-
You have a print server that runs Windows Server 2003 Service Pack 2 (SP2). You need to receive a notification each time a document fails to print. What should you do? ()
A . From the Performance console, create an alert.
B . From the Event Viewer console, create a new filter.
C . From the Printer Server properties, modify the Advanced settings.
D . From the Services console, enable and configure the Messenger service.
-
You are creating a Windows Forms application by using the .NET Framework 3.5.You have resource files in five different languages.You need to test the application in each language. What should you do?()
A . Set the CurrentCulture property explicitly to the respective culture for each language.
B . Set the CurrentCulture property explicitly to IsNeutralCulture for each language.
C . Set the CurrentUICulture property explicitly to IsNeutralCulture for each language.
D . Set the CurrentUICulture property explicitly to the respective culture for each language.
-
You have a file server that runs Windows Server 2003 Service Pack 2 (SP2). You need to track the amount of disk space used by each user on the server. What should you do? ()
A . From Performance console, create a counter log.
B . From the properties of each volume, enable quotas.
C . From the Event Viewer console, create a new log view.
D . From the Local Security Policy, enable auditing for object access.
-
You have a file server that runs Windows Server 2008. You configure quotas on the server. You need to view each users quota usage on a per folder basis. What should you do?()
A . From File Server Resource Manager, create a File Screen
B . From File Server Resource Manager, create a Storage Management report.
C . From the command prompt, run dirquota.exe quota list.
D . From the properties of each volume, review the Quota Entries list.
-
To ensure the safe operation of each ship and to provide a link between the Company and those on board, every Company, as appropriate, should designate a person or persons ashore having direct () to the highest level of management.
A . space
B . distance
C . visibility
D . acce
-
You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to ensure that a defragmentation of the server’s hard disk drive runs each night.What should you do? ()
A . Create a scheduled task that runs Dfrg.msc.
B . Create a scheduled task that runs Defrag.exe.
C . From Computer Management, run Disk Management.
D . From Computer Management, run Disk Defragmenter.
-
You have a file server that runs Windows Server 2008 R2.You configure quotas on the server.You need to view each user¯s quota usage on a per folder basis What should you do?()
A . From File Server Resource Manager, create a File Screen.
B . From File Server Resource Manager, create a Storage Management report.
C . From the command prompt, run dirquota.exe quota list.
D . From the properties of each volume, review the Quota Entries list.
-
You have a file server that runs Windows Server 2008 R2.You configure quotas on the server.You need to view each users quota usage on a per folder basis.What should you do?()
A . From File Server Resource Manager, create a File Screen.
B . From File Server Resource Manager, create a Storage Management report.
C . From the command prompt, run dirquota.exe quota list.
D . From the properties of each volume, review the Quota Entries list.
-
You are designing a strategy to ensure that all employees have Internet access. For each branch office, what should you do?()
A . Configure a DNS server to function as caching-only servers.
B . Configure Internet Connection sharing on terminal servers.
C . Install and configure an Internet Security and Acceleration (ISA) Server Computer.
D . Install and configure a server running Routing and Remote Acess to function as a VPN server.
-
An administrator wants to have the flexibility to dynamically move a fibre channel PCI card between given LPARs. For each given LPAR how should they add the PCI card to the LPAR profile?()
A . Add the fibre channel card as hared?Add the fibre channel card as ?hared?
B . Add the fibre channel card as irtual?Add the fibre channel card as ?irtual?
C . Add the fibre channel card as esired?Add the fibre channel card as ?esired?
D . Add the fibre channel card as equired?Add the fibre channel card as ?equired?
-
Your network contains an Active Directory domain. The domain contains 1000 user accounts. You have a list that contains the mobile phone number of each user You need to add the mobile number of each user to Active Directory. What should you do()
A . Create a file that contains the mobile phone numbers, and then run ldifde.exe
B . Create a fila that contains the mobile phone numbers, and then run csvde.exe
C . From Adsiedit, select the CN=Users container, and then mofify the properties of the container.
D . From Active Directory Users and Computers, select all of the users, and then modify the properties of the users.
-
You have a computer that runs Windows 7. The computer is joined to a domain. You need to ensure thatonly approved USB drives can be used on the computer. Which two policy settings should you configure?(Each correct answer presents part of the solution.()
A . Enable Prevent installation of removable devices.
B . Enable Prevent installation of devices not described by other policy settings.
C . Enable Prevent installation of devices that match any of these device IDs and enter the device ID for theapproved USB drives.
D . Enable Allow installation of devices that match any of these device IDs and enter the device ID for theapproved USB drives.
-
You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing ona folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do?()
A . Start the Problem Steps Recorder.
B . From Event Viewer, modify the properties of the Security log.
C . From the local Group Policy, configure the Audit object access setting.
D . From the local Group Policy, configure the Audit directory service Access setting.
-
You are creating a Windows Forms application by using the .NET Framework 3.5. You have resource files in five different languages. You need to test the application in each language. What should you do?()
A . Set the CurrentCulture property explicitly to the respective culture for each language.
B . Set the CurrentCulture property explicitly to IsNeutralCulture for each language.
C . Set the CurrentUICulture property explicitly to IsNeutralCulture for each language.
D . Set the CurrentUICulture property explicitly to the respective culture for each language.
-
An administrator wants to have the flexibility to dynamically move a fibre channel PCI card between given LPARs. For each given LPAR how should they add the PCI card to the LPAR profile?()
A . Add the fibre channel card as hared?Add the fibre channel card as ?hared?
B . Add the fibre channel card as irtual?Add the fibre channel card as ?irtual?
C . Add the fibre channel card as esired?Add the fibre channel card as ?esired?
D . Add the fibre channel card as equired?Add the fibre channel card as ?equired?
-
Each journal and pin should be examined for () and grooving.
A . bridges
B . recesses
C . rears
D . ridging
-
You have a Web server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 hosts 100 Web sites. Each Web site uses a different application pool. You need to limit the network bandwidth for one of the Web sites. What should you do? ()
A . From Internet Information Services (IIS) Manager, modify the properties of the Web site.
B . From the Properties of the Local Area Connection, install QoS Packet Scheduler. From the Local Security Policy, configure the QoS Packet Scheduler settings.
C . From the Local Security Policy, enable auditing for Object Access. From the System Properties, modify the Performance settings.
D . From the Properties of the Local Area Connection, enable and configure Network Load Balancing.
-
“Dominant over Nature” leads to the “____________”, which proposes that all people should have______ rights, and each should have complete control over one’s own destiny.
-
“Dominant over Nature” leads to the “____________”, which proposes that all people should have______ rights, and each should have complete control over one’s own destiny.
-
Each time you mention a cause or effect in the body part, you should view it as a subtopic, and back it up with the best of the details you have generated.
-
If the benefits provided under a certain policy have a dollar limitation for each service, you should determine whether these limitations are realistic.
-
听力原文:M: Thomas is always late when we have a meeting. Maybe one of us should give him a ring each time.
W: That's really annoying. But I'll volunteer.
Q: What will the woman probably do?
(2)
A.Meet Thomas.
B.Follow Thomas.
C.Annoy Thomas.
D.Call Thomas.
-
In computing, passwords are commonly used to limit access to official users. Yet the widespread use of passwords has serious drawbacks. Office workers now have to remember an average of twelve system passwords. In theory they should use different passwords for each site, but in reality these would be impossible to remember, so many people use the same password for all.
An additional problem is that the majority use simple words such as "hello", or names of family members, instead of more secure combinations of numbers and letters, such as 6ANV76Y. This permits computer hackers to download dictionaries and quickly find the word that allows them access.
When system users forget their passwords there is extra expense in supplying new ones, while if people are forced to change passwords frequently they often write them down, making systems even less secure. Therefore, it is clear that the idea of passwords, which have been used as security devices for thousands of years, may need rethinking.
One possible alternative has been developed by the American firm Real User, and is called "passfaces". In order to access the system a worker has to select a series of photographs of faces from a randomly (随机地) generated sequence. If the pictures are selected in the correct order, access is granted. This concept depends on the human ability to recognize and remember a huge number of different faces, and the advantage is that such a sequence cannot be told to anyone or written down, so is more secure. It is claimed that the picture sequence, which used photographs of university students, is easier to remember than passwords, and it has now been adopted for the United States Senate.
What is the disadvantage of passwords as mentioned in Paragraph 1?
A.They do not ensure security.
B.They are difficult to remember.
C.They have to be changed frequently.
D.They limit computer accessibility.
-
If we were asked exactly what we were doing a year ago,we should probably have to say that we could not remember. But if we had kept a book and had written in it an account of what we did each day, we should be able to give an answer to the question.
It is the same in history. Many things have been forgotten because we do not have any written account of them. Sometimes men did keep a record of the most important happenings in their country,but often it was destroyed by fire or in a war. Sometimes there was never any written record at all because the people of that time and place did not know how to write. For example, we know a good deal about the people who lived in China 4, 000 years ago, because they could write and leave written records for those who lived after them. But we know almost nothing about the people who lived even 200 years ago in central Africa because they had not learned to write.
Sometimes, of course, even if the people cannot write, they may know something of the past. They have heard about it from older people and often songs and dances and stories have been made about the most important happenings, and these have been sung and acted and told for many generations, for most people are proud to tell what their fathers did in the past. This we may call ?remembered history ” . Some of it has now been written down. It is not so exact or so valuable to us as written history is, because words are much more easily changed when used again and again in speech than when copied in writing. But if there are no written records, such spoken stories are often very helpful.
Which of the following is NOT suggested in the passage?
A.Written history is more reliable.
B.Written records play an important role in learning about history.
C.A written account of our daily activities helps to answer many questions.
D.Where there are no written records, there is no history.
Little is known about the central Africa 200 years ago because ______.A.there was nothing worth writing down at that time
B.people there ignored the importance of keeping a record
C.people there did not know how to write
D.the written records were perhaps destroyed by a fire
“ Remembered history” refers to ______.A.history based on a person’s imagination
B.stories of important happenings passed down from mouth to mouth
C.songs and dances about the most important events.
D.both B and C
“ Remembered history” is regarded as valuable only when ______.A.it is written down
B.No written account is available
C.it proves to be timely
D.People are interested in it
It is suggested that we could have learned more about our past if ancient people had ______.A.kept a written record of every past event
B.burnt their written records in wars
C.told exact stories of the most important happenings
D.made more songs and dances
请帮忙给出每个问题的正确答案和分析,谢谢!