英語閱讀摘要試題練習(xí)_第1頁
英語閱讀摘要試題練習(xí)_第2頁
英語閱讀摘要試題練習(xí)_第3頁
英語閱讀摘要試題練習(xí)_第4頁
英語閱讀摘要試題練習(xí)_第5頁
已閱讀5頁,還剩53頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

1、英語閱讀摘要試題練習(xí)Use this utility if you"re upgrading from an MS-DOS or Windows 95 computer to Windows NT。 If you"re upgrading Windows 95 to Windows NT, then you must install Windows NT in a different directory since Windows 95 cannot be automatically upgraded to Windows NT。 Winnt32。exe => Use

2、 this utility to upgrade a PREVIOUS version of Windows NT to a newer version of Windows NT。 When you use the "winnt32。exe" utility to upgrade an existing Windows NT computer, then the system files are upgraded in the background。 The /udf switch is used to specify the Uniqueness Database Fi

3、le, which along with the /u switch, is used to automate the installation process of Windows NT。59。Bill Slates has just lost his original Windows NT setup disks。 How can he re-create the three setup disks without running the actual installation of Windows NT?A。 By running the "winnt。exe" co

4、mmand with the /ox switch from the installation CD。 B。 By running the "winnt。exe" command from the installation CD。 C。 By using the Disk Administrator and selecting the Recreate Startup Disks option in the Tools menu。 D。 By using the Add / Remove Programs applet in the Control Panel。 Selec

5、t the Windows NT Setup tab and choose Recreate Startup Disks。 A When you install Windows NT, you"ll have the option of creating the three setup disks for backup。 Anytime you lose or damage the three setup disks, then you can use answer (a) to re-create them。 However, you must do it from the ins

6、tallation CD。60。What does the subnet mask do?A。 Tell how many bits represent the network address and how many bits represent the host address。 B。 Combines many physical networks into one logical network。 C。 Hides the IP address from the user。 D。 Provides a route to reach remote networks。 A By using

7、subnet, you can differentiate the network address from host address。61。The World Wide Web is based on which protocol?A。 HTTP B。 HTML C。 FTP D。 SMTP A62。Which command is used to configure static IP route tables? A。 IPCONFIG B。 IPROUTE C。 TRACERT D。 ROUTE D TRACERT is used to determines the route pack

8、ets take to a destination。 IPCONFIG is used to display current TCP/IP configuration values。 63。Which of the following is not part of the TCP/IP protocol suite?A。 ARP B。 NetBEUI C。 UDP D。 ICMP B NetBEUI is a small network protocol designed by Microsoft, which can"t route。64。Which service is used

9、 with TCP/IP to minimize broadcast traffic by mapping NetBIOS names to IP address?A。 DHCP B。 DNS C。 WINS D。 SERVER C DHCP is used for mapping IP address to physical address, DNS is used for mapping host name to IP address。65。Which of the following statements is right?A。 DNS is static, WINS is dynami

10、c。 B。 DNS is static, WINS is static too。 C。 DNS is dynamic, WINS is static。 D。 DNS is dynamic, WINS is dynamic too。 A DNS used a static host name database which changes by manually, and WINS used a dynamic computer name database which changes by automatically sending asking frames。66。In your network

11、 there are two segments on different subnets。 There is no routing between the segments, and host names and IP addresses are assigned manually。 What must be implemented to allow host name resolution?A。 WINS B。 DHCP C。 DNS D。 DLC C DHCP is used for mapping IP address to physical address, DNS is used f

12、or mapping host name to IP address。 WINS is used for mapping computer name to IP address67。You are planning to provide connectivity from your company Intranet to the Internet。 What should be used to provide security from Internet related threats?A。 SLIP B。 PPP C。 PPTP D。 Microsoft RAS Protocol C To

13、RAS connection, when it relates Internet, you should choice PPTP。 Please remember。68。You are trying to provide connectivity to the Internet。 What transport protocol must you use?A。 AppleTalk B。 TCP/IP C。 NWLINK D。 NETBEUI B TCP/IP is used for Internet。69。There are two TCP/IP subnets connected with a

14、n NTs IP router。 There is only one DHCP server, how can you assign IP address across the subnet?A。 ARP B。 RIP for IP C。 RIP for NwLink D。 DHCP relay agent D RIP for Internet protocol is mainly used for TCP/IP router service。 RIP for NWLink IPX/SPX compatible Transport is used for IPX/SPX router serv

15、ice。 The DHCP Relay Agent is used to broadcast DHCP messages between a DHCP server and a router。70。You need to simplify a way to distribute IP addresses on a network。 What service should you use?A。 DHCP B。 WINS C。 DNS D。 ARP A DHCP can automate the process of IP distribution on the network。71。Which

16、file is used as an alternative to WINS?A。 LMHOSTS B。 HOSTS C。 DNS D。 DHCP A DNS and DHCP are two services。 HOSTS file is used as an alternative to DNS。72。Which of the following protocol don"t support routing?A。 NetBEUI B。 TCP/IP C。 NWLINK D。 IPX/SPX B,C,D NetBEUI is a small network protocol des

17、igned by Microsoft, which can"t route。73。When you configure a computer running Windows 98 to use TCP/IP, which of the following must be configured?A。 Subnet Mask B。 Default Gateway C。 IP address D。 DHCP server IP address A,C If your computer needn"t to route to other subnets, you needn&quo

18、t;t configure the default gateway。74。You have got a Single Domain in A and one branch in B。 In A you have got the PDC, BDC, DHCP。 In B they have got only a Member Server。 User of B complains about the slow login and browsing the network。 Required result: Less logon validations on the line Optional r

19、esults: Less DHCP traffic Less synchronization of the PDC and BDC Solution: Install a BDC over the Member server in B; Install DHCP on that BDC。 What the propose solution do?A。 The required result and the optional results。 B。 The required result and one of the optional results。 C。 The required resul

20、t only。 D。 Does not produce the required result or the optional results。 B You install BDC, this will decrease logon validations on the line, but increase synchronization of the PDC and BDC。 You install DHCP on BDC will decrease DHCP traffic。75。You offer WWW service for 5 Companies。 Every company ha

21、s one registered Domain Name。 You want to establish 5 web sites for these company on 1 NT Server with IIS。 How will you assign the address?A。 Assign Multiple IP to network Adapter。 B。 Same IP to each company Name on DNS and IIS。 C。 Assign separate IP to each WWW folder。 D。 Wins to assign IP to NetBI

22、OS name。 B By using virtual server, you can realize establishing many web sites with on IP address on one computer。76。You want your NT server act as LAN-to-LAN IP Router。 Which MultiProtocol Routing service will you use?A。 Broadcast B。 DHCP Relay C。 RIP for Internet Protocol D。 RIP for NWLink IPX/SP

23、X compatible Transport C RIP for Internet protocol is mainly used for TCP/IP router service。 RIP for NWLink IPX/SPX compatible Transport is used for IPX/SPX router service。 The DHCP Relay Agent is used to broadcast DHCP messages between a DHCP server and a router。77。Which of the following services a

24、re considered part of the MultiProtocol Router?(Choose all that apply)A。 RIP for IP B。 RIP for NWLink IPX/SPX Compatible Transport C。 DHCP Relay Agent D。 RIP for NetBEUI E。 DNS Relay Agent A,B,C The MultiProtocol consists of three parts: RIP for IP, RIP for NWLINK and DHCP Relay Agent。 Managing Reso

25、urces78。Your company uses a single master domain model with five domains。 You want the ablility to easily administer your users" logon scripts。 Where is the best place to store the logon script files?A。 In a directory on each user"s workstation B。 On a single member server in the trusted d

26、omain C。 On the PDC of the trusted domain D。 In the WinntSystem32ReplImportScripts folder on the PDC of each trusting domain C With a single master domain model, all user accounts reside in the master domain and all user logons are authenticated in the master domain。 To make administration of logon

27、scripts as easy as possible, they should be stored in a single place。79。Mike is a member of group A, B and C。 Mike requires access to the database folder。 The following permissions of database folder have been assigned: A-change B-Full Control C-Read What are Mike"s effective rights to this sha

28、re?A。 No Access B。 Read C。 Change D。 Full Control D Mike will receive the most permissive access in this case。80。 Mike is member of three groups: A1, A2, and A3。 The rights to a directory called DUTY are shown below: A1 Read A2 Change A3 No access What are Mike"s effective rights in the DUTY di

29、rectory?A。 Read B。 Change C。 No Access D。 Full control C Because A3 has been assigned No access, Mike will have No Access regardless of the permissions he has been assign in other groups。81。 In your Windows NT network you have one hundred users, which are all using Windows NT Workstation 4。0。 You wo

30、uld like all one hundred users to have the same system policies。 What should you do?A。 Create the "ntconfig。pol" file and store it in a shared folder on each member server。 B。 Create the "ntconfig。pol" file and store it in the NETLOGON folder on the PDC。 C。 Create the "ntcon

31、fig。pol" file and store it in the NETLOGON folder on each workstation。 D。 Create the "ntconfig。pol" file and store it in the home directory of each user。 B The "ntconfig。pol" policy file is stored on the PDC of the domain。 Each time a user logs onto the domain, the NETLOGON

32、folder is checked automatically on the PDC to see if a system policy file already exists。 If the "ntconfig。pol" policy file is present in the NETLOGON folder on the PDC, then the "ntconfig。pol" file is copied onto the user"s local machine and the system policy ( "ntconf

33、ig。pol" ) overwrites the system policy that is set on the user"s local machine。 To satisfy the scenario, you would use answer b。82。 All profiles for your users are located in their respective profile paths on a member server in your domain。 How do mandatory user profiles differ from roamin

34、g user profiles for your users?A。 Mandatory user profiles will have their read-only attribute set, whereas roaming user profiles will not。 B。 The permission settings for mandatory user profiles only allow users to have read access, whereas the permission settings for roaming user profiles allow user

35、s to have full access。 C。 The suffix of a mandatory user profile is 。man, whereas the suffix for a roaming user profile is 。dat。 D。 The Mandatory Profile checkbox is set on the User Environment Profile screen in User Manager for Domains if the user has a mandatory profile。 If the user has a roaming

36、profile, then the checkbox is clear。 C83。 When you use User manager to set location of home directories for some users。 Which parameter you should use to replace the user account name?A。 %Homepath% B。 %UserName% C。 %homeDrive% D。 %UserProfile% B This parameter will be automatically replaced by user

37、account name。84。 Mike logons from domain A onto domain B。 Domain A trust domain B。 The share name of a domain A "s folder is HEAD。 The Domain Users group of domain B has Change permission to the folder。 The folder is stored on an NTFS partition。 Mike user account only has Read permission for th

38、e HEAD share and the Domain Users group for the trusted domain has Full Control permission for the HEAD share。 What will be Mike"s level of access?A。 Change B。 Read C。 Full Control D。 No access, because the trust is not set up correctly A? The local access level is Full Control, and the network

39、 access level is Change。 Altogether, the access level should be Change。85。 Mike is member of three groups: A1, A2, and A3。 The rights to a directory called DUTY are shown below: A1 Read A2 Change A3 Full Control What are Mike"s effective rights in the DUTY directory?A。 Read B。 Change C。 No Acce

40、ss D。 Full control D Full Control right includes Read and Change right。86。 You"ve given permission to other administrators to administer the directory service on you domain。 How can you keep track of the changes being made? Choose from below:A。 Audit file and object access B。 Audit use of user

41、rights C。 Audit User/Group management D。 Audit file read access C? Marker on success side, not failure side。87。 Which folder does the system check by default when looking for system policies?A。 %WINNTROOT%PROFILES B。 %WINNTROOT%POLICIES C。 %WINNTROOT%SYSTEM32REPLIMPORTSCRIPTS D。 %WINNTROOT%SYSTEM32R

42、EPLEXPORTSCRIPTS C88。 Where are user profiles stored by default?A。 %WINNTROOT%PROFILES B。 %WINNTROOT%POLICIES C。 %WINNTROOT%SYSTEM32REPLIMPORTSCRIPTS D。 %WINNTROOT%SYSTEM32REPLEXPORTSCRIPTS A89。 What is the name of the system policy file the NT Server looks for by default?A。 CONFIG。POL B。 NTCONFIG。P

43、OL C。 NTUSER。DAT D。 USER。DAT B90。 By default, the group EVERYONE gets which permission to newly created folders?A。 No access B。 Read C。 Change D。 Full control D Because of this, you should pay the EVERYONE group more attention。91。 What utility do you use to manually force the BDCs to synchronize to

44、the SAM database on the PDC?A。 User manager B。 Server manager C。 Performance monitor D。 Network monitor B Server manager-> computer ->synchronize with primary domain controller。92。 You would like to audit five print devices in your domain so you can determine which devices are being used the m

45、ost。 In the User Manager for Domains, which of the following events should you audit?A。 File and Object Access events B。 Use of User Rights events C。 User and Group Management events D。 Security Policy Changes events A To enable print device auditing, first select the File and Object Access events t

46、o audit in the User Manager for Domains。 Then use the Printers folder ( or you can use the NT Explorer ) to select the specific events to audit, and the Event Viewer to view the audited events。93。Your domain has one hundred users。 After creating separate user profiles and directories for all one hun

47、dred users in your domain, what else must be done before each user can start using their new profiles?A。 In the User Manager for Domains, enter the full UNC pathname of each users" profile in the User Environment Profile dialog box。 B。 In the Server Manager, enter the full UNC pathname of each

48、users" profile in the User Environment Profile dialog box。 C。 In the User Manager for Domains, enter the shared network drive letter and the full UNC pathname of each users" profile in the User Environment Profile dialog box。 D。 In the User Manager for Domains, enter the shared network dri

49、ve letter and the full UNC pathname of each users" profile in the User Environment Profile dialog box。 A To satisfy the scenario, use answer (a)。 You would enter the information in the User Profile Path letter-box in the User Environment Profile dialog box。94。 Mary is an administrator in her re

50、source domain, and she needs to add users in the account domain。 Which group membership will enable her to do this?A。 She must become a server operator in the account domain。 B。 She must become an account operator in the account domain。 C。 She must become an account operator in her resource domain。

51、D。 She must become a server operator in her resource domain。 B She wants to add users in account domain, so she should surely to be an account operator in the account domain。95。 What must you do to specify the path to user profiles on a Windows NT server?(Choose all that apply)A。 Establish all the u

52、ser profiles on the PDC。 Windows NT will automatically add the user profile path to user accounts。 B。 In User Manager for Domains, open the Users properties dialog box for a user account, and click the Profiles button to add the user profile path。 C。 Create a batch file that modifies all users"

53、 logon scripts and attach it to a broadcast e-mail message。 D。 Create a Profiles folder if it does not already exist, and share the folder with everyone。 B,D You must assign the path first, and copy to the directory on PDC。96。 You want to use system policy in a domain, where should store the Ntconfi

54、g。pol file?A。 Windowssystem32config。pol B。 Create system Default profile that contains a shortcut to the directory that contains the policy file C。 Save policy in path defined for each user"s profile directory D。 Save in NetLogon in PDC D The Ntconfig。pol file for a domain must be install on th

55、e PDC "s winnt ootsystem32 epl ImportScripts directory whose share name is NetLogon。97。 What is the name of the file used to store user profiles?A。 CONFIG。POL B。 NTCONFIG。POL C。 NTUSER。DAT D。 USER。DAT C98。 Which computer can global groups reside on?A。 Windows 98 B。 NT workstations C。 NT member

56、servers D。 NT domain controllers D The global group can only stay in the domain SAM database。99。 You wish to configure your server so that it does not participate in the browsing elections。 How?A。 Set the registry setting ChangeServerList = No B。 Set the registry setting MaintainServerList = No C。 S

57、et the registry setting MaintainServerList = Auto D。 Set the registry setting ChangeServerList = Auto B100。 Domain A trusts Domain B。 There are a global group named BUG on Domain B。 there is a server inside Domain A with a shared directory named FOR。 Using NTFS security, the Domain BBUG group has be

58、en assigned with read permission for FOR。 But the users of BUG are denied access, why?A。 Global group cannot be assigned permissions to resources。 B。 Some NTFS permission is overriding share permission。 C。 NTFS security cannot be assigned。 D。 The relationship is wrong。 B If a network user use a reso

59、urce of network, he will have to pass both the network access and local access。 The NTFS control the local access。 So if the NTFS of FOR directory is assigned NO ACCESS permission, the user will be deny。101。 An NT workstation does not belong to any domain。 In domain A, guest account is disabled。 How can you manage users of the workstation to access needed resources in domain A? (Choose two?)A。 Enable guest account。 B。 Create group A in domain A, add all user groups in the works

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論