网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()
A

the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group

B

the user can see all the users except those in the Admin group, but can only modify the user’s own account

C

the user can see only the user’s own account, and cannot modify it

D

the user can see only the user’s own account, and can change the password only


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor groupB the user can see all the users except those in the Admin group, but can only modify the user’s own accountC the user can see only the user’s own account, and cannot modify itD the user can see only the user’s own account, and can change the password only” 相关考题
考题 You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()A. Finding user entriesB. Authentication requiredC. LDAP Server TypeD. Determining group membership

考题 Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()A. The document is set to hidden.B. The document is locked.C. The document was saved as a system document.D. The document is owned by the first user.

考题 Which of the following statements is used to grant user TOM and Application team APPGRP the ability to add data to table TAB1?() A.GRANT ADD DATA ON TABLE tab1 TO GROUP tom appgrpB.GRANT INSERT TO USER tom, GROUP appgrp ON TABLE tab1C.GRANT INSERT ON TABLE tab1 TO USER tom, GROUP appgrpD.GRANT ADD DATA ON TABLE tab1 TO USER appgrp, GROUP tom

考题 A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()A、the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor groupB、the user can see all the users except those in the Admin group, but can only modify the user’s own accountC、the user can see only the user’s own account, and cannot modify itD、the user can see only the user’s own account, and can change the password only

考题 Which of the following is the BEST way to make sure the network printer is automatically installed when the user logs on?()A、Log onto the user’s computer as a local administrator and install the printer.B、Make sure the user has permission to print to the printer.C、Create and implement a logon script.D、After the user has logged on, install the printer.

考题 Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()A、The document is set to hidden.B、The document is locked.C、The document was saved as a system document.D、The document is owned by the first user.

考题 Which of the following logs contains information on overall performance and events not related to user authentication?()A、SecurityB、AuditC、ApplicationD、System

考题 An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()A、A shell other than ksh is being used by the user.B、The line ’export ENV=$HOME/.env’ is missing from /etc/profile.C、The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.D、The env_profile attribute is not defined for the user within /etc/security/user.

考题 You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. A user named Mrs. King works in the information technology (IT) security department. Mrs. King is a member of the ITSecurity global group. Mrs. King reports that no one in the ITSecurity global group can access the security log from the console of a computer named Testking1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Testking1. How should you modify the local security policy?()A、Assign the Generate security audits user right to the ITSecurity global group.B、Assign the Manage auditing and security logs user right to the ITSecurity global group.C、Assign the Allow logon through Terminal Services user right to the ITSecurity global group.D、Assign the Act as part of the operating system user right to the ITSecurity global group.

考题 You have an Exchange 2010 organization.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can add and remove members from Group1.You must prevent User1 from modifying all other groups. What should you do first?()A、Add User1 to Group1 Managed by list.B、Assign User1 as a group moderator for Group1.C、Assign the Distributions Groups management role to User1.D、Assign the MyDistributionGroups management role to User1.

考题 You have an Exchange Server 2010 organization.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can review and approve all messages sent to Group1.You must prevent User1 from modifying the membership of Group1.  What should you do?()A、Add User1 to Group1 Managed by listB、Assign User1 as a group moderator for Group1.C、Assign the Message Tracking management role to User1.D、Add User1 to Group1 and then create a new journal rule.

考题 You recently upgraded all Windows NT Workstation 4.0 computers to Windows 2000 Professional. You want to give a new employee named Maria the ability to back up files, share resources, and install programs on a client computer that she shares with other users. You do not want Maria to be able to read other users’ files.   What should you do to accomplish these goals?()A、Add Maria’s user account to the system group.B、Add Maria’s user account to the interactive group.C、Add Maria’s user account to the power user group.D、Add Maria’s user account to the administrators group.E、Add Maria’s user account to the Backup Operators group.

考题 You install Microsoft Windows Vista on a computer.  You will share the computer with another user.  You need to prevent the user from making unauthorized changes to the computer.  What should you do? ()A、Add the user to the Guests group.B、Create a standard user account for the user.C、Create an administrator account for the user.D、Add the user to the Remote Desktop Users group.

考题 You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()A、Configure the terminal server so that users log on by using local user accountsB、Configure the terminal server so that users log on by using domain accountsC、Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverD、Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverE、Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverF、Use Appsec.exe to restrict applications on the terminal server

考题 You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology (IT) security department. Mary is a member of the ITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security log from the console of a computer named Server1. You need to grant the ITSecurity global group the minimum rights necessary to view the security log on Server1. How should you modify the local security policy?()A、Assign the Generate security audits user right to the ITSecurity global group.B、Assign the Manage auditing and security logs user right to the ITSecurity global group.C、Assign the Allow logon through Terminal Services user right to the ITSecurity global group.D、Assign the Act as part of the operating system user right to the ITSecurity global group.

考题 单选题What happens when Host Checker is configured to perform checks every "0" minutes? ()A Host Checker is disabled.B Host Checker will perform continous checks.C Host Checker will perform checks when user logs out.D Host Checker will perform checks when user first logs in.

考题 单选题Your network contains a server that runs Windows Server 2008 R2.You have a shared folder named Data that is located on the C drive. The permissions for the Data folder are configured as shown in the following table.Group name NTFS permission Share permission Group1 Read Read Group2 Modify Change Group3 Full control Read A user named User1 is a member of Group1 and Group3.User1 reports that she cannot upload files to the share.You need to ensure that User1 can upload files to C:/Data. The solution must minimize the number of permissions assigned to all users.What should you do?()A Add User1 to Group2.B Remove User1 from Group1.C Assign the Change share permission to Group1.D Assign the Change share permission to Group3.

考题 单选题You are administrator of your company’s network. Your company has offices in New York, Madrid, Paris and Tokyo. A user named Carmen works in the New York office, but she often travels to the Madrid office. Carmen uses the multi-language version of Windows 2000 Professional on her portable computer. She needs to be able to access both an English and Spanish user interface, input locale, and keyboard layout/IME. When Carmen is in the New York office, she logs on to the network by using the Carmen_eng user account. She is given the English user interface, input locale and keyboard layout/IME. When Carmen is in the Madrid office she logs on to the network by using the Carmen_span user account. She is then given the Spanish interface, input locale and keyboard layout/IME. Carmen reports that when she logs on to the network by using the Carmen_eng user account, she is not allowed to add any languages to her computer other than English, which is already installed. What should you do?( )A Add the Spanish keyboard layout/IME for the Carmen_eng user account profileB Add the English keyboard layout/IME for the Carmen_span user account profileC Reconfigure the Group Policy Object for the Carmen_eng user account to allow her to  change the languages on her computerD Configure the Group Policy Object for the Carmen_span user account to allow her to change  the languages on her computer.

考题 多选题You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()AConfigure the terminal server so that users log on by using local user accountsBConfigure the terminal server so that users log on by using domain accountsCConfigure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal serverDConfigure the server to allow each user to have a Windows desktop when the user logs on to the terminal serverEUse software restriction polices in Group Policy objects (GPOs) that apply to the terminal serverFUse Appsec.exe to restrict applications on the terminal server

考题 单选题Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()A The document is set to hidden.B The document is locked.C The document was saved as a system document.D The document is owned by the first user.

考题 单选题Which of the following statements is used to grant user TOM and Application team APPGRP the ability to add data to table TAB1?()A GRANT ADD DATA ON TABLE tab1 TO GROUP tom appgrpB GRANT INSERT TO USER tom, GROUP appgrp ON TABLE tab1C GRANT INSERT ON TABLE tab1 TO USER tom, GROUP appgrpD GRANT ADD DATA ON TABLE tab1 TO USER appgrp, GROUP tom

考题 单选题You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()A Add Julia’s user account to the local Power Users group.B Add Julia’s user account to the local Administrators group.C Allow Julia’s user account Write permissions to C:///Data.D Allow Julia’s user account Full Control permission to C:///Data.

考题 多选题You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()AFinding user entriesBAuthentication requiredCLDAP Server TypeDDetermining group membership

考题 单选题You are the network administrator for Company. The network consists of a single Windows 2000 Domainnamed Company.com. Company has offices in Madrid and New York.A user named Carmen works in the New York office, but she often travels to the Madrid office. Carmenuses the Multilanguage version of Windows 2000 Professional on her portable computer. She needs to beable to access both an English and Spanish user interface, input locale, and keyboard layout/IME.When Carmen is in the New York office, she logs on to the network by using the Carmen_eng useraccount which is in the NewYork organizational unit (OU). With this user account she is given theEnglish user interface, input locale, and keyboard layout/IME.Carmen reports that when she logs on as Carmen_eng, she is not allowed to add any other input locales.She is able to do so when she logs on as Carmen_span.You want Carmen to be able to add input locales to her computer when she logs on as Carmen_eng. Youwant to minimize the effects of any changes on other users.What should you do?()A Disable any Group Policy objects (GPO) currently linked to the NewYork OU. B Disable any Group Policy objects (GPO) currently linked to the domain. C Create a new Group Policy object (GPO) specifically for the Carmen_eng user account to   allow her to change languages on her computer and link the GPO to the NewYork OU. Move the link to the top of the GPO link list. D Modify the Local Computer Policy on all domain controllers to allow users to change   languages. 

考题 单选题An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()A A shell other than ksh is being used by the user.B The line ’export ENV=$HOME/.env’ is missing from /etc/profile.C The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.D The env_profile attribute is not defined for the user within /etc/security/user.

考题 单选题You have an organization that contains Exchange Server 2007 and Exchange Server 2010 Hub Transport servers.You create a moderated distribution group named Group1. You assign a user named User1 as the group’s mderator.User1 reports that some e-mails are delivered to members of Group1 without his approval.You need to ensure that all e-mails delivered to Group1 are approved by user1. What should you do?()A Modify the expansion server for the group.B Restart the MSExchangeTransport Service.C Force a replication between all domain controllers.D Recreate the group as a dynamic distribution group.

考题 单选题A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group namedGroup1. The computer contains a folder named Folder1. You need to configure the permissions on Folder1to meet the following requirements: User1 must be allowed to delete all files in Folder1  Members of Group1 must be able to create files in Folder1  All other members of Group1 must be prevented from deleting files they did not create in Folder1All users must be prevented from modifying the permissions on Folder1. What should you do?()A Assign Group1 the Write permission. Assign User1 the Modify permission.B Assign Group1 the Modify permission. Assign User1 the Write permission.C Deny Group1 the Write permission. Assign User1 the Modify permission.D Deny Group1 the Modify permission. Assign User1 the Write permission.