单项选择题

A.Change the Netlogon service startup setting to manual.
B.Disable the Disable CTRL+ALT+DEL requirement for logon option in the local group policy.
C.In Control Panel, modify the startup and recovery settings in the system option.
D.In Control Panel, add the appropriate user accounts to the Users And Passwords setting.

相关考题

单项选择题 Ten users at your office run an accounting application on their Windows NT Workstation 4.0 computers. The application stores its data in a shared network folder named Accdata on a Windows 2000 Server computer named Server1. You upgrade all 10 computers to Windows 2000 Professional and verify that all applications are compatible with Windows 2000. After the upgrade, some users report that they are receiving intermittent data-corruption error messages. They are also receiving data file-version mismatch error messages. When these errors occur, your only method of recovery is to restore the entire contents of the Accdata folder from a known good backup copy.  You need to prevent these errors from occurring in the future. What should you do? ()

单项选择题 YouarethenetworkadministratorforCompanyInc.TwousersnamedEricandJuliashareaWindows2000Professionalcomputer.Eric’suseraccountisamemberofthelocalAdministratorsgroup.EricneedstosharefileswithJulia.EricwantsJuliatobeabletochangeanyofthesharedfilesandtocreateherownfilesifnecessary.EricwantstopreventJuliafromchangingthepermissionsonfilesthatEriccreates.Toaccomplishhisgoal,EriccreatesafoldernamedC:\Data.HechangestheNTFSpermissiononC:\DatatoallowhislocaluseraccountFullControlpermissionsandtoallowJulia’slocaluseraccountdefaultpermissions.Ericplaces10filesinthefolder.WhenJulialogsontothecomputerusingherlocaluseraccountandopensafileinC:\Data,shecannotsavethechangestothefile.Juliaalsocannotcreateanynewfilesinthefolder.YouneedtohelpEricconfigurethecorrectpermissionsofC:\Data.WhatshouldyouinstructErictodo?()

单项选择题 You are the administrator of a Windows 2000 network. A user named Carlos configures a shared folder named Technical_Data on his Windows 2000 Professional computer. Carlos wants to audit access to the Technical_Data folder and track any attempts to delete files. Carlos configures auditing for Technical_Data, as shown in the exhibit.  The Security Log on Carlos’s computer is set to a maximum log file size of 512 KB and to overwrite events as needed. The next day Carlos reports that files were deleted from the Folder. However, no events were generated in his computer’s Security Log. Carlos needs to discover who is deleting files on his computer. What should you do?()