网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You configure parental controls on your computer for your childs user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inappropriate Web sites.  What should you do? ()
A

Enable Microsoft Windows Firewall.

B

Disable the default administrator account.

C

Use password protection for all user accounts.

D

Configure Web sites you approve of in the list of Trusted Sites of Microsoft Windows Internet Explorer.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You configure parental controls on your computer for your childs user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inappropriate Web sites.  What should you do? ()A Enable Microsoft Windows Firewall.B Disable the default administrator account.C Use password protection for all user accounts.D Configure Web sites you approve of in the list of Trusted Sites of Microsoft Windows Internet Explorer.” 相关考题
考题 You configure parental controls on your computer for your child‘s user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inapproriate Web sites.What should you do?()A.AB.BC.CD.D

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D

考题 You have a computer that runs Windows Vista.You need to configure your computer so that you can interact with your desktop when you are prompted for user account control permissions.What should you do?()A.AB.BC.CD.D

考题 You attach a USB camera to your Windows 2000 Professional computer. Windows 2000 Professional detects the camera and prompts you to install the manufacturer’s device driver. You do it, and then you restart the computer. When Win2000 Professional loads, you notice that your USB keyboard does not respond. You suspect that the camera drivers are not certified for Win2000 Professional. You want to configure your computer to enable your use keyboard and to prevent uncertified drivers from being installed in the future. What should you do? ()A、Configure Windows 2000 Professional to enable driver signing.B、Configure Windows 2000 Professional to disable driver signing.C、Start the computer by using the recovery console, restore the system state data.D、Start the computer in safe mode, replace the camera driver with a Windows 2000 Professional driver by using Device Manager.E、Start the computer in debug mode, replace the camera driver with a Windows 2000 Professional driver by using Device Manager.

考题 You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()A、Enable the Problem Reporting feature for all users.B、Configure a custom view to monitor failed logon events on your computer.C、Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D、In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.

考题 You configure parental controls on your computer for your childs user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inappropriate Web sites.  What should you do? ()A、Enable Microsoft Windows Firewall.B、Disable the default administrator account.C、Use password protection for all user accounts.D、Configure Web sites you approve of in the list of Trusted Sites of Microsoft Windows Internet Explorer.

考题 You implement Parental Controls game restrictions for your child on your computer. You select the TEEN rating game restriction.  Your child is still able to run some inappropriate games.  You need to prevent access to all inappropriate games.  What should you do? ()A、Configure the Game Restrictions parental control to disallow games that are not rated.B、Configure the Game Restrictions parental control to block games that have intense violence. C、Configure Windows Defender to remove high alert items.D、Configure Microsoft Internet Explorer in Protected Mode.

考题 You use Microsoft Windows Mail to download e-mail messages to your Inbox.  You need to minimize the receipt of e-mail messages that attempt to acquire private financial information.  What should you do?()A、Create an Inbox rule that moves potentially malicious email to the Junk Mail folder. B、Configure the Parental Controls Web restriction setting to High.C、Configure the phishing filter to move the e-mail messages to the Junk Mail folder. D、Configure Windows Defender to perform a custom scan of potentially malicious email.

考题 Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer.  You need to ensure that other users are able to access only the shared files.  What should you do? ()A、Restart the Workstation service on your computer.B、Change all of your TCP port exceptions to UDP port exceptions.C、Ensure parental controls are not configured to block file sharing.D、Clear the Block all incoming connections check box in Windows Firewall.

考题 You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged.  What should you do?()A、Start the Problem Steps Recorder.B、From Event Viewer, modify the properties of the Security log.C、From the local Group Policy, configure the Audit object access setting.D、From the local Group Policy, configure the Audit directory service Access setting.

考题 You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B、Start the RunAs service and configure the service to start automatically.C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D、Use Scheduled Tasks to configure the task to run under the security context of your account.

考题 You use Windows 2000 Professional on your desktop Computer. You schedule a task to run an MMC snap-in to perform configuration tasks on other computers. You notice that the task is not completing correctly. You manually start MMC. You add the snap-in. You are then able to successfully run the task. You verify that all of your other tasks are working correctly. You want to enable your tasks to complete successfully. What should you do?()A、Use Scheduled Tasks to configure the task to run under the security context of your account.B、Configure the Task Scheduler service account to use a local Administrator account and password.C、Use Computer Management to start the Messenger service and to configure the Messenger service to start automatically. D、Use Computer Management to start the Task Scheduler service and to configure the Task Scheduler service to start automatically. 

考题 A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.  The router fails. You connect the computer directly to the Internet.  You need to ensure that the computer is connected to the Internet in the most secure manner possible.  What should you do?()A、Enable the Remote Desktop feature in the System Properties dialog box.B、Configure the network category of your network connection to Public.C、Configure the network category of your network connection to Private.D、Enable the Windows Collaboration Computer Name Registration Service exception in Microsoft Windows Firewall.

考题 You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

考题 You are a network administrator for ExamSheet.net.  You plan to configure your computer to use Windows 98, Windows 2000 Professional and indows  NT Workstation 4.0. You also plan to configure a data drive that can be accessed by all operating systems on your computer. Your computer has one 20 GB hard disk. You want to configure your computer as shown in the exhibit.  What should do? ()A、Create the boot drive on drive C and format as a FAT16 partition. B、Create the boot drive on drive C and format as a NTFS partition.C、Configure the boot drive as a basic volume and format the volume as FAT32.D、Configure the boot drive as a dynamic volume and format the volume as a FAT16 partition. E、Configure the boot drive as a dynamic volume and format the volume as a FAT32 partition.

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A、Configure the network category of your wireless network connection to Private.B、Configure the network category of your wireless network connection to Public.C、Configure the TCP/IP packet filtering on the wireless network connection.D、Configure the wireless network connection with the appropriate authentication to the router.

考题 You are attempting to connect to your ISP. You view the status change from Dialing to Verifying user name and password. After several seconds, the status changes to Disconnecting. You are then disconnected from the computer you dialed. You verify that your user name and password are entered correctly. You want to enable your Computer to connect to your ISP correctly. What should you do? ()A、Configure your connection to enable data encryption.B、Configure your connection to use the UNIX SLIP server.C、Configure your connection to allow unsecured passwords.D、Instruct your ISP to configure your account to support Multilink.

考题 单选题You want to connect your Windows 2000 Professional computer to multiple TCP/IP subnets on your company’s network. Your computer currently has an ISA network adapter installed. You install a second ISA network adapter. After you restart your computer, you notice that the second ISA network adapter is not functioning. What should you do?()A Set the driver signing option to block.B Set the driver signing option to ignore.C In the computer’s BIOS, reserve an unused IRQ for ISA devices.D In the Device Manager, configure the second ISA network adapter to use an unused IRQ.

考题 多选题You configure your Windows 2000 Professional portable computer to redirect your My Documents folder to your home folder. You want to ensure that you can access all of your files in you’re my Documents folder when you are not connected to the network. What should you do?()AUse Windows Explorer to enable offline files.BUse Windows Explorer to create shortcut to access offline files folder as desktop.CUse Windows Explorer to configure the properties of your home folder to be available offline.DUse synchronization manager to configure your home folder to be available offline.ECreate a shortcut in my network places to access your home folder.

考题 单选题You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()A Enable the Problem Reporting feature for all users.B Configure a custom view to monitor failed logon events on your computer.C Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.

考题 单选题You report to the IT department in your company that your computer has a connectivity problem. The department requests that you configure your system with the following value:  2001::f85c:494e:7:4bd4  You need to configure your computer accordingly.  What should you do?()A Use the given value as an IPv6 address.B Use the given value as a DNS suffix search item.C Use the given value as a WEP key for a wireless network.D Use the given value as a manually assigned MAC address.

考题 单选题You are a network administrator for ExamSheet.net.  You plan to configure your computer to use Windows 98, Windows 2000 Professional and indows  NT Workstation 4.0. You also plan to configure a data drive that can be accessed by all operating systems on your computer. Your computer has one 20 GB hard disk. You want to configure your computer as shown in the exhibit.  What should do? ()A Create the boot drive on drive C and format as a FAT16 partition. B Create the boot drive on drive C and format as a NTFS partition.C Configure the boot drive as a basic volume and format the volume as FAT32.D Configure the boot drive as a dynamic volume and format the volume as a FAT16 partition. E Configure the boot drive as a dynamic volume and format the volume as a FAT32 partition.

考题 单选题You are attempting to connect to your ISP. You view the status change from Dialing to Verifying user name and password. After several seconds, the status changes to Disconnecting. You are then disconnected from the computer you dialed. You verify that your user name and password are entered correctly. You want to enable your Computer to connect to your ISP correctly. What should you do? ()A Configure your connection to enable data encryption.B Configure your connection to use the UNIX SLIP server.C Configure your connection to allow unsecured passwords.D Instruct your ISP to configure your account to support Multilink.

考题 单选题You use Windows 2000 Professional on your desktop Computer. You schedule a task to run an MMC snap-in to perform configuration tasks on other computers. You notice that the task is not completing correctly. You manually start MMC. You add the snap-in. You are then able to successfully run the task. You verify that all of your other tasks are working correctly. You want to enable your tasks to complete successfully. What should you do?()A Use Scheduled Tasks to configure the task to run under the security context of your account.B Configure the Task Scheduler service account to use a local Administrator account and password.C Use Computer Management to start the Messenger service and to configure the Messenger service to start automatically. D Use Computer Management to start the Task Scheduler service and to configure the Task Scheduler service to start automatically. 

考题 单选题You implement Parental Controls game restrictions for your child on your computer. You select the TEEN rating game restriction.  Your child is still able to run some inappropriate games.  You need to prevent access to all inappropriate games.  What should you do? ()A Configure the Game Restrictions parental control to disallow games that are not rated.B Configure the Game Restrictions parental control to block games that have intense violence. C Configure Windows Defender to remove high alert items.D Configure Microsoft Internet Explorer in Protected Mode.

考题 单选题You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()A Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B Start the RunAs service and configure the service to start automatically.C Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D Use Scheduled Tasks to configure the task to run under the security context of your account.

考题 单选题You are the desktop administrator for your company. You install Windows XP Professional on your portable computer. The computer is configured to use an IEEE 1394 PC card. You use the computer to download pictures from a digital camera while you are at the office. You attend a meeting every Monday. During the meeting you use a battery to supply power to your portable computer. Occasionally, the battery runs out of power during these meetings. You need to configure the computer to conserve battery power while you attend your weekly meeting without affecting your power options when you use the computer at your office. How should you configure your computer?()A Use Device Manager to disable the IEEE 1394 PC card power device. B In Control Panel, select the Minimal Power Management power scheme in the Power Options Properties. C Create an additional hardware profile, and disable the IEEE 1394 PC card for this profile. D Use Device Manager to configure the IEEE 1394 PC card Host Controller power management scheme. Select the Allow this device to bring the computer out of standby check box.