单项选择题

A.Stop the computer browser service, and disable the startup state. 
B.Change the comment for the share to hidden:Yes 
C.Change the share name to private_files$. 
D.Add a hidden entry to the  HKLMSystem\currentcontrolset\services\larmanserver\shares\private_files registry value entry. 

相关考题

单项选择题 You need to create a web share on your Windows 2000 Professional computer named Admin01. You create a folder named reports. Then you configure web sharing on Reports.  You name the share WebReports and allow Read permissions on the share. You test the web share by pointing to http://admin01/WebReports from another computer. You receive the following error message, ‘You are not authorized to view this page.’ You need to be able to access the folder.  What must you do?()

单项选择题 You are the network administrator for ExamSheet inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrator group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary.  Eric wants to prevent Julia from changing the permissions on file that Eric creates. To accomplish his goal, Eric creates a folder named C:\Data. He changes the NTFS permission on C:\Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions.  Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:\Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:\Data.  What should you instruct Eric to do?()

单项选择题 You are the administrator of a Windows 2000 network. A user named Carlos configures a shared folder named Technical_Data on his Windows 2000 Professional computer. Carlos wants to audit access to the Technical_Data folder and track any attempts to delete files. Carlos configures auditing for Technical_Data, as shown in the exhibit. The Security Log on Carlos’s computer is set to a maximum log file size of 512 KB and to Overwrite events as needed.  The next day Carlos reports that files were deleted from the Folder. However, no events were  generates in his computer’s Security Log.  Carlos needs to discover who is deleting files on his computer. What should you do?()