« 上一篇下一篇 »

6-000 Questions and Answers

6-29 Questions and Answers 6-55 Questions and Answers Lesson 1 Review
1. Which of the following tools allows you to administer a share on a remote server? Select all that apply.
a. The Shared Folders snap-in.
b. Windows Explorer running on the local machine, connected to the remote server’s share or hidden drive share.
c. Windows Explorer running on the remote machine in a Terminal Services or Remote Desktop session.
d. The File Server Management console.
The correct answers are a, c, and d. Windows Explorer can be used only to administer a local share, so you would have to run a remote desktop session to the remote server, and run Windows Explorer in that session to manage that server’s shares. A more common, and a bet- ter, practice is to use the Shared Folders snap-in, which is included in the File Server Manage- ment console.
2. A folder is shared on a FAT32 volume. The Project Managers group is given Allow Full Control permission. The Project Engineers group is given Allow Read permission. Julie belongs to the Project Engineers group. She is promoted and is added to the Project Managers group. What are her effective permissions to the folder?
Full Control
3. A folder is shared on a NTFS volume, with the default share permissions. The Project Managers group is given Allow Full Control NTFS permission. Julie, who belongs to the Project Managers group, calls to report problems creating files in the folder. Why can’t Julie create files?
The default share permission in Windows Server 2003 is Everyone: Allow Read. Share permis- sions define the maximum effective permissions for files and folders in the share. The share permissions restrict the NTFS full control permission. To correct the problem, you would need to modify the share permissions to allow, at a minimum, the Project Managers group Change permission.
Lesson 2 Review
1. What are the minimum NTFS permissions required to allow users to open documents and run programs stored in a shared folder?
a. Full Control
b. Modify
c. Write
6-56 Chapter 6 Files and Folders d. Read & Execute
e. List Folder Contents
The correct answer is d.
2. Bill complains that he is unable to access the department plan. You open the Security tab for the plan and you find that all permissions on the document are inherited from the plan’s parent folder. There is a Deny Read permission assigned to a group to which Bill belongs. Which of the following methods would enable Bill to access the plan?
a. Modify the permissions on the parent folder by adding the permission Bill:Allow Full Control.
b. Modify the permissions on the parent folder by adding the permission Bill:Allow Read.
c. Modify the permissions on the plan by adding the permission: Bill:Allow Read.
d. Modify the permissions on the plan by deselecting Allow Inheritable Permissions, choosing Copy, and removing the Deny permission.
e. Modify the permissions on the plan by deselecting Allow Inheritable Permissions, choosing Copy, and adding the permission Bill:Allow Full Control.
f. Remove Bill from the group that is assigned the Deny permission.
The correct answers are c, d, and f.
3. Bill calls again to indicate that he still cannot access the departmental plan. You use the Effective Permissions tool, select Bill’s account, and the tool indicates that Bill is, in fact, allowed sufficient permissions. What might explain the discrepancy between the results of the Effective Permissions tool and the issue Bill is reporting?
The Effective Permissions tool is only an approximation of a user’s access. It is possible that a permission entry is assigned to a logon-related account, such as Interactive or Network, that could be denying access. Permissions for logon groups are not evaluated by the Effective Per- missions tool. Or, if you are not logged on as a Domain Admin, you may not be able to read all group memberships, which might skew the resulting permissions report.
Page Lesson 3 Review
6-36
1. Which of the following must be done to generate a log of resource access for a file or folder? Select all that apply.
a. Configure NTFS permissions to allow the System account to audit resource access.
b. Configure audit entries to specify the types of access to audit.
6-46 Questions and Answers 6-57 c. Enable the Audit Privilege Use policy.
d. Enable the Audit Object Access policy.
The correct answers are b and d.
2. Which of the following are valid criteria for a security log filter to identify specific file and folder access events? Select all that apply.
a. The date of the event
b. The user that generated the event
c. The type of object access that generated the event
d. Success or failure audit
The correct answers are a, b, and d.
3. Users at Contoso Ltd. use Microsoft Office applications to access resources on Server01. Your job is to monitor Server01 to ensure that permissions are not too restrictive, so that users are not prevented from achieving their assignments. Which log, and which type of event, will provide the information you require?
a. Application log; Success Event
b. Application log; Failure Event
c. Security log; Success Event
d. Security log; Failure Event
e. System log; Success Event
f. System log; Failure Event
The correct answer is d.
Page Lesson 4 Review
1. You’re setting up a Web site in IIS on Server01. The site’s Internet domain name is adatum.com, and the site’s home directory is C:\Web\Adatum. Which URL should Internet users use to access files in the home directory of the site?
a. http://server01.web.adatum
b. http://web.adatum.com/server01
c. http://server01.adatum/home
d. http://server01.adatum.com
The correct answer is d.
6-58 Chapter 6 Files and Folders 2. You want to ensure the highest level of security for your corporate intranet with-out the infrastructure of certificate services. The goal is to provide authentication that is transparent to users, and to allow you to secure intranet resources with the group accounts existing in Active Directory. All users are within the corporate fire-wall. What authentication method should you choose?
a. Anonymous Access
b. Basic Authentication
c. Digest Authentication
d. Integrated Windows Authentication
The correct answer is d.
3. Data for your corporate intranet is currently stored on the D: drive of your IIS server. It is decided that the HR department will serve information about the company benefits and policies from its server, and that the URL to access the HR information should be http://intranet.contoso.com/hr. What do you need to configure?
a. A new Web site
b. A new FTP site
c. A virtual directory from file
d. A virtual directory
The correct answer is d.

  还没注册Payoneer的朋友可免费申请一个,现在申请Payoneer可获得25美元奖励并且直接享受1.2%全包的优惠:不仅入账免费,全币种提现只收1.2%的费用,无汇损,当你累积收款100美元时将一次性获得25美元奖励。需要注意的是,如果你直接打开Payoneer官网进行注册,是没有上述优惠的,请务必打开【野猪尖的推荐链接】进行注册。Payoneer注册咨询QQ:2822129880

Payoneer

野猪尖的推荐链接https://www.payoneer.com/zh/znp (此地址要完整地复制,建议直接点击)

【Payoneer申请教程:个人账户企业账户订购Payoneer实体卡(P卡)

Payoneer注册与使用指南(包括P卡申请、Payoneer官方、手续费、收款、提现和消费):
注册-收款工具那么多,为何选择Payoneer? | 为何申请Payoneer万事达预付卡+欧美日收款银行账号
   Payoneer有卡账户和无卡账户的区别Payoneer个人账户注册申请教程P卡公司帐户注册教程
   Payoneer欧元帐户虚拟卡) | Payoneer英镑帐户Payoneer日元帐户订购实体卡(P卡
   Payoneer卡年费啥时候扣? | Payoneer卡休眠和激活P卡到期后如何更换? | 如何注销P卡

官方-Payoneer秉承公正、公开、透明服务Payoneer官方最新政策汇总官方客服联系方式
   Payoneer官方费用表如何减少Payoneer的手续费?点此免除入账费点此降低提现费
   跨境收款服务商拷问篇——PayoneerPayoneer客户答疑手册(FAQ)Payoneer手机App

收款-跨境电商/外贸收款方式对比Payoneer可以错名收款吗
   Amazon亚马逊卖家设置Payoneer卡收款教程Payoneer可提供亚马逊KYC审核所需银行账单
   Amazon亚马逊收款方式对比(Payoneer,World First,PingPong,美国/香港银行卡)
   CJ联盟设置Payoneer卡收款ClickBank联盟设置Payoneer收款Amazon联盟设置P卡收款
   Payoneer如何从东南亚电商平台Lazada收款如何在Lazada开店
   Payoneer如何从拉美电商平台Linio收款? | Payoneer绑定非洲电商平台Jumia收款
   Payoneer支持从美国电商平台Newegg收款
   Payoneer如何从跨境移动电商Wish收款? | Wish模式正在改变电商格局
   Payoneer支持从法国乐天Priceminister收款法国电商平台CDiscount对接Payoneer收款
   如何使用Payoneer请求付款?关于Payoneer卡充值
   从PayPal提现到Payoneer卡教程及手续费用PayPal无法绑定并转账到Payoneer卡

提现-从Payoneer卡提现到国内银行账户Payoneer无法从Dating联盟收款并限制提现方式
   用P卡在中国银行ATM机取款4000元用Payoneer卡在中国建设银行ATM机取款500元

消费-Payoneer为卖家提供更便捷的VAT缴费方案用Payoneer卡在GoDaddy买域名主机教程


人在做天在看,转载请以链接的形式注明本文地址
本文地址:http://www.zhaoniupai.com/blog/archives/216.html