You are the network administrator for Company Inc. Two users

题目
单选题
You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()
A

Add Julia’s user account to the local Power Users group.

B

Add Julia’s user account to the local Administrators group.

C

Allow Julia’s user account Write permissions to C:///Data.

D

Allow Julia’s user account Full Control permission to C:///Data.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are a network administrator at TestKing, Inc. and you‘re getting complaintsthat users on the TestKing2 Ethernet network can‘t access the TestKing1 site. Totroubleshoot this, you begin by looking at the Testking1 and Testking2 routerconfigurations as shown below:Based on the above output, what is the underlying cause of this problem?()

A. Link state routing protocol is missing.

B. Incorrectly configured IP addresses

C. IGRP is incorrectly configured.

D. Frame relay is not configured.

E. None of the above


参考答案:C

第2题:

ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()

  • A、Run the net view command.
  • B、Run the gpresult command.
  • C、Use the IP Security Monitor console.
  • D、Use the IPSec Policy Management console.

正确答案:C

第3题:

You are a network administrator for your company. All servers run Windows Server 2003.A server named Server1 functions as an application server. Server1 runs several applications. Server1 is located on the company‘s perimeter network. You allow communication to Server1 only over port 80.Users report that applications on Server1 perform poorly during periods of peak activity. You monitor Server1.The results are shown in the exhibit. (Click the Exhibit button.)You need to identify which process is causing Server1 to perform poorly.Which two tools can you use to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)

A. Event Viewer

B. Task Manager

C. Network Monitor

D. System Monitor


参考答案:B, D

第4题:

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to ensure that all the network users are able to automatically schedule the use of a projector.What should you do?()

  • A、You should consider having the schedule for the Managed Folder Assistant modified.
  • B、You should consider having the properties of the Calendar managed default folder modified.
  • C、You should consider having a new Sharing policy created.
  • D、You should consider having an equipment mailbox created.

正确答案:D

第5题:

You are the administrator of Company’s network.You install 50 new Windows 2000 Professional computers in the marketing department. Two weeks later,users report that five of the computers have stopped responding. You troubleshoot the five computers.You find that some users have installed unsigned device drivers that are not supported by Windows 2000Professional.You want to determine which drivers were installed by users.What should you do?()

  • A、Run the chkdsk /f command on all drives on the computers.
  • B、Configure Windows 2000 Professional to enable driver signing verification.
  • C、Run the File Signature Verification tool on the computers.
  • D、Run the System File Checker utility on the computers.

正确答案:C

第6题:

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()

  • A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.
  • B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.
  • C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.
  • D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.

正确答案:A

第7题:

You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.During the course of the business week you receive instruction from Company.com to prevent the network users from accessing public folder using Outlook Web App (OWA) whilst ensuring you solution prevents the users using Office Outlook to access public folders.What should you do?()

  • A、You should consider having the default Outlook Web App Mailbox policy modified.
  • B、You should consider having the properties of the public folder database modified.
  • C、You should consider having a managed folder mailbox policy created.
  • D、You should consider having the properties of the OWA virtual directory modified.

正确答案:A,D

第8题:

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

A.A

B.B

C.C

D.D


参考答案:C

第9题:

You work as a network Exchange administrator at Company.com.The Company.com network  currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.The Company.com network users have been configured by Company.com to have the @Company.com email address suffix.During the course of the business week you receive instruction from Company.com to configure a public folder named KingPublic for the Internet users to post content by sending e-mail to KingPublic@Company.com.  What should you do?()

  • A、You should consider having a new mail contact created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.
  • B、You should consider having a new mailbox created which has the e-mail address KingPublic@Company.com.You should then have a transport rule created.
  • C、You should consider having mail enabled for KingPublic.
  • D、You should consider having the author role assigned to Anonymous.

正确答案:C

第10题:

You work as a network exchange administrator at Company.com.the Company.com network currently consists of a single active directory forest containing a single domain named Company.com.the Company.com organization makes use of microsoft exchange server 2010 as their messaging  solution.Company.com has recently configured an exchange server named ex01 with a single mailbox database.Company.com is aware that the network users user microsoft office outlook and outlook web app.During your routine maintenance you discover that the network users are unable to restore e-mail messages from the Recover Deleted Items folder. During the course of the business week you receive instruction from Company.com to ensure that the network users are able to restore e-mail messages from the Recover Deleted Items folder. What should you do?()

  • A、You should consider having a management role created and assigned to all users from the Exchange Management Shell.
  • B、You should consider having a retention policy created and assigned to all users from the Exchange Management Shell.
  • C、You should consider having the properties of the mailbox database modified from the Exchange Management Console (EMC).
  • D、You should consider having the properties of the Mailbox server object modified from the Exchange Management Console (EMC).

正确答案:C

更多相关问题