网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
A user named Tom reports that applications on his Windows 2000 Professional computer are running slowly. You notice that Tom’s computer has 64 MB of RAM and 100 MB free disk space. Which method can you use to improve performance?()
A

Add Tom to the Power Users group.

B

Set the total paging file to 75 percent of physical memory.

C

Perform a disk analysis, and use the disk defragmenter, if recommended.

D

Use disk cleanup to delete temporary files and unnecessary program files.

E

Ensure that the performance options setting is optimized for background services.


参考答案

参考解析
解析: 暂无解析
更多 “多选题A user named Tom reports that applications on his Windows 2000 Professional computer are running slowly. You notice that Tom’s computer has 64 MB of RAM and 100 MB free disk space. Which method can you use to improve performance?()AAdd Tom to the Power Users group.BSet the total paging file to 75 percent of physical memory.CPerform a disk analysis, and use the disk defragmenter, if recommended.DUse disk cleanup to delete temporary files and unnecessary program files.EEnsure that the performance options setting is optimized for background services.” 相关考题
考题 You have a standalone server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You install the FTP Server Windows component on Server1. You create several folders under the Ftproot folder as shown in the exhibit. (Click the Exhibit button.)A user named User1 connects to ftp://server1 and reports that he can view the Localuser folder and all of its subfolders. A user named User2 reports the same problem.You need to ensure that when users connect to ftp://server1, they can only view the content located under their user folder.What should you do? ()A. From the properties of the Default FTP Site, change the directory listing style to Unix.B. From the properties of the Default FTP Site, change the FTP site directory to c:\inetpub\ftproot\localuser.C. From the properties of each user account, modify the home folder. Remove the Users group from the access control list of c:\inetpub\ftproot.D. Delete the Default FTP Site. Create a new FTP site. Select the option to isolate users and specify the FTP site directory of c:\inetpub\ftproot.

考题 A user reports that the Windows update function will not run on the computer but the Internet can be accessed. The user is running an original version of Windows XP Professional. Which of the following is MOST likely the cause?()A、The user has not registered the copy of Windows.B、The user has not applied at least Service Pack 1 to their system.C、The user does not know what site to access for the updates.D、The user needs to flush the DNS cache.

考题 Paul wants to log in to 11i Oracle Applications. Identify the first server to which his requestwould go.()A、Web serverB、Reports serverC、Administration serverD、Concurrent Processing server

考题 A user named Tom reports that applications on his Windows 2000 Professional computer are running slowly. You notice that Tom’s computer has 64 MB of RAM and 100 MB free disk space. Which method can you use to improve performance?()A、Add Tom to the Power Users group.B、Set the total paging file to 75 percent of physical memory.C、Perform a disk analysis, and use the disk defragmenter, if recommended.D、Use disk cleanup to delete temporary files and unnecessary program files.E、Ensure that the performance options setting is optimized for background services.

考题 You are the administrator of your company’s network. A user named Stephen in the graphics department logs on to his Windows 2000 Professional computer. He installs a shared color laser printer. The color laser printer is connected to a computer named Server1. The next day Stephen returns and logs on to a Windows NT Workstation 4.0 computer. Stephan reports that when he attempts to print a document to the shared color laser printer, the printer is not included in the list of available printers. You want to allow Stephen to send print jobs to the shared color laser printer from any computer on the network. What should you do?()A、Configure a roaming user profile for Stephen’s user account.B、Configure the server properties of the printer system folder to connect to the shared printer.C、Install the printer driver for the print device on the Windows NT workstation computer.D、Upgrade the Windows NT Workstation computer to Windows 2000 Professional, and then import the profile settings for Stephen’s user account.

考题 You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You enable Shadow Copies on all drives by using the default options. You run a full backup every Monday at 02:00. You run an incremental backup every day at 02:00, except on Monday. On Thursday at 14:00, a user reports that he accidentally deleted a file named File1.doc in a shared folder named //Server1/Data/. The user reports that the file was last updated at 09:00 on Thursday. You need to restore the latest version of File1.doc. What should you restore? ()A、the file by using the Previous Versions ClientB、the file from the full backup performed on MondayC、the file from the incremental backup performed on ThursdayD、the user’s computer by using Automated System Recovery (ASR)

考题 You are the administrator of an Active Directory domain named A user reports that he forgot his password and cannot log on to the domain. You discover that yesterday morning the user reset his password and successfully logged on to the domain. You need to enable the user to log on to the domain. What should you do? ()(Choose two)A、Use Active Directory Users and Computers to move the account to the default organizational unit (OU) named Users. Instruct the user to restart his computer.B、Use Active Directory Users and Computers to open the account properties for the user's user account. Clear the Account is locked out check box, and select the User must change password at next logon check box.C、Use Active Directory Users and Computers to reset the user's password. Give the user the new password.D、Use Computer Management to reset the password for the local Administrator account.

考题 You are a database administrator for your company. A user named Susan belongs to the Windows SalesManagers group. Susan needs a Reporting Services report to display annual sales information by territory. A user named Joe reports to Susan and belongs to the Windows Sales group. He needs a report that is limited to his sales territory, but still displays the same detailed sales data that is on Susan’s report. You need to design a secure solution that meets the reporting needs of the users and that consumes the minimal amount of server resources.  What should you do?()A、Design a report for Susan that includes two data regions. One data region is used for summary sales data. The other data region is used for the detailed sales data for each sales representative. Then, design a report for Joe that displays the detailed sales data.B、Design two reports for Susan. One report includes the territory information, and one report includes the detailed sales data. Then, design a report for Joe that displays the detailed sales data for his territories.C、Design a report for Susan that includes the territory information. Then, design a report for Joe that includes detailed sales data for his territories. Finally, configure Susans report so that it includes the data in Joes report.D、Design a parameterized report for Susan that includes all territory information. Then, design a linked report for Joe that links to Susans report.

考题 You are the desktop administrator for Company. Janos is a user in Company's accounting department.  Janos uses a Windows 2000 Professional portable computer.  Janos reports that when the computer is unlocked, it randomly displays the following error message:  "JZXDRV.dll failed to load". You discover that the JZXDRV.dll file is used by the device driver for an external storage device that is connected to Janos’ docking station. Janos reports that the error message does not appear when the computer is docked.  You need to ensure that the error does not occur on Janos’ computer. You also need to ensure that the storage device continues to function correctly when Janos’ computer is docked.  What should you do?()A、 Remove the storage device from the hardware profile on Janos’ computer.B、 Create a local user account for Janos on his computer. Copy the JZXDRV.dll file to the profile      folder for Janos’ local user account. Instruct Janos to log on to his computer by using his local      user account whenever the computer is unlocked.C、 Copy the computer's default hardware profile to create a new hardware profile named        Undocked.      Remove the storage device from the Undocked hardware profile.D、 Copy the computer's default hardware profile to create a new hardware profile named       Unlocked. Disable the storage device in the Undocked hardware profile. Instruct Janos to start         the computer by using the Undocked hardware profile whenever the computer is undocked. 

考题 You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A、Create an account for Peter's computer in the Computers container.B、Grant the Log on locally user right to Peter's user account.C、Enable Peter's user account.D、Change the properties of Peter's user account so he can log on to any computer.

考题 You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

考题 A user named Tom reports that an application on his Windows 2000 Professional computer is running slowly. You notice Tom’s computer has 64 MB of RAM and 100 MB of free disk space. What should you do to improve the performance of his system? ()A、Add Tom to the Power user group.B、Set the total paging file to 75 % of physical memory.C、Perform a disk analysis and use the disk defragmenter if recommended.D、Use Disk cleanup to delete temporary files and unnecessary program files.E、Ensure that the Performance Options windows is optimized for background services.

考题 多选题A user named Tom reports that an application on his Windows 2000 Professional computer is running slowly. You notice Tom’s computer has 64 MB of RAM and 100 MB of free disk space. What should you do to improve the performance of his system? ()AAdd Tom to the Power user group.BSet the total paging file to 75 % of physical memory.CPerform a disk analysis and use the disk defragmenter if recommended.DUse Disk cleanup to delete temporary files and unnecessary program files.EEnsure that the Performance Options windows is optimized for background services.

考题 单选题You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()A Use Computer Management to configure separate memory spaces for each financial  application on Helena’s Computer.B Use Security Templates to edit the Security Policy to include the financial applications on  Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.C Use Security Configuration and Analysis to reconfigure the default security policy .inf file to  allow the finance applications to run on Helena’s Computer.D Use secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to  loose the permission for the Local User group on Helena’s Computer.

考题 单选题A user reports that he is unable to start his computer. He provides the following information:.The boot partition is encrypted by using BitLocker Drive Encryption (BitLocker). The user cannot locate his BitLockerrecovery key. You need to start Windows 7 on the computer. The solution must use the minimum amount ofadministrative effort. What should you do?()A From the BIOS, disable the Trusted Platform Module (TPM).B Start the computer from the Windows 7 installation media and select Install now.C Start the computer from the Windows 7 installation media and select Repair your computer.D Start the computer from the Windows 7 installation media, press SHIFT+F10, and then run CHKDSK.

考题 多选题You are the administrator of your company’s network. You network has five Windows 2000 server computers and 75 Windows 2000 Professional computers. The Windows 2000 Professional computers were installed by using a RIS image on one of the Windows 2000 Server computers.  You need to upgrade several applications on the Windows 2000 Professional computers. The applications do not have built-in support for scripted installations. You want to accomplish the following goals:   An unattended installation of the upgraded applications will be performed on the Windows 20000 Professional computers. Existing user environments will be maintained on the Windows 2000 Professional computers. The network name of each Windows 2000 Professional computer will be changed to match its asset tag. The RIS image and the upgraded applications will be enabled as they are added to the network. You take the following actions: Install the RIS image on a Windows 20000 Professional computer named Computer1. Install the upgraded applications on Computers1. Change the network name of Computer1 to %DMI-SERIAL_NUM%.  Run RIPrep.exe on Computer1 to load the RIS image on to the RIS server. Start all of the Windows 2000 Professional computers, and then load the RIS image from the RIS server.  Which result or results do these actions produce?( )AAn unattended installation of the upgraded applications will be performed on the Windows 2000 Professional computers.BExisting user environments will be maintained on the Windows 2000 Professional computers.CThe network name of each Windows 2000 Professional computer will be changed to matchIts asset tag.DThe RIS image and the upgraded applications will be enabled as they are added to the N.etwork.

考题 单选题You are the administrator of 30 Windows XP Professional computers. The computers are not members of a domain. Users of the Windows XP Professional computers encrypt files on the local computers. A user named Stephen reports that he cannot remember his current password. However, he does remember his previous password. Before he changed to his current password, Stephen created a password reset disk. You want to ensure that Stephen can log on to his Windows XP Professional computer again, and that he can open the encrypted files. What should you do?()A Reset Stephen's password and instruct Stephen to log on with the new password.B Reset Stephen's password and then use the password reset disk.C Instruct Stephen to log on with his previous password. D Instruct Stephen to use the password reset disk to set a new password on his account.E Use the Forgotten Password Wizard to create a new password reset disk for Stephen.F Use this disk to set a new password on Stephen's account.

考题 单选题You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Testking32 contains a folder that is shared as ManagerData$. A global group named AllManagers has permission to access the shared folder. A user reports that he needs access to the ManagerData$ shared folder. You add his user account to the All Managers global group. When the user attempts to connect to the shared folder by typing //Testking32/ManagerData$/ , he receives the following error message: "//Testking32/ManagerData$/ is not accessible. You might not have permissions to use the network resource. Contact the administrator of this server to find out if you have access permissions. Access is denied. You need to ensure that the user can access the ManagerData$ shared folder on Testking32. What should you do?()A Instruct the user to type //Testking32/ManagerData/ when he attempts to access the folder.B Add the Anonymous Logon group to the ACL for the ManagerData$ shared folder.C Select the Replace permission entries on all child object with entries shown here that apply to child objects check box.D Instruct the user to log off and log on again before he accesses the folder.

考题 单选题You are the administrator of a Windows Server 2003 computer named Server1. User profiles are stored on Server1. A user named Peter reports that he accidentally deleted a folder named WorkProduct from his user profile. He needs to have his WorkProduct folder restored. Other users are accessing Server1, and you do not want to negatively affect their work. You locate the latest backup that contains the files that you need to restore. You need to restore Peter’s WorkProduct folder. You want to achieve this goal by using the minimum amount of administrative effort. What should you do? ()A Restore Peter's WorkProduct folder, and clear the Restore junction points, but not the folders and the file data they reference check box.B Restore the Documents and Settings folder that contains the WorkProduct folder.C Restore Peter’s WorkProduct folder, and choose an alternate location for the restoration.D Restore Peter’s WorkProduct folder, and choose the original location for the restoration.

考题 单选题You are responsible for administering the Production OU. You are assigned the Allow - Full Control permission for the OU. All computer objects in the Production OU are administered by another administrator named Tom. The Production OU contains the computer account for a Windows Server 2003 computer named Testking1. Tom submits a list of configuration settings that he wants to apply to Testking1 by means of a Group Policy object (GPO). A GPO that contains Tom's required settings is created in another OU by the domain administrator. You only want to allow Tom to link existing GPOs to the Production OU. He must not have any more rights than he needs to perform the required tasks. What should you do?()A Add Tom's user account to the Group Policy Creator Owners group in the domain.B Run the Delegation of Control Wizard and assign Tom's user account the Allow - Manage group policy links permission for the Production OU.C Run the Delegation of Control wizard and assign Tom's user account the Allow - Change permission for the Production OU.D Run the Delegation of Control wizard and assign Tom's user account the Allow - Apply group policy permission for all GPOs that are linked to the Production OU.

考题 单选题You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()A Instruct User2 to add a delegateB Instruct User2 to send a signed e-mail message to User1.C Instruct User1 to send a signed e-mail message to User2.D Instruct User1 to modify the sensitivity settings of the e-mail message

考题 单选题Your network contains an Active Directory domain named contoso.com. The domain contains a user account named User1 that resides in an organizational unit (OU) named OU1. A Group Policy object (GPO) named GPO1 is linked to OU1. GPO1 is used to publish several applications to a user named User1. In the Users container, you create a new user named User2. You need to ensure that the same applications are published to User2. What should you do?()A Modify the security of GPO1.B Modify the settings in GPO1C Link a WMI filter to GPO1D Move User2 to OU1

考题 单选题Your company has a main office and a branch office. Your network consists of a single Active Directory domain. All domain controllers are in the main office. The offices connect to one another by using a wide area network (WAN) link. The branch office has a computer named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). A domain user named User1 reports that he cannot log on to Server1 when the WAN link is unavailable. He reports that he can log on to Server1 when the WAN link is available. You need to ensure that User1 can log on to Server1 by using his domain account when the WAN link is unavailable. What should you do? ()A Modify the Default Domain Policy.B Modify the Default Domain Controller Policy.C Add User1 to the Domain Admins group in the domain.D Add User1 to the local Administrators group on Server1.

考题 单选题You are a help desk technician for your company, which is in the process of deploying Windows XP Professional to all client computers. You upgrade Pierre’s Windows 98 portable computer to Windows XP Professional. After the upgrade, Pierre reports that some of his older software applications no longer work properly. Also, one of the hardware devices on his computer is not currently supported by Windows XP Professional. Pierre requests that you reinstall Windows 98 and all of his applications so that he can use his computer normally. You need to restore Pierre’s computer to its pre-upgraded state while retaining all of the applications,documents, and personal data on the computer. You want to accomplish this task in the minimum amount of time. What should you do?()A Copy Pierre’s documents and personal data to a shared folder on the network.B Reinstall Windows 98 and Pierre’s applications. C Copy the documents and personal data to the My Documents folder on Pierre’s computer.D On Pierre’s computer, run Setup.exe from a Windows 98 installation CD. E On Pierre’s computer, use the Add or Remove Programs Wizard to remove the Windows XP Professional Installation item. F On Pierre’s computer, use a third-party disk-imaging software utility to apply a disk image that contains Windows 98 and Pierre’s applications.

考题 单选题You are the desktop administrator for your company. Tom is a user in the company's accounting department. Tom uses a Windows XP Professional portable computer. Tom reports that when the computer is undocked, it randomly displays the following error message: "JZXDRV.DLL failed to load." You discover that the JZXDRV.dll file is used by the device driver for an external storage device that is connected to Tom's docking station. Tom reports that the error message does not appear when the computer is docked. You need to ensure that the error does not occur on Tom's computer. You also need to ensure that the storage device continues to function correctly when Tom's computer is docked. What should you do?()A Remove the storage device from the hardware profile on Tom's computer.B Create a local user account for Tom on his computer. C Copy the JZXDRV.dll file to the profile folder for Tom's local user account. Instruct Tom to log on to his computer by using his local user account whenever the computer is undocked.D Copy the computer's default hardware profile to create a new hardware profile named Undocked. Remove the storage device from the Undocked hardware profile. E Copy the computer's default hardware profile to create a new hardware profile named Undocked. Disable the storage device in the Undocked hardware profile. F Instruct Tom to start the computer by using the Undocked hardware profile whenever the computer is undocked.

考题 单选题You have an organization that contains Exchange Server 2007 and Exchange Server 2010 Hub Transport servers.You create a moderated distribution group named Group1. You assign a user named User1 as the group’s mderator.User1 reports that some e-mails are delivered to members of Group1 without his approval.You need to ensure that all e-mails delivered to Group1 are approved by user1. What should you do?()A Modify the expansion server for the group.B Restart the MSExchangeTransport Service.C Force a replication between all domain controllers.D Recreate the group as a dynamic distribution group.