- 服务问题 - 启动、停止或重新配置导致计算机无法正常启动的服务
- 设备驱动程序问题 - 停止或启动某些设备驱动
- 启动系统所需的重要文件丢失 - 从光盘或软盘复制一个丢失的文件
- 引导磁道损坏 - 在系统分区上写一个新的引导扇区
- 主引导记录损坏 - 修复分区扇区的主引导记录
- 某个分区无法正常格式化或某个奇怪的文件无法删除 - 可以在故障恢复控制台下试试
1. Which of the following actions should you take if you attempt to edit a GPO and you receive the message Missing Active Directory Container?
A. Check your permissions for the GPO.
B. Check network connectivity.
C. Check that the OU exists.
D. Check that No Override is set for the GPO.
E. Check that Block Policy Inheritance is set for the GPO.
2. Which RSoP query generating tool provides RSoP query results on a console similar to a Group Policy Object Editor console?
A. Resultant Set Of Policy Wizard
B. Group Policy Wizard
C. Gpupdate command-line tool
D. Gpresult command-line tool
E. Advanced System Information–Policy tool
F. Advanced System Information–Services tool
3. Which of the following actions should you take if you attempt to open a Group Policy Object Editor console for an OU GPO and you receive the message Failed To Open The Group Policy Object?
A. Check your permissions for the GPO.
B. Check network connectivity.
C. Check that the OU exists.
D. Check that No Override is set for the GPO.
E. Check that Block Policy Inheritance is set for the GPO.
4. Which of the following are true statements? Choose three.
A. Remote Desktop for Administration is installed by default on computers running Windows Server 2003.
B. Remote Desktop for Administration is enabled by default on computers running Windows Server 2003.
C. A server can be configured to use Offline Files and Remote Desktop for Administration at the same time.
D. A server cannot be configured to use Offline Files and Remote Desktop for Administration at the same time.
E. Before attempting to configure the computer to use Offline Files, you must disable Remote Desktop for Administration.
F. Before attempting to configure the computer to use Offline Files, you must enable Remote Desktop for Administration.
5. Which of the following actions should you take if folder redirection is successful but files and folders are unavailable? Choose two.
A. Check the user's permissions for the redirected folder.
B. Check network connectivity.
C. Check that the redirected folder exists.
D. Check to see if Remote Desktop for Administration is enabled.
E. Check to see if the files have extensions that are not synchronized by default.
6. What is the difference between Logging mode and Planning mode?
Answer: Logging mode reports the existing GPO settings for a user or computer. Planning mode simulates the GPO settings that a user and computer might receive, and it enables you change the simulation.
7. What are the three tools available for generating RSoP queries?
Answer: Windows Server 2003 provides three tools for generating RSoP queries: the Resultant Set Of Policy Wizard, the Gpresult command-line tool, and the Advanced System Information– Policy tool.
8. What is the purpose of the Offline Files feature?
本文属于 MS2274 测试题的一部分,相关测试题如下:Answer: The Offline Files feature provides users with access to redirected folders even when they are not connected to the network.
刷新本地组策略设置和存储在 Active Directory 中的组策略设置,包括安全设置。该命令可以取代 secedit 命令中已经过时的 /refreshpolicy 选项。
语法
gpupdate [/target:{computer | user}] [/force] [/wait:Value] [/logoff] [/boot] 参数
/target:{computer | user}
只处理 Computer 设置或当前的 User 设置。默认情况下,将同时处理计算机设置和用户设置。
/force
忽略所有处理优化并重新应用所有设置。
/wait:Value
策略处理等待完成的秒数。默认值是 600 秒。0 等于“不等待”,而 -1 等于“无限期等待”。
/logoff
刷新完成后才注销。如果客户端的组策略扩展没有在后台刷新周期内进行处理,但在用户登录时进行处理,例如对于用户组策略软件安装和文件夹重定向,这时需要使用该选项。如果没有调用要求用户注销的扩展,则该选项无效。
/boot
刷新完成后重新启动计算机。如果客户端的组策略扩展没有在后台刷新周期内进行处理,但在计算机启动时进行处理,例如对于计算机组策略软件安装,这时需要使用该选项。如果没有调用要求重新启动计算机的扩展,则该选项无效。
1. Which of the following nodes contains the registry-based Group Policy setting?
A. Software Settings
B. Windows settings
C. Administrator templates
D. Security settings
2. You want to ensure that none of the South OU Desk settings applied to the South OU can be overridden. To accomplish this, which of the following exceptions do you apply and where do you apply it?
A. Block Policy Inheritance applied to the OU
B. Block Policy Inheritance applied to the GPO
C. Block Policy Inheritance applied to the GPO link
D. No Override applied to the OU
E. No Override applied to the GPO
F. No Override applied to the GPO link
3. If administrative responsibilities in you organization are task-based and delegated among several administrators, which of the following types of GPOs should you plan to create?
A. GPOs containing only one type of Group Policy setting
B. GPOs containing many types of Group Policy settings
C. GPOs containing only computer configuration settings
D. GPOs containing only user type configuration settings
4. You want to deflect all Group Policy settings that reach the North OU from all of the OU's parent objects. To accomplish this, which of the following exceptions do you apply and where do you apply it?
A. Block Policy Inheritance applied to the OU
B. Block Policy Inheritance applied to the GPO
C. Block Policy Inheritance applied to the GPO link
D. No Override applied to the OU
E. No Override applied to the GPO
F. No Override applied to the GPO link
5. Describe a decentralized GPO design.
Answer: With a decentralized GPO design, you create a base GPO to be applied to the domain that con tains policy settings for as many users and computers in the domain as possible. Next, you cre ate additional GPOs tailored to the common requirements of each OU, and apply them to the appropriate OUs. The goal of a decentralized GPO design is to include a specific policy setting in as few GPOs as possible. When a change is required, only one (or a few) GPO(s) have to be changed to enforce the change.
6. How do you prevent a GPO from applying to a specific group?
Answer: You can prevent a policy from applying to a specific group by denying that group the Apply Group Policy permission for the GPO.
7. What is a GPO?
本文属于 MS2274 测试题的一部分,相关测试题如下:Answer: A GPO is a Group Policy Object. Group Policy configuration settings are contained within a GPO. Each computer running Windows Server 2003 has one local GPO and can, in addition, be sub ject to any number of nonlocal (Active Directory–based) GPOs
1. Which of the following is not a valid object type in the Find option?
A. User, Contacts, and Groups
B. Sites
C. OUs
D. Computers
2. User X is a member of the Sales group and the Marketing group. The Sales group has Write permission for the Accounts shared folder. The Marketing groups has Full Control permission for the Accounts shared folder. User X alone has Read permission for the Accounts shared folder. Which of the following permissions does User X have for the Accounts shared folder?
A. Write permission only
B. Read permission only
C. Read and Write permissions only
D. Full Control permission only
E. All permissions
3. For which of the following Active Directory objects can you delegate administrative control by using the Delegation Of Control Wizard?
A. Folder
B. User
C. Group
D. Site
E. OU
F. Domain
G. Shared folder
4. What are effective permissions?
Answer: Effective permissions are the overall permissions that a security principal has for an object, including group membership and inheritance from parent objects.
5. Why is it necessary to delegate administrative control of Active Directory objects?
Answer: You delgate administrator control of domains, OUs, and containers in order to provide other administrator, groups, or users with the ability to manage functions according to their needs.
6. What are two ways to locate Active Directory objects?
本文属于 MS2274 测试题的一部分,相关测试题如下:Answer: There are two ways to locate Active Directory objects:1) use the Find option on the Active Directory Users And Computers console, and 2) use the Dsquery command.
Zoundry Raven 是个老牌的博客客户端了,早已支持Blogger,但在国内,Blogger API被封掉了,使得通过Zoundry Raven向Blogger 发布日志变得很麻烦,只好使用一个好用的代理软件来弥补。
推荐使用Vidalia
Vidalia其实就是一个图形界面的Tor + Privoxy,(Tor的官方网站也被封掉了)运行Vidalia后,再运行Privoxy。不需要太多的设置,点击更换身份就可以换一个可用的代理了,很方便的。

再对Zoundry Raven进行设置
这样就可以发布日志到Blogger了。
Windows紧急安全更新(KB958644)——微软爆出特大安全漏洞,会引发大面积远程攻击甚至完全控制。据金山反病毒专家介绍,此次微软爆出的漏洞非常严重,危害程度可能赶超“冲击波”。“冲击波”曾在一周内至少攻击了全球80%的Windows用户,使他们的计算机无法工作并反复重启,大量企业用户也未能幸免。
受影响的系统从Win 2000 SP4 到Win Server 2008无一幸免。
懒人刚刚关掉自动更新,没安装正版验证补丁,现在又来了紧急安全更新,要手动选择补丁来安装了,还想再懒下去......
我的应对策略
关掉系统自动更新,使用其他软件来更新Windows XP Professional 系统。比如360安全卫士、瑞星卡卡等具有漏洞检测功能的软件,他们通常是不检测正版验证补丁的,提示什么安什么就OK了。
关掉自动更新后右下角出现一个小红叉?关掉安全中心好了。
也可以用命令行的方式来关闭服务,在CMD下输入如下的命令就OK了。
net stop wscsvc
相关链接:
Microsoft Security Bulletin Summary for October 2008
选择合适的系统下载更新补丁
1. Which of the following options will give you the clearest picture of printer utilization-allowing you to understand the consumption of printer toner and paper?
A. Configure auditing for a logical printer and audit for successful use of Print permission by Everyone system group.
B. Export the System log to a comma-delimited text file and use Excel to analyze spooler events.
C. Configure a performance log and monitor the Total Pages Printed counter for each logical printer.
D. Configure a performance log and monitor the Jobs counter for each logical counter.
2.you're administrator a Windows Server 2003 computer configured as a printer server. Users in the Marketing group complain that they connot print documents using a printer on the server. You view the permissions in the printer's properties. The Marketing groups is allowed Manage Documents permission. Why can't the users print to the printer?
A. The Everyone group must be granted the Manage Documents permission.
B. The Administrator group must be granted the Manage Printers permission.
C. The Marketing group must be granted the Print permission.
D. The Marketing group must be granted the Manage Printer permission.
3. A Windows 2003 Server is configured as a print server. In the middle of the workday, the printer fuse fails, and must be replaced. Users have already submitted jobs to the printer, which uses IP address 192.168.1.81. An identical printer users address 192.168.1.217, and is supported by other logical printers on the server. What actions should you take so that users'jobs can be printed without resubmission?
A. In the failed printer's Properties dialog box, select Enable Printer Pooling.
B. At the command prompt, type Net Stop Spooler.
C. At the command prompt, type Net Start Spooler.
D. In the failed printer's Properties dialog box, select the port 192.168.1.217
E. In the failed printer's Properties dialog box, click Add Port.
F. In the Printers And Faxes folder, right-click the failed printer and choose Use Offline.
4. You're setting up a printer pool on a Windows Server 2003 computer. The printer pool contains three print devices, all identical. You open the properties for the printer and select the Enable Printer Pooling option on the Ports tab. What must you do next?
A. Configure the LPT1 port to support three printers.
B. Select or create the ports mapped to the three printers.
C. On the Device Settings tab, configure the installable options to support two additional print devices.
D. On the Advanced tab, configure the priorty ofr each print device so that printing is distributed among the three print devices.
5. You're administrator a Windows Server 2003 computer configured as a print server. You want to perform maintenance on a print device connected to the print server. There are several documents in the print queue. You want to prevent the documents from being printed to the printer, but you don't want users to have to resubmit the documents to the printer. What is the best way to do this?
A. Open the printer's Properties dialog box, select the Sharing tab, and then select the Do Not Share This Printer option.
B. Open the printer's Properties dialog box and select a port that is not associated with a print device.
C. Open the printer's queue window, select the first document, and then select Pause from the Document window. Repeat the process for each document.
D. Open the printer's queue window, and select the Pause Printing option from the Printer menu.
6. You're setting up printing on a Windows Server 2003 computer. You attach a printer,configure a logical printer, and submit documents for printing, but the documents do not print completely and sometimes come out garbled. What is the most likely cause of the problem?
A. There's insufficient hard disk space for spooling.
B. You're using an incorrect printer driver.
C. The selected port is not correct.
D. The device settings for the printer are using an incorrect font substitution.
7. You want to configure a logical printer so that large, low-priority documents will be printed overnight. Which of the following options will you configure in the printer's Properties dialog box?
A. Priority
B. Available From/To
C. Start Printing After Last Page Is Apooled
D. Print Directly To The Printer
E. Keep Printed Documents
8.you're the administrator of the Windows Server 2003 computer that is configured as a print server,and you want to administrator the print services from a Web browser on a client computer. The server is named Mktg1, but you don't know the share name of the printer. Which URL should you use to connect to the printer?
本文属于 MS2274 测试题的一部分,相关测试题如下:A.http://mktg1/printers
B.http://printers/mktg1
C.http://windows/web/printers
D.http://windows/mktg1
bootcfg /timeout 30
bootcfg /raw "/sos" /id 1
bootcfg /query
Boot.ini 由两个配置节组成
[boot loader] 和 [operating systems]
例如:大多数家用机的boot.ini内容如下,一块P-ATA或S-ATA硬盘,单一WinXP系统装在硬盘的第一个分区(通常是C盘)。
[boot loader]
Timeout=5
Default=Multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
Multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect[boot loader]部分
其中 timeout 即为显示操作系统列表的时间,如下图。timeout=5 即 5秒后引导默认的操作系统。

Default=Multi(0)disk(0)rdisk(0)partition(1)\WINDOWS 为默认操作系统的ARC路径。
ARC路径的各部分的描述
注意:
[operating systems] 部分
每行指定一个操作系统的ARC路径和显示的名称,如果只有一个操作系统,在这个配置节一般只有一行。值得一提的是每行末尾的开关参数。
常用开关和功能
相关KB:BOOT.INI 和 ARC 路径命名约定与用法
相关命令:bootcfg
1. One of your printers is not working properly, and you want to prevent users from sending print jobs to the logical printer serving that device. What should you do?
A. Stop sharing the printer
B. Remove the printer rom the Active Directory
C. Change the printer port
D. Rename the share
2. You're setting up a printer on your Windows Server 2003 computer. The computer will be used as a print server on you network. You plan to use a print device that's currently connected to the network as a stand-alone print device. Which type of printer should you add to the print server?
A. Network
B. Shared
C. Local
D. Remote
3. You're installing a printer on a client computer. The printer will connect to a logical printer installed on a Windows Server 2003 print server. What type or types of information could you provide to setup the printer?
本文属于 MS2274 测试题的一部分,相关测试题如下:A. TCP/IP printer port
B. Model of the print device
C. URL to printer on print server
D. UNC path to print share
E. Printer driver
| 文件名称 | 位置 | 使用的引导序列 |
|---|---|---|
| Ntldr.exe | 系统分区根目录 | 预备引导和引导 |
| Boot.ini | 系统分区根目录 | 引导 |
| Bootsect.dos | 系统分区根目录 | 引导(可选) |
| Ntdetect.com | 系统分区根目录 | 引导 |
| Ntoskrnl.exe | %systemroot%\System32 | 内核加载 |
| Ntbootdd.sys | 系统分区根目录 | 预备引导(使用SCSI控制器时) |
| Hal.dll | %systemroot%\System32 | 内核加载 |
| System | %systemroot%\System32\Config | 内核初始化 |
| Device Drivers (*.sys) | %systemroot%\System32\Drivers | 内核初始化 |
net share [ShareName] net share [ShareName=Drive:Path [{/users:Number | /unlimited}] [/remark:"Text"] [/cache: {manual | automatic | no}]]net share [ShareName [{/users:Number | unlimited}] [/remark:"Text"] [/cache: {manual | automatic | no}]] net share [{ShareName | Drive:Path} /delete]1. Data for you corporate intranet is currently stored on the D:drive of your IIS server. It is decided that the HR department will serve information about the company benefits and policies from its server, and that the URL to access the HR information should be http://intranet.contoso.com.hr. What do you need to configure?
A. A new Web site
B. A new FTP site
C. A virtual directory from file
D. A virtual directory
2. You're setting up a Web site in IIS on Server01. The site's Internet domain name is adatum.com, and the site's home directory is C:\Web\Adatum. Which URL should Internet users use to access files in the home directory of the site?
A. http://server01.web.adatum
B. http://web.adatum.com/server01
C. Http://server01.adatum/home
D. http://server01.adatum.com
3. You want to ensure the highest level of security for your corporate intranet with-out the infrastructure of certificate services. The goal is to provide authentication that is transparent to users, and to allow you to secure intranet resources with the group account existing in Active Directory. All users are within the corporate fire-wall. What authentication method should you choose?
A. Anonymous access
B. Basic authentication
C. Digest authentication
D. Integrated Windows Authentication
4. Users at Contoso Ltd. Use Microsoft Office applications to access resources on Server01. Your job is to moitor Server01 to ensure that permissions are not too restrictive, so that users are not prevented from achieving their assignments. Which log, and which type of event, will provide the information you require?
A. Application log; Success Event
B. Application log; Failure Event
C. Security log; Success Event
D. Security log; Failure Event
E. System log; Success Event
F. System log; Failure Event
5. What are the minimum NTFS permissions required to allow users to open documents and ru programs stored in a shared folder?
A. Full Control
B. Modify
C. Write
D. Read & Execute
E. List Folder Contents
6. Which of the follwing must be done to generate a log of resource access for a file or folder?
A. Configure NTFS permissions to allow the System account to audit resource access.
B. Configure audit entries to specify the types of access to audit.
C. Enable the Audit Privilege Use policy.
D. Enable the Audit Object Access policy
7. Bill complains that he is unable to access the department plan. You open the Security tab for the plan and you find that all permissions on the document are inherited from the plan's parent folder. There is a Deny Read permission assigned to a group to which Bill belongs. Which of the following methods would enable Bill to access the plan?
A. Modify the permissions on the parent folder by adding the permission Bill:Allow Full Control
B. Modify the permissions on the parent folder by adding the permission Bill:Allow Read.
C. Modify the permissions on the plan by adding the permission Bill:Allow Read.
D. Modify the permission on the plan by deselecting Allow Inheritable Permissions, choosing Copy, and removing the Deny permission.
E. Modify permissions on the pan by deselecting Allow Inheritable Permissions, choosing Copy, and adding the permission Bill:Allow Full Control.
F. Remove Bill from the group that is assigned the Deny permission.
8. Which of the following are valid criteria for a security log filter to identify specific file and folder access events?
A. The date of the event
B. The user that generated the event
C. The type of object access that generated the event
D. Success or failure audit
9. Which of the following tools allows you to administer a share on a remote server?
A. The Shared Folders snap-in
B. Windows Explorer running on the local machine, connected to the remote server's share or hidden drive share.
C. Windows Explorer running on the remote machine in a Terminal Services or Remote Desktop session.
D. The File Server Management console.
10. A folder is shared on a FAT32 volume. The Project Managers group is given Allow Full Control permission. The Project Engineers group is given Allow Read permission. Julie belongs to the Project Engineers group. She is promoted and is added to the Project Managers group. What are her effective permissions to the folder?
Answer: Full Control
11. Bill calls again to indicate that he still cannot access the departmental plan. You use the Effective Permissions tool, select Bills account, and the tool indicates that Bill is, in fact, allowed sufficient permissions. What might explain the discrepancy between the results of the Effective Permissions tool and the issue Bill is reporting?
Answer: The Effective Permissions tool is only an approximation of a user's access. It is possible that a permission entry is Network, that could be denying access. Permissions for logon groups are not evaluated by the Effective Permission tool Or, if you are not logged on as a Domain Admin, you may not be able to read all group memberships, which might skew the resulting permissions report.
12. A folder is shared on a NTFS volume, with the default share permissions. The Project Managers group is given Allow Full Control NTFS permission. Julie, who belongs to the Project Managers group, calls to report problems creating files in the folder. Why can't Julie create files?
本文属于 MS2274 测试题的一部分,相关测试题如下:Answer: The default share permission in Windows Server 2003 is Everyone: Allow Read permis-sions define the maximum effective permissions for files and folders in the share. The share permission restrict, you would need to modify the share permissions to allow, at a minimum,the Project Managers groups Change permission.
本来在Windows 下很简单的操作,到Linux上也有可能遇到问题。
比如在分辨率选项里没有你想要分辨率,而检测显示器也检测不到,这时候怎么办呢?
这种情况经常出现在:

大多数情况下只要更新一下显卡的驱动就可以解决这个问题,可以在新立得里搜索你需要的显卡驱动,安装好再重启一下X-Window,想要的分辨率就会出现了。
如果这样你的问题还是不能解决就要用大招啦,修改这个文件 /etc/X11/xorg.conf 注意"X11"中的"X"是大写的哦。
在修改之前一定要做备份,如果哪里没改好进不了图形界面,那不疯了......
sudo cp /etc/X11/xorg.conf /etc/X11/xorg.cof.bak
sudo gedit /etc/X11/xorg.conf
第一步
找到下面这段字符并修改它们之间的内容
Section "Monitor"
EndSection在这里可以根据需要修改,例如:定义显示器的型号、刷新率
Section "Monitor"
Identifier “Sumsang 913N”
Option “DPMS”
HorizSync 30-81
VertRefresh 56-75
EndSection如果你很懒可以直接这样:
Section "Monitor"
Identifier "通用显示器"
Option "DPMS"
HorizSync 30-60
VertRefresh 25-60
EndSection第二步
找到下面这段字符并修改它们之间的内容
Section "Screen"
EndSection还是那样,根据需要修改一下分辨率,色深等。只改 SubSection 就可以了。
SubSection “Display”
Depth 16
Modes “1280×800″ “1024×768″ “832×624″ “800×600″ “720×400″ “640×480″
EndSubSection
SubSection “Display”
Depth 24
Modes “1280×800″ “1024×768″ “832×624″ “800×600″ “720×400″ “640×480″
EndSubSection上面定义的是在16位色深下的分辨率和24位色深下的分辨率。
如果你比较勤快,也可以把其他色深的分辨率也写出来,用不用得到?再说吧。
常用的分辨率一般包括:
1024X600 1024X768 1175X664 1280X720 1280X768 1280X800 1280X900 1280X1024 1366X768 1400X1050 1440X900
更大的显示器:1600X1200 1680X1050 1776X1000 1920X1080 1920X1200
1. Which of the following statement about size of the cache for making shared folders available offline is correct?
A. By default, the cache size is set to 20 percent of the available disk space.
B. By default, the cache size is set to 15 percent of the available disk space.
C. By default, the cache size is set to 10 percent of the available disk space.
D. By default, the cache size is set to 5 percent of the available disk space.
2. To assign permissions to use accounts and groups for a shared folder. Which of the following tabs do you use?
A. The Permissions tab of the Properties dialog box of the shared folder.
B. The Sharing tab of the Properties dialog box of the shared folder.
C. The General tab of the Properties dialog box of the shared folder.
D. The Security tab of the Properties dialog box of the shared folder.
3. Which of the following NTFS folder permissions allow you to delete the folder?
A. Read
B. Read & Execute
C. Modify
D. Administer
4. Which of the following tabs in the Properties dialog box for the file or folder do you use to assign or modify NTFS permissions for a file or a folder?
A. Advanced
B. Permissions
C. Security
D. General
5. Which of the following statements about moving a file or folder are correct?
A. When you move a file from one folder to another folder on the same volume, the permissions on the file do not change.
B. When you move a file from a folder on an NTFS volume to a folder on a FAT volume, the permissions on the file do not change.
C. When you move a file from a folder on an NTFS volume to a folder on another NTFS volume, the permissions on the file match those of the destination folder.
D. When you move a file from a folder on an NTFS volume to a folder on the same volume, the permissions on the file match those of the destination folder.
6. Which of the following statements about combining shared folder permissions and NTFS permission are true?
A. You can use shared folder permission on all shared folders.
B. The Change shared folder permission is more restrictive than the Read NTFS permission.
C. You can use NTFS permissions on all shared folders.
D. The Read NTFS permission is more restrictive than the Change shared folder permission.
7. Which of the following users can assign permissions to user accounts and groups?
A. Administrators
B. Power users
C. Users with the Full Control permission
D. Owners of files and folders
8. Which of the following statements about copying a file or folder are correct?
A. When you copy a file from one folder to another folder on the same volume, the permissions on the files do not change.
B. When you copy a file from a folder on an NTFS volume to a folder on a FAT volume, the permissions on the file do not change.
C. When you copy a file from a folder on an NTFS volume to a folder on another NTFS volume. The permissions on the file match those of the destination folder.
D. When you copy a file from a folder on an NTFS volume to a folder on a FAT volume, the permissions are lost.
9. Which of the following statements about shared folder permissions and NTFS permissions are true?
A. NTFS permissions apply only when the resource is accessed over the network.
B. NTFS permissions apply whether the resource is accessed locally or over the net work.
C. Shared folder permissions apply only when the resource is accessed over the network.
D. Shared folder permissions apply whether the resource is accessed locally or over the network.
10. Which of the following permissions are shared folder permissions?
A. Read
B. Write
C. Modify
D. Full Control
11. If you are using both shared folder and NTFS permissions, the most restrictive permission is always the overriding permission.
12. Windows XP Professional automatically shares folder for administrative purposes. Theese shares are marked with a $ , which hides them from users who browse the computer.
13. When you rename a shared folder, the folder is no longer shared .
14. The system root folder, which is C:\Windows by default, is shared as Admin$ Administrators can access this shared folder to administer Windows XP Professional without knowing in which folder it is installed. Only members of the Administrators group have access to this share. Windows XP Professional assigns the Full Control permission to the Administrator group.
15. When you assign permission for public data folders, it is recommended that you assign the read&execute permission and the write permission to the Users group and the Full Control permission to the CREATOR OWNER user.
16. When you copy a shared folder, the original folder is still shared and the copy is not shared .
17. Because you use NTFS permissions to specify which users and groups can access files and folders and what these permissions allow users to do with the contents of the files or folder, why do you need to share a foler or use shared folder permissions?
Answer: Although NTFS security is effective whether a user gains access to the file or folder at the computer or over the network, NTFS permissions do not make folders available over the net work. Sharing folders is the only way to make folders and their contents available over the network. Shared folder permissions also provide another way to secure file resources. They can be used on FAT or FAT32 partitions, as well as NTFS partitions, whereas NTFS permissions are available only NTFS volumes.
18. If you don't want a user of group to gain access to a particular folder of file, should you deny access permissions to that folder or file?
Answer: You should not assign permissions to the folder or file rather than deny permission to access the folder or file. Denying permissions should be an exception, not common practice.
19. What is the purpose of the Traverse Folder/Execute File special permission?
Answer: Traverse Folder allows or denies moving through folders to access other files or folders, even when the suer has no permissions for the traversed folder. Execute File allows or denies running executable files(application files).
1. Which of the following LDIFDE commands changes the function of LDIFDE from export to import?
A. -i
B. -t
C. -f
D. -s
2. What object classes are possible to export and import using LDIFDE?
Answer: Any object in Active Dirctory can be exported or imported using LDIFDE, including users, groups, computer, or OUs. In addition, any property of these objects can be modified using LDIFDE.
3. You want to nest the IT Administrators group responsible for the Sales group inside the Sales group so that its members will have access to the same resources (set by permissions in an ACL) as the Sales group. From the Properties page of the IT Administrators group, what tab will you access to make the setting?
Answer: The Members Of tab is used for adding the IT Administrators group to the Sales group.
4. If you environment consists of two domains, one Windows Server 2003 and on Windows NT4, what group scopes can you use for assigning permissions on any resource on any domain-member computer?
本文属于 MS2274 测试题的一部分,相关测试题如下:Answer: In a Windows Server 2003 interim domain functional level domain, which is what you must be running to support a Windows NT 4 domain, you will only be able to use global groups as security principals. Domain local groups will only be useful on the domain controllers in the Windows Server 2003 domain, and universal groups cannot be used as security groups in a Windows Server 2003 interim domain functional level domain.
1. Which of the following statements about disk quotas in Windows XP Professional is correct?
A. Disk quotas track and control disk usage on a per-user, per-disk basis.
B. Disk quotas track and control disk usage on a per-group, per-volume basis.
C. Disk quotas track and control disk usage on a per-user, per-volume basis.
D. Disk quotas track and control disk usage on a per-group, per-disk basis.
2. Which of the following statement about disk quotas in Windows XP Professional is correct?
A. Disk quotas can only be applied to Windows XP Professional NTFS volumes.
B. Disk quotas can be applied to any Windows XP Professional volume.
C. You must be logged on with the administrator user account configure default quota management settings.
D. Members of the Administrators and Power Users groups can configure default quota management settings.
3. Which of the following files and folders will Windows XP Professional allow you to encrypt?
A. A file on an NTFS volume
B. A folder on a FAT volume
C. A file stored on a floppy
D. A folder on an NTFS volume
4. Which of the following functions does Check Disk perform?
A. Locate fragmented files and folders and arrange contiguously
B. Locate and attempt to repair file system errors
C. Locate bad sectors and recover readable information from those bad sectors
D. Delete temporary files and offline files
5. Which of the following types of files or data are good candidates for NTFS compression?
A. Encrypted data
B. Frequently updated data
C. Bitmaps
D. Static data
6.which of the following will Windows XP Professional allow you to compress using NTFS compression?
A. A FAT volume
B. An NTFS volume
C. A bitmap stored on a floppy
D. A folder on an NTFS volume
7. By default. The recovery agent for a computer running Windows XP Professional in a workgroup is the administrator of the local computer and the recovery agent for a computer running Windows XP Professional in a domain environment is the domain administrator.
8. The process of finding and consolidating fragmented files and folders is called defragmenting or defragmentation . The Windows XP Professional system tools that locates fragmented files and folders and arranges them in contiguous space is disk defragmenter.
9. How do you encrypt a folder? Is the folder actually encrypted?
Answer: To encrypt a folder, in the Properties dialog box for the folder, click the General tab, click Advanced, and then select the Encrypt Contents To Secure Data check box. All fiels placed in the folder are encrypted and the folder is now marked ofr encryption. Folder that are marked for encryption are not actually encrypted; only the files within the folder are encrypted.
10. When Bob tried to copy a compressed file from one NTFS volume to another, the files was not copied and he got an error message stating that there was not enough disk space for the file. Before he attempted to copy the file, Bob verified that there was enough room for the compressed bitmap on the destination volume. Why did he get the error message?
Answer: If you copy a compressed file to an NTFS volume with enough space for the uncompressed file, you might get an error message stating that there is not enough disk space for the file. The file will not be copied to the volume.
11. What is encryption and what is the Microsoft EFS?
Answer: Encryption makes information indecipherable to protect it from unauthorized viewing or use. Microsoft EFS provides encryption for data in NTFS files stored on disk. This encryption is public key based and runs as an integrated system service, making it easy to manage, difficult to attack. And transparent to the file owner.
在运行 Windows Server 2003 操作系统或 Windows XP Professional 的计算机上创建、修改和删除目录对象。还可使用 Ldifde 来扩展架构、将 Active Directory 用户和组信息导出到其他应用程序或服务,或者使用其他目录服务的数据来填充 Active Directory。
ldifde [-i] [-f FileName] [-s ServerName] [-c String1 String2] [-v] [-j Path] [-t PortNumber] [-d BaseDN] [-r LDAPFilter] [-p Scope] [-l LDAPAttributeList] [-o LDAPAttributeList] [-g] [-m] [-n] [-k] [-a UserDistinguishedName Password] [-b UserName Domain Password] [-?]----------DSADD----------向目录中添加特定类型的对象
创建组织单位
dsadd ou 组织单位名称 [-desc 描述] [{-s 服务器|-d 域}] [-u 用户名] [-p {密码|*}] [-q] [{-uc|-uoc|-uci}]创建域用户帐户
dsadd user UserDN 用户对象的可分辨名称 [-samid SAMName 指定使用SAM名作为该用户的唯一SAM帐户名] -pwd {Password|*} 密码创建计算机帐户
dsadd computer ComputerDN----------DSGET----------显示目录中特定对象的的选定属性
----------DSMOD----------在目录中修改特定类型的现有对象
修改用户帐户属性
dsmod user UserDN ...[-upn UPN] [-fn FirstName] [-mi Initial] [-ln LastName] [-display DisplayName] [-empid EmployeeID] [-pwd (Password | *)] [-desc Description] [-office Office] [-tel PhoneNumber] [-email E-mailAddress] [-hometel HomePhoneNumber] [-pager PagerNumber] [-mobile CellPhoneNumber] [-fax FaxNumber] [-iptel IPPhoneNumber] [-webpg WebPage] [-title Title] [-dept Department] [-company Company] [-mgr Manager] [-hmdir HomeDirectory] [-hmdrv DriveLetter:] [-profile ProfilePath] [-loscr ScriptPath] [-mustchpwd {yes | no}] [-canchpwd {yes | no}] [-reversiblepwd {yes | no}] [-pwdneverexpires {yes | no}] [-acctexpires NumberOfDays] [-disabled {yes | no}] [{-s Server | -d Domain}] [-u UserName] [-p {Password | *}] [-c] [-q] [{-uc | -uco | -uci}]重置用户帐户的密码
dsmod user UserDN -pwd 新密码 [-mustchpwd {yes | no}] 下次登录时修改此密码启用或禁用账户
dsmod user UserDN 可分辨名称 -disabled {yes|no} yes 禁用 no 启用修改计算机帐户属性
dsmod computer ComputerDN ...[-desc Description] [-loc Location] [-disabled {yes | no}] [-reset] [{-s Server | -d Domain}] [-u UserName] [-p {Password | *}] [-c] [-q] [{-uc | -uco | -uci}]重设计算机帐户
dsmod computer ComputerDN -reset启用或禁用计算机帐户
dsmod computer ComputerDN 可分辨名称 -disabled {yes|no} yes 禁止登录 no 允许登录将计算机帐户添加到组中
dsmod group GroupDN -addmbr ComputerDN----------DSMOVE----------移动单个对象或者重命名
----------DSQUERY----------按照指定的条件查询
----------DSRM----------从目录中删除某种特定类型的对象或任何常规对象
删除组织单位
dsrm OrganizationalUnitDN 指定要删除组织单位的可分辨名称 [-subtree 同时删除选定的组织单位和它所包含的任何对象]
1. After a period of expansion, your company created a second domain. Last week-end, a number of machines that had been in your domain ware moved to the new domain. When you open Active Directory User And Computers, the objects for those machines are still in you domain, and are displayed with a red "X" icon. What is the most appropriate course of action?
A. Enable the accounts
B. Disable the accounts
C. Reset the accounts
D. Delete the accounts
2. What platforms are capable of joining a domain?
A. Windows 95
B. Windows NT 4
C. Windows 98
D. Windows 2000
E. Windows Me
F. Windows XP
G. Windows Server 2003
3. What command-line tools will create a domain computer account in Active Directory?
A. NETDOM
B. DSADD
C. DSGET
D. NETSH
E. NSLOOKUP
4. You open a computer object and, on the Operationg System tab, discover that no properties are displayed. What causes these properties to be absent?
Answer: A computer has not joined the domain using that account. When a system joins the domain, by default it populates the properties shown on the Operating System tab.
5. A user reports that during a logon attempt, a message indicates that the computer cannot contact the domain because the domain controller is down or the computer account may be missing. You open Active Directory User and Computers and that computer's account appears normal. What steps should you take?
Answer: Reset the computer account, disjoin the computer from the domain, then rejoin it to the domain.
6. In the properties of a group, which tab will you access to add users to the group?
本文属于 MS2274 测试题的一部分,相关测试题如下:Answer: The Members tabis used fo adding members to the group.
1. Computer hardware profiles are an especially import feature for what type of computers?
A. Computers in a network environment
B. Computers in a domain
C. Stand-alone computers
D. Portable computers
2. Which of the following tools would you use to block the installation of unsigned files?
A. File Signature Verification
B. Driver Signing Options in the System Control Panel
C. System File Checker
D. Sigverif
3. Which of the following statements are true about hardware profiles in Windows XP Professional?
A. Windows XP Professional only prompts the user to select a hardware profile during startup if there are two or more profiles in the Available Hardware Profiles list.
B. It is a good idea to delete the default profile when you create a new profile to avoid confusion.
C. You can configure Windows XP Professional to always start the default profile by selecting the Do Not Display The Select Hardware Profile check box.
D. You can select the Wait Until I Select A Hardware Profile option to have Windows XP Professional wait for you to select a profile at startup.
4. Which of the following devices are not shown by default in Device Manager?
A. Devices sharing an IRQ
B. Phantom devices
C. Plug and play devices
D. Non-Plug and Play device
5. Windows XP Professional creates an initial profile during installation and assigns it the name of profile 1 (Current) in the list of hardware profiles available on the computer.
6. Adding processors to your system to improve performance is called Scaling.
7. DMAs(direct memory access) are channels that allow a hardware device, such as a floppy disk drive, to access memory dirctly, without interrupting the microprocessor.
8. Windows XP Professional automatically identifies Plug and Play devices and arbitrates their resource requests; the resource allocation among these devices is not permanent.
9. You get a call on the help desk from a user wondering why there is no Wireless Link icon in Control Panel on her desktop computer like the one on her laptop computers. What should you tell the user?
Answer: Tell the user that the Wireless Link icon appears in Control Panel only if she has already installed an infrared device on her computer. There must not be any infrared devices installed on her desktop computer.
10. Why would you install a hardware device manually?
Answer: If Windows XP Professional fails to automatically detect a hardware device.
11. why does Microsoft digitally sign the files in Windows XP Professional?
Answer: Windows XP Professional drivers and operating system files have been digitally signed by Microsoft to altered files. Some applications overwrite existing operating files as part of their installation process, which might cause system errors that are difficult to troubleshoot.