单选题Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets?  ()A Advanced Correlation EngineB Advanced Notification EngineC CiscoWorks DashboardD Management Center for CSA

单选题
Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets?  ()
A

 Advanced Correlation Engine

B

 Advanced Notification Engine

C

 CiscoWorks Dashboard

D

 Management Center for CSA


参考解析

解析: 暂无解析

相关考题:

You develop a Windows Communication Foundation (WCF) service. You enable all performance counters and run multiple calls to the service.The service must isolate session data to each user. You need to monitor the instancing behaviour used in the service.Which performance counter should you monitor?()A. ServiceModeService 4.0.0.0\CallsB. ServiceModeService 4.0.0.0\InstancesC. ASP.Net StateService \ Server Sessions ActiveD. ASP.Net StateService \ Server Sessions Total

Which command allows you to decode packets in JUNOS?() A.debug packet interface-nameB.show interface extensiveC.traceoptions interface-nameD.monitor traffic interface interface-name

Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets?  ()A、 Advanced Correlation EngineB、 Advanced Notification EngineC、 CiscoWorks DashboardD、 Management Center for CSA

Which command allows you to view interface usage details in real-time?()A、user@host debug interface interface-nameB、user@host monitor usage interface-nameC、user@host monitor interface interface-nameD、user@host traceoptions interface interface-name

Which can NOT be selected for supported services in Cisco WCS Planning Tool?()A、data/coverageB、location with Monitor Mode access pointsC、demandD、high density

Which of the following is an easy-to-use tool that allows you to easily configure and monitor Cisco Integrated Services Routers?()A、Cisco NAC ApplianceB、Cisco SDMC、Cisco MWAMD、Cisco Unified Communications Manager Express

Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor

Which command would you use to view interface usage details in real time?()A、show interfaces terseB、show interfaces extensiveC、monitor interface trafficD、monitor traffic interface

Which command allows you to decode packets in JUNOS?()A、debug packet interface-nameB、show interface extensiveC、traceoptions interface-nameD、monitor traffic interface interface-name

You are the network administrator for Humongous Insurance. The network consists of a single Active Directory domain named humongous.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure several Group Policy objects (GPOs) to enforce the use of IPSec for certain types of communication between specified computers.   A server named Server2 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Server2 are encrypted by using IPSec. However, when you monitor network traffic, you notice that Telnet connections are not being encrypted.You need to view all of the IPSec settings that are applied to Server2 by GPOs. Which tool should you use?()A、the IP Security Policy Management consoleB、the IP Security Monitor consoleC、the Resultant Set of Policy consoleD、Microsoft Baseline Security Analyzer (MBSA)

You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)A、The security update in the synchronization log.B、The security update in the approval log.C、The status of Internet Explorer 5.5x in the Monitor Server window.D、The status of Internet Explorer 6.x in the Monitor Server window.

You are the network administrator for your company. The network contains 12 Windows Server 2003 computers and 300 Windows XP Professional computers. Three servers named Server4, Server5, and Server6 run a critical business application. When performing performance baselining on these three servers, you notice that Server6 has a larger number of concurrently connected users at any given moment than Server4 or Server5. The additional workload is causing performance problems on Server6. You need to identify which client computers are connecting to Server6.You plan to run Network Monitor on Server6 to capture all packets sent to Server6. The capture task must be configured to meet the following requirements.To reduce the size of the captured data, you want to capture only the packet headers.If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets.   Which two tasks should you perform to configure Network Monitor?()A、Configure the Network Monitor display filters.B、Configure the Network Monitor capture filters.C、Increase the Network Monitor buffer size setting.D、Decrease the Network Monitor buffer size setting.E、Increase the Network Monitor frame size setting.F、Decrease the Network Monitor frame size setting.

You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks. A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data. You should utilize the least amount of administrative effort to finish the task.    Which tool will you utilize to finish the task?() A、To finish the task, you should utilize Resource Governor. B、To finish the task, you should utilize Database Engine Tuning Advisor.C、To finish the task, you should utilize Extended Events. D、To finish the task, you should utilize Performance Monitor (SYSMON).

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. A user reports that when he runs a query, it takes a quite long time and it is still unfinished. As the IT support, you have to verify whether the query is blocked.  Which tool should you use? () A、You should use the Database Engine Tuning Advisor tool B、You should use the Windows System Monitor tool C、You should use the Job Activity Monitor tool in Microsoft SQL Server Management Studio D、You should use the Activity Monitor tool in Microsoft SQL Server Management Studio

You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do? ()A、Create a scheduled task that runs the Netsh tool.B、Create a scheduled task that runs the Nmcap tool.C、From Network Monitor,configure the General options.D、From Network Monitor,configure the Capture options.

Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()A、Add the Security Compliance group to the local administrators group of each VMB、Add the Security Compliance group to the local administrators group of each Hyper-V serverC、In the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupD、in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group

单选题Which of the following would be used to monitor unauthorized access to data files?()APerformance Log and AlertsBEvent ViewerCSecurity Configuration and AnalysisDIP Security Monitor

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()AInstall the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.BOpen Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.CInstall Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.DOpen Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

单选题You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week.  What should you do?()AFrom Reliability Monitor, review the informational events.BFrom System Information, review the Software Environment.CFrom Performance Monitor, review the System Diagnostics Report.DFrom Performance Monitor, run the System Performance Data Collector Set.

单选题Which command allows you to view interface usage details in real-time?()Auser@host debug interface interface-nameBuser@host monitor usage interface-nameCuser@host monitor interface interface-nameDuser@host traceoptions interface interface-name

多选题You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)AThe security update in the synchronization log.BThe security update in the approval log.CThe status of Internet Explorer 5.5x in the Monitor Server window.DThe status of Internet Explorer 6.x in the Monitor Server window.

单选题You develop a Windows Communication Foundation (WCF) service. You enable all performance counters and run multiple calls to the service.The service must isolate session data to each user. You need to monitor the instancing behaviour used in the service. Which performance counter should you monitor?()AServiceModeService 4.0.0.0/CallsBServiceModeService 4.0.0.0/InstancesCASP.Net StateService / Server Sessions ActiveDASP.Net StateService / Server Sessions Total

单选题You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks. A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data. You should utilize the least amount of administrative effort to finish the task.    Which tool will you utilize to finish the task?()ATo finish the task, you should utilize Resource Governor. BTo finish the task, you should utilize Database Engine Tuning Advisor.CTo finish the task, you should utilize Extended Events. DTo finish the task, you should utilize Performance Monitor (SYSMON).

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. A user reports that when he runs a query, it takes a quite long time and it is still unfinished. As the IT support, you have to verify whether the query is blocked.  Which tool should you use? ()AYou should use the Database Engine Tuning Advisor tool BYou should use the Windows System Monitor tool CYou should use the Job Activity Monitor tool in Microsoft SQL Server Management Studio DYou should use the Activity Monitor tool in Microsoft SQL Server Management Studio

单选题You have a computer that runs Windows 7. You need to identify the disk, memory, CPU, and networkresources that an application is currently using.  Which tool should you use?()AComponent ServicesBPerformance Information and ToolsCReliability MonitorDResource Monitor

单选题Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()AAdd the Security Compliance group to the local administrators group of each VMBAdd the Security Compliance group to the local administrators group of each Hyper-V serverCIn the InitialStore.xml file of each VM, define an access policy for the Security Compliance groupDin the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group

单选题You create a new Active Directory domain. The functional level of the domain is Windows Server  2008 R2.   The domain contains five domain controllers. You need to monitor the replication of the group  policy template files.  Which tool should you use()ADfsrdiagBFsutilCNtdsutilDNtfrsutl