• [单选题]You are the network administrator for Ezonexam.Your Windows 2000 Server computer named Ezonexam1 contains two 36-GB hard disks. Disk 0 and Disk 1. Each disk is configured as a basic disc and has a single 36-GB NTFS partition. Both partitions are backed up to a tape each night. The partition on Disk 1 stores user data. Most users at Ezonexam encrypt their files. Disk 1 fails. You replace it with a new hard disk and create a single NTFS partition.
  • 正确答案 :E
  • Restore the contents of Disk 1 from the most recent tape backup to the new partition on Ezonexam1. Instruct the users to verify the integrity of their files.

  • 解析:解析:Explanation:VerifyDataAfterBackupisusedtoconfirmthatfilesarecorrectlybackedup.WindowsBackupcomparesthebackupdataandthesourcedatatoverifythattheyarethesame.Microsoftrecommendsthatyouselectthisoption.RestoringthecontentsofDisk1fromthemostrecentbackuptapetothenewpartitiononEzonexam1andinstructingtheuserstoverifytheintegrityoftheirfileswouldaccomplishthetaskathandthequickestandstillmaintainthesecurityofthefilesofDisk1.Incorrectanswers:A:Thereisnoneedtomakeuseofasecondfileserver.Thiswillnotaccomplishthetaskasquickaspossible.Besides,thisdoesnotmeanthatthesecurityonthefileswillbekeptintact.B:Thereisnoneedtomakeuseofasecondfileserver,neitherasarecoveryagentandthencopyingfilesfromthesecondfileservertothenewpartition.Thiswilltaketoolonginthiscase.D:Thefirstpartofthisoptioniscorrect;buttheciphercommandisusedtodecryptfiles.

  • [多选题]You are the network administrator for Ezonexam. The network consists of a single Active Directory domain Ezonexam.com. All network servers run Windows Server 2000.Your network includes a shared folder named EzonexamDocs. This folder must not be visible in a browse list.
  • 正确答案 :EF
  • Change the share name to EzonexamDocs .

    Change the share name to EzonexamDocs $.

  • 解析:解析:Explanation: Appending a dollar sign ($) to a share name hides the share. A share that is followed by a dollar sign ($) indicates that the share is hidden from view when users access utilities such as My Network Places and browse network resources.

  • [单选题]You are the administrator of your company's network. A user named Paul in the service department has a Windows 2000 Professional computer. Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.What should you do?
  • 正确答案 :C
  • Remove Paul from any other group that has been explicitly denied access to the Sales folder.

  • 解析:解析:Explanation: The Sales group, which Paul is a member of, has permission to access the files. However, Paul still cannot access the files. It would seem that Paul has a permissions conflict. A user can be granted file permissions in a number of contexts: as a user or as a member of a user group. When a user has different file permissions in multiple contexts, the most restrictive permission is applied. Furthermore, the deny permission overrides all other permissions. As Paul does not have access to the file you must therefore assume Paul has explicitly been denied access to the file in some context, as member of one or more groups that have been denied access to the file. You would thus have to remove Paul from such a group so that the restriction is not applied to Paul.

  • [单选题]You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?
  • 正确答案 :A
  • Configure an ADM template and add the template to the GPO.

  • 解析:解析:Explanation: It is recommended that we should use the supplied Administrative Templates where possible. Administrative Templates propagate registry settings to a large number of computers without requiring us to have detailed knowledge of the registry. However, the administrator can create custom .adm files if the supplied templates are inadequate. In Windows 2000, we use Group Policy to set registry-based policies. In Windows NT 4.0, we used the System Policy Editor (Poledit.exe) to set System Policy.

  • [单选题]You need to install Windows 2000 Professional on a new computer in your network. You use the setup manager wizard to configure a fully automated installation script. file. You begin an unattended installation and leave the office.When you return, the installation has reached the GUI-mode setup and you see the following error message "Unattended setup is unable to continue because a setup parameter specified by your system administrator or computer manufacturer is missing or invalid."
  • 正确答案 :D
  • In the UserData section of the answer file, specify theProductIDvariable

  • 解析:解析:Explanation: For a fully unattended installation to complete, the ProductID or product registration key, must be specified in the UserData section of the answer file. The syntax of this key is ProductId = "XXXXX-XXXXX-XXXXX-XXXXX-XXXXX". If this key is missing the error message is returned.

  • 查看原题

    推荐下载科目: 计算机四级 软考中级 思科认证 JAVA认证 软考高级 软考初级 职称计算机 计算机操作员高级 其他 LTE认证
    @2019-2026 不凡考网 www.zhukaozhuanjia.com 蜀ICP备20012290号-2