Users have stated that all their printouts from a networked printer consist of random characters.The technician should:()
第1题:
Which two statements apply when a user has entered private configuration mode by typing configure private?()
第2题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you. So what action should you perform to achieve this goal?()
第3题:
You have an Exchange Server 2010 organization. All users connect to their mailboxes by using Microsoft Office Outlook 2007 Service Pack 2 (SP2) andWindows 7. Your companys security administrators deploy Outlook Protection Rules. You need to recommend a client connection solution for the organization to ensure that Outlook ProtectionRules can be used. What should you recommend?()
第4题:
The user must have been granted the DBA role.
The user must have been granted the switch privilege as a part of a role.
The user must have been granted the Resource Manager administrator privilege.
The user must have been granted the switch privilege by using the DBMS_RESOURCE_MANAGER_PRIVS package.
第5题:
grant CONNECT role to all of the three users
grant RESOURCE role to all of the three users
grant both CONNECT and RESOURCE role to all of the three users
execute ALTER USER .. QUOTA UNLIMITED ON publisher_tbs command for all of the three users
create role with UNLIMITED TABLESPACE system privilege and assign the role to all of the three users
第6题:
To forcibly sign out a single user, you should select the check box next to that user's login name, then select Delete Session.
If you select Delete All Sessions, all users are forcibly signed out and are unable to sign in again until Enable All Users is selected.
Selecting Disable All Users prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.
Selecting Refresh Roles re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.
第7题:
Change the permissions for the IUSR_FTPServer01 account on the Drawings folder.
Create new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.
Disable the Allow Only Anonymous Connections option.
Add the users to the local Administrators group on FTPServer02.
第8题:
All users have their own active configuration
All users have their own private candidate configuration
When a user commits, all nonconflicting changes made by all users are commited
When a user commits, only the user's own changes are commited
第9题:
The SetupUser profile
The Default User profile
The Administrator profile
The System profile
The All Users profile
第10题:
You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()
第11题:
You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. The organization contains two Mailbox servers named Server1 and Server2.Each Mailbox server has one mailbox database and one public folder database. You discover that all users create public folders on Server1 only. You need to ensure that all users create public folders on Server2 only. What should you do?()
第12题:
You have an Exchange Server 2010 organization. Your company’s compliance policy states the following:.Delete e-mail messages sent to legal department users that are older than 180 days. .Delete e-mail messages sent to all other users that are older than 60 days You need to recommend a solution that meets the requirements of the compliance policy. What should you recommend?()
第13题:
Require authentication by a domain controller to unlock the client computer.
Cache zero interactive logons.
Cache 50 interactive logons.
Grant the Log on locally user right to the Users group.
第14题:
From the Exchange Management Console (EMC), modify the properties of the mailbox database
From the Exchange Management Console (EMC), modify the properties of the Mailbox server object
From the Exchange Management Shell, create a management role and then assign the role to all users
From the Exchange Management Shell, create a retention policy and then assign the policy to all users
第15题:
Instruct all users to import the third-party root CA certificate.
Import the internal root CA certificate to the Client Access server.
Instruct all users to import the internal root CA certificate.
Issue a certificate to each user from the internal root CA
第16题:
All users have their own active configuration
All users have their own private candidate configuration
When a user commits, all non conflicting changes made by all users are commited
When a users commits, only the user's own changes are commited
第17题:
All users have their own active configuration.
All users have their own private candidate configuration.
When a user commits, all nonconflicting changes made by all users are committed.
When a user commits, only the user's own changes are committed.
第18题:
set the CPU time per call in the users profile
set the CPU time per session in the users profiles
set the CPU levels for the users’ group using Resource Manager
set the TIMED_STATISTICS parameter to TRUE in the parameter file