A user on your network downloads a video card driver from the Internet. You are unsure of the source of the driver. You want to ensure that the user does not lose production time because of an incompatible driver. What should you do?()A、Install the driver

题目

A user on your network downloads a video card driver from the Internet. You are unsure of the source of the driver. You want to ensure that the user does not lose production time because of an incompatible driver. What should you do?()

  • A、Install the driver into the computer. Restart the computer. Use the last known good configuration to recover the original driver if necessary. 
  • B、Install the driver in the computer. Use the hardware troubleshooter and then use the recovery console to recover the original driver if necessary. 
  • C、Display the advanced attributes of the video card driver file. Install the file only if the contents have been secured. 
  • D、Run file signature verification utility to verify that the driver has been digitally signed. 

相似考题
参考答案和解析
正确答案:D
更多“A user on your”相关问题
  • 第1题:

    You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?()

    • A、user@router> request system storage cleanup
    • B、user@router> show system storage
    • C、user@router> request system storage cleanup dry-run
    • D、user@router> show system storage detail

    正确答案:A,C

  • 第2题:

    You executed the STARTUP MOUNT command to start your database. For which database operation do you need to start the database in the MOUNT state?()

    • A、renaming the control files
    • B、dropping a user in your database
    • C、enabling or disabling redo log archiving
    • D、dropping a tablespace in your database
    • E、re-creating the control files, after you lost all the control files in your database

    正确答案:C

  • 第3题:

    You configure parental controls on your computer for your childs user account. Your child logs on with a different account and is able to access inappropriate Web sites. You need to ensure that your child cannot access inappropriate Web sites.  What should you do? ()

    • A、Enable Microsoft Windows Firewall.
    • B、Disable the default administrator account.
    • C、Use password protection for all user accounts.
    • D、Configure Web sites you approve of in the list of Trusted Sites of Microsoft Windows Internet Explorer.

    正确答案:C

  • 第4题:

    Your network contains an Active Directory forest. The forest schema contains a custom attribute for  user objects.   You need to modify the custom attribute value of 500 user accounts.   Which tool should you use()

    • A、Csvde
    • B、Dsmod
    • C、Dsrm
    • D、Ldifde

    正确答案:D

  • 第5题:

    Your network contains an Active Directory domain.   A user named User1 takes a leave of absence for one year.   You need to restrict access to the User1 user account while User1 is away.     What should you do()

    • A、From the Default Domain Policy, modify the account lockout settings.
    • B、From the Default Domain Controller Policy, modify the account lockout settings.
    • C、From the properties of the user account, modify the Account options.
    • D、From the properties of the user account, modify the Session settings.

    正确答案:C

  • 第6题:

    单选题
    You are ready to implement RMAN in the backup and recover strategy for your company. Which system privilege must the RMAN user have to be able to connect and execute RMAN commands on a target database?()
    A

    SYSDBA

    B

    SYSOPER

    C

    No system privileges are required for the RMAN user.

    D

    Only SYS user can connect and execute RMAN commands on a target database.


    正确答案: C
    解析: 暂无解析

  • 第7题:

    单选题
    You executed the STARTUP MOUNT command to start your database. For which database operation do you need to start the database in the MOUNT state?()
    A

    renaming the control files

    B

    dropping a user in your database

    C

    enabling or disabling redo log archiving

    D

    dropping a tablespace in your database

    E

    re-creating the control files, after you lost all the control files in your database


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?()
    A

    Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account and to Stephen’s user account. 

    B

    Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers permissions to your user account and to Stephen’s user account. 

    C

    Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. 

    D

    Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Owner group. Grant Allow - Manage Printers permission to your user account and to Stephen’s user account. 


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA.  What should you do?()
    A

     Assign the user account to the CA Admin role.

    B

     Add the user account to the local Administrators group.

    C

     Grant the user the Back up files and directories user right.

    D

     Grant the user the Manage auditing and security log user right.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    You have an Exchange Server 2010 organization named contoso.com. Your company is investigating a user named User1. You need to prevent User1 from permanently deleting the items in his mailbox.  What should you run()?
    A

    Set-Mailbox User1 -LitigationHoldEnabled $true

    B

    Set-Mailbox User1 -ModerationEnabled $true

    C

    Set-Mailbox User1 -RetainDeletedItemsUntilBackup $true

    D

    Set-Mailbox User1 -RetentionHoldEnabled $true


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.  What should you do? ()
    A

    Enable the User Account Control: Only elevate executables that are signed and validated option.

    B

    Disable the User Account Control: Only elevate executables that are signed and validated option.

    C

    Configure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.

    D

    Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    For which database operation would you need the database to be in the MOUNT state()

    • A、renaming the control files
    • B、re-creating the control files
    • C、dropping a user in your database
    • D、dropping a tablespace in your database
    • E、configuring the database instance to operate in the ARCHIVELOG or NOARCHIVELOG modes

    正确答案:E

  • 第13题:

    Your network contains an Exchange Server 2010 server.You need to prevent a user named User1 from downloading attachments larger than 50 KB when using Exchange ActiveSync.Your solution must not affect other users.  What should you do first?()

    • A、Modify User1 Mailbox properties
    • B、Create a New ActiveSync Mailbox Policy
    • C、Create a New Exchange ActiveSync Mailbox policy
    • D、Modify properties of Default Exchange ActiveSync Mailbox policy

    正确答案:C

  • 第14题:

    Your company has an Active Directory domain. A user attempts to log on to the domain from a client computer and receives the following message: "This user account has expired Ask your administrator to reactivate the account." You need to ensure that the user is able to log on to the domain. What should you do()

    • A、Modify the properties of the user account to set the account to never expire.
    • B、Modify the properties of the user account to extend the Logon Hours setting.
    • C、Modify the properties of the user account to set the password to never expire.
    • D、Modify the default domain policy to decrease the account lockout duration.

    正确答案:A

  • 第15题:

    Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA.  What should you do?()

    • A、 Assign the user account to the CA Admin role.
    • B、 Add the user account to the local Administrators group.
    • C、 Grant the user the Back up files and directories user right.
    • D、 Grant the user the Manage auditing and security log user right.

    正确答案:B

  • 第16题:

    Your computer has Microsoft Windows Firewall enabled.  Your child plays an online game that uses connectionless traffic over port 5678 for inbound and outbound traffic.  You need to prevent your child from playing this game.  What should you do? ()

    • A、Enable the User Account Control feature.
    • B、Configure the user account of your child as a standard user.
    • C、Create an outbound rule in Windows Firewall to block UDP port 5678.
    • D、Create an outbound rule in Windows Firewall to block TCP port 5678.

    正确答案:C

  • 第17题:

    单选题
    For which database operation would you need the database to be in the MOUNT state()
    A

    renaming the control files

    B

    re-creating the control files

    C

    dropping a user in your database

    D

    dropping a tablespace in your database

    E

    configuring the database instance to operate in the ARCHIVELOG or NOARCHIVELOG modes


    正确答案: E
    解析: 暂无解析

  • 第18题:

    单选题
    You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()
    A

    Enable the Require domain controller to unlock policy.

    B

    Set the Number of previous logons to cache policy to 0.  

    C

    Remove all user and group accounts from the Log on locally user right. 

    D

    Remove all user and group accounts from the Access this computer from the network user right. 


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a file server that contains two volumes named C and D. Volume C contains a folder named User1data. User1 is the owner of all files in the User1data folder. You copy the User1data folder to volume D. You examine the ownership of the User1data folder on volume D and discover that your user account is listed as the owner. You need to ensure that User1 is the owner of the User1data folder on volume D. What should you do? ()
    A

    Modify the Advanced Security settings for the User1data folder.

    B

    Modify the Advanced Attributes settings for the User1data folder.

    C

    Delete the User1data folder on volume

    D

    From Windows Explorer, move the User1data folder from volume C to volume


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()
    A

    identify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator 

    B

    identify CSQs and JTAPI user and designate a Cisco CRS administrator 

    C

    identify resources and RM user and enter information about your LDAP 

    D

    identify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources 


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    You are attempting to connect to your ISP. You view the status change from Dialing to Verifying user name and password. After several seconds, the status changes to Disconnecting. You are then disconnected from the computer you dialed. You verify that your user name and password are entered correctly. You want to enable your Computer to connect to your ISP correctly. What should you do? ()
    A

    Configure your connection to enable data encryption.

    B

    Configure your connection to use the UNIX SLIP server.

    C

    Configure your connection to allow unsecured passwords.

    D

    Instruct your ISP to configure your account to support Multilink.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You would like to configure your PC's IP  address of 10.10.0.156 as an FTP host with a username of user and a password of mypass.Which configuration command accomplishes this goal?()
    A

    host user pc 10.10.0.156 ftp user mypass

    B

    host user pc 10.10.0.156 tftp user mypass

    C

    host name user pc 10.10.0.156 ftp user mypass

    D

    host name user pc 10.10.0.156 tftp user mypass


    正确答案: D
    解析: 暂无解析