单选题Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A AdministratorB UserC GuestD Power user

题目
单选题
Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()
A

Administrator

B

User

C

Guest

D

Power user


相似考题
更多“单选题Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()A AdministratorB UserC GuestD Power user”相关问题
  • 第1题:

    A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()

    • A、An IEEE-1394 device
    • B、A NIC device
    • C、An IrDA device
    • D、A FDD device

    正确答案:A

  • 第2题:

    You are the network administrator for ExamSheet inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrator group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary.  Eric wants to prevent Julia from changing the permissions on file that Eric creates. To accomplish his goal, Eric creates a folder named C:/Data. He changes the NTFS permission on C:/Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions.  Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:/Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:/Data.  What should you instruct Eric to do?()

    • A、Add Julia’s user account to the local Power Users group.
    • B、Add Julia’s user account to the local Administrators group.
    • C、Allow Julia’s user account Write permissions to C:///Data.
    • D、Allow Julia’s user account Full Control permission to C:///Data.

    正确答案:C

  • 第3题:

    A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()

    • A、Modify
    • B、Full control
    • C、Write
    • D、Read

    正确答案:D

  • 第4题:

    Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()

    • A、Administrator
    • B、User
    • C、Guest
    • D、Power user

    正确答案:B

  • 第5题:

    After moving files from one folder to another, the technician cannot access them. Which of the following MUST the technician do to regain access to these files?()

    • A、In folder options, select show hidden files and folders.
    • B、Perform the transfer again.
    • C、Reboot the system; access will be reset automatically.
    • D、Take ownership of the files.

    正确答案:D

  • 第6题:

    You are the network administrator for ExamSheet and you support the portable computer users. An Account Executive named Hildegard frequently travels to meet with customers and uses her portable computer to demonstrate the company’s new software products.  Hildegard needs to update these products frequently so customers can evaluate the latest software releases. You need to allow Hildegard to install the product updates while limiting her ability to perform other administrative duties on her portable computer. What should you do?()

    • A、Add Hildegard’s user accounts to the Pre-Windows 2000 Compatible Access  group. 
    • B、Add Hildegard’s user account to the local Power Users group. 
    • C、Allow Hildegard’s user account Full Control permission to the Program Files  folder.  Propagate the permissions to all the subdirectories and files in that directory. 
    • D、Allow Hildegard’s user account Write permissions to the Program Files folder.  Propagate the permissions to all the subdirectories and files in that directory. 

    正确答案:B

  • 第7题:

    A user named Tom reports that an application on his Windows 2000 Professional computer is running slowly. You notice Tom’s computer has 64 MB of RAM and 100 MB of free disk space. What should you do to improve the performance of his system? ()

    • A、Add Tom to the Power user group.
    • B、Set the total paging file to 75 % of physical memory.
    • C、Perform a disk analysis and use the disk defragmenter if recommended.
    • D、Use Disk cleanup to delete temporary files and unnecessary program files.
    • E、Ensure that the Performance Options windows is optimized for background services.

    正确答案:C,D

  • 第8题:

    单选题
    Which of the following BEST describes the purpose of user account control (UAC) in WindowsVista?()
    A

    UAC ensures that standard users cannot access the files and folders of administrative users.

    B

    UAC allows a computer administrator to add new user accounts to the system, configure passwords and settings for existing users, or remove existing user accounts.

    C

    UAC ensures that viruses and other malware cannot infect the computer, eliminating the need for third-party antivirus solutions.

    D

    UAC ensures that important changes cannot be made to Windows Vista without the permission of a computer administrator.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()
    A

     Enable audit object access and specify files and folders to monitor using Task Manager.

    B

     Enable audit policy change and specify files and folders to monitor using Windows Explorer.

    C

     Enable audit object access and specify files and folders to monitor using Windows Explorer.

    D

     Open Performance Monitor and monitor folder activity.


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    You are the network administrator for Company and you support the portable computer users. An Account Executive named Hildegard frequently travels to meet with customers and uses her portable computer to demonstrate the company’s new software products.  Hildegard needs to update these products frequently so customers can evaluate the latest software releases. You need to allow Hildegard to install the product updates while limiting her ability to perform  ther administrative duties on her portable computer.  What should you do? ()
    A

     Add Hildegard’s user accounts to the Pre-Windows 2000 Compatible Access group.

    B

     Add Hildegard’s user account to the local Power Users group.

    C

     Allow Hildegard’s user account Full Control permission to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.

    D

     Allow Hildegard’s user account Write permissions to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.


    正确答案: A
    解析: As a member of the local Power Users group, Hildegard would be able to install and update applications. 

  • 第11题:

    单选题
    A system administrator has disabled USB ports after experiencing several virus outbreaks. A user needs to transfer several extremely large work related files from their home desktop computer to their work desktop computer. Which of the following will allow the user to transfer the needed files?()
    A

    An IEEE-1394 device

    B

    A NIC device

    C

    An IrDA device

    D

    A FDD device


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()
    A

    Add the list of files to /etc/exclude.rootvg.

    B

    Modify the image.data file and add the files to be excluded form the backup.

    C

    Modify the bosinst.data file and specify which files are to be excluded from the backup.

    D

    Specify the files to be excluded on the command line when executing the mksysb command.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()

    • A、system /v
    • B、winnt /s
    • C、sfc /scannow
    • D、chkdsk /f

    正确答案:C

  • 第14题:

    A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files.  Which of the following actions should the administrator perform?()

    • A、 Enable audit object access and specify files and folders to monitor using Task Manager.
    • B、 Enable audit policy change and specify files and folders to monitor using Windows Explorer.
    • C、 Enable audit object access and specify files and folders to monitor using Windows Explorer.
    • D、 Open Performance Monitor and monitor folder activity.

    正确答案:C

  • 第15题:

    A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()

    • A、EDIT
    • B、CHMOD
    • C、ATTRIB
    • D、CONVERT

    正确答案:C

  • 第16题:

    Which of the following BEST describes the purpose of user account control (UAC) in WindowsVista?()

    • A、UAC ensures that standard users cannot access the files and folders of administrative users.
    • B、UAC allows a computer administrator to add new user accounts to the system, configure passwords and settings for existing users, or remove existing user accounts.
    • C、UAC ensures that viruses and other malware cannot infect the computer, eliminating the need for third-party antivirus solutions.
    • D、UAC ensures that important changes cannot be made to Windows Vista without the permission of a computer administrator.

    正确答案:D

  • 第17题:

    You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()

    • A、Add Julia’s user account to the local Power Users group.
    • B、Add Julia’s user account to the local Administrators group.
    • C、Allow Julia’s user account Write permissions to C:///Data.
    • D、Allow Julia’s user account Full Control permission to C:///Data.

    正确答案:C

  • 第18题:

    A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()

    • A、Instruct User1 to create a new user certificate on Computer2.
    • B、Instruct User1 to take ownership of the encrypted files on Computer2.
    • C、Instruct User1 to import the user certificate from Computer1 to Computer2.  
    • D、Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.

    正确答案:C

  • 第19题:

    单选题
    A user copied files from a CD and now the files can only be opened as read-only. Which of the following utilities can be used to allow the user the ability to edit the files?()
    A

    EDIT

    B

    CHMOD

    C

    ATTRIB

    D

    CONVERT


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()
    A

    system /v

    B

    winnt /s

    C

    sfc /scannow

    D

    chkdsk /f


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    You are the network administrator for Company Inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrators group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary. Eric wants to prevent Julia from changing the permissions on files that Eric creates. To accomplish his goal, Eric creates a folder named C:///Data. He changes the NTFS permission on C:///Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions. Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:///Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:///Data. What should you instruct Eric to do? ()
    A

    Add Julia’s user account to the local Power Users group.

    B

    Add Julia’s user account to the local Administrators group.

    C

    Allow Julia’s user account Write permissions to C:///Data.

    D

    Allow Julia’s user account Full Control permission to C:///Data.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()
    A

    Modify

    B

    Full control

    C

    Write

    D

    Read


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2. What should you do?()
    A

    Instruct User1 to create a new user certificate on Computer2.

    B

    Instruct User1 to take ownership of the encrypted files on Computer2.

    C

    Instruct User1 to import the user certificate from Computer1 to Computer2.  

    D

    Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.


    正确答案: D
    解析: 暂无解析