单选题You are the network administrator for your company. An employee named Bruno uses a Windows 2000 Professional portable computer. When he starts the computer, Windows 2000 prompts him to select either a docked or an undocked mode. Bruno primarily works o

题目
单选题
You are the network administrator for your company. An employee named Bruno uses a Windows 2000 Professional portable computer. When he starts the computer, Windows 2000 prompts him to select either a docked or an undocked mode. Bruno primarily works out of the office and does not use a docking station. What should you do?()
A

 Modify the portable computer’s BIOS settings, and disable support for the docking station

B

 Modify the portable computer’s hardware profiles, to remove the Docked hardware profile

C

 Modify the portable computer’s device settings to disable the Unplug devices icon in the  system tray. 

D

 Modify the portable computer’s hardware profiles, and move the Docked hardware profile to  the top of the list of hardware profiles. 


相似考题
更多“You are the network administrator for your company. An emplo”相关问题
  • 第1题:

    You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.

    You want to upgrade all of the critical system files and patches on the server in the shortest possible time.

    What should you do?

    A.Use Windows Update.

    B.Run System File Checker.

    C.Log on as administrator and run Windows Update.

    D.Log on as administrator and run System File Checker.


    正确答案:C
    解析:Explanation:WindowsUpdateisusedtoupgradethesystemfilesandtoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.AllnecessaryfilesaredownloadedthroughtheInternet.TobeabletorunWindowsUpdatewemusthaveadministrativerights.Incorrectanswers:A:Thenon-administrativeuseraccountcannotbeusedtorunWindowsUpdate.TorunWindowsUpdatewemusthaveadministrativerights.B:SystemFileCheckercheckstheintegrityofthesystemfiles.Itcannotbeusedtoupgradethesystemfilesortoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.D:SystemFileCheckercheckstheintegrityofthesystemfiles.Itcannotbeusedtoupgradethesystemfilesortoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.

  • 第2题:

    You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()

    A.Campus

    B.Teleworker

    C.Branch

    D.Data center


    参考答案:C

  • 第3题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. The domain contains a Windows Server 2003 computer named Server1.   You are planning a public key infrastructure (PKI) for the company. You want to deploy a certification authority (CA) on Server1.   You create a new global security group named Cert Administrators. You need to delegate the tasks to issue, approve, and revoke certificates to members of the Cert Administrators group.   What should you do?()

    • A、 Add the Cert Administrators group to the Cert Publishers group in the domain.
    • B、 Configure the Certificates Templates container in the Active Directory configuration naming context to assign the Cert Administrators group the Allow - Write permission.
    • C、 Configure the CertSrv virtual directory on Server1 to assign the Cert Administrators group the Allow - Modify permission.
    • D、 Assign the Certificate Managers role to the Cert Administrators group.

    正确答案:D

  • 第4题:

    You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

    • A、Campus
    • B、Teleworker
    • C、Branch
    • D、Data center

    正确答案:C

  • 第5题:

    You are the network administrator for Company. Company has recently upgraded its network to a 100Mbps standard and you are now in the process of removing all the old adapter and installing a new Token Ring network adapter into the Windows 2000 Professional computer. On the first computer you install the new hardware and configure the static TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart the computer, however, you cannot access the network. You try to ping your network adapter's TCP/IP address locally. You receive the following error message: "Request timed out." You want to enable the computer to communicate on the new network. What should you do? ()

    • A、Enable DHCP in the TCP/IP properties.
    • B、Replace the Token Ring network adapter with an Ethernet network adapter.
    • C、Configure a different TCP/IP address on the same subnet.
    • D、Configure a valid DNS Server in the TCP/IP properties.

    正确答案:B

  • 第6题:

    You are the network administrator for your company. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. A total of three servers are configured as domain controllers. You need to restore a failed domain controller named DC3. The last backup for any domain controller on the network occurred one week ago. First, you reinstall Windows Server 2003 on DC3. What should you do next?()

    • A、Start DC3 and select Directory Services Restore Mode. Perform a nonauthoriative restoration.
    • B、Start DC3 and select the Recovery Console. Perform a nonauthoriative restoration.
    • C、Run Ntbackup.exe on DC3 to restore the System State data.
    • D、Run the Active Directory Installation Wizard on DC3.

    正确答案:D

  • 第7题:

    You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()

    • A、Configure a WMI event trigger.
    • B、Configure a Network Monitor capture filter.
    • C、Configure a Network Monitor trigger.
    • D、Configure a System Monitor alert.

    正确答案:C

  • 第8题:

    You are a network administrator for your company. You currently automate backups of the System State data on the servers in your network by using NTBackup. Your manager instructs you to document the procedure for restoring a server from a backup of the System State data.You need to select the correct method for performing a restoration of a backup of the System State data.What should you do?()

    • A、Run the following command: ntbackup.exe backup /F {"FileName"}
    • B、Run the following command: ntbackup.exe backup systemstate /F {"FileName"}
    • C、In Control Panel, open System, and configure the Startup and Recovery settings on the Advanced tab.
    • D、Use NTBackup interactively.

    正确答案:D

  • 第9题:

    单选题
    You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()
    A

    Enable the Require domain controller to unlock policy.

    B

    Set the Number of previous logons to cache policy to 0.  

    C

    Remove all user and group accounts from the Log on locally user right. 

    D

    Remove all user and group accounts from the Access this computer from the network user right. 


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()
    A

    msi

    B

    mst

    C

    zap

    D

    zip


    正确答案: B
    解析: 暂无解析

  • 第11题:

    多选题
    You work as a network technician at Company. Your boss, Mrs., is interested in  the Cisco Compatible Extensions program.  What are three features of this program? ()
    A

    Accounting

    B

    Analog and digital voice

    C

    Mobility

    D

    Security

    E

    Routing and switching

    F

    VLAN and QoS


    正确答案: B,A
    解析: 暂无解析

  • 第12题:

    单选题
    You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()
    A

    Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.

    B

    Log on by using your Administrator account and run the ntbackup /D command.

    C

    Log on by using your Administrator account and run the schtasks /delete command.

    D

    Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You are a network administrator for Ezonexam.com's Windows 2000 network.

    Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

    Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

    What should you do?

    A.Use System File Checker (SFC) to decrypt the file.

    B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

    C.Log on the network as the administrator. Use the cipher command to decrypt the files.

    D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


    正确答案:B
    解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

    Incorrect answers:
    A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

    C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

    D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

  • 第14题:

    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()

    • A、STP
    • B、GVRP
    • C、SNMP
    • D、VTP
    • E、DHCP

    正确答案:D

  • 第15题:

    You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()

    • A、Repeater
    • B、Wireless router
    • C、Hub
    • D、Wireless network adapter

    正确答案:D

  • 第16题:

    You are the network administrator for ExamSheet.net.  You install Windows 2000 Professional on your portable computer. You use a docking station for your portable computer when you are in the office. You install a ISA-based network adapter in your docking station. You insert your computer into the docking station and start the computer. The network adapter is not detected during the startup process. You obtain a disk that contains the supported driver from the network adapter manufacturer. You want to allow Windows 2000 Professional to use the network adapter. What should you do?()

    • A、Restart the computer in the docking station.
    • B、Run the Add/Remove Hardware wizard.
    • C、Use Device Manager to scan for hardware changes.
    • D、Copy the network adapter driver to the Winnt/Driver Cache/i386 folder.
    • E、Install the new network adapter driver.

    正确答案:B,E

  • 第17题:

    You are a network administrator for ExamSheet.net's Windows 2000 network.  Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully.  What should you do? ()

    • A、Start the Remote Procedure Call (RPC) Locater service and configure the service to start automatically.
    • B、Start the RunAs service and configure the service to start automatically.
    • C、Configure the Task Scheduler service account to use the local Administrator account and password. Restart the service.
    • D、Use Scheduled Tasks to configure the task to run under the security context of your account.

    正确答案:D

  • 第18题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()

    • A、 Monitor the performance monitor counters on the application server by using System Monitor.  
    • B、 Monitor the network traffic on the application server by using Network Monitor.
    • C、 Monitor network statistics on the application server by using Task Manager.
    • D、 Run network diagnostics on the application server by using Network Diagnostics.

    正确答案:B

  • 第19题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. You need to update six high-visibility servers with critical updates by using Windows Server Update Services (WSUS). You approve all of the updates.You need to ensure that the updates are applied within one hour.  What should you do?()

    • A、On the WSUS server, type the gpupdate /force command at the command prompt.
    • B、On the WSUS server, type the wuauclt /detectnow command at the command prompt.
    • C、On each of the six servers, type the gpupdate /force command at the command prompt.
    • D、On each of the six servers, type the wuauclt /detectnow command at the command prompt.

    正确答案:D

  • 第20题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()
    A

    Automated System Recovery (ASR)

    B

    normal

    C

    primary

    D

    authoritative


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()
    A

    STP

    B

    GVRP

    C

    SNMP

    D

    VTP

    E

    DHCP


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You are the administrator of your company’s network. Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers. Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled.   A user named John leaves the company. You move all of the files from John’s home folder to his manager’s folder. When the manager attempts to open any of the files, she receives the following error message. “Access denied.”   You want the manager to be able to access the files. What should you do?()
    A

    Grant the manager NTFS Full Control permission to the files.

    B

    Grant the manager NTFS Take Ownership permission to the files.

    C

    Log on to the network as a recovery Agent.  Decrypt the files for the manager.

    D

    Log on to the network as a member of the Backup Operators group. Decrypt the files for the manager.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()
    A

    Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.

    B

    Log on by using your Administrator account and run the ntbackup /D command.

    C

    Log on by using your Administrator account and run the schtasks /delete command.

    D

    Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()
    A

    Automated System Recovery (ASR)

    B

    normal

    C

    primary

    D

    authoritative


    正确答案: C
    解析: 暂无解析