网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()
A

to provide a keepalive mechanism

B

to pull event logs from the router

C

to extract relevant SNMP information

D

to perform application-level accounting


参考答案

参考解析
解析: 暂无解析
更多 “单选题As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()A to provide a keepalive mechanismB to pull event logs from the routerC to extract relevant SNMP informationD to perform application-level accounting” 相关考题
考题 Your network contains a server named Server1 that runs Windows Server 2008 R2.You have a user named User1.You need to ensure that User1 can view the events in the Security event log. The solution must minimize the number of rights assigned to User1.What should you do?()A. In Event Viewer, filter the Security log.B. In Event Viewer, configure the properties of the Security log.C. In the Local Security Policy console, modify the Security Options.D. In the Registry Editor, add a Security Descriptor Definition Language (SDDL) value.

考题 Your network contains a server named Server1 that runs Windows Server 2008 R2.You need to ensure that an administrator is notified by e-mail if the Event Viewer logs any error.What should you do from the Event Viewer console?()A. Create a custom view, and then click the Filter Current Custom View action.B. Create a custom view, and then click the Attach Task to This Custom View action.C. From the System log, click the Filter Current Log action.D. From the System log, select an Error event, and then click the Attach Task to This Event action.

考题 Your end user customer has not requested a ServicePac to cover the base unit and options they have purchased.  What is a compelling reason to offer service? ()A、IBM ServicePacs remove a liability from you the reseller in the event of fireB、IBM ServicePacs remove a liability from you the reseller in the event of floodingC、IBM ServicePacs provide improved warranty coverageD、Service just adds a layer of cost you do not needE、all of the above

考题 Your network contain 10 domain controller that run Windows Server    R2.   The network contain a member server that is configured to collect all of events that occur on the  domain controllers.   Your need to ensure that administrators are notified when a specific event occurs on any of the  domain controllers. You want to achive the goal by using the minimum amount effort.   What should you do()A、From Event Viewer on the member server, create a subscription.B、From Event Viewer on each domain controller, create a subscription.C、From Event Viewer on the member server, run the Create Basic Task Wizard.D、From Event Viewer on each domain controller,run the Create Basic Task Wizard.

考题 You are the network administrator for The network consists of a single Active Directory domain named The TestKing Staff department has a Windows 2003 computer that functions as a file server. The computer contains a folder named TestKingData. Auditing is enabled on the TestKingData folder. The TestKing Staff department reports that confidential files were deleted from the folder. You need to identify the user who deleted the confidential files. What should you do?()A、In Event Viewer, create a new log view from the security log. Filter the log view to display only success audits.B、In Event Viewer, create a new log view from the security log. Filter the log view to display only failure audits.C、In Event Viewer, create a new log view from the system log. Filter the log view to display only success audits.D、In Event Viewer, create a new log view from the system log. Filter the log view to display only failure audits.

考题 As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()A、to provide a keepalive mechanismB、to pull event logs from the routerC、to extract relevant SNMP informationD、to perform application-level accounting

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named King uses a client computer named TestKing1. This computer has a locally attached tape device. You grant King the necessary permission to perform backups of a member server named TestKingSrvB. King runs the Backup utility on TestKing1 to back up the files located on TestKingSrvB. You need to use your client computer to view the most recent backup logs for TestKingSrvB. What should you do?()A、Use Notepad to view the contents of the backup report located on TestKingSrvb.B、Use Notepad to view the contents of the backup report located on TestKing1.C、Use Event Viewer to view the contents of the application log located on TestKingSrvb.D、Use Event Viewer to view the contents of the application log located on TestKing1

考题 Your network contains 100 servers that run Windows Server 2008 R2.A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network.You need to define the Custom Event Delivery Optimization settings on Server1.Which tool should you use?()A、Event ViewerB、Task SchedulerC、WecutilD、Wevtutil

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named Peter uses a client computer named Client1. This computer has a locally attached tape device. You grant Peter the necessary permissions to perform backups of a member server named Server1. Peter runs the Backup utility on Client1 to back up the files located on Server1. You need use your client computer to view the most recent backup logs for Server1. What should you do? ()A、Use Notepad to view the contents of the backup report located on Server1.B、Use Notepad to view the contents of the backup report located on Client1.C、Use Event Viewer to view the contents of the application log located on Server1.D、Use Event Viewer to view the contents of the application log located on Client1.

考题 You have an Exchange Server 2010 organization.You need to determine why a remote SMTP server rejects e-mail sent from your organization.What should you do?()A、Review the application event logs.B、Review the message tracking logs.C、Set the Protocol logging level to Verbose on the Receive connectors and then review the protocol log files.D、Set the Protocol logging level to Verbose on the Send connectors and then review the protocol log files.

考题 You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   The company security policy requires complex passwords on all the Microsoft Windows Mobilebased devices.   You provide a Microsoft Windows Mobile 5.0 smartphonebased device to a new user. The first time the user uses the device, the user is not prompted for a password. You need to ensure that the user is prompted for a password.   What should you do?()A、Instruct the user to set a PIN on the mobile device.B、Instruct the user to perform Microsoft Exchange ActiveSync synchronization Over-The-Air (OTA).C、On the Device Security Settings tab, select the Require both numbers and letters option.D、Add the user account of the user to the Exceptions list on the Device Security Settings tab.

考题 Your network consists of a single Active Directory domain. You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the application event logs for all the Web servers. The archived logs must contain all information from the original logs. What should you do? ()A、Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.B、Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file type.C、On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer, and then export the settings.D、Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.

考题 You are the network administrator for. You are the administrator of a Windows Server 2003 computer named TestKing3. Newly hired employees recently started storing files on TestKing3. Now users report that Testking3 is responding much slower than it did before the additional users were added. You suspect the disk subsystem needs to be upgraded to accommodate the additional user load. You need to confirm whether the disk subsystem on TestKing3 needs to be upgraded. What should you do?()A、Configure a Performance Logs and Alerts on the %Free space counter.B、Use Device Manager to populate volume settings and examine the properties of the disk drives on TestKing3.C、Use Event View to examine the system logs and search the system logs for event logs for events generated by the disk event source.D、Use System Monitor to monitor counters based on the PhysicalDisk object

考题 Your network contains a DNS server named DNS1 that runs Windows Server 2008 R2.You need to be notified by e-mail if the DNS service logs errors or warnings. The solution must minimize the number of e-mail notifications you receive. What should you do?()A、Create an alert in Performance Monitor.B、Run the Configure a DNS Server Wizard.C、Select the DNS Server log from Event Viewer and attach a task to the log.D、Create a custom view from Event Viewer and attach a task to the custom view.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named King uses a client computer named TestKing1. This computer has a locally attached tape device. You grant King the necessary permission to perform backups of a member server named TestKingSrvB. King runs the Backup utility on TestKing1 to back up the files located on TestKingSrvB. You need to use your client computer to view the most recent backup logs for TestKingSrvB. What should you do?()A Use Notepad to view the contents of the backup report located on TestKingSrvb.B Use Notepad to view the contents of the backup report located on TestKing1.C Use Event Viewer to view the contents of the application log located on TestKingSrvb.D Use Event Viewer to view the contents of the application log located on TestKing1

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named Peter uses a client computer named Client1. This computer has a locally attached tape device. You grant Peter the necessary permissions to perform backups of a member server named Server1. Peter runs the Backup utility on Client1 to back up the files located on Server1. You need use your client computer to view the most recent backup logs for Server1. What should you do? ()A Use Notepad to view the contents of the backup report located on Server1.B Use Notepad to view the contents of the backup report located on Client1.C Use Event Viewer to view the contents of the application log located on Server1.D Use Event Viewer to view the contents of the application log located on Client1.

考题 单选题You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   The company security policy requires complex passwords on all the Microsoft Windows Mobilebased devices.   You provide a Microsoft Windows Mobile 5.0 smartphonebased device to a new user. The first time the user uses the device, the user is not prompted for a password. You need to ensure that the user is prompted for a password.   What should you do?()A Instruct the user to set a PIN on the mobile device.B Instruct the user to perform Microsoft Exchange ActiveSync synchronization Over-The-Air (OTA).C On the Device Security Settings tab, select the Require both numbers and letters option.D Add the user account of the user to the Exceptions list on the Device Security Settings tab.

考题 单选题Your network contains a DNS server named DNS1 that runs Windows Server 2008 R2.You need to be notified by e-mail if the DNS service logs errors or warnings. The solution must minimize the number of e-mail notifications you receive. What should you do?()A Create an alert in Performance Monitor.B Run the Configure a DNS Server Wizard.C Select the DNS Server log from Event Viewer and attach a task to the log.D Create a custom view from Event Viewer and attach a task to the custom view.

考题 单选题You are the network administrator for. You are the administrator of a Windows Server 2003 computer named TestKing3. Newly hired employees recently started storing files on TestKing3. Now users report that Testking3 is responding much slower than it did before the additional users were added. You suspect the disk subsystem needs to be upgraded to accommodate the additional user load. You need to confirm whether the disk subsystem on TestKing3 needs to be upgraded. What should you do?()A Configure a Performance Logs and Alerts on the %Free space counter.B Use Device Manager to populate volume settings and examine the properties of the disk drives on TestKing3.C Use Event View to examine the system logs and search the system logs for event logs for events generated by the disk event source.D Use System Monitor to monitor counters based on the PhysicalDisk object

考题 单选题Your network consists of a single Active Directory domain. You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the application event logs for all the Web servers. The archived logs must contain all information from the original logs. What should you do? ()A Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.B Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file type.C On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer, and then export the settings.D Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.

考题 单选题You have an Exchange Server 2010 organization.You need to determine why a remote SMTP server rejects e-mail sent from your organization.What should you do?()A Review the application event logs.B Review the message tracking logs.C Set the Protocol logging level to Verbose on the Receive connectors and then review the protocol log files.D Set the Protocol logging level to Verbose on the Send connectors and then review the protocol log files.

考题 单选题Your end user customer has not requested a ServicePac to cover the base unit and options they have purchased.  What is a compelling reason to offer service? ()A IBM ServicePacs remove a liability from you the reseller in the event of fireB IBM ServicePacs remove a liability from you the reseller in the event of floodingC IBM ServicePacs provide improved warranty coverageD Service just adds a layer of cost you do not needE all of the above

考题 单选题Your network contains a server named Server1 that runs Windows Server 2008 R2. You need to ensure that an administrator is notified by e-mail if the Event Viewer logs any error. What should you do from the Event Viewer console?()A Create a custom view, and then click the Filter Current Custom View action.B Create a custom view, and then click the Attach Task to This Custom View action.C From the System log, click the Filter Current Log action.D From the System log, select an Error event, and then click the Attach Task to This Event action.

考题 单选题As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()A to provide a keepalive mechanismB to pull event logs from the routerC to extract relevant SNMP informationD to perform application-level accounting

考题 单选题Your network contains a server named Server1 that runs Windows Server 2008 R2.You have a user named User1.You need to ensure that User1 can view the events in the Security event log. The solution must minimize the number of rights assigned to User1. What should you do?()A In Event Viewer, filter the Security log.B In Event Viewer, configure the properties of the Security log.C In the Local Security Policy console, modify the Security Options.D In the Registry Editor, add a Security Descriptor Definition Language (SDDL) value.

考题 单选题Your network contains 100 servers that run Windows Server 2008 R2.A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network.You need to define the Custom Event Delivery Optimization settings on Server1.Which tool should you use?()A Event ViewerB Task SchedulerC WecutilD Wevtutil

考题 单选题You have an Exchange organization.All servers in the organization have Exchange Server 2010 Service Pack 1 (SP1) installed.You need to identify why a remote SMTP server rejects e-mail sent from the organization. What should you do?()A Modify the diagnostic logging level on the MSExchangeTransportService object, and then review the Application event logB Modify the connectivity log settings on the Transport server, and then review the connectivity logs.C Modify the message tracking settings on the Transport server, and then review the message tracking logs.D Modify the protocol logging level on the Send connectors, and then review the protocol logs.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named The TestKing Staff department has a Windows 2003 computer that functions as a file server. The computer contains a folder named TestKingData. Auditing is enabled on the TestKingData folder. The TestKing Staff department reports that confidential files were deleted from the folder. You need to identify the user who deleted the confidential files. What should you do?()A In Event Viewer, create a new log view from the security log. Filter the log view to display only success audits.B In Event Viewer, create a new log view from the security log. Filter the log view to display only failure audits.C In Event Viewer, create a new log view from the system log. Filter the log view to display only success audits.D In Event Viewer, create a new log view from the system log. Filter the log view to display only failure audits.