You are a system administrator at Company. The network inclu

题目
单选题
You are a system administrator at Company. The network includes 100 Windows 2000 Professional computers. A user named Peter wants to share a local printing device directly connected to his computer. Peter needs to share this device among three groups:  Engineering, Accounting, and Operations. Peter wants to delegate printer administration to one print administrator from each group. Each print administrator must be able to delete print jobs generated by their own group on the print device. They should not be able to delete print jobs from other groups. You want to configure Peter’s client computer to support these requirements.  What should you do? ()
A

 Create a single shared printer to be used by all three groups.Allow each print administrator Manage Documents permission. 

B

 Create a separate shared printer for each group. For each shared printer, allow the respective      print administrator Manage Documents permission. 

C

 Create a single shared printer to be used by all three groups. Add the print administrator’s user      account from each group to the Power Users group on Peter’s client computer. 

D

 Create a separate shared printer for each group. Add the print administrator’s user account  from each group to the Power Users group on Peter’s client computer. 

参考答案和解析
正确答案: B
解析: We need a printer for each group. We then only grant Manage Document permission to the singleappropriate printer for each print administrator.
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.

You want to upgrade all of the critical system files and patches on the server in the shortest possible time.

What should you do?

A.Use Windows Update.

B.Run System File Checker.

C.Log on as administrator and run Windows Update.

D.Log on as administrator and run System File Checker.


正确答案:C
解析:Explanation:WindowsUpdateisusedtoupgradethesystemfilesandtoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.AllnecessaryfilesaredownloadedthroughtheInternet.TobeabletorunWindowsUpdatewemusthaveadministrativerights.Incorrectanswers:A:Thenon-administrativeuseraccountcannotbeusedtorunWindowsUpdate.TorunWindowsUpdatewemusthaveadministrativerights.B:SystemFileCheckercheckstheintegrityofthesystemfiles.Itcannotbeusedtoupgradethesystemfilesortoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.D:SystemFileCheckercheckstheintegrityofthesystemfiles.Itcannotbeusedtoupgradethesystemfilesortoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.

第2题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()

A.Campus

B.Teleworker

C.Branch

D.Data center


参考答案:C

第3题:

You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()

A. Run the following command: ntbackup.exe backup /F {"FileName"}

B. Run the following command: ntbackup.exe backup systemstate /F {"FileName"}

C. In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.

D. Use NTBackup interactively.


参考答案:D

第4题:

You are the network administrator for your company. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. A total of three servers are configured as domain controllers. You need to restore a failed domain controller named DC3. The last backup for any domain controller on the network occurred one week ago. First, you reinstall Windows Server 2003 on DC3. What should you do next?()

  • A、Start DC3 and select Directory Services Restore Mode. Perform a nonauthoriative restoration.
  • B、Start DC3 and select the Recovery Console. Perform a nonauthoriative restoration.
  • C、Run Ntbackup.exe on DC3 to restore the System State data.
  • D、Run the Active Directory Installation Wizard on DC3.

正确答案:D

第5题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

  • A、Campus
  • B、Teleworker
  • C、Branch
  • D、Data center

正确答案:C

第6题:

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


正确答案:B
解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

Incorrect answers:
A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

第7题:

You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

  • A、Repeater
  • B、Wireless router
  • C、Hub
  • D、Wireless network adapter

正确答案:D

第8题:

You are a network administrator for your company. All servers run Windows Server 2003. A server namedServer34 runs an application named App1.Users report that App1 is performing slowly. You suspect that an unauthorized application is installed on Server34.You run the netstat command and examine the output, as shown in the exhibit. (Click the Exhibit button.)You need to identify the unauthorized application by using the output from the netstat command.Which tool should you use to identify the application? ()

A. Performance console

B. System Monitor

C. Network Monitor

D. Task Manager


参考答案:D

第9题:

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a three-node Network Load Balancing cluster. Each cluster node runs Windows Server 2003 and has a single network adapter. The cluster has converged successfully.   You notice that the nodes in the cluster run at almost full capacity most of the time. You want to add a fourth node to the cluster. You enable and configure Network Load Balancing on the fourth node.   However, the cluster does not converge to a four-node cluster. In the System log on the existing three nodes, you find the exact same TCP/IP error event. The event has the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 02:BF://0A:32:08:46."   In the System log on the new fourth node, you find a similar TCP/error event with the following description: "The system detected an address conflict for IP address 10.50.8.70 with the system having network hardware address 03:BF://0A:32:08:46." Only the hardware address is different in the two descriptions.  You verify that IP address 10.50.8.70 is configured as the cluster IP address on all four nodes.  You want to configure a four-node Network Load Balancing cluster.   What should you do?  ()

  • A、 Configure the fourth node to use multicast mode.
  • B、 Remove 10.50.8.70 from the Network Connections Properties of the fourth node.
  • C、 On the fourth node, run the nlb.exe resume command.
  • D、 On the fourth node, run the wlbs.exe reload command.

正确答案:A

第10题:

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()

  • A、 Monitor the performance monitor counters on the application server by using System Monitor.  
  • B、 Monitor the network traffic on the application server by using Network Monitor.
  • C、 Monitor network statistics on the application server by using Task Manager.
  • D、 Run network diagnostics on the application server by using Network Diagnostics.

正确答案:B

更多相关问题