网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You configure parental controls on your computer for your child‘s user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inapproriate Web sites.What should you do?()

A.A

B.B

C.C

D.D


参考答案

更多 “ You configure parental controls on your computer for your child‘s user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inapproriate Web sites.What should you do?()A.AB.BC.CD.D ” 相关考题
考题 Passage FourFriends become a child’s chosen family. If his social life is going well, he gains confidence. If he has trouble connecting, it hurts and can make him feel sad and withdrawn and lonely.1. Help your child communicate. Naturally outgoing kids have an easier time expressing their interest in other children than shy ones do. But you can help build this skill through practice. Ask your child about his favorite games and toys. Praise him for specifics when he shows interest in other people:” You were so nice to let Roger talk about his little dog. I am proud of you.”2. Keep play short and sweet. Parents should keep early play date short, so no one gets too tired and everyone has fun. Schedule the next one soon after that, so kids can quickly build on their comfort foundation.3. Know your child. If your child is bossy, tale with him and agree beforehand on which toys will be shared and which ones should be put away because your child just can’t seem to share them. If you have a shy child, match him with a younger child so he has a chance to be the leader.4. Help your child help others. Encourage your child to be a better friend by helping him include others in play. If you see someone being excluded, don’t ignore it. This is an opportunity to work on your child’s ability to understand others. “Rachel is beingleft out. That must make her feel very sad. Can you think of a way to include her in the game?”5. Help your kids help themselves. If your child is the one who’s being ignored or treated badly, teach him to speak up.48. Which word can best describe a child who is good at connecting?A Bossy B Confident C Proud D Showy

考题 What is probably the best title for the passage?A How to Help Your Child Help OthersB How to Educate a Shy ChildC How to Communicate with Your ChildD How to Help Your Child Make Friends

考题 You have a computer that runs Windows Vista.You need to configure your computer so that you can interact with your desktop when you are prompted for user account control permissions.What should you do?()A.AB.BC.CD.D

考题 You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()A.AB.BC.CD.D

考题 You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()A、Enable the Problem Reporting feature for all users.B、Configure a custom view to monitor failed logon events on your computer.C、Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D、In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.

考题 You are developing a Web control. The Web control captures user address information in a Web application. You create a class named AddressControl that inherits from CompositeControl. This control consists of child controls. You need to ensure that the child controls are properly output to the browser. Developers using your control must be able to set the appropriate text for labels. In addition, they must be able to pull user address information from the associated text boxes during postback. What should you do? ()A、Override the EnsureChildControls method of the base class. Add the child controls to the base container.B、Override the CreateControlCollection method of the base class. Add the child controls to the ControlCollection class.C、Override the CreateChildControls method of the base class. Add the child controls to the base container.D、Override the DataBindChildren method of the base class. Add the child controls to the ControlCollection class.

考题 You configure parental controls on your computer for your childs user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inappropriate Web sites.  What should you do? ()A、Enable Microsoft Windows Firewall.B、Disable the default administrator account.C、Use password protection for all user accounts.D、Configure Web sites you approve of in the list of Trusted Sites of Microsoft Windows Internet Explorer.

考题 Your company has an Active Directory forest. Each branch office has an organizational unit and a  child organizational unit named Sales.     The Sales organizational unit contains all users and computers of the sales department.     You need to install a Microsoft Office 2007 application only on the computers in the Sales  organizational unit.   You create a GPO named SalesApp GPO.     What should you do next()A、Configure the GPO to assign the application to the computer account. Link the SalesAPP GPO to the domain.B、Configure the GPO to assign the application to the user account. Link the SalesAPP GPO to the Sales organizationC、Configure the GPO to publish the application to the user account. Link the SalesAPP GPO to the Sales organizationD、Configure the GPO to assign the application to the computer account. Link the SalesAPP GPO to the Sales organiz

考题 Your company has an Active Directory forest. Each branch office has an organizational unit and a child organizational unit named Sales. The Sales organizational unit contains all users and computers of the sales department. You need to install an Office 2007 application only on the computers in the Sales organizational unit. You create a GPO named SalesApp GPO. What should you do next()A、Configure the GPO to assign the application to the computer account. Link the SalesAPP GPO to the domain.B、Configure the GPO to assign the application to the user account. Link the SalesAPP GPO to the Sales organizational unit in each location.C、Configure the GPO to publish the application to the user account. Link the SalesAPP GPO to the Sales organizational unit in each location.D、Configure the GPO to assign the application to the computer account. Link the SalesAPP GPO to the Sales organizational unit in each location.

考题 You implement Parental Controls game restrictions for your child on your computer. You select the TEEN rating game restriction.  Your child is still able to run some inappropriate games.  You need to prevent access to all inappropriate games.  What should you do? ()A、Configure the Game Restrictions parental control to disallow games that are not rated.B、Configure the Game Restrictions parental control to block games that have intense violence. C、Configure Windows Defender to remove high alert items.D、Configure Microsoft Internet Explorer in Protected Mode.

考题 Your computer is part of a workgroup. You share files with other users on the network. You configure exceptions in Microsoft Windows Firewall to allow file sharing. Users report that they are unable to connect to your computer.  You need to ensure that other users are able to access only the shared files.  What should you do? ()A、Restart the Workstation service on your computer.B、Change all of your TCP port exceptions to UDP port exceptions.C、Ensure parental controls are not configured to block file sharing.D、Clear the Block all incoming connections check box in Windows Firewall.

考题 You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B、Start the RunAs service and configure the service to start automatically.C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D、Use Scheduled Tasks to configure the task to run under the security context of your account.

考题 Your computer has Microsoft Windows Firewall enabled.  Your child plays an online game that uses connectionless traffic over port 5678 for inbound and outbound traffic.  You need to prevent your child from playing this game.  What should you do? ()A、Enable the User Account Control feature.B、Configure the user account of your child as a standard user.C、Create an outbound rule in Windows Firewall to block UDP port 5678.D、Create an outbound rule in Windows Firewall to block TCP port 5678.

考题 You install Windows 2000 Professional on your computer at home. You create a new dial-up connection to connect to your company’s remote access server. You configure the connection to use both of your external modems and to use multilink to bind the modems together. You start the dial-up connection and connect to the remote access server. You notice that only one of the modems is connected to the remote access server. What should you do?()A、Configure the dial-up connection to use a SLIP connection.B、Configure the company’s remote access server to accept multilink connections.C、Replace your modems with new modems that support multilink.D、Grant your user account multilink permission on the company’s remote access.

考题 You are the administrator for Company's network.  Your account is configured to use roaming profiles and your username is Johan1. The profile is stored on a Windows 2000 Server computer named CompanyA. You log on to your Windows 2000 Professional computer and install a shared color laser printer. The color laser printer is shared from a computer named CompanyB. The next day when you return and log on to your computer you discover that when you attempt to print a document to the shared color laser printer, the printer is not included in the list of available printers. You want the printer connection to be available to you from any computer on the network.  What should you do? ()A、On CompanyA configure a local user account for Johan1.B、On CompanyA change the file ntuser.man to ntuser.dat for Johan1C、Install an updated printer driver for the print device on the user’s computer.D、Grant Johan1 the Manage Printers permission for the shared color laser printer.

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A、Configure the network category of your wireless network connection to Private.B、Configure the network category of your wireless network connection to Public.C、Configure the TCP/IP packet filtering on the wireless network connection.D、Configure the wireless network connection with the appropriate authentication to the router.

考题 You are attempting to connect to your ISP. You view the status change from Dialing to Verifying user name and password. After several seconds, the status changes to Disconnecting. You are then disconnected from the computer you dialed. You verify that your user name and password are entered correctly. You want to enable your Computer to connect to your ISP correctly. What should you do? ()A、Configure your connection to enable data encryption.B、Configure your connection to use the UNIX SLIP server.C、Configure your connection to allow unsecured passwords.D、Instruct your ISP to configure your account to support Multilink.

考题 单选题Your computer has Microsoft Windows Firewall enabled.  Your child plays an online game that uses connectionless traffic over port 5678 for inbound and outbound traffic.  You need to prevent your child from playing this game.  What should you do? ()A Enable the User Account Control feature.B Configure the user account of your child as a standard user.C Create an outbound rule in Windows Firewall to block UDP port 5678.D Create an outbound rule in Windows Firewall to block TCP port 5678.

考题 单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()A Enable the Require domain controller to unlock policy.B Set the Number of previous logons to cache policy to 0.  C Remove all user and group accounts from the Log on locally user right. D Remove all user and group accounts from the Access this computer from the network user right. 

考题 单选题Your company has an Active Directory forest. Each branch office has an organizational unit and a  child organizational unit named Sales.     The Sales organizational unit contains all users and computers of the sales department.     You need to install a Microsoft Office 2007 application only on the computers in the Sales  organizational unit.   You create a GPO named SalesApp GPO.     What should you do next()A Configure the GPO to assign the application to the computer account. Link the SalesAPP GPO to the domain.B Configure the GPO to assign the application to the user account. Link the SalesAPP GPO to the Sales organizationC Configure the GPO to publish the application to the user account. Link the SalesAPP GPO to the Sales organizationD Configure the GPO to assign the application to the computer account. Link the SalesAPP GPO to the Sales organiz

考题 单选题You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?()A Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. B Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. C Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. D Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. 

考题 单选题You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()A Enable the Problem Reporting feature for all users.B Configure a custom view to monitor failed logon events on your computer.C Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.

考题 单选题You configure parental controls on your computer for your childs user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inappropriate Web sites.  What should you do? ()A Enable Microsoft Windows Firewall.B Disable the default administrator account.C Use password protection for all user accounts.D Configure Web sites you approve of in the list of Trusted Sites of Microsoft Windows Internet Explorer.

考题 单选题Let’s suppose that you are in _____ position of _____ parent. Would you allow your child to do such a thing?A a; aB the; theC /; /D the; a

考题 单选题You are attempting to connect to your ISP. You view the status change from Dialing to Verifying user name and password. After several seconds, the status changes to Disconnecting. You are then disconnected from the computer you dialed. You verify that your user name and password are entered correctly. You want to enable your Computer to connect to your ISP correctly. What should you do? ()A Configure your connection to enable data encryption.B Configure your connection to use the UNIX SLIP server.C Configure your connection to allow unsecured passwords.D Instruct your ISP to configure your account to support Multilink.

考题 单选题You implement Parental Controls game restrictions for your child on your computer. You select the TEEN rating game restriction.  Your child is still able to run some inappropriate games.  You need to prevent access to all inappropriate games.  What should you do? ()A Configure the Game Restrictions parental control to disallow games that are not rated.B Configure the Game Restrictions parental control to block games that have intense violence. C Configure Windows Defender to remove high alert items.D Configure Microsoft Internet Explorer in Protected Mode.

考题 单选题You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()A Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.B Start the RunAs service and configure the service to start automatically.C Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.D Use Scheduled Tasks to configure the task to run under the security context of your account.