网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are customizing the user interface options for the finance department in your organization. Users in the department are able to see a session counter on the Web interface of the Junos Pulse Access Control Service. The CFO is unable to see the session counter.Which explanation would cause this behavior?()

  • A、The CFO is mapped to the finance role, but the session counter was enabled prior to the role mapping.
  • B、The CFO is mapped to the finance role, but the session counter was enabled after the role mapping.
  • C、The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role first, which does not have the session counter enabled.
  • D、The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role last, which does not have the session counter enabled.

参考答案

更多 “You are customizing the user interface options for the finance department in your organization. Users in the department are able to see a session counter on the Web interface of the Junos Pulse Access Control Service. The CFO is unable to see the session counter.Which explanation would cause this behavior?()A、The CFO is mapped to the finance role, but the session counter was enabled prior to the role mapping.B、The CFO is mapped to the finance role, but the session counter was enabled after the role mapping.C、The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role first, which does not have the session counter enabled.D、The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role last, which does not have the session counter enabled.” 相关考题
考题 现有两张数据表(MySQL数据库)如下:x_pt_info x_user_info字段 类型 长度 小数位 字段 类型 长度 小数位user_id int 11 user_id int 11pt_group int 11 user_name varchar 20pt_number decimal 10 2 user_work int 1描述一下这个SQL语句的作用:SELECT b.user_id as user_id,b.user_name as user_name,round(sum(a.pt_number),2) as ptnum from x_pt_info a,x_user_info b wherea.user_id=b.user_id and a.pt_group=1 and b.user_work=2 group by a.user_id order by ptnum desc另外,就你的经验,你觉得该语句是否有改进的余地,如有,请阐述。

考题 You install Microsoft Windows Vista on a computer. You will share the computer with another user. You need to prvent the user from making unauthorized changes to the computer.What should you do?() A.AB.BC.CD.D

考题 You install Windows Vista on a new computer by using the default settings. You create an administrator account and a standard user account.You log on to the computer as the standard user and attempt to install a new application. You are prompted for user credentials to complete the installation.You need to install the application on the computer.What should you do?()A.AB.BC.CD.D

考题 You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D

考题 How can you verify that you have correctly configured SSH access to your Junos device?()A、user@router# show system servicesB、user@router show configuration servicesC、user@router# show configuration system servicesD、user@router# show system login

考题 Which command prompt indicates that you are in operational mode?()A、user@routerB、user@router#C、user@router%D、user@router

考题 You are the network administrator for . All network servers run Windows Server 2003. A server named TestKing6 functions as a file server. All client computers run Windows XP Professional and are members of the domain. TestKing.com periodically hires temporary employees. You need to prepare a custom user profile for all temporary employees. You log on to a client computer as an administrator, and you configure the desktop settings. You copy the profile to a folder named //TestKing6/Profiles/Temp_profile. You rename the Ntuser.dat file in the //TestKing6/Profiles/Temp_profile folder to Ntuser.man. You create three new user accounts for the temporary employees. The user accounts are named temp_user1, temp_user2, and temp_user3. You need to configure the temporary user accounts to receive the new desktop settings that you created on TestKing6. The temporary employees must not be allowed to retain customized desktop settings? What should you do?()A、Specify a user profile path of //TestKing6/Profiles/username for each of the three user accounts.B、Specify a user profile path of //TestKing6/Profiles/username.man for each of the three user accounts.C、Specify a home folder path of //TestKing6/Profiles/username for each of the three user accounts.D、Specify a user profile path of //TestKing6/Profiles/Temp_profile for each of the three user accounts.E、Specify a user profile path of //TestKing6/Profiles/Temp_profile.man for each of the three user accounts.

考题 You are performing a database recovery because a user’s schema is dropped. While performing the recovery, you use the UNTIL SEQUENCE clause. Which type of database recovery are you performing?()A、 user managed complete recoveryB、 user managed incomplete recoveryC、 RMAN-based complete recoveryD、 RMAN-based incomplete recovery

考题 You have a computer that runs Windows 7. The computer is a member of a domain. You share D:/data asData. You assign Everyone Full control share permissions to the folder. No other share permissions areassigned to the folder. From another computer, you attempt to create a file in the Data share by using a domain account named User1. You receive the following error message: Destination Folder Access Denied.You need to ensure that you can create files in the Data share by using the User1 account.  What should you do?()A、Create a local user named User1.B、Add User1 to the local Power Users group.C、Assign User1 Write NTFS permission on the D:///data folder.D、Assign User1 Full control share permissions to the Data share.

考题 You have an Exchange Server 2010 organization.You have a user named User1 and a user named User2. You need to ensure that User1 can add User2 to the From field when he sends e-mail messages. Messages that have User2 in the From field must display only User2 as the message sender to recipients Who receive the messages. What should you use?()A、Active Directory Users and ComputersB、Exchange Control Panel (ECP)C、Exchange Management Console (EMC)D、Microsoft Office Outlook

考题 You have an Exchange 2010 organization.The organization contains a distribution group named Group1.You need to ensure that a user named User1 can add and remove members from Group1.You must prevent User1 from modifying all other groups. What should you do first?()A、Add User1 to Group1 Managed by list.B、Assign User1 as a group moderator for Group1.C、Assign the Distributions Groups management role to User1.D、Assign the MyDistributionGroups management role to User1.

考题 You have a computer that runs Windows XP Professional. You connect one local print device and install a printer. You share the printer. You need to give a user the ability to manage all new print jobs submitted to the printer. Your solution must prevent the user from installing additional local printers. What should you do?()A、In the printer properties, assign the Manage Printers permission to the user.B、In the printer properties, assign the Manage Documents permission to the user.C、From the Local Users and Groups snap-in, add the user to the Power Users group.D、From the Local Users and Groups snap-in, add the user to the Replicators group.

考题 You need to recommend a solution for storing user documents. What should you include in the recommendation?()A、folder redirectionB、home foldersC、mandatory user profilesD、roaming user profiles

考题 A user named User1 uses a computer that runs Windows XP Professional. You need to enable User1 to create local user accounts. You must minimize the rights assigned to the User1 account.  Which group should you add User1 to?() A、AdministratorsB、Power UsersC、Users D、Network Configuration Operators

考题 You install Microsoft Windows Vista on a computer.  You will share the computer with another user.  You need to prevent the user from making unauthorized changes to the computer.  What should you do? ()A、Add the user to the Guests group.B、Create a standard user account for the user.C、Create an administrator account for the user.D、Add the user to the Remote Desktop Users group.

考题 You have a computer that runs Windows XP Professional. Five users share the computer. A user named User1 is a member of the Power Users group and the Administrators group. User1 has encrypted files on the computer. User1 takes an extended leave of absence. You need to ensure that users cannot access the computer as User1. You must be able to provide User1 access to the files upon User1’s return. What should you do?() A、Disable the User1 account.B、Add User1 to the Guests group. C、Reset the password for the User1 account. D、Rename ntuser.dat as ntuser.man in the User1 user profile.

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. The DB1 database contains the following stored procedure. (Line numbers are useded for reference only.)  01 CREATE PROCEDURE Sales.Procedure1  02 AS  03 IF OBJECT_ID('Service.Table') IS NOT NULL  04 DROP TABLE Service.Table;  06 CREATE TABLE Service.Table (  07 Id int PRIMARY KEY CLUSTERED,  08 Name varchar(100);  09 );  11 ...  12  GOThe following exception is raised when a user tries to invoke Procedure1, "Msg 262, Level 14, State 1, Procedure Procedure1, Line 5 CREATE TABLE permission denied in database 'DB1'." You should grant the user access to execute Procedure1, you must assign only the required permissions.  What action should you do perform?()  A、Between lines 01 and 02, you should insert the WITH EXECUTE AS apos;dboapos; clause. B、Between lines 01 and 02, you should insert the EXECUTE AS USER = apos;dboapos; statement. C、You should give the user the ALTER permission on the Service schema D、You should give the CREATE TABLE permission and permit the user to drop the Service.Table table. 

考题 You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notifcation when a user stores more than 500MB of data int he shared folder. You must allow users to store more than 500MB of data in the shared folder.  What should you do()?  A、Create a soft quotaB、Create a hard quotaC、create an active screening file screenD、create a passive screening file screen

考题 You are the network administrator for You administer a Windows Server 2003 computer named TestKing3. A user needs to share documents that are stored in a folder on TestKing3 with other users in his department. When she attempt to share the folder, she discovers that the Sharing tab is missing. You need to ensure that the user can share the documents on TestKing3. You need to ensure that you grant the user the minimum amount of permissions required. What should you do?()A、Instruct the user to move the documents to the Shared Folders folder.B、Add the user's user account to the local Power Users group.C、Add the user's user account to the Network Configuration Operators group.D、Add the user's user account to the local Adminstrators group.

考题 单选题You create a method that runs by using the credentials of the end user. You need to use  Microsoft Windows groups to authorize the user. You must add a code segment that identifies whether a user is in the local group named Clerk.Which code segment should you use?()A AB BC CD D

考题 单选题You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()A Instruct User2 to add a delegateB Instruct User2 to send a signed e-mail message to User1.C Instruct User1 to send a signed e-mail message to User2.D Instruct User1 to modify the sensitivity settings of the e-mail message

考题 单选题You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )A From System in Control Panel, select the Change Type option, and then select the Roaming profile option. B From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. C Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. D Connect the portable computer to the network, and configure the user accounts for a roaming user profile.

考题 单选题You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Windows Mobilebased device user forgets the PIN for the device.   You need to ensure that the user can unlock the device.   What should you do?()A Change the password for the domain user account of the user.B Perform a hard reset of the user’s Windows Mobilebased device.C Perform a soft reset of the user’s Windows Mobilebased device.D Connect the Windows Mobilebased device to the desktop computer of the user and change the password of the local user account of the user.

考题 单选题You have an Exchange Server 2010 organization named contoso.com. Your company is investigating a user named User1. You need to prevent User1 from permanently deleting the items in his mailbox.  What should you run()?A Set-Mailbox User1 -LitigationHoldEnabled $trueB Set-Mailbox User1 -ModerationEnabled $trueC Set-Mailbox User1 -RetainDeletedItemsUntilBackup $trueD Set-Mailbox User1 -RetentionHoldEnabled $true

考题 单选题Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You install an application that requires a user account enabled for constrained delegation. You create the required user account. When you attempt to configure constrained delegation, you discover that the Delegation tab does not appear in the user account properties. You need to ensure that the Delegation tab appears in the user account properties. What should you do?()A Raise the forest functional level.B Add the user account to the Domain Admins group.C Register a service principal name (SPN) for the user account.D Select the Trust this computer for delegation to specified services only option on all domain controllers.

考题 单选题You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.  What should you do? ()A Enable the User Account Control: Only elevate executables that are signed and validated option.B Disable the User Account Control: Only elevate executables that are signed and validated option.C Configure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.D Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.

考题 单选题Your network contains a server named Server1 that runs Windows Server 2008 R2. You have a user named User1. You need to ensure that User1 can schedule Data Collector Sets (DCSs) on Server1. The solution must minimize the number of rights assigned to User1. What should you do?()A Add User1 to the Performance Log Users group.B Add User1 to the Performance Monitor Users group.C Assign the Profile single process user right to User1.D Assign the Bypass traverse checking user right to User1.

考题 单选题Your network contains an Active Directory forest.   You set the Windows PowerShell execution policy to allow unsigned scripts on a domain controller in the  network.  You create a Windows PowerShell script named new-users.ps1 that contains the following lines:  new-aduser user1  new-aduser user2  new-aduser user3  new-aduser user4  new-aduser user5  On the domain controller, you double-click the script and the script runs. You discover that the script fails to create the user accounts.   You need to ensure that the script creates the user accounts.   Which cmdlet should you add to the script()A Import-ModuleB Register-ObjectEventC Set-ADDomainD Set-ADUser