微软认证考试

Your company network includes 6,000 Windows 2000 Professional client computers and 35 Windows 2000 Server computers in a single domain. Your company has a print device that is used to print payroll checks. The print device is physically attached to the pa

题目

Your company network includes 6,000 Windows 2000 Professional client computers and 35 Windows 2000 Server computers in a single domain. Your company has a print device that is used to print payroll checks. The print device is physically attached to the parallel port of one of the client computers. This print device’s tray is loaded with checks at all times. You have shared this printer on the network as ChkPrinter and retained the default permissions. A payroll application runs on a server named HRserv. Every Wednesday at 5:00P.M, the application prints paychecks from employees on this printer. The payroll application runs as a Windows 2000 service on HRserv. You need to configure ChkPrinter so that only the payroll application will be able to use the printer. What should you do?()

  • A、Configure the share name for ChkPrinter to be ChkPrinter$. Configure the payroll applicationto print to this new share name.
  • B、Configure ChkPrinter so that it is available only from 5:00 P.M to 5:30 P.M
  • C、Configure ChkPrinter to allow the HRserv domain account print permissions for ChkPrinter. Remove print permissions for the Everyone group.
  • D、Configure ChkPrinter to allow all HRserv domain accounts Print permissions for ChkPrinter. Change the permissions to deny print on ChkPrinter for the Everyone group.
参考答案和解析
正确答案:C
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()

A.A

B.B

C.C

D.D


参考答案:C

第2题:

As an experienced technician, you are responsible for Technical Support in your company. You ask one of the trainees to document the layers of an existing CIS network. Which three statements best characterize this process? ()(Choose three.)

  • A、It provides reliable input for verifying network consistency.
  • B、It requires a network audit to support some upgrade decisions.
  • C、It requires a network audit to support any network restructuring.
  • D、It begins with gathering organizational input that may be inaccurate.

正确答案:A,C,D

第3题:

Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets.Which network mask should you use?()

A. /61

B. /62

C. /63

D. /64


参考答案:D

第4题:

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()

  • A、Configure the Network authentication (Shared mode) setting.
  • B、Apply a Wireless Network Policy to set the network type to WPA-PSK.
  • C、Apply a Wireless Network Policy to automatically connect to the company wireless network.
  • D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

正确答案:D

第5题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet. Which PIN architecture is applicable in those environments?()

  • A、Campus
  • B、Teleworker
  • C、Branch
  • D、Data center

正确答案:C

第6题:

You work as a network administrator in your company. Communication inside the company is ensured by network environments, such as GET VPN, Dynamic Multipoint VPN and Ethernet.Which PIN architecture is applicable in those environments?()

A.Campus

B.Teleworker

C.Branch

D.Data center


参考答案:C

第7题:

You work as a network technician at Company. Your boss, Mrs., is interested in  the Cisco Compatible Extensions program.  What are three features of this program? ()

  • A、 Accounting
  • B、 Analog and digital voice
  • C、 Mobility
  • D、 Security
  • E、 Routing and switching
  • F、 VLAN and QoS

正确答案:C,D,F

第8题:

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Your company policy requires that all unnecessary services be disabled on the computers. The Sales department staff has been provided with new mobile broadband adapters that use the Global System for Mobile Communications (GSM) technology. You need to ensure that portable computers can connect to the broadband GSM network. Which service should be enabled on the portable computers?()

A.WLAN AutoConfig

B.WWAN AutoConfig

C.Computer Browser

D.Portable Device Enumerator Service


参考答案:B

第9题:

You are the administrator of your company’s network. You run the English (US) edition of Windows 2000 Professional on all computers in your network. As your company continues to grow, and the number of computers is continually expanding, you decide that another domain is needed. Management asks you about what is required to accommodate this new domain. What should you answer the Management in this regard? ()

  • A、WINS, DHCP and DNS
  • B、At least one domain controller and one DNS server.
  • C、At least one domain controller, Active Directory and DNS server.
  • D、Nothing more is needed.
  • E、Nothing more is needed, we can just subnet the network.

正确答案:C

第10题:

.You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.the Company.com network contains a client access server named - ex05.during routine monitoring you discover that -ex05 has failed.you receive an instruction from the cio to install a new member server named -ex05 on the network as well as to recovering the client access server role on -ex05.What should you do?()

  • A、Your best option would be to run Setup /RecoverCMS from the Exchange Server installation source files.
  • B、your best option would be to have the inetpub folder as well as the system state restored from -ex05.
  • C、Your best option would be to run Setup /M:RecoverServer from the Exchange Server installation source files.
  • D、your best option would be to have the inetsrv folder as well as the system state restored from - ex05.

正确答案:C

更多相关问题