单项选择题

You are the administrator of your company’s network. An employee named Mark is leaving the company. A new employee named Eric has been hired to replace him. Mark has a local user account on a Windows 2000 Professional computer. Mark has rights to multiple files and folders on the computer.  You want Eric to have the same rights and permissions that Mark has. You want to ensure that Mark will no longer have access to the files and folders. You want to accomplish this with least administrative effort. What should you do?()

A.Rename Mark’s user account to Eric and change the account password.
B.Create Eric’s account by copying Mark’s profile to Eric’s account. Delete Mark’s account.
C.Create Eric’s account by copying Marks account. Delete Mark’s account.
D.Delete Mark’s account. Add Eric’s account. Add Eric to the same groups to which Mark belonged. Grant Eric to all the individual user rights and permissions that Mark had.

相关考题

YouupgradefivecomputersintheFinanceorganizationalunit(O...


单项选择题You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()

A. Use Computer Management to configure separate memory space for each financial application on Helene’s computer.
B. Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.
C. Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.
D. Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

Ten users at your office run an accounting application ...


单项选择题

Ten users at your office run an accounting application on their Windows NT Workstation 4.0 computers. The application stores its data in a shared network folder named Accdata on a Windows 2000 Server computer named Server1. You upgrade all 10 computers to Windows 2000 Professional and verify that all applications are compatible with Windows 2000. After the upgrade, some users report that they are receiving intermittent data-corruption error messages. They are also receiving data file-version mismatch error messages. When these errors occur, your only method of recovery is to restore the entire contents of the Accdata folder from a known good backup copy. 
You need to prevent these errors from occurring in the future. What should you do? ()

A.Configure Accdata folder to allow a maximum of one user.
B.Configure the Accdata folder to disable client caching.
C.Create a group policy that removes the Bypass Traverse Checking user right on server1.
D.Create a group policy that increases the amount of idle time required before a session   disconnects on server1.