网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are the system administrator for an electronics manufacturing company. The accounting department uses Windows 98 computers. The department has purchased a third-party spreadsheet application that only runs on Windows 2000 Professional. You need to upgrade the computers to Windows 2000 Professional and install the new application. You choose an unattended installation method for both the operating system and the application.

The Windows 2000 Professional installation files reside on a server named Ezonexamsrv in a shared folder named W2Ksource. You place the installation files for the spreadsheet application in \\Ezonexamsrv\W2Ksource\i386\$OEMS$. You create an answer file named Acctanswer.txt and place it in \\Ezonexamsrv\W2Ksource.

You map drive letter H: to \\Ezonexamsrv\W2Ksource and begin the installation on a test computer by running the winnt32 /s:H:\i386 /u:H:\acctanswer.text command.

Windows 2000 Professional is installed successfully. However, the spreadsheet application is not installed. You want to ensure that the spreadsheet application is installed during the unattended installation.

What should you do?

A.Run thewinnt /s:H:\i386 /u:H:\acctanswer.txtcommand instead of thewinnt32 /s:H:\i386 /u:H:\acctanswer.textcommand.

B.Move the spreadsheet application installation files to \\Ezonexamsrv\W2Ksource\i386, and then run thewinnt/s:H:\i386 /u:H:\acctanswer.txtcommand.

C.Edit the[Unattended]section of the answer file to contain the parameterOemPreinstall = Yes, and then run thewinnt32 /s:H:\i386/u:H:\acctanswer.txtcommand.

D.Rename Acctanswer.txt to Unattend.txt, and then run thewinnt32 /s:H:\i386 /u:H:\unattend.txtcommand.


参考答案

更多 “ You are the system administrator for an electronics manufacturing company. The accounting department uses Windows 98 computers. The department has purchased a third-party spreadsheet application that only runs on Windows 2000 Professional. You need to upgrade the computers to Windows 2000 Professional and install the new application. You choose an unattended installation method for both the operating system and the application.The Windows 2000 Professional installation files reside on a server named Ezonexamsrv in a shared folder named W2Ksource. You place the installation files for the spreadsheet application in \\Ezonexamsrv\W2Ksource\i386\$OEMS$. You create an answer file named Acctanswer.txt and place it in \\Ezonexamsrv\W2Ksource.You map drive letter H: to \\Ezonexamsrv\W2Ksource and begin the installation on a test computer by running the winnt32 /s:H:\i386 /u:H:\acctanswer.text command.Windows 2000 Professional is installed successfully. However, the spreadsheet application is not installed. You want to ensure that the spreadsheet application is installed during the unattended installation.What should you do?A.Run thewinnt /s:H:\i386 /u:H:\acctanswer.txtcommand instead of thewinnt32 /s:H:\i386 /u:H:\acctanswer.textcommand.B.Move the spreadsheet application installation files to \\Ezonexamsrv\W2Ksource\i386, and then run thewinnt/s:H:\i386 /u:H:\acctanswer.txtcommand.C.Edit the[Unattended]section of the answer file to contain the parameterOemPreinstall = Yes, and then run thewinnt32 /s:H:\i386/u:H:\acctanswer.txtcommand.D.Rename Acctanswer.txt to Unattend.txt, and then run thewinnt32 /s:H:\i386 /u:H:\unattend.txtcommand. ” 相关考题
考题 You are the administrator of a Windows 2000 network. You need to store secured files for your company's accounting and legal departments on a Windows 2000 Professional computer.You want to accomplish the following goals:1. Enable users in both departments to access their own files from the network2. Enable users in the accounting department to view the legal accounting department's documents3. Prevent users in the legal department from being able to view the accounting department's documents4. Enable managers within the company to access and modify both the accounting and the legal department's filesYou take the following actions:1. Create two shared folders named Accounting and Legal2. Create three groups named Accounting, Legal, and Management3. Allow the Accounting group modify permission on the Accounting folder4. Allow the Legal group modify permission on the Legal folders.5. Allow the Management group modify permission on both the Accounting and Legal folders.Which result or results do these actions produce? (Choose all that apply)A.Users in both departments can access to their own files from the network.B.Users in the accounting department can view the legal department's documents.C.Users in the legal department cannot view the accounting department's documents.D.Company managers can access and modify both departments' files.

考题 You are writing an application that uses SOAP to exchange data with other applications.You use a Department class that inherits from ArrayList to send objects to another application.The Department object is named dept.You need to ensure that the application serializes the Department object for transport by using SOAP.Which code should you use?()A.B.C.D.

考题 You are the administrator of ExamSheet's network.  The software department is preparing to rewrite an accounting application so that it will run on  Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98. You plan to configure the computers in the software department so that users can use both Windows 98 and Windows 2000 Professional during the project. You want to ensure that users in the software department can access all of the files on their computers while using operating system.  What should you do?()A、Create and format an NTFS volume. Install Windows 2000 Professional on the volume. Create a primary partition in the remaining disk space and format the volume using the FAT32 file system.Reinstall Windows 98 on the new primary partition. B、Create and format an NTFS volume. Install Windows 2000 Professional on the volume. Create an extended partition in the remaining disk space and format the volume using the FAT32 file system. Reinstall Windows 98 on the new extended partition. C、Create and format and extended partition. Create a logical drive within the extended partition and format the drive with the FAT32 file system. Install Windows 2000 Professional on the new partition. D、Create and format an extended partition. Create a logical drive within the extended partition and format the drive with the NTFS file system. Install Windows 2000 Professional on the new partition.

考题 You are the system administrator for an electronics manufacturing company. The accounting department uses Windows 98 computers. The department has purchased a third-party spreadsheet application that only runs on Windows 2000 Professional. You need to upgrade the computers to Windows 2000 Professional and install the new application. You choose an unattended installation method for both the operating system and the application.  The Windows 2000 Professional installation files reside on a server named Companyrv in a shared folder name W2Ksource. You place the installation files for the spreadsheet application in //Companyrv/W2Ksource/i386/$OEMS$. You create an answer files named Acctanswer.txt and place in //Companyrv/W2Ksource. You map drive letter H: to //Companyrv/W2Ksource and begin the installation on a test computer by running the winnt32 /s:H:/i386/u:H:/acctanswer.text command. Windows 2000 Professional is installed successfully. However, the spreadsheet application is not installed. You want to ensure that the spreadsheet application is installed during the unattended installation.  What should you do? ()A、 Run the winnt /s:H:/i386 /u:H:/acctanswer.txt command instead of the winnt32 /s:H:/i386/u:H:/acctanswer.text command. B、 Move the spreadsheet application installation files to //Companyrv/W2Ksource/i386, and thenrun the winnt /s:H:/i386 /u:H:/acctanswer.txt command. C、 Edit the [Unattended] section of the answer file to contain the parameter OemPreinstall = Yes, and then run the winnt32 /s:H:/i386/u:H:/acctanswer.text command. D、 Rename Acctanswer.txt to Unattend.txt, and then run the winnt32 /s:H:/i386 /u:H:/unattend.text command.

考题 You have a computer that runs Windows XP Professional. You run a background application named app1. exe. The application becomes unresponsive. You need to forcibly shut down the application. You must achieve this goal without restarting the computer.Which tool should you use?() A、System Configuration UtilityB、System InformationC、Task ManagerD、tasklist.exe

考题 You are a security administrator for your company. All servers run Windows Server 2003. All client computers run Windows XP Professional.    You install Software Update Services (SUS) on a server named Server1. The company’s written security policy states that all updates must be tested and approved before they are installed on network computers.    You need to ensure that SUS uses the minimum amount of disk space on Server1.  What should you do?()A、 Configure Server1 to redirect client computers to the Microsoft Windows Update servers.B、 Compress the folder in which the downloaded updates are stored.C、 Configure Server1 to store only the locales that are needed.D、 Download the updates, and then delete updates that are not approved for client computers.

考题 You upgrade 11 computers in the accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings.   After the upgrade, users in the accounting department report that they can no longer run any financial or credit applications on their computers.   You want all accounting department users to be able to run these applications. You want to allow only the rights that allow users to run the applications.   What should you do?()A、Add each user account to the Power Users group on that user’s computer.B、Configure the financial and credit applications to run as services on the computers in the accounting department.C、Apply the Compatws.inf security template to the local security policy of the computers in the accounting department.D、Use the Computer Management console to configure separate memory spaces for each financial and credit application on the accounting department computers.

考题 You are the network administrator for Testking.com. The network consists of a single Active Directory domain named testking.com. The sales department is hiring employees. An OU named TestKingSales is created to hold objects for the new sales department users. Each sales department user has a portable computer. Each portable computer runs Windows XP Professional. The sales department users are responsible for joining their portable computers to the domain. You need to ensure that the computer accounts for the Sales department user's portable computers are created in the TestKingSales OU. You need to achieve this goal without granting any unnecessary permissions. What should you do?()A、Assign the sales department users the Allow - Read permissions for the Computer container.B、Configure the sales department users' user accounts to be trusted for delegationC、Prestage the computer accounts in the TestKingSales OU for the sales department users' portable computers.D、Assign the sales depertment users the Allow - Create all Child Objects permission for the TestKingSales OU.

考题 Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments.   Only the sales department will use the existing target computers to run Windows 7.   You have the following requirements:Migrate the user state for each user.  Preserve the file system and existing applications for only the sales department computers.    You need to recommend the deployment method that is appropriate for the environment.    Which combination of deployment scenarios should you recommend?()A、 Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.B、 Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.C、 Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.D、 Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.

考题 You are a network administrator for your company. The network contains a Windows Server 2003 computernamed Server3. Server3 functions as a file server. Six users in the accounting department use an accounting software application to open files that are stored in a shared folder on Server3. The users keep these files open for an extended period of time. You need to restart Server3. You need to find out if any files on Server3 are open before you restart the computer. What should you do? ()A、Use Computer Management to view existing connections.B、Use the netsend command to send a message to all domain members.C、Use Task Manager to monitor processes started by all users.D、Use System Monitor to monitor the Server object in Report view.

考题 You are the network administrator for Company.  You have been assigned the task to upgrade the 23 Windows NT Workstation 4.0 computers in the accounting department to Windows 2000 Professional. Users in the accounting department run a peer-to-peer financial and credit application on their computers. The application requires that information is passed between the accounting department computers over the network. You upgrade all the computers and configure them to have the default security settings. You want to ensure that network traffic between accounting computers is secure. What should you do? ()A、Disable NetBIOS over TCP/IP on the accounting department computers.B、Apply the Hisecws.inf security template to the local security policy on the accounting department computers.C、Enable the Encrypting File System (EFS) on all files used by the financial and credit application on the accounting department computers.D、Configure port filters for each port used by the financial and credit application on the accounting department computers.

考题 You are installing an application on a computer that runs Windows Server 2008 R2.   During installation, the application will need to add new attributes and classes to the Active Directory  database.   You need to ensure that you can install the application.   What should you do()A、Change the functional level of the forest to Windows Server 2008 R2.B、Log on by using an account that has Server Operator rights.C、Log on by using an account that has Schema Administrator rights and the appropriate rights to install  the application.D、Log on by using an account that has the Enterprise Administrator rights and the appropriate rights to  install the application.

考题 You are the system administrator for an electronics manufacturing company. The accountingdepartment uses Windows 98 computers. The department has purchased a third-party spreadsheetapplication that only runs on Windows 2000 Professional. You need to upgrade the computers to Windows 2000 Professional and install the new application. You choose an unattended installationmethod for both the operating system and the application. The Windows 2000 Professional installation files reside on a server named Companysrv in a shared foldernamed W2Ksource. You place the installation files for the spreadsheet application in//Companysrv/W2Ksource/i386/$OEMS$. You create an answer file named Acctanswer.txt and place it in//Companysrv/W2Ksource.You map drive letter H: to //Companysrv/W2Ksource and begin the installation on a test computer byrunning the winnt32 /s:H:/i386 /u:H:/acctanswer.text command.Windows 2000 Professional is installed successfully. However, the spreadsheet application is not installed.You want to ensure that the spreadsheet application is installed during the unattended installation. Whatshould you do? ()A、 Run the winnt /s:H:/i386 /u:H:/acctanswer.txt command instead of the winnt32 /s:H:/i386      /u:H:/acctanswer.text command. B、 Move the spreadsheet application installation files to //Companysrv/W2Ksource/i386, and      then run the winnt /s:H:/i386 /u:H:/acctanswer.txt command. C、 Edit the [Unattended] section of the answer file to contain the parameter OemPreinstall = Yes,      and then run the winnt32 /s:H:/i386/u:H:/acctanswer.txt command. D、 Rename Acctanswer.txt to Unattend.txt, and then run the winnt32 /s:H:/i386 /u:H:/unattend.txt     command.

考题 You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A、Install wireless network cards on all accounting department computers. Select PEAP authenticationB、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

考题 Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers.  You purchase a new computer. You install Microsoft Windows Vista on the new computer.  You need to migrate the following content from the old computer to the new computer: All system and program settings  All users settings  Only the content in the C:///Appdata folder  Which tool should you use? ()A、File and Settings Transfer wizardB、Application Compatibility toolkitC、Windows Automated Installation toolkitD、Microsoft Windows Easy Transfer wizard

考题 You are the network administrator for ExamSheet.  Computers on your network run Windows 2000 Professional, Windows NT Workstation 4.0 and Windows 98. Ten Windows 2000 Professional computers are located in the research department. These computers contain highly confidential information. You want the 10 Windows 2000 Professional computers to be able to communicate only with other Windows 2000 computers.  What should you do?()A、On the research computers use the Local Computer Policy to disable theAccess this computer  from the networkoption.B、Use Security Configuration and Analysis to apply the Highly Secure security template to the research computers.C、Add the users of the research computers to the Power Users group on each computer.D、On the research computers configure the security settings to prevent anonymous access.

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Some client computers run Windows XP Professional, and the rest run Windows NT 4.0 Workstation. TestKing includes departments for accounting, design, marketing, and sales. Each department has a corresponding organizational unit (OU). A member server named Testking1 can be accessed only by user accounts in the Accounting, Design, Marketing, and Sales OUs. You install Terminal Server on Testking1. Then you install four new applications on Testking1. Each application is intended for users in only one of the four departments. You need to ensure that each application can be accessed only by users in the appropriate department. You need to achieve this goal by using the minimum amount of administrative effort. What should you do?()A、In the Default Policy Group Policy object (GPO), configure the Start program on connection policy to be the program path and file name of the application to start when the user logs on.B、In each OU, set the Environment property for each user to the program path and file name of the application that corresponds to the OU.C、On Testking1, select the RDP-Tcp connection properties. Set the program path and file name of the application to start when the user logs on.D、Create one Group Policy object (GPO) for each department. Link each GPO to the corresponding OU. For each GPO, configure the Start program on connection policy to run the application that corresponds to the appropriate department.

考题 You are the desktop administrator for your company's sales department. The IT manager for the sales department creates a custom policy that will apply to a custom application that is loaded on the department's Windows XP Professional computers. He deploys this policy by using Group Policy. When you inspect the sales department's computers, you find out that the application has not been modified by the policy. You want to examine Windows XP Professional to find out whether the custom policy is affecting the correct location in the Registry. Which command should you run?()A、Msinfo32. exeB、Gpresult.exeC、Gpedit.mscD、Rsop.msc

考题 You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()A、Users in both departments can access to their own files from the network.B、Users in the Accounting department can view the Legal department’s documents.C、Users in the Legal department cannot view the Accounting department’s documents.D、Company managers can access and modify both departments’ files.

考题 You are the administrator of your company’s network. The software department is preparing to rewrite an accounting application so that it will run on Windows 2000 Professional computers. All of the computers in the software department currently use Windows 98.  You want to configure the computers in the software department so that the users can use both Windows 98 and Windows 2000 Professional during the project. You also want to ensure that the computers are configured for optimal disk performance. In addition you want to ensure that users in the software department can access all of the files on their computers by using either operating system.  What should you do? ()A、 Create and format a FAT 32 partition.B、 Create and format an NTFS volume.C、 Configure Windows 2000 Professional to enable disk compression.D、 Configure Windows 2000 Professional to enable dynamic volume

考题 You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?()A、Configure each application to run in a separate memory space.B、Configure each application to run in AboveNormal priority class.C、For each application, set the compatibility mode to Windows 95.  D、Configure processor affinity for each application to allow it to run on both processors.

考题 You are the administrator of a Windows 2000 network.  You upgrade five computers in the sales department to Windows 2000 Professional. You then apply the Basicwk.inf security template to the upgraded computers. The remaining computers in the sales department are using Windows NT Workstation 4.0. When users log on to the Windows 2000 Professional computers they report that they are unable to run the company’s database application.  When the users log on to Windows NT Workstation 4.0 computers they are able to run the database application.  You want the users of Windows 2000 Professional computers to be able to run the database application.  What should you do? ()A、Apply the Securews.inf security template to the computers.B、Apply the Compatsws.inf security template to the computers.C、Delete the Basicwk.inf security template file from the computers.D、For each user account, grant Read permission to the database application and its associated files.E、Use the System Policy Editor to configure a new security policy for the database application.

考题 You are responsible for migrating client computers from Windows 98 and Windows NT Workstation 4.0 to Windows 2000 Professional. You have installed Windows 2000 Professional and reinstalled the necessary application on 10 computers. You have returned these computers to their users. The users of these computers report that their word processing application will not start. What should you do?()A、Set the permission on the application to Execute.B、Add the application to the Run key in the registry.C、Apply the Securews.inf security template on the users’ computers.D、Apply the compatws.inf security template on the users’ computers.

考题 Sandy works in Tron Electronics and uses a Windows 2000 Professional system to work on. Today she is visiting another department, and is using a Windows NT 4.0 system. She wants to print a document but is missing her printer. You want her to be able to print from any computer she logs in at. What can you do to insure that she has this ability?()A、 Configure the server properties of printer system folder to connect to the shared printer. B、Install a print driver for the print device on the Windows NT workstation computer. C、Create a roaming user profile for Sandy D、Upgrade the Windows NT 4 computer to a Windows 2000 Professional computer and then  import the file settings for Sandy's user account.

考题 You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. You upgrade 10 computers in the Accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. For security purposes you want to ensure that these computers can only communicate with other Windows 2000 computers.  What should you do?()A、On each computer configure separate memory spaces for each financial and credit applications.B、Apply Highly Secure security template to the local security policy of the computers in the Accounting department.C、Apply Compatible security template to the local security policy of the computers in the Accounting department.D、Add each user account to the Power Users group on that user’s computer.

考题 A user has a computer that runs Windows 2000 Professional. The user plans to upgrade the computer to Windows XP Professional. You need to instruct the user how to perform the upgrade. You must ensure that the user is only prompted to enter the Window XP product ID during the installation. Which command should you instruct the user to run?() A、sysprep.exe -nosidgenB、sysprep.exe -resealC、winnt32 /duprepareD、winnt32. exe /unattend

考题 单选题You are the administrator of a Windows 2000 network.  The network has 100 Windows 2000 Professional computers. A graphics application was assigned to all the computers on the network by using a Group Policy object (GPO).  You deploy a service release for the graphics application to all of the Windows 2000 Professional computers on the network. The service release, in addition to other software that had been assigned, fails to install on only one of the computers.   What should you do?()A Restart Windows Installer on the domain controller.B Restart Windows Installer on the computer that failed to install the service release.C Redeploy the service release by using an .mst file.D Redeploy the service release by using a .zap file.