-
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail?()
A . Virus
B . Worm
C . Trojan
D . Executable
-
A customer has an IBM System Storage DS8100 with 128 DDMs and needs to add additional capacity. What must be verified by the Business Partner during the visit to the computer room()
A . the space for the upgrade to a DS8700
B . the space on the left of the DS8000 for an expansion frame
C . the space on the right of the DS8000 for an expansion frame
D . the space to install additional DDMs in the base frame
-
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()
A . Executable
B . Trojan
C . Virus
D . Worm
-
All client computers in your environment run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App-V). You need to reset the FileSystem cache on a client computer. What should you do?()
A . Use the AppVCacheSize tool to set the maximum cache size to 0.
B . Use the AppVCacheSize tool to set the minimum free disk space threshold to 0.
C . Set the HKLM\SOFTWARE\Microsoft\SoftGrid\4.5\Client\AppFS\State registry key to 0.
D . Set the HKLM\SOFTWARE\Microsoft\SoftGrid\4.5\Client\AppFS\FileSize registry key to 0.
-
You administer 80 computers that run Windows 7. The computers have static IP addresses. You need tochange the static IP addresses on all the computers by using a startup script. Which command should youinclude in the startup script ?()
A . Ipconfig.exe
B . Nbtstat.exe
C . Netstat.exe
D . Netsh.exe
-
You have a computer named Computer1 that runs Windows 7. You plan to migrate the user state on Computer1 by using User State Migration Tool (USMT) 4.0. You need to identify which user documents willbe included in the migration. What should you do?()
A . Run Usmtutils.exe and use the /ec option.
B . Run Sysprep.exe and use the /audit option.
C . Run Loadstate.exe and use the /v:12 option.
D . Run Scanstate.exe and use the /genmigxml option.
-
You need to connect to your computer by using the Remote Desktop Connection client. Which two actions should you perform?()
A . Enable Remote Desktop in the System Properties dialog box.
B . Enable Remote Assistance in the System Properties dialog box.
C . Enable the Remote Desktop exception in Microsoft Windows Firewall.
D . Enable the Remote Assistance exception in Microsoft Windows Firewall.
E . Enable the Remote Administration exception in Windows Firewall.
-
It will be safer to walk on the streets because people will not need to carry large amounts of cash; virtually all financial()will be conducted by computer.
A . transformations
B . transmissions
C . transitions
D . transactio
-
You have a computer that runs Windows XP Professional. You need to verify that all drivers installed on the computer are digitally signed by Microsoft. What should you do?()
A . Review the contents of the boot.ini file.
B . Review the contents of the setup.log file
C . At the command prompt, run sigverif.exe.
D . From the Device Manager snap-in, view resources by type.&e
-
You need to design desktop and security settings for the client computers in the Seattle call center. Your solution must be implemented by using the minimum amount of administrative effort.Which two actions should you perform?()
A . On each client computer in the call center, configure a local policy that lists only authorized programs in the Allowed Windows Programs list
B . Using NTFS permissions, assign the Deny – Read permission for all unauthorized executable files to the client computer domain accounts
C . Design a Group Policy object (GPO) that enforces a software restriction policy on all client computers in the call center
D . Design a Group Policy object (GPO) that implements an IPSec policy on all client computers in the call center. Ensure that the IPSec policy rejects connections to any Web servers that the company does not operate
-
You have a computer that runs Windows Vista. You install Windows 7 on a new partition on the computer.You need to ensure that the computer always starts Windows Vista by default. What should you do?()
A . Run Bcdedit.exe and specify the /default parameter.
B . Run Bcdedit.exe and specify the /bootems parameter.
C . Create a boot.ini file in the root of the Windows 7 partition.
D . Create a boot.ini file in the root of the Windows Vista partition.
-
You need to design the configuration for the kiosk computers. Your solution must be able to be implemented by using the minimum amount of administrative effort. What should you do?()
A . Configure the kiosk computers as computers that are not members of any domain.Use Local Computer Policy to configure the computers with the collection of settings in the Kiosk Desktop Specification
B . Install one kiosk computer as a model.Configure this computer with the collection of settings in the Kiosk Desktop Specification.Copy the content of the C:\Documents and Settings\Default Users folder from this model computer to all other kiosk computers
C . Create a system policy file named Ntconfig.pol and configure it with the collection of settings in the Kiosk Desktop Specification.Make the kiosk computers members of the Active Directory domain.Use a Group Policy object (GPO) to run a startup script that copies the Ntconfig.pol file to the System32 folder on each kiosk computer
D . Create a Group Policy object (GPO) and configure it with the collection of settings in the Kiosk Desktop Specification: Also include an appropriate software restriction policy.Make the kiosk computers members of the Active Directory domain, and place the computer account objects in a dedicated OU. Link the GPO to this OU
-
A customer’s new IBM System Storage DS8000 must be raised by two floors in the building to place it in the computer room. In order to simplify the physical delivery, the storage specialist asks for ()
A . a quotation for extra delivery services
B . the addition to the configuration of the feature "Shipping weight reduction" at no charge
C . an order of the DS8000 with the minimum number of drive sets allowed and an MES order for the remaining drive sets needed
D . an RPQ order to receive frames and drive sets separately
-
By connecting ____ to the personal computer and the CNC, the programmer can transfer programs from the computer to the CNC.
-
Several machine tools are directly controlled by a central computer, this is the _________.
-
A computer file is a collection of ( ) data, used to organize the shortage and processing of data by computer.
-
When examining the output from regression analysis, the goodness of fit measure is labeled ________ by most computer programs.
-
By using the satellite-aided global positioning system (GPS), a computer in the automobile
By using the satellite-aided global positioning system (GPS), a computer in the automobile can do the following EXCEPT ______ .
A.it can locate the vehicle within a few feet
B.it can show where the vehicle is relative to the destination the driver wants to reach
C.after being told the destination, the computer locates it and directs the driver to it
D.after being told the destination, the computer can offer the driver alternative routes if needed
-
She purchased a used computer for¥3500 on credit by making a ¥1500 cash down payment and obtaining two-month accounts payable for the remaining¥2000.
-
听力原文:M: I am sorry to inform. you that you have been replaced by a computer at the office.
W: I see. So a machine can be more capable than a man.
What do we learn from the conversation?
A.The woman will work together with a machine.
B.The machine has been replaced by a man.
C.The woman lost her job.
D.The woman was happy to work with a capable computer.
-
Which term means “the amount of money which a business obtains (in a year) from customers by selling goods or services”?
A、Annual income
B、operation profit
C、annual turnover
D、net profit
-
By citing the example of computer maker Hewlett-Packard, the author intends to show that
A.effort has been made by the digital industry to save energy.
B.virtualization could help the company to save energy.
C.HP has managed to consolidate 86 data centers to just three.
D.HP has employed software to create multiple "virtual" computers.
-
The "MyDoom" virus could presage a generation of computer attacks by organised gangs aiming to extract ransoms from online businesses, experts said yesterday.
The warning came as the website run by SCO, a company that sells Unix computer software, in effect disappeared from the web under a blizzard of automated attacks from PCs infected by the virus, which first appeared a week ago.
The "myDoom-A" version of the virus is reckoned to be the worst to have hit the internet, in terms of the speed of its spread, with millions of PCs worldwide believed to be infected. Such "zombie" machines begin to send out hundreds of copies of the virus every hour to almost any e-mail address in their files.
On Sunday they began sending automated queries to SCO's website, an attack that will continue until 12 February. The attack is the web equivalent of ringing the company's doorbell and running away a million times a second, leaving its computers unable to deal with standard requests to view its pages.
"You have to wonder about the time limit," said Graham Cluley, senior technology consultant at the antivirus company Sophos. "Someone could go to SCO after the 12th and say, 'If you don't want this to happen again, here are our demands'." Raimund Genes, European president of the security software firm Trend Micro, said: "Such a programme could take out any major website on the internet. It's not terrorism, but it is somebody who is obviously upset with SCO."
SCO has earned the enmity of computer users through a lawsuit it has filed against IBM. SCO claims ownership of computer code it says IBM put into the free operating system Linux, and is demanding licence fees and damages of $1bn.
Mr. Cluley said: "It might be that whoever is behind this will say to SCO, 'if you don't want the next one to target you, drop the lawsuit'." SCO has offered $250,000(£140,000) for information leading to the arrest of the person or people who wrote and distributed MyDoom.
Nell Barrett, of the security company Information Risk Management, said, "I would give a lot of credence to the idea of gangs using viruses to extort money. It's hard for law enforcement to track them down, because they're using machines owned by innocent people."
A second variant of MyDoom will start attacking part of Microsoft's website later today. The antivirus company MessageLabs said it had blocked more than 16 million copies of the virus in transit over the net so far. But millions more will have reached their targets.
The onset of a new generation of computer attacks was marked by ______.
A.an organization of gangs
B.the infection of PCs
C.the sale of a software
D.a website's vanishing
-
The speculatior raised by Pertti Peussa is based on a function of the in-car computer that prevents the car exceeding certain speeds when ________.