Add Julia’s user account to the local Power Users group.
Add Julia’s user account to the local Administrators group.
Allow Julia’s user account Write permissions to C:///Data.
Allow Julia’s user account Full Control permission to C:///Data.
第1题:
You are a network administrator at TestKing, Inc. and you‘re getting complaintsthat users on the TestKing2 Ethernet network can‘t access the TestKing1 site. Totroubleshoot this, you begin by looking at the Testking1 and Testking2 routerconfigurations as shown below:Based on the above output, what is the underlying cause of this problem?()
A. Link state routing protocol is missing.
B. Incorrectly configured IP addresses
C. IGRP is incorrectly configured.
D. Frame relay is not configured.
E. None of the above
第2题:
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections. What should you do?()
第3题:
You are a network administrator for your company. All servers run Windows Server 2003.A server named Server1 functions as an application server. Server1 runs several applications. Server1 is located on the company‘s perimeter network. You allow communication to Server1 only over port 80.Users report that applications on Server1 perform poorly during periods of peak activity. You monitor Server1.The results are shown in the exhibit. (Click the Exhibit button.)You need to identify which process is causing Server1 to perform poorly.Which two tools can you use to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)
A. Event Viewer
B. Task Manager
C. Network Monitor
D. System Monitor
第4题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that all the network users are able to automatically schedule the use of a projector.What should you do?()
第5题:
You are the administrator of Company’s network.You install 50 new Windows 2000 Professional computers in the marketing department. Two weeks later,users report that five of the computers have stopped responding. You troubleshoot the five computers.You find that some users have installed unsigned device drivers that are not supported by Windows 2000Professional.You want to determine which drivers were installed by users.What should you do?()
第6题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()
第7题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to prevent the network users from accessing public folder using Outlook Web App (OWA) whilst ensuring you solution prevents the users using Office Outlook to access public folders.What should you do?()
第8题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()
A.A
B.B
C.C
D.D
第9题:
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com. What should you do?()
第10题:
You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.the Company.com organization makes use of microsoft exchange server 2010 as their messaging solution.Company.com has recently configured an exchange server named ex01 with a single mailbox database.Company.com is aware that the network users user microsoft office outlook and outlook web app.During your routine maintenance you discover that the network users are unable to restore e-mail messages from the Recover Deleted Items folder. During the course of the business week you receive instruction from Company.com to ensure that the network users are able to restore e-mail messages from the Recover Deleted Items folder. What should you do?()