单项选择题
You are the network administrator for ExamSheet inc. Two users named Eric and Julia share a Windows 2000 Professional computer. Eric’s user account is a member of the local Administrator group. Eric needs to share files with Julia. Eric wants Julia to be able to change any of the shared files and to create her own files if necessary.
Eric wants to prevent Julia from changing the permissions on file that Eric creates. To accomplish his goal, Eric creates a folder named C:\Data. He changes the NTFS permission on C:\Data to allow his local user account Full Control permissions and to allow Julia’s local user account default permissions.
Eric places 10 files in the folder. When Julia logs on to the computer using her local user account and opens a file in C:\Data, she cannot save the changes to the file. Julia also cannot create any new files in the folder. You need to help Eric configure the correct permissions of C:\Data.
What should you instruct Eric to do?()
A.Add Julia’s user account to the local Power Users group.
B.Add Julia’s user account to the local Administrators group.
C.Allow Julia’s user account Write permissions to C:\Data.
D.Allow Julia’s user account Full Control permission to C:\Data.
相关考题
-
单项选择题
You are the administrator of a Windows 2000 network. A user named Carlos configures a shared folder named Technical_Data on his Windows 2000 Professional computer. Carlos wants to audit access to the Technical_Data folder and track any attempts to delete files. Carlos configures auditing for Technical_Data, as shown in the exhibit. The Security Log on Carlos’s computer is set to a maximum log file size of 512 KB and to Overwrite events as needed. The next day Carlos reports that files were deleted from the Folder. However, no events were generates in his computer’s Security Log. Carlos needs to discover who is deleting files on his computer. What should you do?()
A.Restart the Security Accounts Manager Service.
B.Modify the Security Log size settings to set the file size to 2,048 KB.
C.In the Local Security Policy setting for Audit Object Access, select the Success and Failure check boxes.
D.In the Auditing Entry dial box for Technical_Data, select the Change button and change Everyone to Authenticated Users. -
单项选择题
You are the network administrator for ExamSheet and you support the portable computer users. An Account Executive named Hildegard frequently travels to meet with customers and uses her portable computer to demonstrate the company’s new software products. Hildegard needs to update these products frequently so customers can evaluate the latest software releases. You need to allow Hildegard to install the product updates while limiting her ability to perform other administrative duties on her portable computer. What should you do?()
A.Add Hildegard’s user accounts to the Pre-Windows 2000 Compatible Access group.
B.Add Hildegard’s user account to the local Power Users group.
C.Allow Hildegard’s user account Full Control permission to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory.
D.Allow Hildegard’s user account Write permissions to the Program Files folder. Propagate the permissions to all the subdirectories and files in that directory. -
单项选择题
Saul needs access to files that are in the Accounting folder on his computer. A local group named accounting is granted full control permission to the accounting folder and the files within it. Saul is a member of the accounting local group but he cannot access the files that he needs. What should you do?()
A.Grant Saul NTFS permission so that he can access any parent folder or files in the shared sales folder.
B.Share the Sales folder and grant Saul shared folder permission to access the shared sales folder.
C.Remove Saul from any other groups that have been explicitly denied access to the accounting folder.
D.Delete the Sales local group and recreate, add individual user accounts from the sales department back into sales local group.
