Funny Computer Users
High-tech and Low-tech
Computers and Helpline Users
A Qualified Computer User
第1题:
Your network has a single domain with 1,000 client computers that run Windows Vista. You are planning a deployment of Windows 7. Your company has multiple departments. Only the sales department will use the existing target computers to run Windows 7. You have the following requirements:Migrate the user state for each user. Preserve the file system and existing applications for only the sales department computers. You need to recommend the deployment method that is appropriate for the environment. Which combination of deployment scenarios should you recommend?()
第2题:
You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()
第3题:
You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:/User1. The user leaves the company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?()
第4题:
The Dark Side of Computer Games
Computer Games—Advantages and Disadvantages
The Development of Violent Computer Games
A Study on the Influence of Computer Games
第5题:
Enable all user accounts.
Modify the default password policy.
Modify the Allow log on locally user right.
Add User1 and User2 to the local Administrators group.
第6题:
The Main Experts of America
The Computer TakeBack Campaign
The Harm of E-waste Treatment
Electric Waste-a Global Problem
第7题:
Instruct Marie to run the ipconfig /flushdns command on her new computer and to add the new computer to the domain by using the same computer name as her failed computer.
Assign Marie permissions for adding computer accounts to the default container named Computers. Instruct Marie to add her new computer to the domain.
Reset the computer account for Marie's failed computer. Instruct Marie to add her new computer to the domain by using the same name as her failed computer.
Configure the IP address of Marie's new computer to be the same as the failed computer. Instruct Marie to add the new computer to the domain.
第8题:
Use Computer Management to configure separate memory spaces for each financial application on Helena’s Computer.
Use Security Templates to edit the Security Policy to include the financial applications on Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.
Use Security Configuration and Analysis to reconfigure the default security policy .inf file to allow the finance applications to run on Helena’s Computer.
Use secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to loose the permission for the Local User group on Helena’s Computer.
第9题:
Dsquery user -name User1
Dsquery computer -name Computer1
Gpresult /s Computer1 /scope COMPUTER /v
Gpresult /user User1 /scope USER /v
第10题:
Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:/user1/*.*.
Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted files.
Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties of the encrypted files.
Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery agent account and modify the properties of the encrypted files.
第11题:
Funny Computer Users.
High-tech and Low-tech.
Computers and Helpline Users.
A Qualified Computer User.
第12题:
The Evolution of Insects.
Environment and Heredity.
Education: The Influence of the Environment.
The Instincts of Animals.
第13题:
You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()
第14题:
You are the network administrator for . The network consists of a single Active Directory domain named . All client computers run Windows XP Professional. The finance deparment uses a specific naming process to audit users and their computers. The process requires that each user's client computer has an account in Active Directory and that each client computer name corresponds to a specific user account. A user name Marie is a member of only the Domain Users security group. She reports that the hardware on her computer fails. She receives a new computer. You need to add Marie's new computer to the domain. You need to comply with the finance department naming process. What should you do?()
第15题:
Privacy on data files
Heated attacks on the computer
Privacy issue caused by computer
Privacy has been long neglected
第16题:
Run the netdom TRUST /reset command.
Run the netsh command with the set and machine options.
Run the Active Directory Users and Computers console to disable, and then enable the computer account.
Reset the computer account. Disjoin the computer from the domain, and then rejoin the computer to the domain.
第17题:
Progress in the Field of Study
Teachers’ Role in Study
How to Improve Students’ Ability
Bad Points of the Examination System
第18题:
The computers account was removed from Active Directory.
The users account was removed from Active Directory.
The computer was disjoined from the domain.
The user typed in the wrong password.
第19题:
Configure each computer to join a workgroup. Create a user account and a local profile for each user.
Configure each computer to join a workgroup. Create a domain user account that uses roaming user profiles.
Configure each computer to join the domain. Create a user account for each user on a domain controller.
Configure each computer to join the domain. Create domain user accounts that use roaming user profiles.
第20题:
Use the Refresh Computer method for the sales department computers. Use the New Computer method for all other computers.
Use the Refresh Computer method for the sales department computers. Use the Replace Computer method for all other computers.
Use the Upgrade Computer method for the sales department computers. Use the Refresh Computer method for all other computers.
Use the Upgrade Computer method for the sales department computers. Use the Replace Computer method for all other computers.
第21题:
Create an account for Peter's computer in the Computers container.
Grant the Log on locally user right to Peter's user account.
Enable Peter's user account.
Change the properties of Peter's user account so he can log on to any computer.
第22题:
第23题:
On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer.
On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer.
In the domain, modify Marc's Logon Workstations list to include the name of the computer.
In the domain, modify Marc's account properties to unlock the account.