网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are a database administrator for your company. A user named Susan belongs to the Windows SalesManagers group. Susan needs a Reporting Services report to display annual sales information by territory. A user named Joe reports to Susan and belongs to the Windows Sales group. He needs a report that is limited to his sales territory, but still displays the same detailed sales data that is on Susan’s report. You need to design a secure solution that meets the reporting needs of the users and that consumes the minimal amount of server resources.  What should you do?()
A

Design a report for Susan that includes two data regions. One data region is used for summary sales data. The other data region is used for the detailed sales data for each sales representative. Then, design a report for Joe that displays the detailed sales data.

B

Design two reports for Susan. One report includes the territory information, and one report includes the detailed sales data. Then, design a report for Joe that displays the detailed sales data for his territories.

C

Design a report for Susan that includes the territory information. Then, design a report for Joe that includes detailed sales data for his territories. Finally, configure Susans report so that it includes the data in Joes report.

D

Design a parameterized report for Susan that includes all territory information. Then, design a linked report for Joe that links to Susans report.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are a database administrator for your company. A user named Susan belongs to the Windows SalesManagers group. Susan needs a Reporting Services report to display annual sales information by territory. A user named Joe reports to Susan and belongs to the Windows Sales group. He needs a report that is limited to his sales territory, but still displays the same detailed sales data that is on Susan’s report. You need to design a secure solution that meets the reporting needs of the users and that consumes the minimal amount of server resources.  What should you do?()A Design a report for Susan that includes two data regions. One data region is used for summary sales data. The other data region is used for the detailed sales data for each sales representative. Then, design a report for Joe that displays the detailed sales data.B Design two reports for Susan. One report includes the territory information, and one report includes the detailed sales data. Then, design a report for Joe that displays the detailed sales data for his territories.C Design a report for Susan that includes the territory information. Then, design a report for Joe that includes detailed sales data for his territories. Finally, configure Susans report so that it includes the data in Joes report.D Design a parameterized report for Susan that includes all territory information. Then, design a linked report for Joe that links to Susans report.” 相关考题
考题 Which statement creates a new user? () A. CREATIVE USER susan;B. CREATIVE OR REPLACE USER susan;C. CREATE NEW USER susan DEFAULTD. CREATE USER susan IDENTIFIED BY blue;E. CREATE NEW USER susan IDENTIFIED BY blue;F. CREATE OR REPLACE USER susan IDENTIFIED BY blue;

考题 Which statement creates a new user?()A、CREATE USER susan;B、CREATE OR REPLACE USER susan;C、CREATE NEW USER susan DEFAULT;D、CREATE USER susan IDENTIFIED BY blue;E、CREATE NEW USER susanIDENTIFIED by blue;F、CREATE OR REPLACE USER susan IDENTIFIED BY blue;

考题 You are the domain administrator for your company. Roaming profiles are enabled for all users in the sales department. Roaming profiles are stored on a server named Server1, in a shared folder named Profiles. Roger is a user in the sales department. Susan is Roger's manager. Susan reports that Roger modifies his desktop settings, which results in the need for help desk assistance and in lost productivity for Roger. You want to ensure that Roger cannot modify his roaming profile. What should you do?() A、In Active Directory Users and Computers, on Roger's profile tab, change the profile path to //Server1/Profiles/%username%.dat. B、In Active Directory Users and Computers, on Roger's profile tab, change the profile path to //Server1/Profiles/%username%.man. C、In Roger's profile on Server1, change the file name of Ntuser.dat to Ntuser.man.D、In Roger's profile on his computer, change the file name of Ntuser.dat to Ntuser.man.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. DB1 is available to a Windows group which is named WIIKIGO/Supervisors. A Windows user named User1 is a member of the WIIKIGO/Supervisors group. WIIKIGO/Supervisors is a member of the db_owner role in the DB1 database. You must make sure that the SQL Server instance is available to User1. In the DB1 database, which Transact-SQL statement(s) should you execute?()  A、 DROP LOGIN "WIIKIGO/User1"; B、 EXEC dbo.sp_droprolemember 'db_owner', 'WIIKIGO/User1';C、 EXEC dbo.sp_revokedbaccess 'WIIKIGO/User1';EXEC dbo.sp_revokelogin 'WIIKIGO/User1'; D、 CREATE LOGIN "WIIKIGO/User1" FROM Windows;DENY CONNECT SQL TO "WIIKIGO/User1";

考题 Which statement creates a new user?()A、CREATIVE USER susan;B、CREATIVE OR REPLACE USER susan;C、CREATE NEW USER susan DEFAULTD、CREATE USER susan IDENTIFIED BY blue;E、CREATE NEW USER susan IDENTIFIED BY blue;F、CREATE OR REPLACE USER susan IDENTIFIED BY blue;

考题 You are the desktop administrator for your company's sales department. Susan is a user in the sales department. Susan's computer currently runs Microsoft Windows NT Workstation 4. 0.  Susan uses a legacy application that is compatible with only Windows NT Workstation. You want to install Windows XP Professional on Susan's computer. You plan to set up a dual-boot configuration so that Susan can run either Windows XP Professional or Windows NT Workstation. Susan's computer has two hard disks, named drive C and drive G. You install Windows XP Professional on drive G. After Windows XP Professional is installed, Susan reports that Windows NT Workstation is no longer available. You need to ensure that both operating systems are available on Susan's computer. What should you do?() A、Insert the Windows XP Professional CD-ROM into the computer. Run the Sfc.exe /scannow command.B、Insert the Windows XP Professional CD-ROM into the computer. Run the Winnt32. exe /cmdcons command.C、Start the computer by using an MS-DOS bootable floppy disk. Run the Attrib.exe -r -h -s c:/bootsect.dos command.D、Start the computer by using the Windows XP Professional CD-ROM. From the Recovery console, run the Bootcfg /rebuild command.

考题 You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. There is a user in the Windows SalesManagers group, and he is called Simon. A Reporting Services report is required by Simon to have annual sales information displayed by territory. There is another user in the Windows Sales group, and he is called Jack. He is responsible to report to Simon. A report is required by Jack, and the report is limited to his sales territory, but the same detailed sales data is still displayed, and the detailed sales data is on Simon’s report. A secure solution should be designed to meet the requirements of the users listed above, and the least amount of server resources should be utilized.  Which action should be performed?()A、First, all territory information should be contained by a parameterized report which is designed for Simon. Second, a linked report that links to Simons report should be designed for Jack.B、First, two data regions should be contained by a report which is designed for Simon. Second, one data region should be utilized for summary sales data. Third, the other data region should be utilized for the detailed sales data for each sales representative. Four, a report that displays the detailed sales data should be designed for Jack.C、First, two reports should be designed for Simon. Second, the territory information should be contained by one, and the detailed sales data should be contained by another. At last, a report that displays the detailed sales data for Jack’s territories should be designed for Jack.D、First, the territory information should be contained by a report which is designed for Simon. Second, a report which detailed sales data for Jack’s territories is contained should be designed for Jack. Third, Simon’s report should be set to have the data in Jacks report contained.

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You create and share a folder named Sales on a member server. You apply the default share permission and NTFS permissions to Sales. Then you create a folder named SalesForecast in Sales. You apply the default NTFS permissions to SalesForecast. Managers in the sales department are members of a domain user group named SalesManagers. When members of SalesManagers try to add files to SalesForecast,they receive the "Access is denied" error message. You need to configure permissions on these folders to fulfil the following requirements: 1. Members of SalesManagers must be able to create, modify, and delete files in both folders. 2. All other domain users must only be able to read files in both folders. What should you do?()A、Configure the share permissions on Sales to assign the Allow - Change permission to the Everyone group. Configure the NTSF permissions on SalesForecast to assign the Allow - Write permission to the SalesManagers group.B、Configure the share permissions on Sales to assign the Allow - Change permissions to the SalesManagers group. Configure the NTSF permissions on Sales to assign the Allow - Write permissions to the SalesManagers group.C、Configure the share permissions on Sales to assign the Allow - Change permissions to the Everyone group. Configure the NTFS permissions on Sales to assign the Allow - Modify permission to the SalesManagers group.D、Configure the share permissions on Sales to assign theAllow - Change permission to the SalesManagers group. Configure the NTFS permissions on Sales to assign the Allow - Modify permission to the SalesManagers group.

考题 You are a database administrator for your company. A user named Susan belongs to the Windows SalesManagers group. Susan needs a Reporting Services report to display annual sales information by territory. A user named Joe reports to Susan and belongs to the Windows Sales group. He needs a report that is limited to his sales territory, but still displays the same detailed sales data that is on Susan’s report. You need to design a secure solution that meets the reporting needs of the users and that consumes the minimal amount of server resources.  What should you do?()A、Design a report for Susan that includes two data regions. One data region is used for summary sales data. The other data region is used for the detailed sales data for each sales representative. Then, design a report for Joe that displays the detailed sales data.B、Design two reports for Susan. One report includes the territory information, and one report includes the detailed sales data. Then, design a report for Joe that displays the detailed sales data for his territories.C、Design a report for Susan that includes the territory information. Then, design a report for Joe that includes detailed sales data for his territories. Finally, configure Susans report so that it includes the data in Joes report.D、Design a parameterized report for Susan that includes all territory information. Then, design a linked report for Joe that links to Susans report.

考题 You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer.  Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.  What should you do? ()A、Grant Paul NTFS permission so that he can access any parent folder to files in the shared   folder.B、Share the Sales folder and grant Paul shared folder permission to access the shared Sales   folder.C、Remove Paul from any other group that has been explicitly denied access to the Sales folder. D、Delete the Sales local group and recreate it. Add individual user accounts from the Sales   Department back into Sales local group.

考题 You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()A、Assign the Generate security audits user right to the ITSecurity global group.B、Assign the Manage auditing and security logs user right to the ITSecurity global group.C、Assign the Allow logon through Terminal Services user right to the ITSecurity global group.D、Assign the Act as part of the operating system user right to the ITSecurity global group.

考题 You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology (IT) security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()A、Assign the Generate security audits user right to the ITSecurity global group.B、Assign the Manage auditing and security logs user right to the ITSecurity global group.C、Assign the Allow logon through Terminal Services user right to the ITSecurity global group.D、Assign the Act as part of the operating system user right to the ITSecurity global group.

考题 You are the network administrator for your company. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. You successfully install a new server named Server9. Immediately afterward, you perform the first backup of the server. The date is January 25, 2003. Next, you add a user named Anna to the local Backup Operators group. You direct Anne to perform nightly backups of Server9. One week later, you try to review the backup logs for Server9. The Backup utility displays the information show in the exhibit Exhibit: Backup Reports Report date, time and backup job name: 1/25/2003 4:12 PM - Interactive You verify that Anne is performing nightly backups. You need to be able to review the backup logs for the previous week. What should you do?()A、Add your user account to the local Backup Operators group.B、Direct Anne to use her user account to log on and open the Backup utility.C、In the Backup utility, select the verify data after the backup completes check box.D、Open %windir%/System32/LogFiles. Create a new subfolder named BackupLogs.

考题 You are a database administrator for your company. The company uses a SQL Server 2005 computer that runs Reporting Services. Reporting Services is used to produce hundreds of reports each day. You discover that the ReportServerTempDB database is growing. You need to minimize the size of the ReportServerTempDB database. What should you do?()A、Decrease the time between transaction log backups of the database.B、Delete report snapshot history each week.C、Minimize the use of session caching in the reports.D、Minimize the use of report snapshots in the reports.

考题 单选题You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology (IT) security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()A Assign the Generate security audits user right to the ITSecurity global group.B Assign the Manage auditing and security logs user right to the ITSecurity global group.C Assign the Allow logon through Terminal Services user right to the ITSecurity global group.D Assign the Act as part of the operating system user right to the ITSecurity global group.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You create and share a folder named Sales on a member server. You apply the default share permission and NTFS permissions to Sales. Then you create a folder named SalesForecast in Sales. You apply the default NTFS permissions to SalesForecast. Managers in the sales department are members of a domain user group named SalesManagers. When members of SalesManagers try to add files to SalesForecast,they receive the "Access is denied" error message. You need to configure permissions on these folders to fulfil the following requirements: 1. Members of SalesManagers must be able to create, modify, and delete files in both folders. 2. All other domain users must only be able to read files in both folders. What should you do?()A Configure the share permissions on Sales to assign the Allow - Change permission to the Everyone group. Configure the NTSF permissions on SalesForecast to assign the Allow - Write permission to the SalesManagers group.B Configure the share permissions on Sales to assign the Allow - Change permissions to the SalesManagers group. Configure the NTSF permissions on Sales to assign the Allow - Write permissions to the SalesManagers group.C Configure the share permissions on Sales to assign the Allow - Change permissions to the Everyone group. Configure the NTFS permissions on Sales to assign the Allow - Modify permission to the SalesManagers group.D Configure the share permissions on Sales to assign theAllow - Change permission to the SalesManagers group. Configure the NTFS permissions on Sales to assign the Allow - Modify permission to the SalesManagers group.

考题 单选题You are the network administrator for your company. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. You successfully install a new server named Server9. Immediately afterward, you perform the first backup of the server. The date is January 25, 2003. Next, you add a user named Anna to the local Backup Operators group. You direct Anne to perform nightly backups of Server9. One week later, you try to review the backup logs for Server9. The Backup utility displays the information show in the exhibit Exhibit: Backup Reports Report date, time and backup job name: 1/25/2003 4:12 PM - Interactive You verify that Anne is performing nightly backups. You need to be able to review the backup logs for the previous week. What should you do?()A Add your user account to the local Backup Operators group.B Direct Anne to use her user account to log on and open the Backup utility.C In the Backup utility, select the verify data after the backup completes check box.D Open %windir%/System32/LogFiles. Create a new subfolder named BackupLogs.

考题 单选题You are a database administrator for your company. The company uses a SQL Server 2005 computer that runs Reporting Services. Reporting Services is used to produce hundreds of reports each day. You discover that the ReportServerTempDB database is growing. You need to minimize the size of the ReportServerTempDB database. What should you do?()A Decrease the time between transaction log backups of the database.B Delete report snapshot history each week.C Minimize the use of session caching in the reports.D Minimize the use of report snapshots in the reports.

考题 单选题Which statement creates a new user?()A CREATE USER susan;B CREATE OR REPLACE USER susan;C CREATE NEW USER susan DEFAULT;D CREATE USER susan IDENTIFIED BY blue;E CREATE NEW USER susanIDENTIFIED by blue;F CREATE OR REPLACE USER susan IDENTIFIED BY blue;

考题 单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. There is a user in the Windows SalesManagers group, and he is called Simon. A Reporting Services report is required by Simon to have annual sales information displayed by territory. There is another user in the Windows Sales group, and he is called Jack. He is responsible to report to Simon. A report is required by Jack, and the report is limited to his sales territory, but the same detailed sales data is still displayed, and the detailed sales data is on Simon’s report. A secure solution should be designed to meet the requirements of the users listed above, and the least amount of server resources should be utilized.  Which action should be performed?()A First, all territory information should be contained by a parameterized report which is designed for Simon. Second, a linked report that links to Simons report should be designed for Jack.B First, two data regions should be contained by a report which is designed for Simon. Second, one data region should be utilized for summary sales data. Third, the other data region should be utilized for the detailed sales data for each sales representative. Four, a report that displays the detailed sales data should be designed for Jack.C First, two reports should be designed for Simon. Second, the territory information should be contained by one, and the detailed sales data should be contained by another. At last, a report that displays the detailed sales data for Jack’s territories should be designed for Jack.D First, the territory information should be contained by a report which is designed for Simon. Second, a report which detailed sales data for Jack’s territories is contained should be designed for Jack. Third, Simon’s report should be set to have the data in Jacks report contained.

考题 单选题Which statement creates a new user?()A CREATIVE USER susan;B CREATIVE OR REPLACE USER susan;C CREATE NEW USER susan DEFAULTD CREATE USER susan IDENTIFIED BY blue;E CREATE NEW USER susan IDENTIFIED BY blue;F CREATE OR REPLACE USER susan IDENTIFIED BY blue;

考题 单选题You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()A Assign the Generate security audits user right to the ITSecurity global group.B Assign the Manage auditing and security logs user right to the ITSecurity global group.C Assign the Allow logon through Terminal Services user right to the ITSecurity global group.D Assign the Act as part of the operating system user right to the ITSecurity global group.

考题 单选题You are the desktop administrator for your company's sales department. Susan is a user in the sales department. Susan's computer currently runs Microsoft Windows NT Workstation 4. 0.  Susan uses a legacy application that is compatible with only Windows NT Workstation. You want to install Windows XP Professional on Susan's computer. You plan to set up a dual-boot configuration so that Susan can run either Windows XP Professional or Windows NT Workstation. Susan's computer has two hard disks, named drive C and drive G. You install Windows XP Professional on drive G. After Windows XP Professional is installed, Susan reports that Windows NT Workstation is no longer available. You need to ensure that both operating systems are available on Susan's computer. What should you do?()A Insert the Windows XP Professional CD-ROM into the computer. Run the Sfc.exe /scannow command.B Insert the Windows XP Professional CD-ROM into the computer. Run the Winnt32. exe /cmdcons command.C Start the computer by using an MS-DOS bootable floppy disk. Run the Attrib.exe -r -h -s c:/bootsect.dos command.D Start the computer by using the Windows XP Professional CD-ROM. From the Recovery console, run the Bootcfg /rebuild command.

考题 单选题You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer.  Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.  What should you do? ()A Grant Paul NTFS permission so that he can access any parent folder to files in the shared   folder.B Share the Sales folder and grant Paul shared folder permission to access the shared Sales   folder.C Remove Paul from any other group that has been explicitly denied access to the Sales folder. D Delete the Sales local group and recreate it. Add individual user accounts from the Sales   Department back into Sales local group.

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. DB1 is available to a Windows group which is named WIIKIGO/Supervisors. A Windows user named User1 is a member of the WIIKIGO/Supervisors group. WIIKIGO/Supervisors is a member of the db_owner role in the DB1 database. You must make sure that the SQL Server instance is available to User1. In the DB1 database, which Transact-SQL statement(s) should you execute?()A  DROP LOGIN WIIKIGO/User1; B  EXEC dbo.sp_droprolemember 'db_owner', 'WIIKIGO/User1';C  EXEC dbo.sp_revokedbaccess 'WIIKIGO/User1';EXEC dbo.sp_revokelogin 'WIIKIGO/User1'; D  CREATE LOGIN WIIKIGO/User1 FROM Windows;DENY CONNECT SQL TO WIIKIGO/User1;

考题 单选题You are the domain administrator for your company. Roaming profiles are enabled for all users in the sales department. Roaming profiles are stored on a server named Server1, in a shared folder named Profiles. Roger is a user in the sales department. Susan is Roger's manager. Susan reports that Roger modifies his desktop settings, which results in the need for help desk assistance and in lost productivity for Roger. You want to ensure that Roger cannot modify his roaming profile. What should you do?()A In Active Directory Users and Computers, on Roger's profile tab, change the profile path to //Server1/Profiles/%username%.dat. B In Active Directory Users and Computers, on Roger's profile tab, change the profile path to //Server1/Profiles/%username%.man. C In Roger's profile on Server1, change the file name of Ntuser.dat to Ntuser.man.D In Roger's profile on his computer, change the file name of Ntuser.dat to Ntuser.man.

考题 单选题You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute a custom application to the Windows XP Professional computers in the sales department. He deploys the software by using Group Policy. Susan is a user in the sales department. She reports that the custom application is not available. You examine her computer, and you verify that the application is not present on her computer. You want to ensure that the software is deployed the next time Susan logs on. Which command should you run?()A Secedit /refreshpolicy user_policy /enforceB Secedit /refreshpolicy machine_policy /enforceC Gpupdate /target:computer /syncD Gpupdate /target:user /sync