Set folder permissions to 760.
Set folder permissions to 770.
Set folder permissions to modify
Set folder permissions to full control
第1题:
You are the network administrator for The network consists of a single Active Directory domain named.You configure a new Windows Server 2003 file server named TestKingSrv1.You restore user files from a tape backup, and you create a logon script that maps driveletters to shared files on TestKingSrv1.Users report that they cannot access TestKingSrv1 through the drive mappings youcreated. Users also report that TestKingSrv1 does not appear in My NetworkPlaces.You log on to TestKingSrv1 and confirm that the files are present and that theNTFS permissions and share permissions are correct. You cannot access anynetwork resources. You run the ipconfig command and see the following output.You need to configure the TCP/IP properties on TestKingSrv1 to resolve theproblem.What should you do?()
A. Add testking.com to the DNS suffix for this connection field.
B. Configure the default gateway.
C. Configure the DNS server address.
D. Configure a static IP address.
第2题:
A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()
第3题:
Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()
第4题:
After moving files from one folder to another, the technician cannot access them. Which of the following MUST the technician do to regain access to these files?()
第5题:
Examine the command: SQL> ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()
第6题:
You have a computer that runs Windows XP Professional. Five users share the computer. A user named User1 is a member of the Power Users group and the Administrators group. User1 has encrypted files on the computer. User1 takes an extended leave of absence. You need to ensure that users cannot access the computer as User1. You must be able to provide User1 access to the files upon User1’s return. What should you do?()
第7题:
That there are no DHCP relay servers
That the user account on Active Directory is not locked
That the network card driver is not installed incorrectly
The network connection is functioning
第8题:
chmod +s /tmp
chmod 775 /tmp
chmod 1777 /tmp
chmod 4755 /tmp
第9题:
In folder options, select show hidden files and folders.
Perform the transfer again.
Reboot the system; access will be reset automatically.
Take ownership of the files.
第10题:
Add Hildegard’s user accounts to the Pre-Windows 2000 Compatible Access group.
Add Hildegard’s user account to the local Power Users group.
Allow Hildegard’s user account Full Control permission to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.
Allow Hildegard’s user account Write permissions to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.
第11题:
Grant Saul NTFS permission so that he can access any parent folder or files in the shared sales folder.
Share the Sales folder and grant Saul shared folder permission to access the shared sales folder.
Remove Saul from any other groups that have been explicitly denied access to the accounting folder.
Delete the Sales local group and recreate, add individual user accounts from the sales department back into sales local group.
第12题:
Perform a policy trace for the specific user and review the output to isolate the problem.
Review the Events log.
Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.
Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.
第13题:
A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()
第14题:
A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()
第15题:
Which of the following BEST describes the purpose of user account control (UAC) in WindowsVista?()
第16题:
Which command will configure a directory /commonfiles so that a user cannot delete files owned by other users in the same group?()
第17题:
You are the administrator of your company’s network. A user named Paul in the service department has a Windows 2000 Professional computer. Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs. What should you do? ()
第18题:
Set folder permissions to 760.
Set folder permissions to 770.
Set folder permissions to modify
Set folder permissions to full control
第19题:
WAR files must be located in the web application library directory.
WAR files must contain the web application deployment descriptor.
WAR files must be created by using archive tools designed specifically for that purpose.
The web container must serve the content of any META-INF directory located in a WAR file.
The web container must allow access to resources in JARs in the web application library directory.
第20题:
The SKD user cannot log in to the database instance.
The objects owned by the SKD user are not accessible to any user.
The other users can access the objects owned by the SKD user, on which they have access.
The password for the SKD user expires and the user is forced to change the password at the next log in
第21题:
Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.
Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.
Ensure that merge roles is selected in the role-mapping rules.
Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.
第22题:
chmod +s /tmp
chmod 755 /tmp
chmod 1777 /tmp
chmod 4755 /tmp
第23题:
Set folder permissions to 760.
Set folder permissions to 770.
Set folder permissions to modify.
Set folder permissions to full control.