You are the administrator of some of TestKing‘s file servers. Peter is hired as an intern in the human resources department. Peter needs access to some HR files. He also needs to be able to read the file named Handbook.doc, but he must not be able to make changes to it.Handbook.doc exists in a folder named HRResources. Peter needs to have Read and Modify permissions for the other files in the HRResources folder.Peter is a member of the Domain Users group and the HR group. The permissions on the HRResources folder are shown in the following table.You need to ensure that Peter can access the appropriate files and that he cannot make changes to Handbook.doc.What should you do?()

A. Set the hidden and system attributes on Handbook.Doc.
B. Disable permissions inheritance on Handbook.doc.
C. Assign Peter the Allow-Read permission for Handbook.doc.
D. Assign Peter the Deny-Write NTFS permission for Handbook.doc.
第1题:
You are the administrator of your company’s network. A user named Peter runs Windows 2000 Professional on his portable computer. Peter wants to be able to work at home on files that were created in the office on the company network. Prior to logging off the network and leaving the office, Peter enables offline files. Peter wants to automatically download all the opened files to his computer and he should not manually define the offline files. What setting you will do in caching option? ()
第2题:
You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()
第3题:
You are the network administrator for TestKing.com Active Directory domain. The domain includes Windows Server 2003 domain controllers and Windows XP Professonal client computers. A new administrator named Sandra is hired to assist you in deploying Windows XP Professional to 100 new computers. Sandra installs the operating system on a new computer named TestKing11. However, when Sandra tries to log on to the domain from TestKing11, she is unsuccessful. The logon box does now allow her to view and select the domain name. You need to ensure that Sandra can log on to the domain from TestKing11. What should you do?()
第4题:
You are the administrator of your company’s network. A user named Peter runs Windows 2000 Professional on his portable computer. Peter wants to be able to work at home on files that were created in the office on the company network. Prior to logging off the network and leaving the office, Peter enables Offline Files. Peter calls you from home and reports that copies of his folders and files on the network are not available on his portable computer. What should you instruct Peter to do? ()
第5题:
You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()
第6题:
Add Peter's user account to the Server Operators group.
Add Peter's user account to the Account Operators group.
Use the Delegation of Control Wizard to permit Peter's user account to create new computer objects in the Computers container.
Create a Group Policy object (GPO) and link it to the domain. Configure the GPO to permit Peter's user account to add client computers to the domain.
第7题:
Perform a default restoration.
Run the Automated System Recover (ASR) wizard.
Perform a restoration, and enable the Restore security option.
Perform a restoration, and disable the Restore security option
第8题:
In the Backup utility, select the Verify data after backup option.
Run the Ntbackup //TestKing2/TestKingProjects /v:yes command.
Restore the file to a temporary folder. Verify that the database file contains the correct data. Copy the restored file to the TestKingProjects folder.
Restore the file to a temporary folder. Use the Windiff utility to compare the file in the temporary folder to the file in the TestKingProjects folder. Copy the restored file to the TestKingProjects folder.
第9题:
Enable the computer account for Testking11.
Configure TestKing11 as a member of the domain.
Add Sandra's user account to the Enterprise Admins group.
Add Sandra's user account to the Server Operators group.
第10题:
You are the network administrator for You administer a Windows Server 2003 computer named TestKing2. User profiles are stored on TestKing2. A user named Sandra reports that she accidentally deleted a folder named TestKingStuff from her user profile. She needs to have her TestKingStuff folder restored. Other users are accessing TestKing2, and you do not want to negatively affect their work. You locate the latest backup that contains the files that you need to restore. You need to restore Sandra's TestKingStuff folder. You want to achieve this goal by using the minimum amount of administrative effort. What should you do?()
第11题:
You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Prfessional computer. Your company hires an intern named Richard. You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder. What should you do?()
第12题:
You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()
第13题:
You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named King will leave TestKing in one week. A replacement will be hired in one month. The replacement will need the same access to network resources that King currently has. The replacement will also need ownership of all files that currently reside in King's home folder. You need to minimize the administrative effort that will be required when the replacement is hired. You also need to ensure that no one can use King's user account to log on to the domain until the replacement is hired. What should you do?()
第14题:
Change the UNC path of Peter’s roaming profile to his home directory folder.
Log on as a local administrator on Peter’s computer. Change the roaming profile to a local profile.
Log on as a local administrator on Peter’s computer. Edit the local Group Policy to exclude Directories in Roaming Profile.
Log on as a local administrator on Peter’s computer. In the properties of the My Documents folder, change the Target folder location to Peter’s home directory.
第15题:
Restore Peter's WorkProduct folder, and clear the Restore junction points, but not the folders and the file data they reference check box.
Restore the Documents and Settings folder that contains the WorkProduct folder.
Restore Peter’s WorkProduct folder, and choose an alternate location for the restoration.
Restore Peter’s WorkProduct folder, and choose the original location for the restoration.
第16题:
Move the files and folders from TESTKING1 to TESTKING2.
Copy the files and folders from TESTKING1 to TESTKING2.
Change the NTFS permissions on TESTKING2 to match the NTFS permissions on TESTKING1.
Back up the files and folders in TESTKING1 and restore them, including permissions, to TESTKING2.
第17题:
Copy the .acw file to the c;/documents/setting/default user folder
Save the accessibility option to the floppy disk and change the permission to allow full control of the file
Resume the setting for the option by using utility manager, then copy the file to Peter’s local profile folder
Change the permission of the .acw file in the folder to allow access for Peter’s user account.
第18题:
Configure a Performance Logs and Alerts on the %Free space counter.
Use Device Manager to populate volume settings and examine the properties of the disk drives on TestKing3.
Use Event View to examine the system logs and search the system logs for event logs for events generated by the disk event source.
Use System Monitor to monitor counters based on the PhysicalDisk object