网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

If file A has the capability of 724, the same group's users of file A may do(74).

A.read A only

B.write A

C.execute A

D.non-operation


参考答案

更多 “ If file A has the capability of 724, the same group's users of file A may do(74).A.read A onlyB.write AC.execute AD.non-operation ” 相关考题
考题 ●If file A has the capability of 724,the same group's users of file A may do (74) .(74) A.read A onlyB.write AC.execute AD.non-operation

考题 If file A has the capability of 724,the same group’s users of file A may doA.read A OnlyB.write AC.execute AD.non-operation

考题 Examine these two statements:Which three are true about the MRKT tablespace?() A. The MRKT tablespace is created as a small file tablespace, because the file size is less than the minimum required for big file files.B. The MRKT tablespace may be dropped if it has no contents.C. Users who were using the old default tablespace will have their default tablespaces changed to the MRKT tablespace.D. No more data files can be added to the tablespace.E. The relative file number of the tablespace is not stored in rowids for the table rows that are stored in the MRKT tablespace.

考题 You executed this command to create a password file:$ orapwd file = orapworcl entries = 10 ignorecase = NWhich two statements are true about the password file?() A. It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.B. It contains username and passwords of database users who are members of the OSOPER operating system group.C. It contains usernames and passwords of database users who are members of the OSDBA operating system group.D. It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.E. It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.

考题 Password is a secret series of(73) that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to(74). The password helps ensure that(75) users do not access the computer. In addition, data files and programs may require a password.A.symbolB.signC.charactersD.characteristic

考题 You are a network administrator for Ezonexam.com's Windows 2000 network.Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."What should you do?A.Use System File Checker (SFC) to decrypt the file.B.Log on the network as the Recovery Agent. Decrypt the files for the manager.C.Log on the network as the administrator. Use the cipher command to decrypt the files.D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 Certkiller .com has asked you to create a file management application to monitor the hosts file.Certkiller .com has instructed you to change the hosts file if it has been changed.You, therefore, need to display the size and whether the hosts file is set to read-only.What should you do?()A.B.C.D.

考题 You are the administrator for ExamSheet.net's network.  You are using Windows Installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes an organizational unit (OU) named Sales. A Group Policy object (GPO) is created for the Sales OU.  The software deployment of the application is unsuccessful. During the deployment, some users in the Sales OU report that the installation is aborting with random errors midway through the installation process. The remaining users in the Sales OU report that the software is installing, but is giving them general protection fault errors. You want to successfully deploy the software What should you do? ()A、Repackage and redeploy the application’s .msi file to the Sales OU.B、Repackage and redeploy the application’s .mst file to the Sales OU.C、Redeploy the application by using the Group Policy object (GPO) for the Sales OU.D、Restart Windows Installer on all computers in the Sales OU. Then redeploy the application’s .zap file to the Sales OU.

考题 You are the network administrator for Company.A user named Bruno has limited dexterity, which prevents him from using the standard keyboardcompleting his daily computing tasks. You configure his Windows 2000 Professional computer to use theon-screen keyboard and ToggleKeys option. You save the accessibility option settings to a floppy disk.You copy the .acw file to the desktop of another user named Peter. Peter’s domain user account is amember of the local Power Users group. Peter executes the .acw file. Peter informs you that theaccessibility options are not to his liking.You want to remove the accessibility options enabled by the .acw file on Peter’s computer.What should you do? ()A、Delete the .acw file from Peter’s desktop.B、Remove Peter’s account from the local Power Users group.C、Run the Accessibility wizard and select Restore Defaults.D、Use Task Manager to end the Explorer.exe process.

考题 Your company ahs an active direcotyr domain. The company also has a server named Server1 that runs Windows Server 2008. You install the file server role on Server1. you create a shared folder named AcctgShare on Server1 The permissions for the shared folder are configured as shown in the following table. ( missing again!) You need to ensure members of the Managers group can only view and open files in the shared folder.  What should you do()?  A、Modify the share permissions for the Managers group to ReaderB、Modify the share permisisons for the Accounting Users group to ContributorC、Modify the NTFS permisisons for the Managers group to ModifyD、Modify the NTFS permissions for the authenticated users group to modify and the share permissions to contributer.

考题 单选题Your network contains a file server named Server1 that runs Windows Server 2008 R2. Server1 has a volume named E.From the File Server Resource Manager console, you create a new quota for volume E. The quota is derived from the 100 MB limit quota template.You need to prevent users from storing audio and video files on volume E. What should you do?()A Create a file screen.B Create a file management task.C Modify the properties of the quota.D Modify the properties of the Audio and Video Files file group.

考题 单选题You need to recommend a deployment strategy for App1. What should you recommend?()A Assign App1 to users by using a Group Policy.B Publish App1 to users by using a Group Policy.C Deploy App1 as a RemoteApp program by using an MSI file.D Deploy App1 as a RemoteApp program by using an RDP file.

考题 单选题Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. All servers run Windows Server 2003 Service Pack 2 (SP2). The network contains 10 file servers. Each file server hosts a share named Apps.On each file server, a local group named App-install-local has permissions to the Apps share. A global group named App-install-global belongs to the App-install-local group on each file server. App-install-global is used only to control permissions for the Apps share.You create a global group named Helpdesk.You need to provide the Helpdesk group access to the Apps share on each file server. The Helpdesk group must have the same permissions as the App-install-global group. You must achieve this goal by using the minimum amount of administrative effort.What should you do? ()A Add the Helpdesk group to the App-install-global group.B Add the Helpdesk group to the App-install-local group on each file server.C Convert the App-install-global group to a universal group. Add the App-install-global group to the Helpdesk group.D Convert the Helpdesk group to a universal group. Add the Helpdesk group to the App-install-local group on each file server.

考题 单选题Your company has file servers located in an organizational unit named Payroll. The file servers contain payroll files located in a folder named Payroll. You create a GPO. You need to track which employees access the Payroll files on the file servers. What should you do()A Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configure Auditing for the Everyone group in the Payroll folder.B Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing for the Authenticated Users group in the Payroll folder.C Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file servers, configure Auditing for the Authenticated Users group in the Payroll folder.D Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, configure Auditing for the Everyone group in the Payroll folder.

考题 单选题You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. The software deployment of the application is unsuccessful. During the deployment, some users in the Sales OU report that the installation is aborting with random errors midway through the installation process. The remaining users in the Sales OU report that the software is installing, but is giving them general protection fault errors. What should you do?()A Repackage and re-deploy the application's .msi file to the Sales OUB Repackage and re-deploy the application's .mst file to the Sales OUC Re-deploy the application by using the Group Policy object (GPO for the Sales OU)D Restart Windows Installer on all computers in the Sales OU. Then re-deploy the application's .zap file to the sales OU. 

考题 单选题Your network contains an Active Directory domain. The domain contains a member server that runs Windows Server 2008 R2.You have a folder named Data that is located on the C drive. The folder has the default NTFS permissions configured.A support technician shares C:/Data by using the File Sharing Wizard and specifies the default settings.Users report that they cannot access the shared folder.You need to ensure that all domain users can access the share.What should you do?()A Enable access-based enumeration (ABE) on the share.B Assign the Read NTFS permission to the Domain Users group.C From the Network and Sharing Center, enable public folder sharing.D From the File Sharing Wizard, configure the Read permission level for the Domain Users group.

考题 单选题Your network contains a file server that runs Windows Server 2008 R2. The server has File Server Resource Manager (FSRM) installed.A file screen is created for a folder named Data. Data is located on the C drive. The file screen is configured to block files contained in the Audio and Video file group.You need to allow users in the sales department to upload video files to C:/Data/Sales. What should you do?()A Create a file screen exception.B Modify the Audio and Video file group.C Implement an active file screen on C:/Data/Sales.D Implement a passive file screen on C:/Data/Sales.

考题 单选题You have a stand-alone computer that runs Windows XP Professional. Five users use the computer. Each user has a local user account. The user accounts are member of only the Users group. You need to share a document between all users of the computer. What should you do?()A Copy the file to the Shared Documents folder. B Copy the file to the My Documents folder of the local administrator. C Copy the file to the %SystemRoot%/CSC folder. Add all user accounts to the guests group.D Enable Offline File and Folder Caching. Copy the file to the %SystemRoot%/CSC folder.

考题 单选题You create a Microsoft ASP.NET Web application by using the Microsoft .NET Framework version 3.5.  You use Windows Authentication for the application. You set up NTFS file system permissions for the Sales group to access a particular file. You discover that all the users are able to access the file.  You need to ensure that only the Sales group users can access the file. What additional step should you perform?()A Remove the rights from the ASP.NET user to the file. B Remove the rights from the application pool identity to the file. C Add the identity impersonate=true/ section to the Web.config file. D Add the authentication mode=[None] section to the Web.config file.

考题 单选题You need to design an access control strategy that meets business and security requirements. Your solution must minimize forestwide replication. What should you do?()A Create a global group for each department and a global group for each location. Add users to their respective departmental groups as members. Place the departmental global groups within the location global groups. Assign the location global groups to file and printer resources in their respective domains, and then assign permissions for the file and printer resources by using the location global groupsB Create a global group for each department, and add the respective users as members. Create domain local groups for file and printer resources. Add the global groups to the respective domain local groups. Then, assign permissions to the file and printer resources by using the domain local groupsC Create a local group on each server and add the authorized users as members. Assign appropriate permissions for the file and printer resources to the local groupsD Create a universal group for each location, and add the respective users as members. Assign the universal groups to file and printer resources. Then, assign permissions by using the universal groups

考题 单选题Your alert log file has the following information: Tue May 25 17:43:38 2004  ORA-00060: Deadlock detected. More info in file  /u01/app/oracle/admin/ORCL/udump/orcl_ora_3173.trc.  What would you do to ensure that database is still running correctly?()A examine the trace file and kill the session that caused the deadlockB examine the trace file and kill both the sessions responsible for the deadlockC examine the trace file for details and ask the user who caused the deadlock to roll back the transactionD examine the trace file for details and remember that deadlocks are resolved automatically by Oracle databaseE examine the trace file for details and use the Undo Advisor to rollback the transaction that caused the deadlock

考题 单选题Your network consists of a single Active Directory domain. The functional level of the domain isWindows Server 2003. All servers run Windows Server 2003 Service Pack 2 (SP2).The network contains 10 file servers. Each file server hosts a share named Apps. On each file server, a local group named App-install-local has permissions to the Apps share. A globalgroup named App-install-global belongs to the App-install-local group on each file server.App-install-global is used only to control permissions for the Apps share.You create a global group named Helpdesk.You need to provide the Helpdesk group access to the Apps share on each file server. The Helpdeskgroup must have the same permissions as the App-install-global group. You must achieve this goal byusing the minimum amount of administrative effort.What should you do? ()A Add the Helpdesk group to the App-install-global group.B Add the Helpdesk group to the App-install-local group on each file server.C Convert the App-install-global group to a universal group. Add the App-install-global group to the Helpdesk group.D Convert the Helpdesk group to a universal group. Add the Helpdesk group to the App-install-local group on each file server.

考题 单选题After a merger with another small business, your company has inherited a legacy WAR file but the originalsource files were lost. After reading the documentation of that web application,you discover that the WARfile contains a useful tag library that you want to reuse in your own webapp packaged as a WAR file. What do you need to do to reuse this tag library?()A Simply rename the legacy WAR file as a JAR file and place it in your webapp’s library directory.B Unpack the legacy WAR file, move the TLD file to the META-INF directory, repackage the whole thingas a JAR file, and place that JAR file in your webapp’s library directory.C Unpack the legacy WAR file, move the TLD file to the META-INF directory, move the class files to thetop-level directory, repackage the whole thing as a JAR file, and place that JAR file in your webapp’slibrary directory.D Unpack the legacy WAR file, move the TLD file to the META-INF directory, move the class files to thetop-level directory, repackage the WAR, and place that WAR file in your webapp’s WEB-INF directory.

考题 单选题You are the administrator for Company’s network.You are using Windows Installer to deploy an application to 500 Windows 2000 Professional computerson your network. The network includes an organizational unit (OU) named Marketing. A Group Policyobject (GPO) is created for the Marketing OU.The software deployment of the application is unsuccessful. During the deployment, some users in theMarketing OU report that the installation is stopping with random errors midway through theinstallation process. The remaining users in the Marketing OU report that the software is installing but itis giving them general protection fault errors.You want the installation of the application to complete successfully.What should you do?()A Redeploy the application as a .zap file to the Marketing OU.B Redeploy the application by using the Group Policy object (GPO) for the Marketing OU.C Repackage and redeploy the application’s .msi file to the Marketing OU.D Repackage and redeploy the application’s .mst file to the Marketing OU.

考题 单选题Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Tess King leaves the company. You grant her manager the Full Control NTFS permission to Tess's home folder. When the manager attempts to open any of the files, she receives the follo wing error message: "Access is denied." What should you do?()A Use System File Checker (SFC) to decrypt the file.B Log on the network as the Recovery Agent. Decrypt the files for the manager.C Log on the network as the administrator. Use theciphercommand to decrypt the files.D Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.

考题 单选题You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer.  What should you do? ()A Configure File signature verification to block driver installation, and set driver signing as a system default.B Remove all users from the Power User group.C Create a Local Computer Policy to prevent users from installing drivers.D Create a Local Computer Policy to enable Windows File Protection.