Users have stated that all their printouts from a networked printer consist of random characters.The technician should:()A、perform a virus scan.B、replace the fuser.C、reinstall the printer drivers.D、reinstall the printer firmware.

题目

Users have stated that all their printouts from a networked printer consist of random characters.The technician should:()

  • A、perform a virus scan.
  • B、replace the fuser.
  • C、reinstall the printer drivers.
  • D、reinstall the printer firmware.

相似考题
更多“Users have stated that all their”相关问题
  • 第1题:

    Which two statements apply when a user has entered private configuration mode by typing configure private?()

    • A、All users have their own active configuration
    • B、All users have their own private candidate configuration
    • C、When a user commits, all non conflicting changes made by all users are commited
    • D、When a users commits, only the user's own changes are commited

    正确答案:B,D

  • 第2题:

    You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB01 in the instance. The company CIO wants all the application developers can capture traces to troubleshoot the application that uses the database DB1, and they can perform this by using SQL Server Profiler. But they have to be given as little permission as possible. The company CIO assigns this task to you.  So what action should you perform to achieve this goal?()  

    • A、All the SQL Server logins of the application developers have to be added to a fixed server role. 
    • B、All the database users of the application developers have to be added to a fixed database role 
    • C、All SQL Server logins of the application developers should be given the appropriate server-level permissions. 
    • D、All database users of the application developers should be given the appropriate database-level permissions. 

    正确答案:C

  • 第3题:

    You have an Exchange Server 2010 organization.  All users connect to their mailboxes by using Microsoft Office Outlook 2007 Service Pack 2 (SP2) andWindows 7.  Your companys security administrators deploy Outlook Protection Rules.  You need to recommend a client connection solution for the organization to ensure that Outlook ProtectionRules can be used.  What should you recommend?()

    • A、Upgrade all client computers to Outlook 2010.
    • B、Instruct all users to connect to Outlook Web App (OWA).
    • C、Instruct all users to install the Rights Management Service (RMS) client.
    • D、Instruct all users to install the Secure/Multipurpose Internet Mail Extensions (S/MIME) control.

    正确答案:A

  • 第4题:

    单选题
    Manually, you set the consumer group of all of the newly created users to MYDB_GRP. You want the users to be able to change their consumer groups as per the application requirement. What was the first step that was needed in the process to achieve this objective?()
    A

     The user must have been granted the DBA role.

    B

     The user must have been granted the switch privilege as a part of a role.

    C

     The user must have been granted the Resource Manager administrator privilege.

    D

     The user must have been granted the switch privilege by using the DBMS_RESOURCE_MANAGER_PRIVS package.


    正确答案: D
    解析: 暂无解析

  • 第5题:

    单选题
    You have been asked to create three users, PUB1, PUB2 and PUB3, for three newly hired employees and to allocate unlimited quota on their default tablespace PUBLISHER_TBS with no other privileges. After creating the users, which method can you use for granting the required privileges?()
    A

    grant CONNECT role to all of the three users

    B

    grant RESOURCE role to all of the three users

    C

    grant both CONNECT and RESOURCE role to all of the three users

    D

    execute ALTER USER .. QUOTA UNLIMITED ON publisher_tbs command for all of the three users

    E

    create role with UNLIMITED TABLESPACE system privilege and assign the role to all of the three users


    正确答案: A
    解析: 暂无解析

  • 第6题:

    多选题
    In the admin GUI, you navigate to "System" > "Status" > "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()
    A

    To forcibly sign out a single user, you should select the check box next to that user's login name, then select Delete Session.

    B

    If you select Delete All Sessions, all users are forcibly signed out and are unable to sign in again until Enable All Users is selected.

    C

    Selecting Disable All Users prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.

    D

    Selecting Refresh Roles re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.


    正确答案: D,C
    解析: 暂无解析

  • 第7题:

    单选题
    You are a Windows Server 2008 systems administrator responsible for configuring FTP Publishing Servicefor use by members of your organization’s engineering department. The name of the server is FTPServer01. Several users have reported that they are able to access most files through the FTP site,but they cannot access the contents of the Drawings folder. You have verified that these users. Windowsaccounts have the correct file system permissions for this folder. You want to minimize the permissionsgranted to all the users. Which of the following changes should you make to enable users to access thisfolder?()
    A

    Change the permissions for the IUSR_FTPServer01 account on the Drawings folder.

    B

    Create new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.

    C

    Disable the Allow Only Anonymous Connections option.

    D

    Add the users to the local Administrators group on FTPServer02.


    正确答案: D
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements apply when a user has entered private configuration mode by typing configure private? ()
    A

    All users have their own active configuration

    B

    All users have their own private candidate configuration

    C

    When a user commits, all nonconflicting changes made by all users are commited

    D

    When a user commits, only the user's own changes are commited


    正确答案: D,A
    解析: 暂无解析

  • 第9题:

    单选题
    You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()
    A

    The SetupUser profile

    B

    The Default User profile

    C

    The Administrator profile

    D

    The System profile

    E

    The All Users profile


    正确答案: C
    解析: 暂无解析

  • 第10题:

    You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()

    • A、All users except SYS
    • B、All users except SCOTT
    • C、All users except sys and SCOTT
    • D、All users except sys, system, and SCOTT

    正确答案:B

  • 第11题:

    You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed. The organization contains two Mailbox servers named Server1 and Server2.Each Mailbox server has one mailbox database and one public folder database. You discover that all users create public folders on Server1 only. You need to ensure that all users create public folders on Server2 only. What should you do?()

    • A、Move all mailboxes to Server2.
    • B、Modify the properties of both mailbox databases.
    • C、Remove all public folder replicas from Server1.
    • D、Modify the properties of both public folder databases.

    正确答案:B

  • 第12题:

    You have an Exchange Server 2010 organization. Your company’s compliance policy states the following:.Delete e-mail messages sent to legal department users that are older than 180 days. .Delete e-mail messages sent to all other users that are older than 60 days You need to recommend a solution that meets the requirements of the compliance policy. What should you recommend?()

    • A、Configure deleted item retention for all users.
    • B、Configure Personal Archives for the legal department users.
    • C、Create two Managed Folder mailbox policies. Use one policy for the legal department users. Use the other policy for all other users.
    • D、Create two new message classifications. Use one message classification for the e-mails sent to legal department users. Use the other message classification for the e-mails sent to all other users.

    正确答案:C

  • 第13题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directorydomain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers.You need to ensure that all users are authenticated by a domain controller when they log on.How should you modify the local security policy? ()
    A

    Require authentication by a domain controller to unlock the client computer.

    B

    Cache zero interactive logons.

    C

    Cache 50 interactive logons.

    D

    Grant the Log on locally user right to the Users group.


    正确答案: C
    解析: 暂无解析

  • 第14题:

    单选题
    You have an Exchange Server 2010 server that contains a single mailbox database.All users run Microsoft Office Outlook and Outlook Web App.You discover that users cannot restore e-mail messages from the Recover Deleted Items folder.You need to ensure that users can restore e-mail messages from the Recover Deleted Items folder.What should you do?()
    A

    From the Exchange Management Console (EMC), modify the properties of the mailbox database

    B

    From the Exchange Management Console (EMC), modify the properties of the Mailbox server object

    C

    From the Exchange Management Shell, create a management role and then assign the role to all users

    D

    From the Exchange Management Shell, create a retention policy and then assign the policy to all users


    正确答案: C
    解析: 暂无解析

  • 第15题:

    单选题
    You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.The network contains an internal root certification authority (CA).Users on the network use Outlook Anywhere.A Client Access server uses a wildcard certificate issued by a trusted third-party root CA.You need to ensure that users can send and receive encrypted e-mail messages by using S/MIME. What should you do?()
    A

    Instruct all users to import the third-party root CA certificate.

    B

    Import the internal root CA certificate to the Client Access server.

    C

    Instruct all users to import the internal root CA certificate.

    D

    Issue a certificate to each user from the internal root CA


    正确答案: C
    解析: 暂无解析

  • 第16题:

    多选题
    Which two statements apply when a user has entered private configuration mode by typing configure private?()
    A

    All users have their own active configuration

    B

    All users have their own private candidate configuration

    C

    When a user commits, all non conflicting changes made by all users are commited

    D

    When a users commits, only the user's own changes are commited


    正确答案: A,D
    解析: 暂无解析

  • 第17题:

    多选题
    Which two statements apply when a user has entered private configuration mode by typing configure private?()
    A

    All users have their own active configuration.

    B

    All users have their own private candidate configuration.

    C

    When a user commits, all nonconflicting changes made by all users are committed.

    D

    When a user commits, only the user's own changes are committed.


    正确答案: C,B
    解析: 暂无解析

  • 第18题:

    单选题
    From the V$SESSION_LONGOPS view, you find that some of the database users have long-running queries that consume a lot of CPU time. This causes performance problems for other users in the database, who have much shorter queries.  You would like to make sure that the users with large queries do not use all the CPU time, but you still do not want to terminate them with an error message.  Which method would you follow to achieve this?()
    A

    set the CPU time per call in the users profile

    B

    set the CPU time per session in the users profiles

    C

    set the CPU levels for the users’ group using Resource Manager

    D

    set the TIMED_STATISTICS parameter to TRUE in the parameter file


    正确答案: A
    解析: 暂无解析