题目
A.打开一个文件,不管文件在不在
B.打开文件并写入
C.在桌面上打开一个文件(路径得看个人具体情况),w的意思是,如果有则在文件里写入helloworld,如果没有则创建一个文件。
D.打开文件,没有报错
第1题
A. Use Computer Management to view existing connections.
B. Use the netsend command to send a message to all domain members.
C. Use Task Manager to monitor processes started by all users.
D. Use System Monitor to monitor the Server object in Report view.
第2题
A.2,4,3
B.1,4,3,2
C.2,5,4,3,6
D.5,2,4,3,6
E.1,5,4,3,6,2
第3题
A. The database will open, and the tablespace automatically comes out of the backup mode
B. The database will be mounted, and recovery must be performed on the USERS tablespace.
C. The database will be mounted, and data files in the USERS tablespace must be taken out of the backup mode.
D. The database will not be mounted, and you must restore all the data files for the USERS tablespace from the backup, and perform recovery.
第4题
You want to prevent all users from browsing the network.
What should you do? (Each correct answer presents a complete solution. Choose two.)
A.Create a Windows Group Policy that denies user access to My Network Places.
B.Copy the Windows NT policy file to the 20 Windows NT Workstation 4.0 computers.
C.Create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator.
D.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the terminal server.
E.Configure the terminal server to use Application server mode. Select the Permissions compatible with Terminal Server 4.0 Users option.
第5题
A. Copy the previous version of TestKingDocs to a separate location.
B. Restore the previous version of TestKingDocs to the default location.
C. Save Financials.xls in a separate location by using Microsoft Excel.
D. In the security properties of Financials.xls, assign the Allow - Modify permissions to the Everyone group.
第6题
You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.
You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.
What should you do?
A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.
B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.
C.Create a Windows 2000 Group Policy that denies user access to My Network Places.
D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.
第7题
You are a network administrator for Ezonexam.com's Windows 2000 network.
Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.
Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."
What should you do?
A.Use System File Checker (SFC) to decrypt the file.
B.Log on the network as the Recovery Agent. Decrypt the files for the manager.
C.Log on the network as the administrator. Use the cipher command to decrypt the files.
D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.
第8题
You want the manager to be able to access the files.
What should do? (Each correct answer presents a complete solution. Choose two.)
A.Move the files from Sandra's folder to the manager's folder.
B.Grant the manager NTFSFull Controlpermission to the files.
C.Run theciphercommand to create a new file encryption key for the manager.
D.Run theciphercommand to generate an EFS recovery agent key and certificate.
E.Grant the manager NTFSList Folder Contentspermissions to the folder containing Sandra's files.
第9题
A. Open Active Directory Users and Computers, and then delete the existing HRServices domain local group. Create a new domain local group named DL_HRServices. Add the G_HRUsers group to the DL_HRServices group. Assign the DL_HRServices group the Allow - Full Control permission for the HRFiles shared folder.
B. Open the Active Directory Users and Computers, and then change the name of the HRservices group to DL_HRServices.
C. Run the following command: dsadd group CN=DL_HRServices,CN=Users,DC=testking.com,DC=com - member CN=G_HRUsers,CN=Users,DC=testking,DC=com
D. Run the following command: dsmove CN=HRServices,CN=Users,DC=testking,DC=com -newname DL_HRServices
第10题
In Recovery Manager (RMAN), you are taking image copies of the datafiles of your production database and rolling them forward as regular intervals. You attempt to restart your database instance after a regular maintenance task, you realize that one of the data files that belongs to the USERS tablespace is damaged and you need to recover the datafile by using the image copy. You could perform the following steps to accomplish this:1) Mount the database2) Take the data file offline3) Bring the data file online4) Use the RMAN SWITCH TO command to switch the image copy5) Apply the archived redo logs6) Open the database7) Use the RMAN RESTORE TO command to switch to the image copyWhich two options illustrate the correct sequence of steps that you could follow?() (Choose two.)
A. 2, 6, 4, 5, 3
B. 1, 2, 4, 5, 3, 6
C. 1, 2, 4, 6, 3
D. 1, 2, 7, 5, 3, 6
第11题
User programs interact with the kernel through a set of standard(71). They request services to be provided by the kernel. Such services would include accessing a file: open close, read, write, link, or execute a file; starting or(72)accounting records; changing ownership of a file or(73); changing to a new directory; creating,(74), or killing a process; enabling access to hardware devices; and setting limits on system resources. Unix is a multi -user, multi -tasking operating system. You can have many users logged into a system simultaneously, each running many programs. It's the kernel's job to keep each process and user separate and to regulate access to(75), including cpu, memory, disk and other L/O devices.
A.system commands
B.system transfer
C.system calls
D.system rings
为了保护您的账号安全,请在“赏学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!