A.生产成本
B. 管理费用
C. 制造费用
D. 销售费用
第1题
A.Wireless router
B.Hub
C.Repeater
D.Wireless network adapter
第2题
A./24
B./26
C./27
D./28
第3题
A. Configuration register
B. NVRAM
C. Boot flash
D. CMOS
E. Flash
第4题
A.14
B.16
C.30
D.32
E.62
F.64
第5题
A.10.1.1.1
B.127.0.0.1
C.192.168.0.1
D.239.1.1.1
第6题
You are the network administrator for TestKing. The network contains a Windows
Server 2003 computer named testking1, which hosts a critical business application
named Salesapp. Testking1 has one disk that contains a single NTFS volume.
Five days ago, the System State of testking1 was backed up, and an Automated
System Recovery (ASR) backup was created. No additional backups were
performed. Subsequently, many changes were made to the Salesapp data files.
You apply an update to the application, which requires you to restart testking1.
Windows startup terminates with a Stop error. You restart the computer and boot
to a floppy disk. A utility on this disk gives you read-only access to the NTFS file
system. You discover that one of the .dll files for the Salesapp application is
corrupted. The corrupted file is stored in the C.\Windows\System32 folder.
You need to restore the corrupted file. You need to avoid losing any changes made
to the data files on testking1.
What should you do onTestKing1?()
第7题
You are the network administrator for TestKing. The network consists of a single
Active Directory domain. All servers run Windows Server 2003.
The domain contains two domain controllers named Testking1 and Testking2. You
use a Windows XP Professional client computer named Client1.
In Active Directory, the domain administrator creates two new user accounts
named NetAdmin1 and AdminUser1. The NetAdmin1 account is a member of the
Domain Admins global group. The AdminUser1 account is a member of only the
Users local group. You assign the AdminUser1 logon account the Allow log on
locally user right in the Default Domain Controller Group Policy object (GPO).
A new written security policy states that user accounts that are member of the
Domain Admins global group should not be used to log on to the console of a
domain controller. It also states that administrative tasks should be performed by
using the Secondary Logon service.
You need to create a new computer account in Active Directory, and you must
comply with the new company security policy.
What should you do?()
第8题
You are a network administrator for Ezonexam.com's Windows 2000 network.
Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.
Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."
What should you do?
A.Use System File Checker (SFC) to decrypt the file.
B.Log on the network as the Recovery Agent. Decrypt the files for the manager.
C.Log on the network as the administrator. Use the cipher command to decrypt the files.
D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.
第9题
You are the network administrator for The network consists of a
single Active Directory domain named The domain contains Windows
Server 2003 computers and Windows XP Professional computers.
All confidential company files are stored on a file server named TestKing1. The
written company security states that all confidential data must be stored and
transmitted in a secure manner. To comply with the security policy, you enable
Encrypting File System (EFS) on the confidential files. You also add EFS
certificates to the data decryption field (DDF) of the confidential files for the users
who need to access them.
While performing network monitoring, you notice that the confidential files that are
stored on TestKing1 are being transmitted over the network without encryption.
You must ensure that encryption is always used when the confidential files on
TestKing1 are stored and transmitted over the network.
What are two possible ways to accomplish this goal?() (Each correct answer presents
a complete solution. Choose two)
第10题
You are the network administrator for TestKing. Your network consists of a single
Active Directory domain. You manage a Terminal Server farm that includes five
terminal servers and a Terminal Services Licensing server named testking9. All
servers run Windows 2000 Server. There are 2,500 users who log on to the terminal
servers to access a custom human resource (HR) application.
You install Windows Server 2003 on a new server named testking10. Testking10 is
configured with all default settings enabled. You install Terminal Services and the
HR application on testking10. You instruct some users to access the HR application
on testking10.
Four months later, users report that they can no longer establish Terminal Services
sessions to testking10. You verify that users can connect to the other terminal
servers in your Terminal Server farm.
You need to ensure that users can run the HR application on all terminal servers on
the network.
What should you do?()
为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!