网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets? ()
A
Advanced Correlation Engine
B
Advanced Notification Engine
C
CiscoWorks Dashboard
D
Management Center for CSA
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets? ()A Advanced Correlation EngineB Advanced Notification EngineC CiscoWorks DashboardD Management Center for CSA” 相关考题
考题
You develop a Windows Communication Foundation (WCF) service. You enable all performance counters and run multiple calls to the service.The service must isolate session data to each user. You need to monitor the instancing behaviour used in the service.Which performance counter should you monitor?()A. ServiceModeService 4.0.0.0\CallsB. ServiceModeService 4.0.0.0\InstancesC. ASP.Net StateService \ Server Sessions ActiveD. ASP.Net StateService \ Server Sessions Total
考题
Which command allows you to decode packets in JUNOS?()
A.debug packet interface-nameB.show interface extensiveC.traceoptions interface-nameD.monitor traffic interface interface-name
考题
Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets? ()A、 Advanced Correlation EngineB、 Advanced Notification EngineC、 CiscoWorks DashboardD、 Management Center for CSA
考题
Which command allows you to view interface usage details in real-time?()A、user@host debug interface interface-nameB、user@host monitor usage interface-nameC、user@host monitor interface interface-nameD、user@host traceoptions interface interface-name
考题
Which can NOT be selected for supported services in Cisco WCS Planning Tool?()A、data/coverageB、location with Monitor Mode access pointsC、demandD、high density
考题
Which of the following is an easy-to-use tool that allows you to easily configure and monitor Cisco Integrated Services Routers?()A、Cisco NAC ApplianceB、Cisco SDMC、Cisco MWAMD、Cisco Unified Communications Manager Express
考题
Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor
考题
Which command would you use to view interface usage details in real time?()A、show interfaces terseB、show interfaces extensiveC、monitor interface trafficD、monitor traffic interface
考题
Which command allows you to decode packets in JUNOS?()A、debug packet interface-nameB、show interface extensiveC、traceoptions interface-nameD、monitor traffic interface interface-name
考题
You are the network administrator for Humongous Insurance. The network consists of a single Active Directory domain named humongous.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure several Group Policy objects (GPOs) to enforce the use of IPSec for certain types of communication between specified computers. A server named Server2 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Server2 are encrypted by using IPSec. However, when you monitor network traffic, you notice that Telnet connections are not being encrypted.You need to view all of the IPSec settings that are applied to Server2 by GPOs. Which tool should you use?()A、the IP Security Policy Management consoleB、the IP Security Monitor consoleC、the Resultant Set of Policy consoleD、Microsoft Baseline Security Analyzer (MBSA)
考题
You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)A、The security update in the synchronization log.B、The security update in the approval log.C、The status of Internet Explorer 5.5x in the Monitor Server window.D、The status of Internet Explorer 6.x in the Monitor Server window.
考题
You are the network administrator for your company. The network contains 12 Windows Server 2003 computers and 300 Windows XP Professional computers. Three servers named Server4, Server5, and Server6 run a critical business application. When performing performance baselining on these three servers, you notice that Server6 has a larger number of concurrently connected users at any given moment than Server4 or Server5. The additional workload is causing performance problems on Server6. You need to identify which client computers are connecting to Server6.You plan to run Network Monitor on Server6 to capture all packets sent to Server6. The capture task must be configured to meet the following requirements.To reduce the size of the captured data, you want to capture only the packet headers.If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets. Which two tasks should you perform to configure Network Monitor?()A、Configure the Network Monitor display filters.B、Configure the Network Monitor capture filters.C、Increase the Network Monitor buffer size setting.D、Decrease the Network Monitor buffer size setting.E、Increase the Network Monitor frame size setting.F、Decrease the Network Monitor frame size setting.
考题
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks. A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data. You should utilize the least amount of administrative effort to finish the task. Which tool will you utilize to finish the task?() A、To finish the task, you should utilize Resource Governor. B、To finish the task, you should utilize Database Engine Tuning Advisor.C、To finish the task, you should utilize Extended Events. D、To finish the task, you should utilize Performance Monitor (SYSMON).
考题
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. A user reports that when he runs a query, it takes a quite long time and it is still unfinished. As the IT support, you have to verify whether the query is blocked. Which tool should you use? () A、You should use the Database Engine Tuning Advisor tool B、You should use the Windows System Monitor tool C、You should use the Job Activity Monitor tool in Microsoft SQL Server Management Studio D、You should use the Activity Monitor tool in Microsoft SQL Server Management Studio
考题
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do? ()A、Create a scheduled task that runs the Netsh tool.B、Create a scheduled task that runs the Nmcap tool.C、From Network Monitor,configure the General options.D、From Network Monitor,configure the Capture options.
考题
Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()A、Add the Security Compliance group to the local administrators group of each VMB、Add the Security Compliance group to the local administrators group of each Hyper-V serverC、In the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupD、in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group
考题
单选题Which of the following would be used to monitor unauthorized access to data files?()A
Performance Log and AlertsB
Event ViewerC
Security Configuration and AnalysisD
IP Security Monitor
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1. What should you do?()A
Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B
Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C
Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D
Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
考题
单选题You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week. What should you do?()A
From Reliability Monitor, review the informational events.B
From System Information, review the Software Environment.C
From Performance Monitor, review the System Diagnostics Report.D
From Performance Monitor, run the System Performance Data Collector Set.
考题
单选题Which command allows you to view interface usage details in real-time?()A
user@host debug interface interface-nameB
user@host monitor usage interface-nameC
user@host monitor interface interface-nameD
user@host traceoptions interface interface-name
考题
多选题You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)AThe security update in the synchronization log.BThe security update in the approval log.CThe status of Internet Explorer 5.5x in the Monitor Server window.DThe status of Internet Explorer 6.x in the Monitor Server window.
考题
单选题You develop a Windows Communication Foundation (WCF) service. You enable all performance counters and run multiple calls to the service.The service must isolate session data to each user. You need to monitor the instancing behaviour used in the service. Which performance counter should you monitor?()A
ServiceModeService 4.0.0.0/CallsB
ServiceModeService 4.0.0.0/InstancesC
ASP.Net StateService / Server Sessions ActiveD
ASP.Net StateService / Server Sessions Total
考题
单选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks. A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data. You should utilize the least amount of administrative effort to finish the task. Which tool will you utilize to finish the task?()A
To finish the task, you should utilize Resource Governor. B
To finish the task, you should utilize Database Engine Tuning Advisor.C
To finish the task, you should utilize Extended Events. D
To finish the task, you should utilize Performance Monitor (SYSMON).
考题
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. A user reports that when he runs a query, it takes a quite long time and it is still unfinished. As the IT support, you have to verify whether the query is blocked. Which tool should you use? ()A
You should use the Database Engine Tuning Advisor tool B
You should use the Windows System Monitor tool C
You should use the Job Activity Monitor tool in Microsoft SQL Server Management Studio D
You should use the Activity Monitor tool in Microsoft SQL Server Management Studio
考题
单选题You have a computer that runs Windows 7. You need to identify the disk, memory, CPU, and networkresources that an application is currently using. Which tool should you use?()A
Component ServicesB
Performance Information and ToolsC
Reliability MonitorD
Resource Monitor
考题
单选题Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()A
Add the Security Compliance group to the local administrators group of each VMB
Add the Security Compliance group to the local administrators group of each Hyper-V serverC
In the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupD
in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group
考题
单选题You create a new Active Directory domain. The functional level of the domain is Windows Server 2008 R2. The domain contains five domain controllers. You need to monitor the replication of the group policy template files. Which tool should you use()A
DfsrdiagB
FsutilC
NtdsutilD
Ntfrsutl
热门标签
最新试卷