网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()
A

Request the user to logoff and log back on.

B

Add the user as an administrator on their local machine.

C

Add the user as an administrator on the server.

D

Run an ipconfig /renew on the user’s machine.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()A Request the user to logoff and log back on.B Add the user as an administrator on their local machine.C Add the user as an administrator on the server.D Run an ipconfig /renew on the user’s machine.” 相关考题
考题 Given that the current directory is empty, and that the user has read and write privileges to the current, and the following:Which statement is true?() A.Compilation fails.B.Nothing is added to the file system.C.Only a new file is created on the file system.D.Only a new directory is created on the file system.E.Both a new file and a new directory are created on the file system.

考题 You are the administrator of a Windows 2000 Professional computer that is shared by several users in the Sales department. User accounts have been created for current users. Current users can log on to the computers. To accommodate new users, you add two new user accounts named User7 and User8 to computer5. When User7 attempts to log on o the computer, she receives the following error message: "Windows cannot copy file C:\Documents and Settings\Default User\ to location C:\Documents and Settings\User7. Contact your network administrator. Detail - Access is denied." When User8 attempts to log on to the computer, he receives the same type of error message.You want to allow the two new users, as well as other users in the Sales department, to be able to log on to the computer.Which two methods can you use to accomplish your goal? (Choose two.)A.Add the User7 and User8 user accounts to the DACL for the Profiles shared folder on the network server.B.Add the User7 and User8 user accounts to the DACL for the C:\Documents and Settings\Default User folder.C.Add the Everyone group to the DACL for the C:\Documents and Settings\Default User folder.D.Add a Group Policy object (GPO) for the Sales OU that redirects user profiles to a shared folder.E.Log on by using the local Administrator account and create new folders for User7 and User8 in the C:\Documents and Settings folder.F.Select the allow inheritable permissions from parent to propagate to this object option on the C:\Documents and Settings\Default User folder, and reset the permissions on all child objects.G.Move and retain permissions and compressions.

考题 Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? () A. Events logB. System logC. User Access logD. Admin Access log

考题 A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read

考题 You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A、The user will be instructed to call the network administrator.B、The user will fail authentication.C、The user will be prompted to install a new device certificate on the MAG Series device.D、The user will successfully authenticate and have full network access.

考题 A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

考题 A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()A、 Reboot the file server.B、 Ask the user what they were doing when they noticed the problem.C、 Ask the user to reboot their PC.D、 Ask the user to ping the default gateway and report the response times back to the administrator.

考题 A Windows file server has run out of space. In the interim the administrator is moving several archived confidential folders that have been encrypted off the file server and onto an older server file shares. After the move, a manager reports that they are able to access and modify some of the items that have been moved. Which of the following is the MOST likely issue?()A、The temporary server was formatted as NTFS.B、The manager is a power user on the temporary server.C、The temporary server was formatted as FAT32.D、The manager is an administrator on the temporary server

考题 An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()A、As the root user from serverA run the command rhost serverBB、As the root user from serverA run the command rlogin serverBC、As the desired user from serverB run the command rhost serverAD、As the desired user from serverA run the command rlogin serverB

考题 An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A、/tmpB、/var/preserveC、/var/tmp/$USERD、$HOME/.vi

考题 Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A、Events logB、System logC、User Access logD、Admin Access log

考题 Your database is in NOARCHIVELOG mode. After which two operations you should take the backup of control file?()A、adding a new user to the databaseB、dropping a user from the databaseC、dropping a table from the databaseD、dropping a data file from a tablespaceE、adding a new tablespace to the database

考题 Your company has an Active Directory domain. All consultants belong to a global group named   TempWorkers. The TempWorkers group is not nested in any other groups.   You move the computer objects of three file servers to a new organizational unit named SecureServers.   These file servers contain only confidential data in shared folders.   You need to prevent members of the TempWorkers group from accessing the confidential data on the file  servers. You must achieve this goal without affecting access to other domain resources.   What should you do()A、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this  computer from the network user right to the TempWorkers global group.B、Create a new GPO and link it to the domain. Assign the Deny access to this computer from the network  user right to the TempWorkers global group.C、Create a new GPO and link it to the domain. Assign the Deny log on locally user right to the  TempWorkers global group.D、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locallyuser right to the TempWorkers global group.

考题 Your company has an Active Directory domain. All consultants belong to a global group named  TempWorkers. The TempWorkers group is not nested in any other groups.   You move the computer objects of three file servers to a new organizational unit named  SecureServers. These file servers contain only confidential data in shared folders.    You need to prevent members of the TempWorkers group from accessing the confidential data  on the file servers. You must achieve this goal without affecting access to other domain  resources.     What should you do()A、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this computer froB、Create a new GPO and link it to the domain. Assign the Deny access to this computer from the network user right toC、Create a new GPO and link it to the domain. Assign the Deny log on locally user right to the TempWorkers global gD、Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locally user right to

考题 You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()A、In the Web.config file, enable impersonation.B、In IIS, enable anonymous access.C、In IIS, disable anonymous access.D、In the Web.config file, set the authentication mode to Windows.

考题 多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

考题 多选题Your database is in NOARCHIVELOG mode. After which two operations you should take the backup of control file?()Aadding a new user to the databaseBdropping a user from the databaseCdropping a table from the databaseDdropping a data file from a tablespaceEadding a new tablespace to the database

考题 单选题You manage a computer running Windows 2000 Professional that belongs to a workgroup. You create a new user account (Tony) on that computer that is not a member of the Administrators group. You log on using the new account. You create a file with notepad in a folder that is on a volume formatted with NTFS. You encrypt the file. You give another user account defined on that computer, Luis the permission to take ownership of the file. Luis logs on using the account and takes ownership. However, she receives an error message reporting that access is denied when she tries to open the file. What can you do to allow Luis to open the file?()A Instruct Luis to decrypt the file before she tries to open it.B Log on with the account Tony and decrypt the file.C Move the file to a folder that is not encrypted on a different volume that is formatted with NTFS.D Move the file to a folder that is not encrypted on the same volume.

考题 多选题You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name "CONTOSO/Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()AIn the Web.config file, enable impersonation.BIn IIS, enable anonymous access.CIn IIS, disable anonymous access.DIn the Web.config file, set the authentication mode to Windows.

考题 单选题A user is reporting that access to a file server is much slower than it has been. The system administrator completes a test of the server using a system monitoring tool and compares it to the previously taken baseline. The comparison shows that there are no significant changes in the use of system resources. Which of the following actions should be taken to resolve this user problem?()A Add additional RAM to the user PCB Troubleshoot the user PCC Add additional RAM to the serverD Add additional hard drive space to the server

考题 单选题An administrator received a call from a user whose PC crashed while using vi to edit a file. The user wants the edited file back. Where should the administrator look for the file()A /tmpB /var/preserveC /var/tmp/$USERD $HOME/.vi

考题 单选题An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()A Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.B Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.C Ensure that merge roles is selected in the role-mapping rules.D Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.

考题 多选题You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()ACreate a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.BConfigure a wired adapter and assign the required SSID under User Roles Agent Odyssey Settings.CCreate a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.DCreate a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.

考题 单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A The user will be instructed to call the network administrator.B The user will fail authentication.C The user will be prompted to install a new device certificate on the MAG Series device.D The user will successfully authenticate and have full network access.

考题 单选题You issue this SQL statement:  ALTER DATABASE RENAME FILE ’/ORADATA/u02/user_data01.dbf’ TO ’/ORADATA/u04/user_data01.dbf’;  What does this SQL statement do?()A It updates the control file with the new location of the data file. B It updates only the data dictionary with the new location of the data file. C It changes the location of the user_data01.dbf file in the operating system. D It changes the location of the user_data01.dbf file in the operating system and updates the control file with the new location of the data file.

考题 单选题Given that the current directory is empty, and that the user has read and write privileges to the current directory, and the following: Which statement is true?()A Compilation fails.B Nothing is added to the file system.C Only a new file is created on the file system.D Only a new directory is created on the file system.E Both a new file and a new directory are created on the file system.

考题 单选题A user calls the system administrator and states that they can no longer access the file server they had been working on all morning. To trouble shoot this problem,  which step should the administrator take FIRST?()A  Reboot the file server.B  Ask the user what they were doing when they noticed the problem.C  Ask the user to reboot their PC.D  Ask the user to ping the default gateway and report the response times back to the administrator.