网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()
A

The user copied to a read-only folder share.

B

The user changed the attributes of the files.

C

The user copied the files from the local My Documents folder.

D

The user moved instead of copied the files.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A The user copied to a read-only folder share.B The user changed the attributes of the files.C The user copied the files from the local My Documents folder.D The user moved instead of copied the files.” 相关考题
考题 A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?() A.EDITB.CHMODC.ATTRIBD.CONVERT

考题 Your network contains a single Active Directory domain. You have a file server named Server1 that runsWindows Server 2003 Service Pack 2 (SP2).Users store all of their files in their My Documents folders.You need to move each user’s My Document folder to Server1. You must achieve this goal by using the minimum amount of administrative effort.What should you do?()A. Configure Folder Redirection by using a Group Policy object (GPO).B. Configure the shared folder settings by using a Group Policy object (GPO).C. From the properties of each user account, assign a home folder.D. From the properties of each user’s My Documents folder, modify the target folder location.

考题 When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()A、userB、read_onlyC、target_operatorD、security_operator

考题 Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()A、User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());B、User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());C、User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());D、User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());E、User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());

考题 A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()A、The user copied to a read-only folder share.B、The user changed the attributes of the files.C、The user copied the files from the local My Documents folder.D、The user moved instead of copied the files.

考题 A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()A、EDITB、CHMODC、ATTRIBD、CONVERT

考题 Bob, a technician, needs to backup a user’s local My Documents on a Windows XP workstation.Which of the following is the QUICKEST way to the user’s folder?()A、Browse to the root, Documents and Settings, user’s name, and then My DocumentsB、Browse to the root, Users, Documents and Settings, user’s name, and then My DocumentsC、Type %system% into the run boxD、Type %temp% into the run box, My Documents, and then user’s name

考题 A user selects their proper domain and is unable to log into their Windows computer.The error states:‘System cannot log you on to the domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect’.Which of the following is the MOST likely cause for this error?()A、The computer’s account was removed from Active Directory.B、The user’s account was removed from Active Directory.C、The computer was disjoined from the domain.D、The user typed in the wrong password.

考题 When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()A、 use acl = yesB、 map group acls = yesC、 force unknown acl user = yesD、 inherit acls = no

考题 The technician is moving a user’s files from a Windows XP PC to a Windows Vista PC. Which of the following directories corresponds to each operating system?()A、c:/users/user1/documents to c:/users/user1/documentsB、c:/documents and settings/user1/my documents to c:/users/user1/documentsC、c:/documents and settings/user1/my documents to c:/documents and settings/user1/my documentsD、c:/users/user1/my documents to c:/users/user1/documents

考题 Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()A、REVOKE ACCESS ON DATABASE FROM USER bobB、REVOKE CONNECT ON DATABASE FROM USER tomC、REVOKE tom FROM ACCESS ON DATABASE BY USER bobD、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

考题 Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()A、REVOKE ALL PRIVILEGES FROM USER tomB、REVOKE ALL ON EMPLOYEE FROM USER tomC、REVOKE EXECUTE ON EMPLOYEE FROM USER tomD、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

考题 How would you grant the RVPC user access to specific RMAN database records in the RMAN virtual private catalog?()  A、 Issue the grant command from the SYS user (or equivalent) of the target database.B、 Issue the grant command from the SYS user (or equivalent) of the recovery-catalog database.C、 Issue the grant command from the recovery catalog-owning schema user account in the recovery catalog.D、 Issue the grant command from RMAN when connected to the recovery catalog-owning schema.E、 Issue the grant command from RMAN when connected to the target database.

考题 You have an Exchange Server 2010 organization.You have a user named User1 and a user named User2. You need to ensure that User1 can add User2 to the From field when he sends e-mail messages. Messages that have User2 in the From field must display only User2 as the message sender to recipients Who receive the messages. What should you use?()A、Active Directory Users and ComputersB、Exchange Control Panel (ECP)C、Exchange Management Console (EMC)D、Microsoft Office Outlook

考题 Your network contains a single Active Directory domain. You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Users store all of their files in their My Documents folders. You need to move each user’s My Document folder to Server1. You must achieve this goal by using the minimum amount of administrative effort. What should you do? ()A、Configure Folder Redirection by using a Group Policy object (GPO).B、Configure the shared folder settings by using a Group Policy object (GPO).C、From the properties of each user account, assign a home folder.D、From the properties of each user’s My Documents folder, modify the target folder location.

考题 Your company has an Exchange Server 2010 organization. A user named User1 is configured as a Delegate for a user named User2. You need to ensure that User1 can add User2 in the From field when sending email messages. Messages that contain User2 in the From field must display User2 as the message sender when recipients receive the messages.  What should you do()?  A、Remove User1 as a delegate, and then grant User1 Send As permissions to User2¯s mailboxB、Remove User1 as a delegate, and then grant User1 Send on Behalf permissions to User2¯s mailboxC、Create a Sharing policy, and then grant User1 Modify permissions to User2¯s mailboxD、Create a Sharing policy, and then grant User1 Full Mailbox permissions to User2¯s mailbox

考题 You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure user Group Policy to achieve these results:    Allow users to view the options in the Offline Files dialog box   Remove the Offline Files tab from the Folder Options dialog box   Disable the Settings button in the Offline Files Status dialog box   Remove the Settings command from the Offline Files shortcut menu    Your proposed solution is to enable the group policy setting Disable user configuration of Offline Files.    Which results does the proposed solution provide?()A、Users can view the options in the Offline Files dialog boxB、The Offline Files tab is removed from the Folder Options dialog boxC、The Settings button in the Offline Files Status dialog box is disabledD、The Settings command is removed from the Offline Files shortcut menu

考题 单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()A Add the list of files to /etc/exclude.rootvg.B Modify the image.data file and add the files to be excluded form the backup.C Modify the bosinst.data file and specify which files are to be excluded from the backup.D Specify the files to be excluded on the command line when executing the mksysb command.

考题 单选题When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()A  use acl = yesB  map group acls = yesC  force unknown acl user = yesD  inherit acls = no

考题 单选题A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()A Instruct User1 to create a new user certificate on Computer2.B Instruct User1 to take ownership of the encrypted files on Computer2.C Instruct User1 to import the user certificate from Computer1 to Computer2.  D Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

考题 单选题How would you grant the RVPC user access to specific RMAN database records in the RMAN virtual private catalog?()A  Issue the grant command from the SYS user (or equivalent) of the target database.B  Issue the grant command from the SYS user (or equivalent) of the recovery-catalog database.C  Issue the grant command from the recovery catalog-owning schema user account in the recovery catalog.D  Issue the grant command from RMAN when connected to the recovery catalog-owning schema.E  Issue the grant command from RMAN when connected to the target database.

考题 单选题You are the network administrator for ExamSheet inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrator group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary.  Eric wants to prevent Julia from changing the permissions on file that Eric creates. To accomplish his goal, Eric creates a folder named C:/Data. He changes the NTFS permission on C:/Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions.  Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:/Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:/Data.  What should you instruct Eric to do?()A Add Julia’s user account to the local Power Users group.B Add Julia’s user account to the local Administrators group.C Allow Julia’s user account Write permissions to C:///Data.D Allow Julia’s user account Full Control permission to C:///Data.

考题 单选题Every Sunday, consistent backups are performed on your database. Because of a user error, you performed an incomplete recovery on Tuesday and opened the database with the RESETLOGS option. A user error occurs again on Thursday, which necessitates an incomplete recovery. Sunday’s backup is the most recent backup available.What would you do in this scenario?()A  recovery cannot be performed because a backup was not performed after the last incomplete recoveryB  restore all the files from Sunday’s backup, and then recover up to the point in time when the RESETLOGS operation was performed on TuesdayC  restore all the files from Sunday’s backup, and open the database to reset the database to the point in time when the backup was performed on SundayD  restore all the files from Sunday’s backup, and then perform an incomplete recovery up to the point in time when the user error occurred on Thursday

考题 单选题You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()A Add Julia’s user account to the local Power Users group.B Add Julia’s user account to the local Administrators group.C Allow Julia’s user account Write permissions to C:///Data.D Allow Julia’s user account Full Control permission to C:///Data.

考题 单选题When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()A userB read_onlyC target_operatorD security_operator

考题 单选题All of the client computers in your company network are Windows 2000 portable computers. A user named Maria stores Sales files in her My Documents folder. She uses these files when she travels. Maria informs you that when she takes her portable computer to trade shows, she can access some of the Sales files but not all of them. When her portable computer is connected to the network at the office, she can access all of the files. You need to enable Maria to access all of the files in her My Documents folder when she is working remotely. What should you do?()A  Allow Maria full control permissions on the %systemroot%/documents and settings/Maria/MyDocuments folderB  Allow Maria full control permissions on the %systemroot%/documents and settings/all  users/My Documents folderC  Configure Maria’s computer to automatically copy the entire contents of her network My  Documents folder to her offline files folder.D  Configure Maria’s computer to automatically copy the entire contents of her network My  Documents folder to her local My Documents folder. 

考题 单选题You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1.  The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()A Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*. B Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files. C Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files. D Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.