题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2024-05-25 00:26:39

[单项选择]You work as an administrator at ABC.com.The ABC.com network consists of a single domain named ABC.com.All servers in the ABC.com domain have Windows Server 2012 R2 installed.A ABC.com server named ABC_SR12 hosts a Windows Server 2012 R2 virtual machine named ABC_VT02.A ABC.com user named RoyMoses must be allowed to add and remove Windows features on ABC_VT02.  Which of the following options will allow RoyMoses to complete his duties without giving him too much permissions?()
A. You should make RoyMoses a member of the Power Users group on ABC_SR12.
B. You should make RoyMoses a member of the Administrators group on ABC_VT02.
C. You should make RoyMoses a member of the Hyper-V Administrators group on ABC_SR12
D. You should run the Delegation of Control Wizard on ABC_VT02.
E. You should make RoyMoses a member of the Creator Owner group on ABC_VT02.
F. You should make RoyMoses a member of the Local Administrators group on ABC_SR12.

更多"You work as an&#8"的相关试题:

[单项选择]The most important reason why the Hush administration support more new nuclear-power plants is that ______.
A. they need little government financial support
B. they will increase energy security
C. they help lessen dependence on fossil fuels
D. they are environmentally friendly
[单项选择]Which of the following tools allows an administrator to determine the MAC address of another computer?()
A. ping
B. arp
C. ifconfig
D. ipconfig
[单项选择]Which of the following services can an administrator use to reduce latency and prioritize the flowof data?()
A. Fault tolerance
B. RADIUS
C. Qos
D. Load balancing
[单项选择]A mail server keeps shutting down. The administrator gets an error message over temperature error? Which of the following should the administrator replace FIRST?()
A. Power supply fan
B. CPU fan
C. Heat sink
D. Case fan
[多项选择]Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
A. Port security needs to be globally enabled.
B. Port security needs to be enabled on the interface.
C. Port security needs to be configured to shut down the interface in the event of a violation.
D. Port security needs to be configured to allow only one learned MAC address.
E. Port security interface counters need to be cleared before using the show command.
F. The port security configuration needs to be saved to NVRAM before it can become active.
[多项选择]A WebSphere Commerce administrator is attempting to invalidate a cached servlet. Which course of action would NOT accomplish this goal?()
A. Manually Invalidate the servlet cache through the Cache Monitor
B. Configure a Time Based invalidation for the servlet
C. Call the dynamic cache invalidation API to invalidate the servlet
D. Manually invalidate the servlet through the Configuration Manager
E. Use the Commerce Accelerator to remove the invalid servlet
[单项选择] You are a database administrator for your company. A user named Susan belongs to the Windows SalesManagers group. Susan needs a Reporting Services report to display annual sales information by territory. A user named Joe reports to Susan and belongs to the Windows Sales group. He needs a report that is limited to his sales territory, but still displays the same detailed sales data that is on Susan’s report. You need to design a secure solution that meets the reporting needs of the users and that consumes the minimal amount of server resources.  What should you do?()
A. Design a report for Susan that includes two data regions. One data region is used for summary sales data. The other data region is used for the detailed sales data for each sales representative. Then, design a report for Joe that displays the detailed sales data.
B. Design two reports for Susan. One report includes the territory information, and one report includes the detailed sales data. Then, design a report for Joe that displays the detailed sales data for his territories.
C. Design a report for Susan that includes the territory information. Then, design a report for Joe that includes detailed sales data for his territories. Finally, configure Susans report so that it includes the data in Joes report.
D. Design a parameterized report for Susan that includes all territory information. Then, design a linked report for Joe that links to Susans report.
[单项选择] You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains three member servers named Server1,Server2,and Server3.    The three member servers are connected to the Internet. You plan to implement remote access to the company network for users that work from home. You configure and enable Routing and Remote Access on Server1 and Server2. An assistant,who is an administrator on all member servers, configures and enables Routing and Remote Access on Server3. Users from the domain can successfully establish VPN connections from the lnternet to Server1 and Server2. However,users cannot establish a VPN connection to Server3. You discover that Server3 can only authenticate Internet VPN connections from local user accounts.    You need to ensure that users from the domain can successfully establish a VPN connection to Server3.  What should you do?()
A.  Enable the Server3 computer account in Active Directory as trusted for delegation.
B.  Assign the Authenticated Users group the Allow - Allowed to Authenticate permission for the Server3 computer acc
C.  Assign the Server3 computer account the Allow. Read permission on the RAS and IAS Servers access Check cont
D.  Add the Server3 computer account to the RAS and IAS Servers security group.
E.  Add the Server3 computer account to the Windows Authorization Access Group security group.
[单项选择] You are a Database Administrator with WonderWeb. You use a password file to establish connections to the Sales database located on the server. You created the password file using the following command:        ORAPWD file=d:/oracle/ora9i/orapwU01 password=admin entries=4   You erroneously deleted the password file while the database was running. You re-create the password file using the following command:   ORAPWD file=d:/oracle/ora9i/orapwU01 password=change_on_install entries=4   However, when you try to connect as the SYS user, you receive the following error:        ORA-01031: insufficient privileges   What should you do to resolve this error?()
A.  Delete the newly created password file and re-create another password file with the password admin, without shutting down the database.
B.  Enable the operating system authentication, shut down the database, disable the operating system authentication, and restart the database using the password file.
C.  Enable the operating system authentication, shut down the database, re-create the password file using the same ORAPWD command, and restart the database using the password file.
D.  Delete the newly created password file, enable operating system authentication and shut down the database. Then, re-create another password file using the same ORAPWD command and restart the database using this password file.
[单项选择] ou are the network administrator for your company. The network consists of a single Active Directory forest that contains one domain. The functional level of the forest is Windows 2000, and the functional level of the domain is Windows 2000 mixed. The domain contains four domain controllers named DC1, DC2, DC3, and DC4. There are two sites in the forest. DC1 and DC2 are in one site. DC3 and DC4 are in the other site. DC1 fails. You need to wait until the following week to restore DC1. While connected to DC3, you perform a bulk import of user accounts and receive an error message stating that a number of the user accounts could not be created. You need to ensure that the user accounts can be created.  What should you do?()
A.  Seize the PDC emulator role to DC3.
B.  Seize the relative ID (RID) master role to DC3. 
C.  Create a replication object to connect DC3 to DC2.
D.  Raise the functional level of the domain and the functional level of the forest to Windows Server 2003.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码