网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()
A

Create a new display filter and apply the filter to the capture.

B

Create a new capture filter and apply the filter to the capture.

C

Populate the aliases table and apply the aliases to the capture.

D

Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()A Create a new display filter and apply the filter to the capture.B Create a new capture filter and apply the filter to the capture.C Populate the aliases table and apply the aliases to the capture.D Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.” 相关考题
考题 Your network consists of a single Active Directory domain named contoso.com. All network servers run Windows Server 2003 Service Pack 2 (SP2). You have a DNS zone named contoso.com. The zone is configured to support dynamic updates. All servers in the company are registered in the contoso.com zone. You change the IP address of a server named Server1. From a server named Server2, you attempt to ping Server1 by host name, but the request fails. You successfully ping the new IP address of Server1. You need to ensure that Server2 can connect to Server1 by using the Server1 host name. Which two actions should you perform?()A、On Server1, restart the Netlogon service.B、On Server2, run the Ipconfig /flushdns command.C、On Server1, run the Ipconfig /Registerdns command.D、On the DNS server, run the Dnscmd /zonerefresh contoso.com command.

考题 You are a security administrator for your company. All servers run Windows Server 2003. All client computers run Windows XP Professional.    You install Software Update Services (SUS) on a server named Server1. The company’s written security policy states that all updates must be tested and approved before they are installed on network computers.    You need to ensure that SUS uses the minimum amount of disk space on Server1.  What should you do?()A、 Configure Server1 to redirect client computers to the Microsoft Windows Update servers.B、 Compress the folder in which the downloaded updates are stored.C、 Configure Server1 to store only the locales that are needed.D、 Download the updates, and then delete updates that are not approved for client computers.

考题 Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has IPSec enabled. Several users report that they cannot connect to Server1. You need to see how many IPSec connection attempts failed due to authentication failures. What should you do?()A、From IP Security Monitor, view the Main Mode Statistics.  B、From Microsoft Baseline Security Analyzer, scan Server1.  C、From the Security event log, view the events from the IPSec source.  D、From System Monitor, add the IPSec V4 Driver : Active Security Associations counter. 

考题 You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1.You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses.You need to display mnemonic host names instead of IP addresses for all the frames. What should you do? ()A、Create a new display filter and apply the filter to the capture.B、Create a new capture filter and apply the filter to the capture.C、Populate the Aliases table and apply the aliases to the capture.D、Configure the Network Monitor application to enable the Enable Conversations option. Recapture the data to a new file.

考题 Your network contains an Active Directory domain. All domain controllers run Windows Server 2008.   The functional level of the domain is Windows Server 2003. All client computers run Windows 7.  You install Windows Server 2008 R2 on a server named Server1.  You need to perform an offline domain join of Server1.   Which two actions should you perform()A、From Server1, run djoin.exe.B、From Server1, run netdom.exe.C、From a Windows 7 computer, run djoin.exe.D、Upgrade one domain controller to Windows Server 2008 R2.E、Raise the functional level of the domain to Windows Server 2008.

考题 You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. You need to add a graphical user interface (GUI) to Server1. Which tool should you use?()A、the dism.exe commandB、the Add-WindowsFeature cmdletC、the imagex.exe commandD、the setup.exe commandE、the ocsetup.exe commandF、the Add-WindowsPackage cmdletG、the Install-Module cmdletH、the Install-RoleService cmdlet

考题 You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You open the IP Security Monitor snap-in and see the information shown in the exhibit. (Click the Exhibit button.) You need to ensure that all communications to Server1 are encrypted. What should you do?()A、/Modify the Local Security Policy on Server1. B、Modify the Research IPSec Policy Group Policy object. C、Enable Windows Firewall and do not allow exceptions. D、From the Properties of the Local Area Connection, modify the Authentication settings.

考题 You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling

考题 You have a server named Server1 that runs Windows Server 2012 R2. You plan to create an image of Server1. You need to remove the source files for all server roles that are not installed on Server1. Which tool should you use?()A、servermanagercmd.exeB、imagex.exeC、dism.exeD、ocsetup.exe

考题 You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()A、the Security Templates snap-inB、the Security Configuration WizardC、the Microsoft Baseline Security AnalyzerD、the Security Configuration and Analysis snap-in

考题 Your network contains two Active Directory sites named Site1 and Site2. Site1 contains a server named Server1. Server1 runs a custom application named App1.Users in Site2 report that they cannot access App1 on Server1. Users in Site1 can access App1.Server1 has a Windows Firewall with Advanced Security rule named Rule1.You discover that Rule1 blocks the connection to App1.You verify that Server1 has no connection security rules.You need to ensure that the Site2 users can connect to Server1.What should you modify in Rule1?()A、the authorized computers listB、the authorized users listC、the edge traversal settingsD、the scope

考题 You are the administrator of a SQL Server 2005 computer named SQL1. SQL1 is a member of a Microsoft Active Directory domain. You do not have any rights or privileges to perform domain administration. However, you have been granted membership in the local Administrators group on SQL1. You perform most of the management of SQL1 from your administrative workstation. However, for security reasons, you want to track all attempts for interactive logons and network connections to SQL1. What should you do?()A、Create a Group Policy object (GPO) that is configured for success and failure auditing of the Audit account logon events setting. Ask the domain administrator to link the GPO to the object containing SQL1.B、Configure the SQL Server service on SQL1 to audit all successful and failed logon attempts.C、Edit the local security policy of SQL1. Then, configure success and failure auditing on the Audit logon events setting.D、Run the SQL Server Profiler and use a standard default template.

考题 Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A、In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B、In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C、In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D、In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.

考题 单选题You have a server named Server1 that runs Windows Server 2012 R2. You plan to create an image of Server1. You need to remove the source files for all server roles that are not installed on Server1. Which tool should you use?()A servermanagercmd.exeB imagex.exeC dism.exeD ocsetup.exe

考题 多选题Your network consists of a single Active Directory domain named contoso.com. All network servers run Windows Server 2003 Service Pack 2 (SP2). You have a DNS zone named contoso.com. The zone is configured to support dynamic updates. All servers in the company are registered in the contoso.com zone. You change the IP address of a server named Server1. From a server named Server2, you attempt to ping Server1 by host name, but the request fails. You successfully ping the new IP address of Server1. You need to ensure that Server2 can connect to Server1 by using the Server1 host name. Which two actions should you perform?()AOn Server1, restart the Netlogon service.BOn Server2, run the Ipconfig /flushdns command.COn Server1, run the Ipconfig /Registerdns command.DOn the DNS server, run the Dnscmd /zonerefresh contoso.com command.

考题 单选题Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.

考题 单选题Your company has an Active Directory domain. You install an Enterprise Root certification authority (CA) on a member server named Server1. You need to ensure that only the Security Manager is authorized to revoke certificates that are supplied by Server1. What should you do()A Remove the Request Certificates permission from the Domain Users group.B Remove the Request Certificated permission from the Authenticated Users group.C Assign the Allow - Manage CA permission toonly  the Security Manager user Account.D Assign the Allow - Issue and Manage Certificates permission to only the Security Manger user account

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain.  The domain contains a Windows Server 2003 computer named Server1 that is located in an organizational unit (OU) named Servers. Server1 contains confidential data, and all network communications with Server1 must be encrypted by using IPSec.   The default Client (Respond Only) IPSec policy is enabled in the Default Domain Policy Group Policy object (GPO). You create a new GPO and link it to the Servers OU. You configure the new GPO by creating and enabling a custom IPSec policy. You monitor and discover that network communications with Server1 are not being encrypted.  You need to view all IPSec policies that are being applied to Server1.   What should you do?  ()A  Use Local Security Policy to view the Security Options for Server1.B  Use Resultant Set of Policy (RSoP) to run an RSoP logging mode query to view the IP Security Policies on Local Computer for Server1.C  Use Resultant Set of Policy (RSoP) to run an RSoP planning mode query to view the Security Options for Server1.D  Use IP Security Monitor to view the Active Policy for Server1.E  Use IP Security Monitor to view the IKE Policies for Server1.

考题 单选题You are a network administrator for your company. The network consists of a single Active Directory domain and contains 10 Windows Server 2003 computers.   You install a new service on a server named Server1. The new service requires that you restart Server1. When you attempt to restart Server1, the logon screen does not appear. You turn off and then turn on the power for Server1. The logon screen does not appear. You attempt to recover the failed server by using the Last Known Good Configuration startup option. It is unsuccessful. You attempt to recover Server1 by using the Safe Mode startup options. All Safe Mode options are unsuccessful.   You restore Server1. Server1 restarts successfully. You discover that Server1 failed because the new service is not compatible with a security patch.   You want to configure all servers so that you can recover from this type of failure by using the minimum amount of time and by minimizing data loss. You need to ensure that in the future, other services that fail do not result in the same type of failure.   What should you do? ()A  Use Add or Remove Programs.B  Install and use the Recovery Console.C  Use Automated System Recovery (ASR).D  Use Device Driver Roll Back.

考题 单选题You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames. What should you do?()A Create a new display filter and apply the filter to the capture.B Create a new capture filter and apply the filter to the capture.C Populate the Aliases table and apply the aliases to the capture.D Configure the Network Monitor application to enable the Enable Conversations option. Recapture the data to a new file.

考题 单选题Your network contains a DNS server that has a reverse lookup zone for all of your network segments. You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). An IP security policy is assigned to Server1.  You verify IPSec traffic and see that the current security associations display only by IP address. You need to view the fully qualified domain names for all security associations.  What should you do?()A From the DNS console, add Server1 as a name server.B From the DNS console, change dynamic updates to Secure only.C From IP Security Monitor on Server1, enable DNS name resolution.D From IP Security Monitor on Server1, create a new taskpad view.

考题 单选题Your network contains two Active Directory sites named Site1 and Site2. Site1 contains a server named Server1. Server1 runs a custom application named App1.Users in Site2 report that they cannot access App1 on Server1. Users in Site1 can access App1.Server1 has a Windows Firewall with Advanced Security rule named Rule1.You discover that Rule1 blocks the connection to App1.You verify that Server1 has no connection security rules.You need to ensure that the Site2 users can connect to Server1.What should you modify in Rule1?()A the authorized computers listB the authorized users listC the edge traversal settingsD the scope

考题 多选题You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1. You need to add a graphical user interface (GUI) to Server1. Which tool should you use?()Athe dism.exe commandBthe Add-WindowsFeature cmdletCthe imagex.exe commandDthe setup.exe commandEthe ocsetup.exe commandFthe Add-WindowsPackage cmdletGthe Install-Module cmdletHthe Install-RoleService cmdlet