-
You need to recommend a solution to minimize the amount of time it takes for users in the Boston office to log on to their client computers. What should you include in the recommendation?()
A . access-based enumeration (ABE)
B . folder redirection
C . the Active Directory site link cost
D . universal group membership caching
-
You manage 40 computers that run Microsoft Windows Vista. You use Microsoft Windows Calendar to publish a calendar to a shared network location. You need to allow users to automatically view the most recent calendar updates. What should you do? ()
A . Instruct all users to configure a calendar subscription that has an update interval of 15 minutes.
B . Instruct all users to perform calendar synchronization for all shared calendar subscriptions.
C . Instruct all users to map a network drive to the folder that holds the shared calendar. Import the .ics file for the shared calendar.
D . Use e-mail messages to deploy the .ics file for the shared calendar to each user. Instruct each user to import the .ics file that is attached to the e-mail message.
-
You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()
A . Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.
B . Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.
C . Use Windows Explorer to turn on auditing for the specific files.
D . Have the administrator for domains log you on as an administrator and enable auditing for a specific file.
E . Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.
F . Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.&e
-
You have a computer that runs Windows 7. Multiple users share the computer. The computer contains afolder named C:\folder1. You need to identify all of the encrypted files in C:\folder1. Which command shouldyou run?()
A . Cipher C:\folder1
B . Dir C:\folder1 /OE
C . Fsutil C:\folder1
D . Wfs C:\folder1
-
You share your computer with two users who belong to the Users group. You need to ensure that all users are informed of new updates. What should you do?()
A . Enable the Turn on recommended updates via Automatic Updates option.
B . Enable the Allow non-administrators to receive update notifications option.
C . Enable the Enable client-side targeting option and specify the target group.
D . Disable the Do not display "Install Updates and Shut Down" option in Shut Down Windows Dialog box option.
-
You have a computer named Computer1 that runs Windows XP Professional. Computer1 is a member of a workgroup. You need to prevent all users from encrypting files on Computer1. What should you do?()
A . For all files, deny the Take ownership permission to the Everyone group.
B . From the Local Security Policy, modify the Encrypting File System (EFS) properties.
C . From the Certificates snap-in, delete the recovery agent certificate.
D . From the Certificates snap-in, delete all trusted root certification authority (CA) certificates.&e
-
You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users logon to the computer. You need to prevent the computer from displaying the username of the last user whologged on. What should you do?()
A . From Control Panel, modify the User Profiles settings.
B . From Control Panel, modify the Personalization settings.
C . From the local computer policy, add a policy template.
D . From the local computer policy, modify the local security policy.
-
Your network has client computers that run Windows 7. A custom Web-based application requires specific security settings. You need to prevent users from permanently modifying their Internet Explorer browser’s security settings. What should you do?()
A . Use Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode.
B . Use Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode.
C . Reset the Internet Explorer settings.
D . Restore the advanced settings in Internet Explorer.
-
You have a computer that runs Windows 7. You need to provide standard users the ability to update thedrivers for display adapters. What should you modify from the Local Group Policy?()
A . device installation settings for the computer.
B . display settings for the user.
C . driver installation settings for the computer.
D . driver installation settings for the user.
-
You have a computer that runs Windows XP Professional. Multiple users share the computer. Users work in either French or English. You need to ensure that users can change the language in which the system menus appear. What should you do first?()
A . From the Display Properties, modify the Desktop settings.
B . From Internet Explorer, modify the Language Preferences.
C . From the Multilingual User Interface (MUI) pack installation CD, run muisetup.exe.
D . From Regional and Language Options, modify the Location settings and the Input Languages settings.&e
-
Remote users are unable to connect to a shared folder on your computer. You need to allow access to the shared folder.
What are the two possible ways to achieve this goal?()
https://assets.asklib.com/images/image2/201807311511466131.jpg
A . A
B . B
C . C
D . D
-
Remote users are unable to connect to a shared folder on your computer. You need to allow access to the shared folder. What are the two possible ways to achieve this goal?()
A . Restore the Microsoft Windows Firewall defaults.
B . Validate the permissions on the shared folder by using Microsoft Windows Explorer.
C . Enable the File and Printer Sharing exception in Windows Firewall.
D . Enable the Internet Connection Sharing exception in Windows Firewall.
-
You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to adomain. You need to prevent the users from using more than 2 GB of disk space on drive C. What should you do?()
A . From a Group Policy object (GPO), enable the Limit profile size setting.
B . Enable System Protection for Local Disk (C) and set the disk space usage.
C . Enable disk quota management on Computer1 and configure a default quota limit.
D . From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cachesetting.
-
You need to design a strategy to move confidential data from research users’ client computers to ATLFP2. Your solution must meet the business requirements. What should you instruct the research users to do?()
A . Move the encrypted data to a folder on ATLFP2 over an IPSec connection
B . Move the encrypted data to an Encrypting File System (EFS) folder on ATLFP2 over an IPSec connection
C . Move the encrypted data to a new server that is not a member of the domain, and then move it to ATLFP2
D . Move the encrypted data to a compressed folder on ATLFP2 by using Web Distributed Authoring and Versioning (WebDAV) over SSL
-
You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?()
A . Start the Problem Steps Recorder.
B . From Event Viewer, modify the properties of the Security log.
C . From the local Group Policy, configure the Audit object access setting.
D . From the local Group Policy, configure the Audit directory service Access setting.
-
The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()
A . On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
B . On all client computers, implement logon auditing for all user account logons
C . On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policy
D . On all domain controllers, implement logon auditing for all user account logo
-
ou share a computer with other users. You need to ensure that all application and device driver failure reports for this computer are submitted to Microsoft Problem Reports and Solutions. What should you do?()
A . After each error occurs, perform a Microsoft Windows Update scan.
B . Turn on the Windows Problem Reporting feature for all users.
C . Configure the computer to take part in the Microsoft Windows Customer Experience Improvement Program.
D . Create a standard user account. Instruct all users to log on by using this standard user account. Configure auditing for this user account.
-
I want to buy _ computer next week.
A、/
B、an
C、a
D、the
-
The French tend to buy fresh meat from the supermarket, where they can inspect the piece before purchasing it.
-
With computer users linked to the Internetgrowin9__________every year,business istrying to cash in on the worldwide network. A.at million B.with a million C.with one million D.by millions
-
You are the network administrator for Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows 2000 Professional.You install Windows Server 2003 with default settings on a new computer named TestKingSrv1. You install and share several printers on TestKingSrv1. You instruct all users to connect to these printers by using the address http://TestKingSrv1/Printers.However, users report that they cannot connect to this address.You need to ensure that all users can connect to the printers by using HTTP.Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)
A. Publish all shared printers that are installed on TestKingSrv1.
B. Create a virtual directory named Printers on TestKingSrv1.
C. Install IIS with default settings on TestKingSrv1.
D. Reshare all printers on TestKingSrv1.
E. Install the Internet Printing component of IIS.
F. Type Net Stat W3SVC at a command prompt.
-
You are the network administrator for Testking.com. The network consists of a single Active Directory domain named testking.com.The sales department is hiring employees. An OU named TestKingSales is created to hold objects for the new sales department users. Each sales department user has a portable computer. Each portable computer runs Windows XP Professional. The sales department users are responsible for joining their portable computers to the domain.You need to ensure that the computer accounts for the Sales department user‘s portable computers are created in the TestKingSales OU. You need to achieve this goal without granting any unnecessary permissions.What should you do?()
A. Assign the sales department users the Allow - Read permissions for the Computer container.
B. Configure the sales department users‘ user accounts to be trusted for delegation
C. Prestage the computer accounts in the TestKingSales OU for the sales department users‘ portable computers.
D. Assign the sales depertment users the Allow - Create all Child Objects permission for the TestKingSales OU.
-
Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to ()Web sites without their knowledge or consent. Pharming has been called &
A.hypertext
B. computation
C. expectation
D. bookmark
-
Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message: °Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()
A. Open port 1423 on the firewall.
B. Open port 1723 on the firewall.
C. Open port 3389 on the firewall.
D. Open port 6000 on the firewall.