The System profileE The All Users profile

考题 单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()A Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B Log on by using your Administrator account and run the ntbackup /D command.C Log on by using your Administrator account and run the schtasks /delete command.D Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.

考题 单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()A Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B Log on by using your Administrator account and run the ntbackup /D command.C Log on by using your Administrator account and run the schtasks /delete command.D Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()A Automated System Recovery (ASR)B normalC primaryD authoritative