An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()A、Active DirectoryB、DHCP logsC、Security logsD、System logs

An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()

  • A、Active Directory
  • B、DHCP logs
  • C、Security logs
  • D、System logs

相关考题:

An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A.tracerouteB.tracertC.ifconfigD.ipconfig

An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router

Windows默认帐户应如何管理()A、禁用Administrator帐户,重命名Guest帐户B、禁用Administrator及Guest帐户C、重命名Administrator帐户,禁用Guest帐户D、重命名Administrator及Guest帐户

An administrator has ordered a new server and setup a dedicated RAID 1 array for the application database. While troubleshooting with performance monitoring tools, the administrator is receiving lowerread/write speeds than expected.  Which of the following would be the MOST likely cause for the lower performance?()A、 The BIOS needs to be upgraded.B、 The administrator did not add the right amount of memory.C、 There is a cooling issue with the server.D、 The administrator did not order high enough RPM drives.

An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again.  Which of the following is the MOST likely reason for this?()A、 The administrator improperly configured the virtual memory settings on the server.B、 The administrator is using incorrect patch switches for the install.C、 The administrator is trying to install security patches for software that is not installed.D、 The administrator is trying to install patches that require hard drive encryption on the server.

An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()A、The administrator forgot to change the share permissionsB、The users were not part of the “Everyone” built in groupC、The administrator shared the files but not the folderD、“Modify” only allows users to change existing documents

An administrator does not have console access to a Windows Server. Which of the following command line utilities should the administrator use to reboot the system remotely?()A、rebootB、pkillC、shutdownD、kill

An administrator has set up a company’s intranet server.Users should be able to access it but nousers are able to.The administrator verifies that the website is accessible by IP address.Which of the following should the administrator look at FIRST to resolve the issue?()A、WINS serverB、DNS serverC、Lmhosts fileD、DHCP cache

An administrator needs to connect servers to the Fiber Channel SAN. Which of the following should the administrator install in the servers to allow this connection?()A、RiserB、HBAC、SCSI cardD、SAS card

An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem.  Which of thefollowing is the NEXT step that the administrator should take? ()A、 Create an action plan.B、 Escalate the issue.C、 Reboot the mail server.D、 Document the solution.

An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router

An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing

An administrator is experiencing availability issues on a Linux server. The administrator decides tocheck the server for an IP address conflict on the server. Which of the following commands should the administrator use?()A、tracerouteB、tracertC、ifconfigD、ipconfig

Which of the following is the administrator’s profile path in Windows 2000?()A、C:/Profiles/AdministratorB、C:/Windows/System32C、C:/Users/AdministratorD、C:/Documents and Settings/Administrator

A system administrator needs to specify a set of FQDN to IP address mappings for a legacyserver; the administrator does not want the legacy server to be referenced by other servers. Which of the following should the administrator use to set this?()A、DHCP serverB、DNS serverC、Host fileD、Route statements

An administrator has mirrored the root volume group to a second disk, but ’bootlist’ is failing to correctly add the second disk.  What is the likely cause of the problem?()  A、The administrator has failed to run ’bosboot -ad 2nd disk’ prior to the bootlist command.B、The administrator has failed to run ’bootinfo -B 2nd disk’ prior to the bootlist command.C、The administrator has failed to run ’mirrorvg -m rootvg 2nd disk’ prior to the bootlist command.D、The administrator has failed to run ’bosboot -ad /dev/ipldevice 2nd disk’ prior to the bootlist command.

A system administrator received the following message while trying to ssh to a server:  connection timed out.The administrator pinged the server and had no response. The administrator then pinged the gateway, and was successful. Which tool could the administrator use next to isolate the problem?()A、routeB、tracerouteC、netstat -nrD、broadcast ping

Which of the following tasks can be performed by a Buyer Administrator using the Organization Administration console?()A、The Buyer Administrator can approve the shoppers within their organization.B、The Buyer Administrator can create a new seller organization.C、The Buyer Administrator can assign access levels to their members.D、The Buyer Administrator can make Request for Quotes (RFQ) to a seller organization.

You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()A、Grant the administrator membership in the Domain Administrators group.B、Grant the administrator membership in the Exchange Administrators group.C、Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.D、Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.

多选题Which of the following tasks can be performed by a Buyer Administrator using the Organization Administration console?()AThe Buyer Administrator can approve the shoppers within their organization.BThe Buyer Administrator can create a new seller organization.CThe Buyer Administrator can assign access levels to their members.DThe Buyer Administrator can make Request for Quotes (RFQ) to a seller organization.

单选题A user requests access to a new file share.The administrator adds the user to the group with the appropriate access.The user is still unable to access the share.Which of the following actions should the administrator do to resolve the permissions issue?()ARequest the user to logoff and log back on.BAdd the user as an administrator on their local machine.CAdd the user as an administrator on the server.DRun an ipconfig /renew on the user’s machine.

单选题An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()AThe administrator improperly configured the virtual memory settings on the server.BThe administrator is using incorrect patch switches for the install.CThe administrator is trying to install security patches for software that is not installed.DThe administrator is trying to install patches that require hard drive encryption on the server.

单选题An administrator creates a new directory then shares it on the Windows server. The administrator sets the permissions for everyone to "Modify" but users report they are unable to create or delete documents. Which of the following is the cause?()AThe administrator forgot to change the share permissionsBThe users were not part of the “Everyone” built in groupCThe administrator shared the files but not the folderD“Modify” only allows users to change existing documents

单选题An administrator installs a driver,reboots the DC, and logs in to configure the NIC. Once the administrator opens the NIC properties, the server bluescreens and now will no longer boot into Windows. Which of the following is the FIRST thing the administrator should do?()ABoot into Last Known Good ConfigurationBReseat the NICCBoot into Safe ModeDBoot into Directory Services Restore Mode

单选题为了加强防止黑客猜测系统管理员Administrator的密码,保证系统安全,最有效的措施是哪个?()A给Administrator账户设置复杂密码B降低Administrator账户的系统权限C降低Guest账户权限D给Administrator账户改名