« 上一篇下一篇 »

6-000 Questions and Answers

6-29 Questions and Answers 6-55 Questions and Answers Lesson 1 Review
1. Which of the following tools allows you to administer a share on a remote server? Select all that apply.
a. The Shared Folders snap-in.
b. Windows Explorer running on the local machine, connected to the remote server’s share or hidden drive share.
c. Windows Explorer running on the remote machine in a Terminal Services or Remote Desktop session.
d. The File Server Management console.
The correct answers are a, c, and d. Windows Explorer can be used only to administer a local share, so you would have to run a remote desktop session to the remote server, and run Windows Explorer in that session to manage that server’s shares. A more common, and a bet- ter, practice is to use the Shared Folders snap-in, which is included in the File Server Manage- ment console.
2. A folder is shared on a FAT32 volume. The Project Managers group is given Allow Full Control permission. The Project Engineers group is given Allow Read permission. Julie belongs to the Project Engineers group. She is promoted and is added to the Project Managers group. What are her effective permissions to the folder?
Full Control
3. A folder is shared on a NTFS volume, with the default share permissions. The Project Managers group is given Allow Full Control NTFS permission. Julie, who belongs to the Project Managers group, calls to report problems creating files in the folder. Why can’t Julie create files?
The default share permission in Windows Server 2003 is Everyone: Allow Read. Share permis- sions define the maximum effective permissions for files and folders in the share. The share permissions restrict the NTFS full control permission. To correct the problem, you would need to modify the share permissions to allow, at a minimum, the Project Managers group Change permission.
Lesson 2 Review
1. What are the minimum NTFS permissions required to allow users to open documents and run programs stored in a shared folder?
a. Full Control
b. Modify
c. Write
6-56 Chapter 6 Files and Folders d. Read & Execute
e. List Folder Contents
The correct answer is d.
2. Bill complains that he is unable to access the department plan. You open the Security tab for the plan and you find that all permissions on the document are inherited from the plan’s parent folder. There is a Deny Read permission assigned to a group to which Bill belongs. Which of the following methods would enable Bill to access the plan?
a. Modify the permissions on the parent folder by adding the permission Bill:Allow Full Control.
b. Modify the permissions on the parent folder by adding the permission Bill:Allow Read.
c. Modify the permissions on the plan by adding the permission: Bill:Allow Read.
d. Modify the permissions on the plan by deselecting Allow Inheritable Permissions, choosing Copy, and removing the Deny permission.
e. Modify the permissions on the plan by deselecting Allow Inheritable Permissions, choosing Copy, and adding the permission Bill:Allow Full Control.
f. Remove Bill from the group that is assigned the Deny permission.
The correct answers are c, d, and f.
3. Bill calls again to indicate that he still cannot access the departmental plan. You use the Effective Permissions tool, select Bill’s account, and the tool indicates that Bill is, in fact, allowed sufficient permissions. What might explain the discrepancy between the results of the Effective Permissions tool and the issue Bill is reporting?
The Effective Permissions tool is only an approximation of a user’s access. It is possible that a permission entry is assigned to a logon-related account, such as Interactive or Network, that could be denying access. Permissions for logon groups are not evaluated by the Effective Per- missions tool. Or, if you are not logged on as a Domain Admin, you may not be able to read all group memberships, which might skew the resulting permissions report.
Page Lesson 3 Review
6-36
1. Which of the following must be done to generate a log of resource access for a file or folder? Select all that apply.
a. Configure NTFS permissions to allow the System account to audit resource access.
b. Configure audit entries to specify the types of access to audit.
6-46 Questions and Answers 6-57 c. Enable the Audit Privilege Use policy.
d. Enable the Audit Object Access policy.
The correct answers are b and d.
2. Which of the following are valid criteria for a security log filter to identify specific file and folder access events? Select all that apply.
a. The date of the event
b. The user that generated the event
c. The type of object access that generated the event
d. Success or failure audit
The correct answers are a, b, and d.
3. Users at Contoso Ltd. use Microsoft Office applications to access resources on Server01. Your job is to monitor Server01 to ensure that permissions are not too restrictive, so that users are not prevented from achieving their assignments. Which log, and which type of event, will provide the information you require?
a. Application log; Success Event
b. Application log; Failure Event
c. Security log; Success Event
d. Security log; Failure Event
e. System log; Success Event
f. System log; Failure Event
The correct answer is d.
Page Lesson 4 Review
1. You’re setting up a Web site in IIS on Server01. The site’s Internet domain name is adatum.com, and the site’s home directory is C:\Web\Adatum. Which URL should Internet users use to access files in the home directory of the site?
a. http://server01.web.adatum
b. http://web.adatum.com/server01
c. http://server01.adatum/home
d. http://server01.adatum.com
The correct answer is d.
6-58 Chapter 6 Files and Folders 2. You want to ensure the highest level of security for your corporate intranet with-out the infrastructure of certificate services. The goal is to provide authentication that is transparent to users, and to allow you to secure intranet resources with the group accounts existing in Active Directory. All users are within the corporate fire-wall. What authentication method should you choose?
a. Anonymous Access
b. Basic Authentication
c. Digest Authentication
d. Integrated Windows Authentication
The correct answer is d.
3. Data for your corporate intranet is currently stored on the D: drive of your IIS server. It is decided that the HR department will serve information about the company benefits and policies from its server, and that the URL to access the HR information should be http://intranet.contoso.com/hr. What do you need to configure?
a. A new Web site
b. A new FTP site
c. A virtual directory from file
d. A virtual directory
The correct answer is d.

  现在申请Payoneer可获得25美元奖励并立享1.2%全包的费用优惠:当你累积收款1000美元时将一次性获得25美元奖励。需要注意的是,如果你直接打开Payoneer官网进行注册,是没有上述优惠的,请务必打开【野猪尖的推荐链接】进行注册。Payoneer注册咨询QQ:2822129880

Payoneer派安盈

野猪尖的推荐链接http://tracking.payoneer.com/SHFv (此地址要完整地复制,建议直接点击)

【Payoneer申请教程:个人账户企业账户如何用Payoneer派安盈收款

Payoneer注册与使用指南(包括P卡申请、Payoneer官方、手续费、收款、提现和消费):
注册-为何选择Payoneer派安盈? | Payoneer有卡和无卡账户的区别派安盈公司和个人帐户的区别
   Payoneer个人账户注册申请教程P卡公司帐户注册教程订购实体卡P卡
   Payoneer欧元帐户Payoneer英镑帐户Payoneer日元帐户Payoneer加元帐户
   Payoneer澳元帐户Payoneer离岸账号Payoneer墨西哥帐户如何注销P卡
   买卖P卡的风险Payoneer卡激活和休眠Payoneer卡年费啥时候扣? | P卡到期后更换

官方-Payoneer秉承公正、公开、透明服务Payoneer官方最新政策汇总官方客服联系方式
   Payoneer官方费用表如何减少Payoneer的手续费?点此降低提现费
   跨境收款服务商拷问:Payoneer派安盈Payoneer客户答疑手册(FAQ)Payoneer手机App

收款-如何用Payoneer派安盈收款跨境电商/外贸收款方式对比Payoneer支持错名收款和提现
   橄榄枝计划(平台入驻)Amazon亚马逊绑定Payoneer卡收款教程亚马逊收款方式对比
   Payoneer可提供亚马逊KYC审核所需银行证明用Payoneer亚马逊店铺管家开子账户和KYC证明
   Payoneer支持从虾皮Shopee收款Tophatter绑定Payoneer派安盈收款
   Payoneer如何从跨境移动电商Wish收款? | Payoneer针对Wish卖家推出提前放款服务
   Payoneer如何从东南亚电商平台Lazada收款如何在Lazada开店
   Payoneer如何从拉美电商平台Linio收款? | Payoneer绑定非洲电商平台Jumia收款
   Payoneer支持从美国电商平台Newegg收款Payoneer支持从美国Walmart沃尔玛平台收款
   Payoneer支持从法国乐天Priceminister收款法国电商平台CDiscount对接Payoneer收款
   Joom卖家大会干货大放送苹果开发者绑定Payoneer派安盈收款教程如何向Payoneer充值
   从PayPal提现到Payoneer卡教程及费用从PayPal提现到Payoneer派安盈的一些提醒
   外贸e户通(B2B收款)如何使用Payoneer请求付款亚马逊印度和中东站、速卖通和线下B2B收款
   CJ联盟设置Payoneer收款ClickBank联盟设置Payoneer收款Amazon联盟设置P卡收款

其它-从Payoneer卡提现到国内银行账户Payoneer加快提现速度用P卡在中国银行ATM机取款
    Payoneer免费为卖家提供便捷的VAT缴费方案Payoneer缴纳VAT服务常见问题答疑


人在做天在看,转载请以链接的形式注明本文地址
本文地址:http://www.zhaoniupai.com/blog/archives/216.html