网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()
A

 tracert

B

 msconfig

C

 route

D

 net use


参考答案

参考解析
解析: 暂无解析
更多 “单选题A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()A  tracertB  msconfigC  routeD  net use” 相关考题
考题 What are two use cases enabled by IF-MAP Federation?() A. Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.B. Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.C. Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.D. Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.

考题 A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?() A. tracertB. msconfigC. routeD. net use

考题 Which of the following is true about the following share access properties? ()A、 +managers will be resolved as a Winbind group.  B、 The timo and taki users can manipulate files regardless of the file system permissions.  C、 +managers will be resolved as a Unix group.  D、 +managers is a builtin default Samba group.  E、 The "admin users" can be applied only to print shares.

考题 You are the network administrator for TestKing. The network consists of a single Active Directory forest that contains three domains. The functional level of the forest is Windows 2000. The NetBIOS names of the domains are TesKing1, TesKing2, TestKing3. The functional level of all three domains is Windows 2000 mixed. You manage resources in TesKing1. A new file server is added to TesKing1. Users in all three domains need access to resources on the file server. You need to create a group that will be used to grant access to the file server in TesKing1. Which two actions should you perform? Each correct answer presents part of the solution. Select two.()A、Create a security group.B、Create a distribution group.C、Configure the group to be a global group.D、Configure the group to be a universal group.E、Configure the group to be a domain local group.

考题 What is the maximum number of users that can be added to an autonomous access point that is being used as a local authenticator?()A、75B、100C、25D、50

考题 A group of users report that they can access local resources but cannot access the Internet. Which of the following should the administrator use to test connectivity?()A、 tracertB、 msconfigC、 routeD、 net use

考题 What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller

考题 You are the network administrator for Testking.com. The network consists of a single Active Directory forest that contains three domains. The functional level of the forest is Windows Server 2003. The domain names are testking.com, europe.testking.com, and asia.testking.com. Each domain contains 500 user accounts. TestKing.com is in the process of acquiring several other companies whose networks will be add to the testking.com Windows Server 2003 domain. These acquisitions will entail the addition of several new offices, which will be connected to TestKing's network by means of dedicated 56-Kbps WAN connections. You create a new shared folder named NewProjects on a file server in testking.com. Several users in each existing domain need access to the NewProjects folder. These users are not in the same group in any domain. All users who need access to the NewProjects folder must be able to add, delete, and modify files and folders in the NewProjects folder. Users in the acquired companies also will require access to this folder. You need to create the required Active Directory groups and configure the required permissions for the NewProjects folder. Your solution must minimize ongoing administrative effort as you add new companies to the network. You must also minimize unnecessary traffic across the WAN connections. What should you do?()A、Create a single universal security group. Add all users that require access to the folder to the group. Create a domain local group in the testking.com domain. Add the universal group to the domain local group. Assign permissions to the shared folder by using the domain local group.B、Create a global security group in each domain. Add all users that require access to the folder to the global group in their domain. Create a domain local group in testking.com domain. Add the global groups to the domain local group. Assign permissions to the shared folder by using the domain local group.C、Create a universal security group in each domain. Add all users that require access to the folder to the group in their domain. Assign permissions to the shared folder by using the universal groups.D、Create a global security group in each domain. Add all users that require access to the folder to the group in their domain. Assign permissions to the shared folder by using the global groups.

考题 You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer.  Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.  What should you do? ()A、Grant Paul NTFS permission so that he can access any parent folder to files in the shared   folder.B、Share the Sales folder and grant Paul shared folder permission to access the shared Sales   folder.C、Remove Paul from any other group that has been explicitly denied access to the Sales folder. D、Delete the Sales local group and recreate it. Add individual user accounts from the Sales   Department back into Sales local group.

考题 You have a Web server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You replace the network adapter. Users report that they are unable to access Server1. You need to ensure that users can access Server1. What should you do? ()A、From Network Connections, configure the Provider Order settings.B、From Network Connections, configure the Adapters and Bindings settings.C、From the Local Area Connection properties, configure the Internet Protocol (TCP/IP) settings.D、From the Local Area Connection properties, configure the File and Printer Sharing for Microsoft Networks settings.

考题 You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()A、Advanced settingsB、Group scopeC、Group typeD、The mail flow settings

考题 You are the administrator of a Windows 2000 Professional computer. A user named Maria assists you in performing some administrative tasks. Maria is a member of local Administrators group. Users report that Maria has been viewing and changing their files.  You want Maria to be able to install programs, perform backups and manage printers, but not to view, change or read other users’ files for which permission has not been granted. You want to set up Maria’s account to have minimal rights and permission. You want to accomplish this with least amount of administrative effort.  What should you do?  ()A、 Leave Maria in the local Administrators group.  Limit her rights by using Local Policies.B、 Leave Maria in the local Administrators group. Change the NTFS provision on other users’ files to deny Maria’s request.C、 Remove Maria from the local Administrators group. Add her to both the Power Users group and Backup Operators group.D、 Remove Maria from local Administrators group.  Add her to Power User group.  Then grant her NTFS Read permission on the files to be backed up.

考题 You are the administrator of an Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional and are members of the domain.The domain contains a single DNS server named Server1. Root hints are enabled on Server1. Internet access for the company is provided by a Network Address Translation (NAT) server named Server2. Server2 is connected to the Internet by means of a permanent connection to the company’s ISP.Users report that they can no longer connect to http://www.adatum.com. Users can connect to internal resources and to other Internet Web sites. You can successfully access http://www.adatum.com from a computer outside of the corporate network.You need to ensure that the users can access http://www.adatum.com. You must also ensure that users retain their ability to access internal resources.   Which two actions should you perform?()A、Disable Routing and Remote Access on Server2.B、Create a root zone on Server1.C、On all affected users’ computers, run the ipconfig /flushdns command.D、Configure all affected users’ computers to use the ISP’s DNS server.E、Use the DNS console on Server1 to clear the DNS cache.

考题 单选题You have an Exchange Server 2010 organization named Contoso.com that contains a mail-enabled Domain Local group named Group1.Users from outside the organization report that all e-mail messages sent to group1@contoso.com generate a non-delivery-report (NDR).You need to ensure that users from outside the organization send e-mail to group1@contoso.com. What should you modify for group1?()A Advanced settingsB Group scopeC Group typeD The mail flow settings

考题 单选题What is the primary purpose of creating a Location Group Policy? ()A to associate more than one realm with an authentication serverB to logically group network access devices and associate them with specific sign-in policiesC to allow or prevent users from accessing resources in specific locations on the networkD to define the URL that users of network access devices can use to access the Infranet Controller

考题 单选题You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions.  What should you do?()A  Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.B  Grant the Server Access Team group permissions to modify computer objects in the Application OU.C  Move the Server Access Team group object into the Application OU.D  Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.

考题 单选题ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()A  It is a list of remote database links stored in the XML file that are available to the users of the database.B  It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C  It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D  It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

考题 单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()A Enable the Require domain controller to unlock policy.B Set the Number of previous logons to cache policy to 0.  C Remove all user and group accounts from the Log on locally user right. D Remove all user and group accounts from the Access this computer from the network user right. 

考题 单选题What is the maximum number of users that can be added to an autonomous access point that is being used as a local authenticator?()A 75B 100C 25D 50

考题 单选题Your network contains an Active Directory domain. The domain contains a member server that runs Windows Server 2008 R2.You have a folder named Data that is located on the C drive. The folder has the default NTFS permissions configured.A support technician shares C:/Data by using the File Sharing Wizard and specifies the default settings.Users report that they cannot access the shared folder.You need to ensure that all domain users can access the share.What should you do?()A Enable access-based enumeration (ABE) on the share.B Assign the Read NTFS permission to the Domain Users group.C From the Network and Sharing Center, enable public folder sharing.D From the File Sharing Wizard, configure the Read permission level for the Domain Users group.

考题 单选题You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network. What should you do?()A On Folder1, modify the share permissions.B On Folder1, modify the NTFS permissions.C Add all local user accounts to the Guests group. D Add all local user accounts to the Network Configuration Operators group.

考题 单选题You are the administrator of a Windows 2000 Professional computer. A user named Maria assists you in performing some administrative tasks. Maria is a member of local Administrators group. Users report that Maria has been viewing and changing their files.  You want Maria to be able to install programs, perform backups and manage printers, but not to view, change or read other users’ files for which permission has not been granted. You want to set up Maria’s account to have minimal rights and permission. You want to accomplish this with least amount of administrative effort.  What should you do?  ()A  Leave Maria in the local Administrators group.  Limit her rights by using Local Policies.B  Leave Maria in the local Administrators group. Change the NTFS provision on other users’ files to deny Maria’s request.C  Remove Maria from the local Administrators group. Add her to both the Power Users group and Backup Operators group.D  Remove Maria from local Administrators group.  Add her to Power User group.  Then grant her NTFS Read permission on the files to be backed up.

考题 单选题You need to design an access control strategy that meets business and security requirements. Your solution must minimize forestwide replication. What should you do?()A Create a global group for each department and a global group for each location. Add users to their respective departmental groups as members. Place the departmental global groups within the location global groups. Assign the location global groups to file and printer resources in their respective domains, and then assign permissions for the file and printer resources by using the location global groupsB Create a global group for each department, and add the respective users as members. Create domain local groups for file and printer resources. Add the global groups to the respective domain local groups. Then, assign permissions to the file and printer resources by using the domain local groupsC Create a local group on each server and add the authorized users as members. Assign appropriate permissions for the file and printer resources to the local groupsD Create a universal group for each location, and add the respective users as members. Assign the universal groups to file and printer resources. Then, assign permissions by using the universal groups

考题 多选题What are two use cases enabled by IF-MAP Federation?()AUsers authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.BUsers authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.CRemote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.DRemote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.

考题 多选题Which of the following is true about the following share access properties? ()A+managers will be resolved as a Winbind group.BThe timo and taki users can manipulate files regardless of the file system permissions.C+managers will be resolved as a Unix group.D+managers is a builtin default Samba group.EThe admin users can be applied only to print shares.

考题 单选题Saul needs access to files that are in the Accounting folder on his computer. A local group named accounting is granted full control permission to the accounting folder and the files within it. Saul is a member of the accounting local group but he cannot access the files that he needs.  What should you do?()A Grant Saul NTFS permission so that he can access any parent folder or files in the shared sales folder.B Share the Sales folder and grant Saul shared folder permission to access the shared sales folder.C Remove Saul from any other groups that have been explicitly denied access to the accounting folder.D Delete the Sales local group and recreate, add individual user accounts from the sales department back into sales local group.