网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You are the administrator of Company's network. You have configured your computer with a dual-boot configuration. The computer uses both Windows 2000 Professional and Windows NT Workstation 4.0 with the latest service pack. Your computer is equipped with three hard disks: Disk 0, Disk1, and Disk2. Windows NT Workstation 4.0 is installed on Disk 0. Windows 2000 Professional is installed on Disk1. You wish to use Disk 2 to store your project files on. You partition Disk 2 and configure it as a dynamic volume in Windows 2000 Professional. You then start Windows NT Workstation 4.0. You find that you cannot access your project files. You want to be able to access your project files when using either of the operating systems.  What should you do?()
A

Format the dynamic volume as a FAT32 partition.

B

Format the dynamic volume as a FAT16 partition.

C

Configure Disk 2 to use Encrypting File System (EFS).

D

Configure Disk 2 as a basic volume and format the volume as NTFS.

E

Configure Disk 2 as a basic volume and format the volume as FAT32.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You are the administrator of Company's network. You have configured your computer with a dual-boot configuration. The computer uses both Windows 2000 Professional and Windows NT Workstation 4.0 with the latest service pack. Your computer is equipped with three hard disks: Disk 0, Disk1, and Disk2. Windows NT Workstation 4.0 is installed on Disk 0. Windows 2000 Professional is installed on Disk1. You wish to use Disk 2 to store your project files on. You partition Disk 2 and configure it as a dynamic volume in Windows 2000 Professional. You then start Windows NT Workstation 4.0. You find that you cannot access your project files. You want to be able to access your project files when using either of the operating systems.  What should you do?()A Format the dynamic volume as a FAT32 partition.B Format the dynamic volume as a FAT16 partition.C Configure Disk 2 to use Encrypting File System (EFS).D Configure Disk 2 as a basic volume and format the volume as NTFS.E Configure Disk 2 as a basic volume and format the volume as FAT32.” 相关考题
考题 You are the administrator of your company's network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him.Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer.You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort.What should you do?A.Rename Mark's user account to Eric and change the account password.B.Create Eric's account by copying Mark's profile to Eric's account. Delete Mark's account.C.Create Eric's account by copying Marks account. Delete Mark's account.D.Delete Mark's account. Add Eric's account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.

考题 In telephone communication , you should ( )A. get to the point without any greeting or introductionB. keep your company' s address in confidentialityC. make sure you have the information you need

考题 – It’s our great pleasure to have you visit our company. --_________________A、Thank you.B、Nice to meet you.C、It’s our pleasure, too.D、Wonderful.

考题 You administer your company‘s network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the applicatin.What should you do?()A.AB.BC.CD.D

考题 You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured a user named Rory Allen as a Delegate for a user named Dean Austin.During the course of the business week you receive instruction from Company.com to ensurethat Rory Allen is able to add Dean Austin in the from field when sending messages whilst ensuring messages which contain Dean Austin in the From field should display Dean Austin s the message sender when the recipient receive the messages.  What should you do?()A、You should consider having a Sharing policy created.You should then have Rory Allen granted Modify permission to Dean Austin’s mailbox.B、You should consider having a Sharing policy created.You should then have Rory Allen granted Full Mailbox permission to Dean Austin’s mailbox.C、You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send As permission to Dean Austin’s Mailbox.D、You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send on Behalf permission to Dean Austin’s mailbox.

考题 You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()A、WINS, DHCP and DNSB、At least one domain controller and one DNS server.C、At least one domain controller, Active Directory and DNS server.D、Nothing more is needed.E、Nothing more is needed, we can just subnet the network.

考题 You are the administrator of your company’s network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him. Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer.  You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort. What should you do?()A、Rename Mark’s user account to Eric and change the account password.B、Create Eric’s account by copying Mark’s profile to Eric’s account. Delete Mark’s account.C、Create Eric’s account by copying Marks account. Delete Mark’s account.D、Delete Mark’s account. Add Eric’s account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.

考题 You are the network administrator for Company.  A user named Peter runs Windows 2000 Professional on his portable computer. Peter wants to be able to work at home with files that were created in the office on Company’s network. He mapsdrive X to a shared network folder and configures it to reconnect when he logs on to the network.  Before Peter logs off the network and leaves the office, he attempts to make drive X available offline.   Peter calls you and reports that he does not have the option to make his shared folder available offline.   Peter needs to have the files in drive X available offline.   What should you instructs Peter to do?()A、Ensure that NetBIOS over TCP/IP is enabled on the network server.B、Enable Offline Files on the portable computer.C、Create an Offline File synchronization schedule.D、Create a shortcut to the Offline Files folder.

考题 You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()A、You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.B、You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.C、You should consider having mail enabled for KingPublic.D、You should consider having the author role assigned to Anonymous.

考题 You are the administrator of Company's Windows 2000 network. You have been asked to rollout a Windows 2000 Professional service pack on all Windows 2000 Professional client computers in Company's main office. You create a shared folder named InstallFiles that contains the installation files for the service pack and connect to the shared folder. You want to prevent the user interface from being displayed during the installation.  What should you do? ()A、Connect to the InstallFiles shared folder and run the Update -q command.B、Connect to the InstallFiles shared folder and run the Update -u command.C、Connect to the InstallFiles shared folder and run the Update -z command.D、Connect to the InstallFiles shared folder and run the Update -s:InstallFiles command.

考题 You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box. 

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You have to perform the backup of the default trace according to the requirement of your failure recovery plan. The default trace is contained in the subdirectory.You have to backup the subdirectory.  Which SQL Server database engine subdirectory should be backed up?()A、DATAB、INSTALL C、LOG D、BINN

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Today you notice that applications that run on the server have poor performances. You doubt that this has something to do with table scans. You have to capture the appropriate information by using an appropriate Windows System Monitor object. In the options below, which performance object should you use? () A、You should use SQLServer:Buffer ManagerB、You should use SQLServer:Memory Manager C、You should use SQLServer:Databases D、You should use SQLServer:Access Methods

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover.  What should you do? () A、The contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS) B、You should restore a backup to the active node C、You should get rid of the shared array from the active node D、From the active node, you have to uplug the network cable(s)

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database which is named Sellings in the instance. The Sellings database contains a table named Productions. The table is used to stores information about all types of products. The Productions table is often queried by users on the basis of the RadioSize column. The RadioSize column contains the NULL value for all products other than Radios. Currently no index exists on the RadionSize column. According to the requirement of the company CIO, you have to optimize the query performance and reduce the effect on the disk space to the least. So what action should you perform to achieve this goal?()A On the Products table, you should create a view. B On the RadioSize column, you should create a clustered index C On the RadioSize column, you should create a filtered index D On the RadioSize column, you should create a unique clustered index

考题 多选题You are the administrator of Company.com's Windows 2000 Network. The routed TCP/IP network that you administer consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are members of a single Windows 2000 domain named Company.com. TCP/IP is the only network protocol used at Company's office. You have recently installed 10 new Windows 2000 Professional computers and you want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address and a gateway address on each new computer. You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a DNS suffix.BConfigure a subnet mask.CConfigure an LMHOSTS file.DConfigure an Interface metric.EConfigure at least one DNS address.

考题 单选题You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A Control Panel  Data Sources (ODBC).B Control Panel  System Tools  Shared Folders.C Computer Management  System Tools  System Information.D Computer Management  System Tools  Shared Folders  Open Files.E Computer Management  System Tools  Shared Folders  Sessions.F Computer Management  System Tools  Shared Folders  Shares.

考题 单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()A msiB mstC zapD zip

考题 多选题You are the administrator of your company’s network. Your network consists of 20 Windows 2000 Professional computers. You want to configure all of the computers to allow access to the Internet. Your Budget does not allow for installing a permanent Internet connection for the network. You do have a single dial-up account at a local Internet service provider (ISP) and a 56-Kbps modem. You want the computer to be able to access the Internet when web resources are requested. What should you do?()AConfigure the shared modem to use software handshakingBConfigure the dial-up connection to enable on-demand dialing.CConfigure the dial-up connection to enable the Internet connection sharing.DConfigure all the other computers to have a dial-up connection that uses the shared modem.EAttach the modem to one of the Windows 2000 Professional computer, and create a dial-up connection to the ISP.FAttach the modem to one of the Windows 2000 Professional computers, and share the modem on the network.

考题 单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured a user named Rory Allen as a Delegate for a user named Dean Austin.During the course of the business week you receive instruction from Company.com to ensurethat Rory Allen is able to add Dean Austin in the from field when sending messages whilst ensuring messages which contain Dean Austin in the From field should display Dean Austin s the message sender when the recipient receive the messages.  What should you do?()A You should consider having a Sharing policy created.You should then have Rory Allen granted Modify permission to Dean Austin’s mailbox.B You should consider having a Sharing policy created.You should then have Rory Allen granted Full Mailbox permission to Dean Austin’s mailbox.C You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send As permission to Dean Austin’s Mailbox.D You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send on Behalf permission to Dean Austin’s mailbox.

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now you get an order from your company CIO, you have to identify whether a database integrity check (DBCC CHECKDB) was run for a particular database.  Which log file should you examine?()A log.trc B default.trc C ERRORLOG D SQLAGENT

考题 多选题You are the administrator of Company.com’s Windows 2000 Network.  Your routed TCP/IP network consists of 10 Windows 2000 Server computers and 75 Windows 2000 Professional computers. All computers are in the Company.com domain. Your network uses TCP/IP as the only network protocol. You are installing 10 new Windows 2000 Professional computers. You want to enable the new computers to use host names to connect to shared resources on the network. You configure a TCP/IP address, a gateway address and a subnet mask on each new computer.   You want to complete the configuration to allow the computers to communicate on the network.  What should you do?()AConfigure a HOSTS file.BConfigure a LMHOSTS file.CConfigure a WINS server database.DConfigure a DHCP server address.EConfigure at least one DNS address.

考题 单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()A The SetupUser profileB The Default User profileC The Administrator profileD The System profileE The All Users profile

考题 单选题You want to install Windows 2000 Professional on 45 new computers on your company’s network. You first install Windows 2000 Professional on one of the new computers. You log on to the computer by using the local administrator account.  You install Microsoft Office 97, a virus scanner, and other company-standard applications. You then create a RIS image of the computer you configured. You want to configure the RIS image so that the standard applications will be accessible to the user when the user first logs on to the network.  What should you do?()A Run Rbfg.exe before installing the standard applications. B Run RIPrep.exe before installing the standard applications. C Copy the all users profile to the default users profile.D Copy the local administrator account profile to the default users profile

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. For some reason, now the company wants to view the number of users who access the SQL Server instance. The company CIO assigns this task to you. You have to use Windows System Monitor to find out the concrete number. Which performance object should you capture?()A SQLServer:Buffer Manager B SQLServer:Access Methods C SQLServer:General Statistics D SQLServer:Exec Statistics

考题 多选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover.  What should you do? ()AThe contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS)BYou should restore a backup to the active nodeCYou should get rid of the shared array from the active nodeDFrom the active node, you have to uplug the network cable(s)

考题 单选题You are the network administrator for your company. All client computers run Windows XP Professional. All servers run Windows Server 2003.The company has offices in Los Angeles, San Francisco, and Seattle. Each office is configured as a separate IP subnet. DNS is the only method of name resolution used on the network.You need to implement a software update infrastructure on the network. You install Windows Server Update Services (WSUS) on a computer named Server1 in the Los Angeles office. You install WSUS on Server1 with all default settings. You create a Group Policy object (GPO) named WSUS. You have no plans to install additional WSUS servers.You need to ensure that client computers can successfully connect to the WSUS server.  What should you do?()A Configure the Internet browser home page on all client computers to point to http: //windowsupdate.microsoft.com.B In the WSUS GPO, specify the Server Name property to be the server’s fully qualified domain name (FQDN).C On the WSUS server, configure the IIS Manager to require HTTP over SSL.D Enable communication over port 443 between all client computers and the WSUS server.