单选题You are responsible for network monitoring and need to monitor traffic over a routed network from a remote source to an IDS or IPS located in the headquarters site. What would you use in order to accomplish this?()AVACLs and VSPANBRSPANCERSPANDNetFlow

单选题
You are responsible for network monitoring and need to monitor traffic over a routed network from a remote source to an IDS or IPS located in the headquarters site. What would you use in order to accomplish this?()
A

VACLs and VSPAN

B

RSPAN

C

ERSPAN

D

NetFlow


参考解析

解析: 暂无解析

相关考题:

You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.

Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only whe nyou are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home.Which two actions should you perform?()A.AB.BC.CD.D

Your computer uses both wired and wireless network connections. The networks are not connected to each other.You disallow incoming connections in Microsoft Windows Firewall. You create a shared folder. Users on the wireless network cannot access the shared folder. You need to allow access to the shared folder from the wireless network. You also need to maintain the security of the wired network.What should you do?()A.AB.BC.CD.D

Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network. You need to ensure that the computer is able to connect to the wireless network.What should you do?()A.AB.BC.CD.D

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E

You are unable to connect your computer to a wireless network projector. The wireless network projector does not appear in the list of available network projectors provided by the Connect to a Network Projector wizard.You need to connect to the network projector.What are two possible ways to achieve this goal?()A.AB.BC.CD.D

You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D

You connect your computer to a wireless network. You discover that this new connection fails to show in the Connect to a network window.You need to view this connection in the Connect to a network window.What should you do?()A.AB.BC.CD.D

You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()A、STPB、GVRPC、SNMPD、VTPE、DHCP

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

You work as the exchange administrator at Testking.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network for TestKing.com. Currently Microsoft Office Outlook is used by all TestKing.com users to connect to their mailboxes. Thecompliance policy of the organization states that a copy of messages sent to the Finance department fromthe Internet is archived. The archived e-mails need to be stored on a third-party archival server. You areinstructed to recommend a solution that will comply with the set criteria. What should you do?()A、You should include Retention Policies.B、You should include Transport Protection Rules.C、You should include Personal archives.D、You should include Journal rules.

You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Windows Firewall allows the following ports on Server1: 53110135 You plan to install a monitoring server on the network. You need to ensure that the monitoring server can use Server1 to relay e-mail messages. You install the SMTP service on Server1.  What should you do next?()A、Install SNMP.B、Install the POP3 service.C、Create an exception for TCP port 21 in Windows Firewall.D、Create an exception for TCP port 25 in Windows Firewall.

You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. The Hyper-V server role is installed on a server named ABC_SR07.ABC_SR07 has a legacy network card that you use when creating a virtual machine named ABC_VT01.  What is the first thing you should do when assigning bandwidth to ABC_VT01?()A、You need to install a Hyper-V Virtual Switch on ABC_SR07.B、You need to install Integration Services on ABC_VT01.C、You need to remove the legacy network card and replace it with a new one.D、You need to install a second legacy network card on ABC_SR07.E、You need to create an external virtual network.

You are one of the network administrators for All network servers run Windows Server 2003. TestKing operates a total of four offices. The office where you work has 15 servers. You are responsible for supporting and maintaining all of these servers. You need to design a monitoring plan that will achieve the following goals: 1. Track all performance changes on the servers. 2. Record performance data to anticipate the need for future upgrades. What should you do?()A、On each server in your office, use Performance Logs and Alerts to create a baseline log. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.B、From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.C、On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.D、From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Your network includes domain controllers, file and print servers, and application servers. The application servers run a variety of programs, including Microsoft SQL Server 2000 and Microsoft Exchange Server 2003. Your staff are responsible for monitoring current system performance on all servers. You need to enable your staff to use System Monitor to gather performance data for each unique server type. The data will be used for trend analysis and forecasting. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)A、For each server, add the most common performance counters and save them as an HTML file.B、For each server, add the most common performance counters and save them as a counter report file.C、Create trace logs based on the file and schedule and trace logs to gather data.D、Create alerts on the file and schedule the alerts to gather data.E、Create counter logs based on the file and schedule the counter logs to gather data.

You need to recommend a monitoring solution for the new printer. What should you include in the recommendation?()A、Data Collector Sets (DCSs)B、event subscriptionsC、object access auditingD、Print Management filters

Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()A、From a command prompt, run the diskperf command.B、Run Network Monitor in dedicated capture mode.C、Configure a Network Monitor capture filter.D、Increase the buffer size in Network Monitor.

You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. All servers on the TestKing.com network are configured to run Exchange Server 2010.At present the network is separated from the Internet by means of a firewall. You receive an instructionform management to ensure that customers from the Internet to use Outlook Anywhere, Outlook Web App(OWA), Exchange ActivSync as well as IMAP4 over Secure Sockets Layer (SSL). You thus need todetermine the TCP ports that you need to open. What should you do?()A、You should consider opening port 25, port 80, port 143 as well as port 3269.B、You should consider opening port 25, port 443 as well as port 993.C、You should consider opening port 80, port 143, port 443 as well as port 389.D、You should consider opening port 26, port 443 as well as port 995.

You are designing a performance monitoring plan for the database that supports APP1. You need to monitor only necessary indicators. Which indicator or indicators should you include in the baseline?()A、response times for frequently used queriesB、database backup and restore completion timesC、disk I/OD、CPU utilizationE、network packet sizeF、SOAP requests failed

单选题You are an administrator of a switched network and your goal is to reduce some of the administrative overhead on your network. You plan on achieving this by configuring a new VLAN for each department in your network. However, you need to share the VLAN information across numerous switches throughout your network. Which of the following would allow you accomplish this?()ASTPBGVRPCSNMPDVTPEDHCP

单选题As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()AEnable the highest level of Syslogging available to ensure you log all possible event messagesBUse SSH to access your Syslog informationCLog all messages to the system buffer so that they can be displayed when accessing the routerDSyncronize clocks on the network with a protocol such as Network Time Protocol

单选题You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing the Exchange network forTestKing.com. All servers on the TestKing.com network are configured to run Exchange Server 2010.At present the network is separated from the Internet by means of a firewall. You receive an instructionform management to ensure that customers from the Internet to use Outlook Anywhere, Outlook Web App(OWA), Exchange ActivSync as well as IMAP4 over Secure Sockets Layer (SSL). You thus need todetermine the TCP ports that you need to open. What should you do?()AYou should consider opening port 25, port 80, port 143 as well as port 3269.BYou should consider opening port 25, port 443 as well as port 993.CYou should consider opening port 80, port 143, port 443 as well as port 389.DYou should consider opening port 26, port 443 as well as port 995.

单选题You are the network administrator for your company. The network contains a Windows Server 2003 Web server named WebServer1. WebServer1 is connected to the Internet by means of a dedicated link. You are responsible for monitoring the bandwidth utilization of WebServer1. You run a System Monitor log on WebServer1, which monitors the Bytes Total/sec counter on the Network Interface object. The sample rate for the counter is set to 15 seconds. The log is archived once each day.The size of the System Monitor log is becoming too large for the available disk space. You need to reconfigure the System Monitor log settings to reduce the amount of data that is captured.  What should you do?()ARetain the current counter, but set the sample rate to 5 seconds.BRetain the current counter, but set the sample rate to 60 seconds.CChange the counter to Total Bytes, and set the sample rate to 15 seconds.DChange the counter to Current Bandwidth, and set the sample rate to 60 seconds.

单选题You are the network administrator for Your network consists of a single Active Directory domain named All network servers run Windows Server 2003. A single server running Terminal Server is available to remote users. Your help desk staff is responsible for monitoring user activity on the terminal server. The staff is also responsible for sending messages to users about new programs and about modifications to the terminal server. A company developer writes a script that will log the relevant user information in a file and provide pop-up messages as needed. You need to ensure that the script runs every time a user logs on to the terminal server. What should you do?()ADeploy a client connection object for remote users. Configure the client connection object to run the script.BOn the terminal server, configure the RDP-tcp properties with the name of the script. Override other settings.CIn the Default Domain Group Policy object (GPO), select the Start a program on startup option and specify the name of the script.DOn the terminal server, configure the RDP client properties with the name of the script.

单选题You are the network administrator for your company. You need to provide Internet name resolution services for the company. You set up a Windows Server 2003 computer running the DNS Server service to provide this network service.   During testing, you notice the following intermittent problems:   Name resolution queries sometimes take longer than one minute to resolve.   Some valid name resolution queries receive the following error message in the Nslookup command-line tool: "Non-existent domain."   You suspect that there is a problem with name resolution.   You need to review the individual queries that the server handles. You want to configure monitoring on the DNS server to troubleshoot the problem.   What should you do? ()A In the DNS server properties, on the Debug Logging tab, select the Log packets for debugging option.B In the DNS server properties, on the Event Logging tab, select the Errors and warnings option.C In System Monitor, monitor the Recursive Query Failure counter in the DNS object.D In the DNS server properties, on the Monitoring tab, select the monitoring options.

单选题You are the network administrator for The network is distributed across five countries in Europe, namely Spain, Italy, Hungary, Austria, and Germany. All network servers run Windows Server 2003. Each location has three print servers. You need to monitor usage of print queues on all print servers on the network. You plan to enable monitoring for each print server in the same way. Monitoring data must be stored in a central location and archived for five years to enable data comparison. What should you do?()ACreate a counter log and specify SQL Database as the log file type.BCreate a trace log and specify Circular Trace File as the log file type.CCreate a counter log and specify Binary Circular File as the log file type.DCreate a trace log and specify Sequential Trace File as the log file type.