网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are the network administrator for your company. A user reports that the USB ports on his Windows 2000 Professional portable computer function only when the portable computer is in its docked position at the office. He asks you to configure the computer so that the USB port works when the portable computer is docked and when it is undocked and running on battery power. You verify that the portable computer supports ACPI power management. What should you do?()
A

Modify the portable computer’s power management settings to ensure the USB ports are not  shut down when the computer is running on battery power. 

B

Modify the portable computer’s BIOS settings to disable ACPI when the computer is running  on battery power. 

C

Modify the portable computer’s undocked hardware profile, and enable the USB root hub. 

D

Disable the BIOS power management features in the portable computer’s BIOS settings. 

E

Obtain external power supplies for the user’s USB devices. Ensure that these power supplies  are connected when the portable computer is undocked. 

F

Undock the portable computer, and reinstall the drivers for the USB port.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are the network administrator for your company. A user reports that the USB ports on his Windows 2000 Professional portable computer function only when the portable computer is in its docked position at the office. He asks you to configure the computer so that the USB port works when the portable computer is docked and when it is undocked and running on battery power. You verify that the portable computer supports ACPI power management. What should you do?()A Modify the portable computer’s power management settings to ensure the USB ports are not  shut down when the computer is running on battery power. B Modify the portable computer’s BIOS settings to disable ACPI when the computer is running  on battery power. C Modify the portable computer’s undocked hardware profile, and enable the USB root hub. D Disable the BIOS power management features in the portable computer’s BIOS settings. E Obtain external power supplies for the user’s USB devices. Ensure that these power supplies  are connected when the portable computer is undocked. F Undock the portable computer, and reinstall the drivers for the USB port.” 相关考题
考题 You are the network administrator for your company. The network originally consists of a single Windows NT 4.0 domain.You upgrade the domain to a single Active Directory domain. All network servers now run Windows Server 2003, and all client computers run Windows XP Professional.Your staff provides technical support to the network. They frequently establish Remote Desktop connections with a domain controller named DC1.You hire 25 new support specialists for your staff. You use Csvde.exe to create Active Directory user accounts for all 25.A new support specialist named Paul reports that he cannot establish a Remote Desktop connection with DC1. He receives the message shown in the Logon Message exhibit. (Click the Exhibit button.)You open Gpedit.msc on DC1. You see the display shown in the Security Policy exhibit. (Click the Exhibit button.)You need to ensure that Paul can establish Remote Desktop connections with DC1.What should you do? ()

考题 You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.You want to upgrade all of the critical system files and patches on the server in the shortest possible time.What should you do?A.Use Windows Update.B.Run System File Checker.C.Log on as administrator and run Windows Update.D.Log on as administrator and run System File Checker.

考题 You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()A.CampusB.TeleworkerC.BranchD.Data center

考题 You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

考题 Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All servers run Windows Server 2008 R2.   A corporate security policy requires complex passwords for user accounts that have administrator  privileges. You need to design a strategy that meets the following requirements: èEnsures that administrators use complex passwords   èMinimizes the number of servers required to support the solution What should you include in your design?()A、Implement Network Access Protection (NAP).B、Implement Active Directory Rights Management Services (AD RMS).C、Create a new Password Settings Object (PSO) for administrator accounts.D、Create a new child domain in the forest. Move all non-administrator accounts to the new domain.Configure a complex password policy in the root domain.

考题 You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()A、RepeaterB、Wireless routerC、HubD、Wireless network adapter

考题 You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()A、CampusB、TeleworkerC、BranchD、Data center

考题 .Your companys virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to provide a user with the ability to perform only the Create, Delete, Start, Stop, Pause, Resume, and Shut Down virtual machine (VM) management tasks on your host servers .  What should you do?()A、In VMM,create a Self-Service user role.B、In VMM,create a Delegated Administrator user role.C、In VMM,assign the Local Administrator permission for the host servers to the user.D、In Authorization Manager, create a role on the users client computer and add the user to this role.

考题 You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional. You need to standardize the desktop environment for all client computers. Your solution must prevent domain users from permanently modifying their regional settings or the desktop background. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A、Specify the profile's network path in the user properties in Active Directory Users and Computers.B、Specify the profile's local path in the user properties in Computer Management.C、Specify the profile's network path in the user properties in Computer Management.D、In the network share where profiles reside, rename Ntuser.dat to Ntuser.man.E、In the local profile directory, rename Ntuser.dat to Ntuser.man.F、In the network share where profiles reside, rename Ntuser.ini to Ntuser.man.

考题 You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files.D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on. 

考题 You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A、Create an account for Peter's computer in the Computers container.B、Grant the Log on locally user right to Peter's user account.C、Enable Peter's user account.D、Change the properties of Peter's user account so he can log on to any computer.

考题 You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a user named Paul West. You create a user account named Paul West on the Windows 2000 server computer named server 1. You define a network profile by entering the path //server1/profile/%username% in Paul’s user account setting. When Paul logs on to a Windows 2000 Professional computer he sees the following message- “Windows can not locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server.” The details of network cannot be found. You want to configure the roaming user profile for Paul. What should you do?()A、Create a home folder for Paul.B、Share the network profile directory.C、Map a device to network profile directory.D、Use the %username% variable to allow access.

考题 You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology (IT) security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()A、Assign the Generate security audits user right to the ITSecurity global group.B、Assign the Manage auditing and security logs user right to the ITSecurity global group.C、Assign the Allow logon through Terminal Services user right to the ITSecurity global group.D、Assign the Act as part of the operating system user right to the ITSecurity global group.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()A Automated System Recovery (ASR)B normalC primaryD authoritative

考题 单选题You are the network administrator for your company. The network consists of a single Active Directorydomain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers.You need to ensure that all users are authenticated by a domain controller when they log on.How should you modify the local security policy? ()A Require authentication by a domain controller to unlock the client computer.B Cache zero interactive logons.C Cache 50 interactive logons.D Grant the Log on locally user right to the Users group.

考题 单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()A Enable the Require domain controller to unlock policy.B Set the Number of previous logons to cache policy to 0.  C Remove all user and group accounts from the Log on locally user right. D Remove all user and group accounts from the Access this computer from the network user right. 

考题 单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A STPB GVRPC SNMPD VTPE DHCP

考题 单选题You are the network administrator for your company. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. You successfully install a new server named Server9. Immediately afterward, you perform the first backup of the server. The date is January 25, 2003. Next, you add a user named Anna to the local Backup Operators group. You direct Anne to perform nightly backups of Server9. One week later, you try to review the backup logs for Server9. The Backup utility displays the information show in the exhibit Exhibit: Backup Reports Report date, time and backup job name: 1/25/2003 4:12 PM - Interactive You verify that Anne is performing nightly backups. You need to be able to review the backup logs for the previous week. What should you do?()A Add your user account to the local Backup Operators group.B Direct Anne to use her user account to log on and open the Backup utility.C In the Backup utility, select the verify data after the backup completes check box.D Open %windir%/System32/LogFiles. Create a new subfolder named BackupLogs.

考题 多选题Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest.   You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements:   èThe GPOs must only contain settings for either user configurations or computer configurations. èThe number of GPOs must be minimized.   Which two actions should you perform?()AExport the new GPOs to .cab files. Ensure that the .cab files are available to the network administrator  in each forest.BCreate two new GPOs. Configure both GPOs to use the required user configurations and the required  computer configurations.CCreate two new GPOs. Configure one GPO to use the required user configuration. Configure the other GPO to use the required computer configuration.DBack up the Sysvol folder that is located on the domain controller where the new GPOs were created. Provide the backup to the network administrator in each forest.

考题 单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()A msiB mstC zapD zip

考题 单选题You are the network administrator for . The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. TestKing acquires a subsidiary. You receive a comma delimited file that contains the names of all user accounts at the subsidiary. You need to import these accounts into your domain. Which command should you use?()A ldifdeB csvdeC ntdsutil with the authoritative restore optionD dsadd user

考题 单选题Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()A IgnoreB Replace users roleC Terminate user sessionD Disable user account

考题 单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()A Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B Log on by using your Administrator account and run the ntbackup /D command.C Log on by using your Administrator account and run the schtasks /delete command.D Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.

考题 单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()A Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B Log on by using your Administrator account and run the ntbackup /D command.C Log on by using your Administrator account and run the schtasks /delete command.D Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()A Automated System Recovery (ASR)B normalC primaryD authoritative