单选题When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors 

题目
单选题
When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()
A

 use acl = yes

B

 map group acls = yes

C

 force unknown acl user = yes

D

 inherit acls = no

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are the network administrator for TestKing. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. A member server named TestkingA has a locally attached tape device. TestkingA contains several folders and files that are encrypted by using Encrypting File System (EFS). You create a new user account for a new employee named Victoria. Victoria's user account is member of the Users group only. You need to ensure that Victoria can back up the encrypted folders and files on TestkingA. Victoria must be assigned the minimum administrative privileges needed to complete this task. What should you do?()

  • A、Add Victoria's domain user account to the Administrators group.
  • B、Add Victoria's user account to the Backup Operators group.
  • C、Assign the Allow - Full Control permission on the encrypted folders and files to Victoria.
  • D、Designate Victoria as a recovery agent for the encrypted files.

正确答案:B

第2题:

A user states that when the user copies files from ‘My Documents’ to a network share, the files are no longer available locally. Which of the following BEST describes the reason the files are no longer visible?()

  • A、The user copied to a read-only folder share.
  • B、The user changed the attributes of the files.
  • C、The user copied the files from the local My Documents folder.
  • D、The user moved instead of copied the files.

正确答案:D

第3题:

You are the network administrator for Ezonexam.com. Your network has 210 Windows 2000 Professional computers and eleven Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Sandra leaves Ezonexam.com. You decrypt the files for her manager. When the manager attempts to open any of the files, he receives the following error message: "Access is denied."

You want the manager to be able to access the files.

What should do? (Each correct answer presents a complete solution. Choose two.)

A.Move the files from Sandra's folder to the manager's folder.

B.Grant the manager NTFSFull Controlpermission to the files.

C.Run theciphercommand to create a new file encryption key for the manager.

D.Run theciphercommand to generate an EFS recovery agent key and certificate.

E.Grant the manager NTFSList Folder Contentspermissions to the folder containing Sandra's files.


正确答案:AB
解析:Explanation:
A: When a new file is created it inherits the permissions from its parent. A Move operation creates a new version of the resource you are moving if you are moving the resource to a different partition-for this reason, permissions of the parent are inherited. A Move operation does not create a new version of the resource if you are moving the resource to a different location on the same partition-for this reason, existing permissions are moved along with the resource.
B: The NTFS Full Control permission allows a user to change permissions, take ownership, delete subfolders and files, and perform. the actions granted by all other permissions.

Incorrect answers:
C, D: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. However, this does not guarantee the manager access to the files because the files have been decrypted already and access was still denied.

E: The NTFS List Folder Contents permission allows a user to see the names of files and subfolders in the folder. This is not the same as granting access.

第4题:

You are the administrator of your company’s network. Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled.   A user named John leaves the company. You move all of the files from John’s home folder to his manager’s folder. When the manager attempts to open any of the files, she receives the following error message. “Access denied.”   You want the manager to be able to access the files. What should you do?()

  • A、Grant the manager NTFS Full Control permission to the files.
  • B、Grant the manager NTFS Take Ownership permission to the files.
  • C、Log on to the network as a recovery Agent.  Decrypt the files for the manager.
  • D、Log on to the network as a member of the Backup Operators group. Decrypt the files for the manager.

正确答案:C

第5题:

You are the administrator of the Windows XP Professional portable computers that are used by your company's sales representatives. The computers are members of a Windows 2000 domain. A Windows 2000 Server computer named Server1 contains the sales data used by the sales representatives in a shared folder named Data. When sales representatives travel, they use the Offline Files feature to access the files in the //Server1/Data shared folder. You want to ensure that the offline files on the portable computers are not accessible by unauthorized persons, in the event that a portable computer is lost. What should you do?() 

  • A、Instruct the sales representatives to configure the permissions on the offline files on their portable computers to allow access for only their user accounts. 
  • B、On Server1, configure the permissions on all files in the Data shared folder to allow access for only the sales representatives. 
  • C、Use a Group Policy object (GPO) to enable the Encrypt the Offline Files cache option for the portable computers. 
  • D、On the portable computers, enable encryption of the %systemroot%/CSC folder.
  • E、Apply this setting to the folder and files in the CSC folder.
  • F、On Server1, encrypt all files in the Data shared folder. 

正确答案:C

第6题:

You are the network administrator for ExamSheet.net. Your network has 210 Windows 2000 Professional computers and eleven Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Sandra leaves ExamSheet.net. You decrypt the files for her manager. When the manager attempts to open any of the files, he receives the following error message: "Access is denied." You want the manager to be able to access the files.  What should do? ()

  • A、Move the files from Sandra’s folder to the manager’s folder.
  • B、Grant the manager NTFSFull Controlpermission to the files.
  • C、Run theciphercommand to create a new file encryption key for the manager.
  • D、Run theciphercommand to generate an EFS recovery agent key and certificate.
  • E、Grant the manager NTFSList Folder Contentspermissions to the folder containing Sandra’s files.

正确答案:A,B

第7题:

A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()

  • A、 Enable audit object access and specify files and folders to monitor using Task Manager.
  • B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.
  • C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.
  • D、 Open Performance Monitor and monitor folder activity.

正确答案:C

第8题:

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


正确答案:B
解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

Incorrect answers:
A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

第9题:

When migrating files from a Windows server A to a Samba server B with the command ’net rpc share migrate files -S A -destination=B -acls -attrs -U administrator’, some files that originally belong only to a Windows group (no user) will generate errors during the migration. Which option in smb.conf will force such files to be mapped to the correct UNIX UID and GID?()

  • A、 use acl = yes
  • B、 map group acls = yes
  • C、 force unknown acl user = yes
  • D、 inherit acls = no

正确答案:C

第10题:

Your company has an Active Directory Domain Services (AD DS) domain. You inst all the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. All client computers run Windows 7. You need to ensure that the current Libraries from users computers are avail able when they logon to the RD Session Host server. What should you do?()

  • A、Redirect each user ’s Docu ment s f ol der t o a net work shar e
  • B、Redirect each user ’s Li nks f ol der t o t he RD Sessi on Host server
  • C、Use a startup script to copy .library - ms files from the client computers to the RD S ession Host server.
  • D、Use Group Policy Preferences to copy .library - ms files from the client computers to the RD Session Host server.

正确答案:D

更多相关问题