【导读】
布丁学网发布计算机类考试2022微软认证考试题301,更多微软认证的模拟考试请访问布丁学网计算机类考试频道。
1. [单选题]Your Windows 2000 Professional computer has 10 shared folders that are available to other network users. A user reports that he cannot access a shared folder named Share
A. You want to respond to the user's problem as quickly as possible by using an administrative tool.
B. What should you do?
C. Use Windows Explorer to display the file paths of your shared folders.
D. Use Storage in Computer Management to view logical drive properties.
E. Use Event Viewer in Computer Management to search for shared folder error messages.
F. Use System Tools in Computer Management to display the file paths of your shared folders.
2. [单选题]You are the administrator of your company's network. A user named Paul in the service department has a Windows 2000 Professional computer. Paul needs to access the files that are in a shared folder on his computer. A local group named Sales has permissions to access the data. Paul is a member of the Sales local group but he cannot access the file he needs.What should you do?
A. Grant Paul NTFS permission so that he can access any parent folder to files in the shared folder.
B. Share the Sales folder and grant Paul shared folder permission to access the shared Sales folder.
C. Remove Paul from any other group that has been explicitly denied access to the Sales folder.
D. Delete the Sales local group and recreate it. Add individual user accounts from the Sales department back into Sales local group.
3. [多选题]You are the administrator of a SQL Server 2000 computer. The server contains a Data Transformation Services (DTS) package that queries multiple databases and writes the results to a text file. You run this package by using a Microsoft Windows batch file. The batch file uses the dtsrun utility to execute the DTS package.You want to ensure that connection properties, such as login names and passwords, cannot be read or modified by users. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)
A. Save the DTS package so that it has an owner password.
B. Save the DTS package so that it has a user password.
C. Encrypt the DTS package details in the command line of the dtsrun utility.
D. Store the DTS package in the Meta. Data Services repository.
E. Store the DTS package as a Microsoft Visual Basic file.
4. [多选题]The network consists of a single domain named Ezonexam.com that includes 20 Windows NT workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers. You install Terminal Services on one of the Windows Server computers and Terminal Services Client on the 20 Windows NT Workstation 4.0 client computers. You create a system policy on the server that is configured as the terminal server. This system policy denies access to Network Neighborhood. You find that the users of the terminal server can still browse the network when they open My Network Places from Windows 2000 Professional computer or when they open Network Neighborhood from Windows NT Workstation 4.0 computers.You want to prevent all users from browsing the network.
A. What should you do? (Each correct answer presents a complete solution. Choose two.)
B. Create a Windows Group Policy that denies user access to My Network Places.
C. Copy the Windows NT policy file to the 20 Windows NT Workstation 4.0 computers.
D. Create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator.
E. Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the terminal server.
F. Configure the terminal server to use Application server mode. Select the Permissions compatible with Terminal Server 4.0 Users option.
5. [单选题]You are the network administrator for Ezonexam. You are planning to upgrade 35 Windows NT Server 4.0 computers to Windows 2000 Server. You want to accomplish the upgrades by using a distribution server. The Windows NT Server 4.0 computers support a tight production schedule that requires them to be online from 8:00
A. M. to midnight, seven days a week. You schedule the upgrade to run during non-business hours. Because of the limited amount of time the upgrades must be performed as quickly as possible.You want to complete the upgrades before production begins in the morning.
B. What should you do?
C. Perform. an unattended installation by running the winnt32 command and the /cmdcons switch.
D. Perform. an unattended installation by running the winnt32 command and specify the use of a .txt file and a uniqueness database file.
E. Perform. an unattended installation by running the winnt command and specify the use of a .txt file and a uniqueness database file.
F. Perform. an unattended installation by using a Winnt.sif file with a commands section that initiates the Update.exe command in quiet mode.