网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You delete content from a file named Speed.doc that is stored in the C:\Data folder. You edit 20 files in this folder over the next two days. You need to restore the version of the file that had the correct data. You also need to ensure that the other fiels in the folder remain unaffected.What should you do?()

A.A

B.B

C.C

D.D


参考答案

更多 “ You delete content from a file named Speed.doc that is stored in the C:\Data folder. You edit 20 files in this folder over the next two days. You need to restore the version of the file that had the correct data. You also need to ensure that the other fiels in the folder remain unaffected.What should you do?()A.AB.BC.CD.D ” 相关考题
考题 You are the administrator of a SQL Server 2000 database. You import a table of geographic information from a Microsoft access database into a SQL Server 2000 database. The table has 12,000 rows. Each row averages 5,000 bytes. The table contains lockup data that does not change.You want to minimize the size of the data file and the time required to back up the data. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)A. Create a 60-MB data file named geography.ndfB. Create a 95-MB data file named geography.ndfC. Create a 60-MB data file named geography.mdfD. Create a 95-MB data file named geography.mdfE. Place the table in the PRIMARY filegroup.F. Place the table in a new filegroup named LOCATION.

考题 You are the administrator of a Windows 2000 network. The network includes a Windows 2000 Server computer that is used as a file server. More than 800 of Ezonexam.com's client computers are connected to this server.A shared folder named Data on the server is on an NTFS partition. The data folder contains more than 200 files. The permissions for the data folder are shown in the following table.Type of permission Account PermissionShare Users ChangeNTFS Users Full ControlYou discover that users are connected to the Data folder. You have an immediate need to prevent 10 of the files in the Data folder from being modified. You want your actions to have the smallest possible effects on the users who are using other files on the server.What two actions should you take? (Choose Two)A.Modify the NTFS permissions for the 10 files.B.Modify the NTFS permissions for the Data folder.C.Modify the shared permissions for the Data folder.D.Log off the users from the network.E.Disconnect the users from the Data folder.

考题 You are the administrator of a SQL Server 2000 computer in your company's personnel department. Employee data is stored in a SQL Server 2000 database. A portion of the database schema is shown in the exhibit.You want to create a text file that lists these data columns in the following format title, FirstName, LastName, WorkPhone, PositionName, DepartmentName.You want to create the text file as quickly as possible. You do not expect to re-create this file, and you want to avoid creating new database objects if possible.What should you do?A.Use the bcp utility to export data from each table to a separate text file. Use format files to select the appropriate columns. Merge the data from each text file into a single text file.B.Create a view that joins data from all three tables include only the columns you want to appear in the text file. Use the bcp utility to export data from the view.C.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a local temporary table. Use the bcp utility to export data from the local temporary table to a text file.D.Create a SELECT query that joins the data from the appropriate columns in the three tables. Add an INTO clause to the query to create a global temporary table. Use the bcp utility to export data from the global temporary table to a text file.

考题 You are the administrator of a SQL Server 2000 computer. The server contains a database named Acct. You purge the Acct database of old records and perform. a full backup. The database now uses 4 GB of space. The database files are configured as shown in the Acct Properties exhibit.The server has two hard disks that are configured as shown in the Server Configuration exhibit.The 3 GB transaction log file for the Acct database is stored on drive C. You need to make room for a new database that has a 3 GB data file and a 1 GB transaction log file. You want to optimize database performance on both databases. You also want to minimize administrative overhead.What should you do?A.Shrink the empty data file on drive E. Place the new data file and the new log file on drive E.B.Shrink the empty data file on drive E. Backup and shrink the log file on drive C to 2 GB. Place the new data file on drive E and the new log file on drive C.C.Shrink the data file on drive D to 1 GB, and then shrink the data file on drive E to 2 GB. Place the new data file on drive D and the new log file on drive E.D.Shrink and delete the data file on drive C, and then shrink the database files on drives D and E so that they are both 2 GB. Place the new data file and the new log file on drive C.

考题 You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only.You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.What should you do? (Choose all that apply)A.Map a network drive to the AccSecured\intern folder from Richard's computer.B.Map a network drive to the AccSecured shared folder from Richard's computer.C.Allow the intern user account modify permissions on the intern subfolder.D.Allow the intern user account traverse folder/execute file permission on the AccSecured folder.E.Allow the intern user account list folder content permission on the AccSecured folder. Remove read extended attributes and read permissions.

考题 You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. contains a shared folder named TestKingProjects. You use the Backup utility once each day to back up the TestKingProjects folder.You discover that a database file in the TestKingProjects folder is corrupt. You confirm that the file corruption is not the result of a virus. You need to replace the corrupted file by using the latest backup. You do not know whether the file was corrupted before or after the latest backup was completed.You need to verify that the file in the backup can be opened successfully before you overwrite the existing file.What should you do?()A. In the Backup utility, select the Verify data after backup option.B. Run the Ntbackup \\TestKing2\TestKingProjects /v:yes command.C. Restore the file to a temporary folder. Verify that the database file contains the correct data. Copy the restored file to the TestKingProjects folder.D. Restore the file to a temporary folder. Use the Windiff utility to compare the file in the temporary folder to the file in the TestKingProjects folder. Copy the restored file to the TestKingProjects folder.

考题 You are the administrator of a Windows 2000 Server computer. A folder named HR-Data on the system partition of the server is shared on the network as HR-Data. The owner of the HR-Data folder is Administrators.The shared permissions and NTFS permissions are shown in the following table.Share permissions:Everyone: FULL ControlNTFS permissionsDomain Admins: ReadKatrin: Full ControlKatrin creates a file in the HR-Data folder. She sets the NTFS permissions for the file to list only herself on the access control list, with Full Control permission. Katrin then leaves on vacation and cannot be contacted.Later, you discover that the file contains sensitive information and must be removed from the server as soon as possible. You want to delete the file without modifying any of the permissions for other files in the HR-Data folder. You want your actions to have least possible impact on users who may be using other files in the HR-Data folder. You want to use the minimum amount of authority necessary to delete the file.What should you do?A.Grant yourself Full Control permission for only the HR-data folder and not its subobjects. Delete the file. Then remove Full Control permission for HR-Data folder.B.Take ownership of the HR-Data folder. When prompted, take ownership of the existing files. Grant yourself Full Control permission for the file. Delete the file.C.Take ownership of the file. Grant yourself Modify permission for the file. Delete the file.D.Grant yourself Modify permission for the HR-Data folder and its subobjects. Delete the file. Then remove Modify permission for the HR-Data folder.

考题 Which two statements are true regarding the usage of the SQL*Loader utility()A、You can load data into multiple tables during the same load session.B、You can load data from multiple files to a table during the same load session.C、You cannot perform selective data loading based on the values available in the records.D、You can use an export file generated by the EXPDP utility as an input data file to load the data.E、You can load data only if the input file is available on the disk and tape but not in a named pipes.

考题 You have a computer that runs Windows 7. The computer is a member of a domain. You share D:/data asData. You assign Everyone Full control share permissions to the folder. No other share permissions areassigned to the folder. From another computer, you attempt to create a file in the Data share by using a domain account named User1. You receive the following error message: Destination Folder Access Denied.You need to ensure that you can create files in the Data share by using the User1 account.  What should you do?()A、Create a local user named User1.B、Add User1 to the local Power Users group.C、Assign User1 Write NTFS permission on the D:///data folder.D、Assign User1 Full control share permissions to the Data share.

考题 You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named Dworks in the instance. The Dworks database has a table named Orderthings. According to the company requirement, you have to export all data from the Orderthings table to a file. During the export, you must make sure that the data export process is saved for reuse and a Microsoft Office Open XML document format is used. What should you do?()  A、You should run the bulk copy program utility along with an output file and no format fileB、You should run the SQLCmd utility and save the output to a fileC、You should run the SQL Import and Export Data Wizard and save the output to a file.D、You should run the bulk copy program utility along with a format file and an output file.

考题 You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data. What should you do? ()A、Apply the display filter !DNS and save the displayed frames as a DNSdata.cap file.B、Apply the capture filter DNS and save the displayed frames as a DNSdata.cap file.C、Add a new alias named DNS to the aliases table and save the file as DNSdata.cap.D、Run the nmcap.exe /inputcapture data.cap /capture DNS /file DNSdata.cap command.

考题 You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notification when a user stores more than 500 MB of data in the shared folder. You must allow users to store more than 500 MB of data in the shared folder. What should you do? ()A、Create a soft quota.B、Create a hard quota.C、Create an Active Screening File Screen.D、Create a Passive Screening File Screen.

考题 You delete content from a file named Speed.doc that is stored in the C:///Data folder. You edit 20 files in this folder over the next two days.  You need to restore the version of the file that had the correct data. You also need to ensure that the other files in the folder remain unaffected.  What should you do? ()A、From the Previous Versions tab, restore the version of the file that contains the correct data.B、Restore a version of the folder that contains the correct version of the file.C、Open a version of the folder that contains the correct version of the file.D、Copy a version of the folder that contains the correct version of the file. Replace the existing version of the folder with the older version.

考题 You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. There is a database named Inventory on a SQL Server 2005 computer, and the computer is named SQL01. SQL01 is utilized to aggregate manufacturing part numbers from your company’s trading partners. And the company stores the manufacturing part numbers in the Product table in the Inventory database. The company requests the users to deliver data as text files from each trading partner to SQL1 every night. The data should be imported, and no duplicate manufacturing part numbers should exist in the data which is imported from the text files, and the text files are stored in the Inventory database on SQL01. You should cut the effect on your company’s trading partners and your IT department to the least.  Which action should you perform?()A、First, you should import the data from each text file into a staging table. Second, you should write a query to have a HAVING clause contained so as to migrate replicate values before results are inserted into the Product table.B、First, you should make sure that each text file is stored in an Extensible Markup Language (XML) file. Second, you should utilize Extensible Stylesheet Language Transformations (XSLT) to automatically migrate replicates before data is imported into the Product table.C、First, you should make sure that the unique key values for manufacturing part numbers are utilized by each of your company’s trading partners utilizes. Second, you should import the text files into the Product table.D、You should place a unique index on the PartNum column.

考题 You need to install Windows 2000 Professional on 30 new computers. You also need to deploy a Windows 2000 Professional service pack during the installation. First, you create a network distribution folder named InstallFiles.  You copy the i386 folder from the Windows 2000 Professional CD to the InstallFiles folder.  What should you do?()A、 Copy the service pack files to the InstallFiles/Misc folder. B、 Copy the service pack file sot the InstallFiles/$OEM$ folder. C、 From an existing client computer, run the update –u command from the service pack to the  Install Files folder. D、 From an existing client computer, run the Update –s:InstallFiles command from the service  pack to the InstallFiles folder.

考题 You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()A、Map a network drive to the AccSecured/intern folder from Richard’s computer.B、Map a network drive to the AccSecured shared folder from Richard’s computer.C、Allow the intern user account modify permissions on the intern subfolder.D、Allow the intern user account traverse folder/execute file permission on the AccSecured folder.E、Allow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.

考题 You have a domain controller named Server1 that runs Windows Server 2008 R2.     You need to determine the size of the Active Directory database on Server1.     What should you do()A、Run the Active Directory Sizer tool.B、Run the Active Directory Diagnostics data collector set.C、From Windows Explorer, view the properties of the %systemroot%/ntds/ntds.dit file.D、From Windows Explorer, view the properties of the %systemroot%/sysvol/domain folder.

考题 You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notifcation when a user stores more than 500MB of data int he shared folder. You must allow users to store more than 500MB of data in the shared folder.  What should you do()?  A、Create a soft quotaB、Create a hard quotaC、create an active screening file screenD、create a passive screening file screen

考题 You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()A、 Map a network drive to the AccSecuredintern folder from Richard’s computer. B、 Map a network drive to the AccSecured shared folder from Richard’s computer. C、 Allow the intern user account modify permissions on the intern subfolder. D、 Allow the intern user account traverse folder/execute file permission on the AccSecured  folder. E、 Allow the intern user account list folder content permission on the AccSecured folder.  Remove read extended attributes and read permissions.

考题 单选题You delete content from a file named Speed.doc that is stored in the C:///Data folder. You edit 20 files in this folder over the next two days.  You need to restore the version of the file that had the correct data. You also need to ensure that the other files in the folder remain unaffected.  What should you do? ()A From the Previous Versions tab, restore the version of the file that contains the correct data.B Restore a version of the folder that contains the correct version of the file.C Open a version of the folder that contains the correct version of the file.D Copy a version of the folder that contains the correct version of the file. Replace the existing version of the folder with the older version.

考题 单选题You have a file server that runs Windows Server 2008. The server has a shared folder. You need to receive a notification when a user stores more than 500 MB of data in the shared folder. You must allow users to store more than 500 MB of data in the shared folder. What should you do? ()A Create a soft quota.B Create a hard quota.C Create an Active Screening File Screen.D Create a Passive Screening File Screen.

考题 多选题You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()AMap a network drive to the AccSecured/intern folder from Richard’s computer.BMap a network drive to the AccSecured shared folder from Richard’s computer.CAllow the intern user account modify permissions on the intern subfolder.DAllow the intern user account traverse folder/execute file permission on the AccSecured folder.EAllow the intern user account list folder content permission on the AccSecured folder. Removeread extended attributes and read permissions.

考题 单选题You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. contains a shared folder named TestKingProjects. You use the Backup utility once each day to back up the TestKingProjects folder. You discover that a database file in the TestKingProjects folder is corrupt. You confirm that the file corruption is not the result of a virus. You need to replace the corrupted file by using the latest backup. You do not know whether the file was corrupted before or after the latest backup was completed. You need to verify that the file in the backup can be opened successfully before you overwrite the existing file. What should you do?()A In the Backup utility, select the Verify data after backup option.B Run the Ntbackup //TestKing2/TestKingProjects /v:yes command.C Restore the file to a temporary folder. Verify that the database file contains the correct data. Copy the restored file to the TestKingProjects folder.D Restore the file to a temporary folder. Use the Windiff utility to compare the file in the temporary folder to the file in the TestKingProjects folder. Copy the restored file to the TestKingProjects folder.

考题 单选题You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft network monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24hours. You save the capture file as data.cap. you find that the size of this file is more than 1GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS –related data what should you do?()A Apply the display filter IDNS and save the displayed frames as DNSdata.cap file.B Apply the capture filter IDNS and save the displayed frames as DNSdata.cap file.C Add a new alisa named DNS to the aliases table and save the file as DNSdata.cap.D Run the nmcap.exe /inputcapture data.cap /capture DNS /file DNSdata.cap command.

考题 单选题Your network contains a file server named Server1 that runs Windows Server 2008 R2.You have a folder named Folder1.You need to ensure that files in Folder1 that are older than 365 days are automatically moved to an archive folder. What should you create from the File Server Resource Manager console?()A a file groupB a file management taskC a file screenD a quota

考题 单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You design a SQL Server 2008 Analysis Services (SSAS) solution. Customer data is stored in the tables named CustomerDetails and CustomerContact. The solution uses the following two data sources from two different servers: ·Contoso that accesses the CustomerDetails table ·ContosoCRM that accesses the CustomerContact table You plan to create a dimension named DimCustomer to analyze customer data. You need to ensure that the DimCustomer dimension represents the tables as a snowflake schema to include attributes from the two tables. What should you do?()A  Create a data source view named DsvContoso that is associated with the two data sources and add the tables to the data source view.B  Create a data source view named DsvContoso that is associated with the two data sources and create a named query in the data source view to merge the tables.C  Create a data source view named DsvCustomer that is associated with the Contoso data source and add the CustomerDetails table to the data source view.Create a data source view named DsvCustomerContact that is associated with the ContosoCRM data source and add the CustomerContact table to the data source view.D  Create a data source view named DsvCustomer that is associated with the Contoso data source and create a named query in the data source view to select data from the CustomerDetails table.Create a data source view named DsvCustomerContact that is associated with the ContosoCRM data source and create a named query in the data source view to select data from the CustomerContact table.

考题 单选题You have a computer that runs Windows 7. The computer is a member of a domain. You share D:/data asData. You assign Everyone Full control share permissions to the folder. No other share permissions areassigned to the folder. From another computer, you attempt to create a file in the Data share by using a domain account named User1. You receive the following error message: Destination Folder Access Denied.You need to ensure that you can create files in the Data share by using the User1 account.  What should you do?()A Create a local user named User1.B Add User1 to the local Power Users group.C Assign User1 Write NTFS permission on the D:///data folder.D Assign User1 Full control share permissions to the Data share.