网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()
A

Modify

B

Full control

C

Write

D

Read


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A ModifyB Full controlC WriteD Read” 相关考题
考题 Which of the following is the access level of a user that belongs to both the Administrators andUsers groups?() A. UserB. AdministratorC. Power UserD. Remote Desktop User

考题 A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read

考题 Kerberos is a form of user authentication that:() A. Provides users access to network resources.B. Performs router commands after user authentication.C. Provides users with remote access only capabilities.D. Does not require an authentication server

考题 Remote users are unable to connect to a shared folder on your computer. You need to allow access to the shared folder.What are the two possible ways to achieve this goal?() A.AB.BC.CD.D

考题 In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权). An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources. In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.A.remote B.native C.controlled D.automated

考题 A support technician wants to help a user, in a different city, navigate a new software program. Which of the following will allow the user and technician to view and control the Windows XP PC desktop simultaneously?()A、Terminal ServicesB、Remote AssistanceC、Routing and Remote Access ServiceD、Remote Desktop

考题 Which of the following is the access level of a user that belongs to both the Administrators andUsers groups?()A、UserB、AdministratorC、Power UserD、Remote Desktop User

考题 A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

考题 Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A、AdministratorB、UserC、GuestD、Power user

考题 Kerberos is a form of user authentication that:()A、Provides users access to network resources.B、Performs router commands after user authentication.C、Provides users with remote access only capabilities.D、Does not require an authentication server

考题 Which of the following groups should a user be added to for the ability to restore files, withoutgranting any ownership privileges?()A、Remote Desktop UsersB、Power UsersC、AdministratorsD、Backup Operators

考题 Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A、the Netsh toolB、the Network Policy Server consoleC、the Registry EditorD、the Routing and Remote Access console

考题 You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer.  Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.  What should you do? ()A、Grant Paul NTFS permission so that he can access any parent folder to files in the shared   folder.B、Share the Sales folder and grant Paul shared folder permission to access the shared Sales   folder.C、Remove Paul from any other group that has been explicitly denied access to the Sales folder. D、Delete the Sales local group and recreate it. Add individual user accounts from the Sales   Department back into Sales local group.

考题 Rate your level of proficiency with configuring, managing, and troubleshooting access to resources, such as files, folders, offline files, shared folders, and local and network printers.()A、Very HighB、HighC、ModerateD、LowE、Very Low

考题 单选题You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()A The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authenticationB The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.C The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,D The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.

考题 单选题You install Windows 2000 Professional on your portable computer. You create a new dial up connection to connect to your company’s remote access server. You connect to the remote access server by using the dial up connection. You can connect to the servers on the same segment as the remote access server. You cannot access the shared resources that are on the remote segments from the remote access server. What should you do? ()A Configure the company remote access server to accept multilink connections.B Configure the TCP/IP program for the dial up connection to disable IP header compression.C Configure the TCP/IP properties for the dial up connection to use the default gateway on theremote network.D Grant your user account dial in permission on the company remote access server.

考题 单选题You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Testking32 contains a folder that is shared as ManagerData$. A global group named AllManagers has permission to access the shared folder. A user reports that he needs access to the ManagerData$ shared folder. You add his user account to the All Managers global group. When the user attempts to connect to the shared folder by typing //Testking32/ManagerData$/ , he receives the following error message: "//Testking32/ManagerData$/ is not accessible. You might not have permissions to use the network resource. Contact the administrator of this server to find out if you have access permissions. Access is denied. You need to ensure that the user can access the ManagerData$ shared folder on Testking32. What should you do?()A Instruct the user to type //Testking32/ManagerData/ when he attempts to access the folder.B Add the Anonymous Logon group to the ACL for the ManagerData$ shared folder.C Select the Replace permission entries on all child object with entries shown here that apply to child objects check box.D Instruct the user to log off and log on again before he accesses the folder.

考题 单选题Rate your level of proficiency with configuring, managing, and troubleshooting access to resources, such as files, folders, offline files, shared folders, and local and network printers.()A Very HighB HighC ModerateD LowE Very Low

考题 单选题Your company consists of a single Active Directory domain that is configured in Windows 2000 native mode. All servers run Windows Server 2003 Service Pack 2 (SP2). You deploy a Routing and Remote Access server to provide VPN access to the network.You need to ensure that only members of a group named Sales can access the network through the VPN. The solution must minimize the administrative effort required to manage remote access.  What should you do?()A Allow dial-in access for the user accounts of all Sales group members. B Deny dial-in access for the user accounts of all users except the Sales group members. C Create a remote access policy and assign the Allow - Remote Access permission. Add the Windows-Groups condition and specify the Sales group. D Create a remote access policy and assign the Deny - Remote Access permission. Add the Windows-Groups condition and specify all Active Directory groups except for Sales.

考题 单选题You need to design a remote access strategy for portable computers. Your solution must meet business requirements. What should you do?()A Issue a computer certificate to P_RAS1. Reconfigure the remote access policy on P_RAS1 to accept only EAP-MD5 authentication. Then, specify that P_RAS1’s computer certificate is to be used for authenticationB Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-MD5 authentication. Then, specify that the Administrator account’s user certificate is to be used for authenticationC Issue a computer certificate to P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify the P_RAS1’s computer certificate is to be used for authenticationD Issue a user certificate to the Administrator account on P_RAS1. Reconfigure the remote access policy to accept only EAP-TLS authentication. Then, specify that the Administrator account’s user certificate is to be used for authentication

考题 单选题Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()A the Netsh toolB the Network Policy Server consoleC the Registry EditorD the Routing and Remote Access console

考题 单选题An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()A Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.B Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.C Ensure that merge roles is selected in the role-mapping rules.D Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.

考题 单选题You have a computer that runs Windows XP Professional Service Pack 2 (SP2). A remote user has a computer that runs Windows XP Professional SP2. The remote user experiences several errors while attempting to install an application. You need to remotely observe the actions the user performs. What should you do first?()A Instruct the user to send you a Remote Assistance invitation. B Instruct the user to start the Remote Desktop Help Session Manager service.C At the command prompt, establish a telnet session to the user's computer. D Enable a Remote Desktop and establish a Remote Desktop Connection. Log on by using the local administrator account.

考题 单选题you configure a new file server that runs windows server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files.The TCP/IP properties for the file server are configured as shown in the following exhibit.You need to ensure that users are able to access the shared files. What should you do?()A Configure a static IP address.B Configure the default gateway.C Configure the DNS server address.D Add the domain to the DNS suffix on the network interface.

考题 单选题Saul needs access to files that are in the Accounting folder on his computer. A local group named accounting is granted full control permission to the accounting folder and the files within it. Saul is a member of the accounting local group but he cannot access the files that he needs.  What should you do?()A Grant Saul NTFS permission so that he can access any parent folder or files in the shared sales folder.B Share the Sales folder and grant Saul shared folder permission to access the shared sales folder.C Remove Saul from any other groups that have been explicitly denied access to the accounting folder.D Delete the Sales local group and recreate, add individual user accounts from the sales department back into sales local group.

考题 单选题You configure a new file server that runs Windows Server 2008. Users access shared files on the file server. Users report that they are unable to access the shared files. The TCP/IP properties for the file server are configured as shown in the following exhibit.(exhibit not there again wtf!) You need to ensure that users are able to access the shared files. How should you configure the TCP/IP properties in the file server?()A Configure a static IP addressB Configure the default gatewayC Configure the DNS server addressD Add the domain to the DNS suffix on the network interface

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A  Configure the system event log to Do not overwrite.B  In IAS, in Remote Access Logging, enable the Authentication requests setting.C  Configure the Remote Access server to Log all events.D  Create a custom remote access policy and configure it for Authentication-Type.

考题 单选题You are the administrator of the Windows XP Professional portable computers that are used by your company's sales representatives. The computers are members of a Windows 2000 domain. A Windows 2000 Server computer named Server1 contains the sales data used by the sales representatives in a shared folder named Data. When sales representatives travel, they use the Offline Files feature to access the files in the //Server1/Data shared folder. You want to ensure that the offline files on the portable computers are not accessible by unauthorized persons, in the event that a portable computer is lost. What should you do?()A Instruct the sales representatives to configure the permissions on the offline files on their portable computers to allow access for only their user accounts. B On Server1, configure the permissions on all files in the Data shared folder to allow access for only the sales representatives. C Use a Group Policy object (GPO) to enable the Encrypt the Offline Files cache option for the portable computers. D On the portable computers, enable encryption of the %systemroot%/CSC folder.E Apply this setting to the folder and files in the CSC folder.F On Server1, encrypt all files in the Data shared folder.