Set the group’s folder permissions to deny.
Use Event Viewer to monitor changes to the file.
Store a backup copy of the file on a USB drive.
Change the file attribute to read only.
第1题:
Ezonexam.com's network consists of Windows 2000 Professional and UNIX client computers. You install a Windows 2000 Server computer on the network. All computers that are connected to the network use TCP/IP as their only network protocol.
Several laser print devices are attached to the UNIX computers. You want to enable the Windows 2000 Professional computers to print to these printers. You want to make the minimum number of configuration changes necessary to achieve this goal.
What should you do?
A.Install Simple TCP/IP services on the Windows 2000 Server computer. Configure printers on the Windows 2000 Server computer to print to the print device attached to the UNIX computers.
B.Install Print Services for UNIX on the Windows 2000 Server computer. Configure shared printers on the Windows 2000 Server computer. Configure the UNIX computers to print to these shared printers.
C.Disconnect the print devices from the UNIX computers and connect them to the Windows 2000 Server computer. Share the printers, and configure the Windows 2000 Professional computers and the UNIX computers to print to the shared printers.
D.On the Windows 2000 Server computer, configure shared printers that connect to the print devices attached to the UNIX computers. Configure the Windows 2000 Professional computers to print to the shared printers on the Windows 2000 Server computer.
第2题:
You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.What should you do?()
A.A
B.B
C.C
D.D
第3题:
What will a new Ezonexam router do during startup if a configuration file is not located in NVRAM?
A.It will search for the configuration file in the locations specified by boot system commands.
B.It will search for the configuration file in flash and if no configuration file is found there, it will enter the setup dialog.
C.It will search for the configuration file on a TFTP server and if no configuration file is found there, it will enter the setup dialog.
D.It will search for the configuration file in flash and if no configuration file is found there, it will load a limited configuration file from ROM.
E.It will search for the configuration file on a TFTP server and if no configuration file is found there, it will load a limited configuration file from ROM.
第4题:
A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()
第5题:
Which statement correctly describes the change tracking writer (CTWR) background process?()
第6题:
You have a computer that runs Windows Vista.You need to configure the computer to meet the following requirements:·You must be able to make configuration changes remotely.·You must be able to make the changes without the permission of the locally logged-on user.What should you do?()
A.A
B.B
C.C
D.D
第7题:
What will a router do during startup if a configuration file is not located in NVRAM?()
第8题:
Your Windows 2000 Professional computer has 10 shared folders that are available to other network users. A user reports that he cannot access a shared folder named ShareA.
You want to respond to the user's problem as quickly as possible by using an administrative tool.
However, you cannot remember the server location of ShareA. What should you do?
A.Use Windows Explorer to display the file paths of your shared folders.
B.Use Storage in Computer Management to view logical drive properties.
C.Use Event Viewer in Computer Management to search for shared folder error messages.
D.Use System Tools in Computer Management to display the file paths of your shared folders.
第9题:
A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()
第10题:
After making changes to the monitoring configuration file for the event monitoring engine on an agent, which conman command will force the change immediately?()