网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()
A

Set the group’s folder permissions to deny.

B

Use Event Viewer to monitor changes to the file.

C

Store a backup copy of the file on a USB drive.

D

Change the file attribute to read only.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A Set the group’s folder permissions to deny.B Use Event Viewer to monitor changes to the file.C Store a backup copy of the file on a USB drive.D Change the file attribute to read only.” 相关考题
考题 A user, Jill, is reporting her mouse is moving when Jill is not moving it, and the computer is running slower than normal. Which of the following is the FIRST action that Karen, a technician, should take?()A. Run chkdsk.B. Run an antivirus program.C. Replace the faulty mouse.D. Remove any recently added hardware.

考题 An uninstalled program is still attempting to load when Windows starts. Which of the following options can the technician suggest to stop this unwanted program from loading?()A、ServicesB、Add or Remove ProgramsC、System Configuration UtilityD、System File Checker

考题 A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A、system /vB、winnt /sC、sfc /scannowD、chkdsk /f

考题 You are the network administrator for ExamSheet inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrator group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary.  Eric wants to prevent Julia from changing the permissions on file that Eric creates. To accomplish his goal, Eric creates a folder named C:/Data. He changes the NTFS permission on C:/Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions.  Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:/Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:/Data.  What should you instruct Eric to do?()A、Add Julia’s user account to the local Power Users group.B、Add Julia’s user account to the local Administrators group.C、Allow Julia’s user account Write permissions to C:///Data.D、Allow Julia’s user account Full Control permission to C:///Data.

考题 You run a Windows Defender scan on your computer.  You notice a valid program listed in Quarantined Items.  You need to use this program on your computer.  What should you do?()A、Reinstall the application to another location.B、Restore the program from the Quarantined Items list.C、Remove the program from the Quarantined Items list.D、Repair the program from the Programs option in Control Panel.

考题 A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A、Set the group’s folder permissions to deny.B、Use Event Viewer to monitor changes to the file.C、Store a backup copy of the file on a USB drive.D、Change the file attribute to read only.

考题 Which narrative regarding loading software is incorrect?()A、The approved Loading Program could substituted the approved Loading Manual and/or Trim and Stability BookletB、A Loading Program is required to have General Approval by classification Society prior to being considered for use on a specific shipC、Following a satisfactory installation test on board the ship the Surveyor will issue a Program Installation TestD、A Loading Program may be provided as a classification requirement or as an Owner’s option

考题 A user, Jill, is reporting her mouse is moving when Jill is not moving it, and the computer is running slower than normal. Which of the following is the FIRST action that Karen, a technician, should take?()A、Run chkdsk.B、Run an antivirus program.C、Replace the faulty mouse.D、Remove any recently added hardware.

考题 A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()A、Application logB、File Replication logC、System logD、Security log

考题 A customer purchased a new PC with Windows XP but wants to run a program designed forWindows 98. Which of the following will allow this program to run under Windows XP?()A、Change the file permissions for the executable file.B、Use the convert utility to change the attributes of the executable file.C、Make sure that Windows XP has FAT32 file system.D、Run the executable file under compatibility mode.

考题 You are a help desk technician for your company. All users have Windows XP Professional computers. Ten users run a custom application named Finance on their computers. Finance stores user passwords in a file named Passwords.ini. By default, the Passwords.ini file is stored in a folder named C:/Winnt/App1.  The location and name of the file can be changed by an administrator. Each Passwords.ini file is unique. Each computer contains a single logical drive, which is drive C and is formatted as NTFS. In order to comply with a new company security policy, you need to ensure that the Passwords.ini files are encrypted. What should you do?()A、In the properties of the C:/Winnt/App1 folder, use Windows Explorer to select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. B、Ask a network administrator to share a new encrypted folder named PassFiles on a network server and to permit users to read the files contained within the folder. Copy the Passwords.ini file from each computer into the PassFiles folder. On each computer, configure Finance to use the Passwords.ini file in the PassFiles folder.C、Create a folder named C:/Files. Copy the Passwords.ini file to the C:/Files folder. In the properties of the C:/Files folder, select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:/Files/Passwords.ini file. D、Create a folder named C:/Files. Move the Passwords.ini file to the C:/Files folder. Instruct the user of each computer to open the properties of the C:/Files folder and select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:/Files/Passwords.ini file. 

考题 You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer.  Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.  What should you do? ()A、Grant Paul NTFS permission so that he can access any parent folder to files in the shared   folder.B、Share the Sales folder and grant Paul shared folder permission to access the shared Sales   folder.C、Remove Paul from any other group that has been explicitly denied access to the Sales folder. D、Delete the Sales local group and recreate it. Add individual user accounts from the Sales   Department back into Sales local group.

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Some client computers run Windows XP Professional, and the rest run Windows NT 4.0 Workstation. TestKing includes departments for accounting, design, marketing, and sales. Each department has a corresponding organizational unit (OU). A member server named Testking1 can be accessed only by user accounts in the Accounting, Design, Marketing, and Sales OUs. You install Terminal Server on Testking1. Then you install four new applications on Testking1. Each application is intended for users in only one of the four departments. You need to ensure that each application can be accessed only by users in the appropriate department. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?()A、In the Default Policy Group Policy object (GPO), configure the Start program on connection policy to be the program path and file name of the application to start when the user logs on.B、In each OU, set the Environment property for each user to the program path and file name of the application that corresponds to the OU.C、On Testking1, select the RDP-Tcp connection properties. Set the program path and file name of the application to start when the user logs on.D、Create one Group Policy object (GPO) for each department. Link each GPO to the corresponding OU. For each GPO, configure the Start program on connection policy to run the application that corresponds to the appropriate department.

考题 Your company plans to distribute an application to all of its client computers by using GroupPolicy. You save a file named setup.msi to a local folder on the domain controller. You assign the Authenticated Users group the Read and Read  Execute permissions for the folder. You create a new Group Policy  object (GPO) and a new Computer Configuration software installation package, and you point the package to the setup.msi file in the local folder. You link the GPO to an organizational unit (OU) that contains a computer object for a test client computer. When you log on to the test client computer, you  notice that the application is not installed. You need to ensure that the application is installed on the test computer.  What should you do?()A、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Log off the client computer and then log on.B、 Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Restart the client computer.C、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Log off the client computer and then log on.D、 Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Restart the client computer.

考题 Your network consists of a single Active Directory domain. All servers run Windows Server 2003 ServicePack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).A user named User1 frequently logs on to several different computers.You need to ensure that the documents and shortcuts User1 stores on his desktop are available on the desktop of each computer he uses.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two.)A、From Active Directory Users and Computers, modify the properties of the User1 account.B、From Active Directory Users and Computers, modify the properties for each computer account used by User1.C、On a file server, create a shared folder named Profiles and assign the Change share permission to Everyone group.D、On a file server, create a shared folder named Profiles and assign the Full Control share permission to the Everyone group.

考题 You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()A、Copy the .acw file to the c;/documents/setting/default user folderB、Save the accessibility option to the floppy disk and change the permission to allow full control  of the fileC、Resume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderD、Change the permission of the .acw file in the folder to allow access for Peter’s user account. 

考题 单选题A program configuration file on a shared computer changes each time the program is run, causing the program to fail. Which of the following steps could a technician take to help prevent this file from being changed?()A Set the group’s folder permissions to deny.B Use Event Viewer to monitor changes to the file.C Store a backup copy of the file on a USB drive.D Change the file attribute to read only.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Some client computers run Windows XP Professional, and the rest run Windows NT 4.0 Workstation. TestKing includes departments for accounting, design, marketing, and sales. Each department has a corresponding organizational unit (OU). A member server named Testking1 can be accessed only by user accounts in the Accounting, Design, Marketing, and Sales OUs. You install Terminal Server on Testking1. Then you install four new applications on Testking1. Each application is intended for users in only one of the four departments. You need to ensure that each application can be accessed only by users in the appropriate department. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?()A In the Default Policy Group Policy object (GPO), configure the Start program on connection policy to be the program path and file name of the application to start when the user logs on.B In each OU, set the Environment property for each user to the program path and file name of the application that corresponds to the OU.C On Testking1, select the RDP-Tcp connection properties. Set the program path and file name of the application to start when the user logs on.D Create one Group Policy object (GPO) for each department. Link each GPO to the corresponding OU. For each GPO, configure the Start program on connection policy to run the application that corresponds to the appropriate department.

考题 单选题A customer purchased a new PC with Windows XP but wants to run a program designed forWindows 98. Which of the following will allow this program to run under Windows XP?()A Change the file permissions for the executable file.B Use the convert utility to change the attributes of the executable file.C Make sure that Windows XP has FAT32 file system.D Run the executable file under compatibility mode.

考题 单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A system /vB winnt /sC sfc /scannowD chkdsk /f

考题 单选题You are a help desk technician for your company. All users have Windows XP Professional computers. Ten users run a custom application named Finance on their computers. Finance stores user passwords in a file named Passwords.ini. By default, the Passwords.ini file is stored in a folder named C:/Winnt/App1.  The location and name of the file can be changed by an administrator. Each Passwords.ini file is unique. Each computer contains a single logical drive, which is drive C and is formatted as NTFS. In order to comply with a new company security policy, you need to ensure that the Passwords.ini files are encrypted. What should you do?()A In the properties of the C:/Winnt/App1 folder, use Windows Explorer to select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. B Ask a network administrator to share a new encrypted folder named PassFiles on a network server and to permit users to read the files contained within the folder. Copy the Passwords.ini file from each computer into the PassFiles folder. On each computer, configure Finance to use the Passwords.ini file in the PassFiles folder.C Create a folder named C:/Files. Copy the Passwords.ini file to the C:/Files folder. In the properties of the C:/Files folder, select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:/Files/Passwords.ini file. D Create a folder named C:/Files. Move the Passwords.ini file to the C:/Files folder. Instruct the user of each computer to open the properties of the C:/Files folder and select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:/Files/Passwords.ini file. 

考题 单选题You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()A Copy the .acw file to the c;/documents/setting/default user folderB Save the accessibility option to the floppy disk and change the permission to allow full control  of the fileC Resume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderD Change the permission of the .acw file in the folder to allow access for Peter’s user account. 

考题 单选题You are the network administrator for ExamSheet inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrator group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary.  Eric wants to prevent Julia from changing the permissions on file that Eric creates. To accomplish his goal, Eric creates a folder named C:/Data. He changes the NTFS permission on C:/Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions.  Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:/Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:/Data.  What should you instruct Eric to do?()A Add Julia’s user account to the local Power Users group.B Add Julia’s user account to the local Administrators group.C Allow Julia’s user account Write permissions to C:///Data.D Allow Julia’s user account Full Control permission to C:///Data.

考题 单选题Your company plans to distribute an application to all of its client computers by using GroupPolicy. You save a file named setup.msi to a local folder on the domain controller. You assign the Authenticated Users group the Read and Read  Execute permissions for the folder. You create a new Group Policy  object (GPO) and a new Computer Configuration software installation package, and you point the package to the setup.msi file in the local folder. You link the GPO to an organizational unit (OU) that contains a computer object for a test client computer. When you log on to the test client computer, you  notice that the application is not installed. You need to ensure that the application is installed on the test computer.  What should you do?()A  Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Log off the client computer and then log on.B  Modify the permissions on the folder that contains the setup.msi file so that authenticated users have the List Folder Contents permission. Restart the client computer.C  Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Log off the client computer and then log on.D  Place the setup.msi file into a shared folder. Modify the software installation package to point to the shared folder. Restart the client computer.

考题 单选题You run a Windows Defender scan on your computer.  You notice a valid program listed in Quarantined Items.  You need to use this program on your computer.  What should you do?()A Reinstall the application to another location.B Restore the program from the Quarantined Items list.C Remove the program from the Quarantined Items list.D Repair the program from the Programs option in Control Panel.

考题 单选题An uninstalled program is still attempting to load when Windows starts. Which of the following options can the technician suggest to stop this unwanted program from loading?()A ServicesB Add or Remove ProgramsC System Configuration UtilityD System File Checker

考题 单选题You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer.  Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.  What should you do? ()A Grant Paul NTFS permission so that he can access any parent folder to files in the shared   folder.B Share the Sales folder and grant Paul shared folder permission to access the shared Sales   folder.C Remove Paul from any other group that has been explicitly denied access to the Sales folder. D Delete the Sales local group and recreate it. Add individual user accounts from the Sales   Department back into Sales local group.

考题 单选题A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()A Application logB File Replication logC System logD Security log