You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()
A. Run the Secedit.exe command in validation mode and specify the new security template.
B. Run the Secedit.exe command in configuration mode and specify the new security template.
C. Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation.
D. Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation.
查看答案
You have an Exchange Server 2010 organization.You need to ensure that a user can open a resource mailbox.What are two possible ways to achieve this goal?()
A. From Microsoft Office Outlook, modify the properties of the resource mailbox.
B. From the Exchange Management Console, create a new sharing policy.
C. From the Exchange Management Shell, set the Resource Delegates parameter for the resource mailbox.
D. From the Active Directory Users and Computers console, reset the password for the account associated to the resource mailbox, and then provide the password to the user.
You are a system administrator at Company. The network includes 100 Windows 2000 Professional computers. A user named Peter wants to share a local printing device directly connected to his computer. Peter needs to share this device among three groups: Engineering, Accounting, and Operations. Peter wants to delegate printer administration to one print administrator from each group. Each print administrator must be able to delete print jobs generated by their own group on the print device. They should not be able to delete print jobs from other groups. You want to configure Peter’s client computer to support these requirements. What should you do? ()
A. Create a single shared printer to be used by all three groups.Allow each print administrator Manage Documents permission.
B. Create a separate shared printer for each group. For each shared printer, allow the respective print administrator Manage Documents permission.
Create a single shared printer to be used by all three groups. Add the print administrator’s user account from each group to the Power Users group on Peter’s client computer.
D. Create a separate shared printer for each group. Add the print administrator’s user account from each group to the Power Users group on Peter’s client computer.
You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()
A. Enable the Require domain controller to unlock policy.
B. Set the Number of previous logons to cache policy to 0.
C. Remove all user and group accounts from the Log on locally user right.
D. Remove all user and group accounts from the Access this computer from the network user right.
Certkiller.com has hired you as a system administrator for their network. You make use of .NETFramework v3.5 in order to create a Microsoft ASP.NET application. You decide to create a Web form. You add the subsequent code fragment to the Web form. ’ /> The DataSource control named CKDataSource recovers the Quantity column values from a tablenamed Orders. You the create the rptData_ItemDataBound event handler using the subsequentcode fragment. (The line numbers is included for reference purposes) 1 protected void rept_b(object sender, RepeaterItemEventArgs e) 2 { 3 4 if(CKLbl != null) 5 if(int.Parse(CKLbl.Text)
A. Your best option would be to insert Label CKLbl = e.Item.FindControl("lblQty") as Label at line4.
B. Your best option would be to insert Label CKLbl = Page.FindControl("lblQty") as Label at line 4.
C. Your best option would be to insert Label CKLbl = rptData.FindControl("lblQty") as Label at line4.
D. Your best option would be to insert Label CKLbl = e.Item.Parent.FindControl("lblQty") as Labelat line 4