You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()A、From a command prompt, run the diskperf command.B、Run Network Monitor in dedicated capture mode.C、Configure a Network Monitor capture filter.D、Increase the buffer size in Network Monitor.

You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()

  • A、From a command prompt, run the diskperf command.
  • B、Run Network Monitor in dedicated capture mode.
  • C、Configure a Network Monitor capture filter.
  • D、Increase the buffer size in Network Monitor.

相关考题:

You are a network administrator for your company. All servers run Windows Server 2003.A server named Server1 functions as an application server. Server1 runs several applications. Server1 is located on the company‘s perimeter network. You allow communication to Server1 only over port 80.Users report that applications on Server1 perform poorly during periods of peak activity. You monitor Server1.The results are shown in the exhibit. (Click the Exhibit button.)You need to identify which process is causing Server1 to perform poorly.Which two tools can you use to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)A. Event ViewerB. Task ManagerC. Network MonitorD. System Monitor

You are the network administrator for your company. All network servers run Windows Server 2003. Business hours are 8 A.M. to 5 P.M. You provide network assistance during business hours only.A server named Server1 stores personal files for all network users. Mobile users access Server1 by using the company‘s VPN. They must have 24-hour access to the files on Server1.You need to be able to identify the source of the recurring slowdowns in VPN access.First, you log on to Server1.What should you do next?()A. Use Task Manager to review network utilization of the VPN adapter.B. Use the Performance console to create a log of network utilization outside of business hours.C. Use System Monitor to review network utilization of the VPN connection.D. Use Task Manager to select Bytes Sent as the Network Adapter History setting.

our network consists of an internal network and a perimeter network. On the internal network there is a server named Server1. On the perimeter network there is a server named Server2. All servers run Windows Server 2003 Service Pack 2 (SP2).You schedule a task to transfers files from Server1 to Server2 by using FTP.You monitor the network traffic from Server1 to Server2 and notice that the user name and password used for the FTP transfer are sent as plain text.  You need to ensure that all FTP traffic between Server1 and Server2 is encrypted.  What should you do?()A、Implement IPSec. B、Install a server certificate on Server1. C、Install a server certificate on Server2. D、Use the Encrypting File System on Server1.

You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()A、Use the RUNAS feature to run the at /delete command as the Server1/Administrator account.B、Log on by using your Administrator account and run the ntbackup /D command.C、Log on by using your Administrator account and run the schtasks /delete command.D、Use the RUNAS feature to run the taskkill command as the Server1/Administrator account.

Your network consists of an internal network and a perimeter network. On the internal network there is a server named Server1. On the perimeter network there is a server named Server2. All servers run Windows Server 2003 Service Pack 2 (SP2).  You schedule a task to transfers files from Server1 to Server2 by using FTP.You monitor the network traffic from Server1 to Server2 and notice that the user name and password used for the FTP transfer are sent as plain text. You need to ensure that all FTP traffic between Server1 and Server2 is encrypted.  What should you do?()A、Implement IPSec.B、Install a server certificate on Server1.C、Install a server certificate on Server2.D、Use the Encrypting File System on Server1.

Your network contains a single Active Directory domain named contoso.com.You have a domain controller named DC1 that runs Windows Server 2003 Service Pack 2 (SP2) that has the DNS Server Windows component installed.  You have a member server named Server1 that runs Windows Server 2003 SP2.Server1 fails to update its host (A) record for the contoso.com domain. You need to verify that DNS requests from Server1 are sent to DC1.  What should you do?()A、On Server1,restart the server, press F8, and enable boot logging.B、On Server1,open the properties of the network adapter and install the Network Monitor Driver.C、On DC1,open the DNS snap-in and configure debug logging for the DNS Server service.D、On DC1,open the DNS snap-in and configure event logging for errors and warnings for the DNS Server service.

You have a server named Server1 that is located in a remote office. Server1 runs Windows Server 2003 Service Pack 2 (SP2). You need to view the current processor activity on Server1 remotely. What should you do? ()A、From Event Viewer, connect to Server1.B、From the System Monitor snap-in, add a counter.C、From the Performance Logs and Alerts snap-in, create a new trace log.D、Install Network Monitor Tools and create a new capture.

You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.You install Windows Server Update Services (WSUS) on a network server named Server1. When you attempt to synchronize Server1 with the Windows Update servers, you receive an error message. You open Internet Explorer and verify that you can communicate with an external Web site by using the proxy server. You need to ensure that Server1 can communicate with the Windows Update servers.  What should you do on Server1?()A、Restart the IIS administration tool.B、Configure the Internet Explorer settings to bypass the proxy server.C、In the WSUS options, configure authentication to the proxy server.D、Install the ISA Firewall Client.

You are the administrator of a Windows Server 2003 computer named Server1. You log on to Server1 and attempt to access the network. You discover that the server is not communicating on the network. You discover that a service pack and an updated network adapter driver were installed on Server1 the previous night. A complete backup, including the System State data, was performed before the service pack and the driver were installed. You need to restore network communications. What should you do first? ()A、Use Roll Back Driver to reinstall the previous driver for the network adapter.B、Use the Backup or Restore Wizard to restore the backup from the previous night.C、Restart Server1 by using the Last Known Good Configuration option.D、Use the Registry Editor to delete the registry settings for the network adapter driver.

You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A、Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B、Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C、Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D、Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

Your network contains a DNS server that has a reverse lookup zone for all of your network segments. You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). An IP security policy is assigned to Server1. You verify IPSec traffic and see that the current security associations display only by IP address. You need to view the fully qualified domain names for all security associations.  What should you do?()A、From the DNS console, add Server1 as a name server.B、From the DNS console, change dynamic updates to Secure only.C、From IP Security Monitor on Server1, enable DNS name resolution.D、From IP Security Monitor on Server1, create a new taskpad view.

You are the desktop administrator for your company's sales department. Katrin is a user in the sales department. You need to upgrade Katrin's Windows 2000 Professional computer to Windows XP Professional. Philippe is the network administrator. He previously downloaded updated Setup files and placed them on a server named Server1, in a shared folder named Updates. Philippe has successfully installed computers by using these updated Setup files. You want to ensure that these updated Setup files are automatically installed on Katrin's computer during the upgrade.  Which command should you run to start Setup?() A、Winnt32. exe /dushare://server1/updatesB、Winnt32. exe /copydir://server1/updatesC、Winnt32. exe /duprepare://server1/updatesD、Winnt32. exe /copysource://server1/updates

You are the network administrator for Fabrikam, Inc. The network consists of a single Active Directory domain named fabrikam.com.  A Windows Server 2003 computer named Server1 is the only DNS server in the domain. It hosts no other zones. Users report that connecting to computers within the fabrikam.com domain is slow.  You need to find out whether DNS client traffic on Server1 is causing this problem.  What should you do?()A、Use System Monitor to create a log of the DNS counters Dynamic updates/sec and Total queries/sec.B、Use System Monitor to create a log of the NetworkInterface counter Total bytes/sec.C、Enable debug logging on Server1. Configure the log to capture Notification events.D、Enable debug logging on Server1. Configure the log to capture Update events.

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

our network contains a DNS server that has a reverse lookup zone for all of your network segments. You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). An IP security policy is assigned to Server1.You verify IPSec traffic and see that the current security associations display only by IP address. You need to view the fully qualified domain names for all security associations.  What should you do?() A、From the DNS console, add Server1 as a name server. B、From the DNS console, change dynamic updates to Secure only. C、From IP Security Monitor on Server1, enable DNS name resolution. D、From IP Security Monitor on Server1, create a new taskpad view.

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). You have a server named Server1. You try to log on to Server1 and receive the following error message: “Windows cannot connect to the domain, either because the domain controller is down or otherwise unavailable, or because your computer account was not found. Please try again later. If this message continues to appear, contact your system administrator for assistance.” You verify that you can contact a domain controller from Server1. You need to ensure that you can log on to Server1 by using a domain account. What should you do? ()A、Reset the Server1 computer account. Restart Server1.B、Delete the Server1 computer account. Restart Server1.C、Join Server1 to a workgroup and then join Server1 to the domain. Restart Server1.D、Delete the Server1 computer account. Create a new computer account named Server1. Restart Server1.

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). The domain contains a member server named Server1. Server1 is a file server. You accidentally delete the computer account for Server1 from the domain. You need to ensure that users can access the file shares on Server1 by using their domain user accounts. You must achieve this goal by using the minimum amount of administrative effort. What should you do? ()A、On Server1, run the Netdom reset command.B、On Server1, add the computer to a workgroup and then add the computer to the domain. Restart Server1.C、From Active Directory Users and Computers, create a new computer account named Server1 in the domain. Restart Server1.D、On a domain controller, perform an authoritative restore in Active Directory for the Server1 computer account. Restart Server1.

You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.   You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts. What should you do?()A、Use Network Monitor to capture traffic between Server1 and all client computers.B、Use Network Monitor to capture traffic between Server1 and Server2.C、Monitor Event Viewer for Net Logon error or warning events.D、Run the tracert command on Server1.

You are the network administrator for your company.You work in the company’s branch office in Chicago. The network in your office consists of 40 Windows XP Professional desktop computers and one Windows Server 2003 computer named Server1. Server1 connects to the Internet through a 512-Kbps leased line. The main office of the company is in Seattle.Users of the desktop computers in the Chicago office are developers who are developing a new software product. You want these users to place daily builds of the product in a shared folder on Server1. You want developers in the Seattle office to be able to download the daily builds from Server1 by using FTP.You install IIS on Server1 and configure the FTP site so that it is available to the developers in the Seattle office. However, when you monitor inbound Internet connection attempts to Server1, you notice many attempted HTTP connections.You want to secure Server1 so that it is not susceptible to malicious Internet users. Server1 must also connect to the Internet to use Windows Update and to download virus definition updates. You do not want to purchase additional hardware or software.   What should you do on Server1?()A、Enable Internet Connection Sharing (ICS).B、Configure port filtering on the network adapter to allow only TCP port 80 and TCP port 21.C、Enable Internet Connection Firewall (ICF) and create a service setting in the Internet Connection Firewall settings that allows Internal and external TCP port 21 to Server1  internal and external TCP port 80 to Server1D、Enable Internet Connection Firewall (ICF) and select the FTP Server check box in the Services tab. Enter Server1 as the server hosting the FTP services.

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 ServicePack 2 (SP2). You have a server named Server1. You try to log on to Server1 and receive the following error message: “Windows cannot connect to the domain,either because the domain controller is down or otherwise unavailable, or because your computer account was not found. Please try again later. If this message continues to appear, contact your system administrator for assistance.” You verify that you can contact a domain controller from Server1. You need to ensure that you can log on to Server1 by using a domain account. What should you do? ()A、Reset the Server1 computer account. Restart Server1.B、Delete the Server1 computer account. Restart Server1.C、Join Server1 to a workgroup and then join Server1 to the domain. Restart Server1.D、Delete the Server1 computer account.Create a new computer account named Server1. Restart Server1.

You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()A、Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.B、Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.C、Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.D、Create a Pattern Match capture trigger for the 131.107.0.1 IP address.

You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet.   What are two possible ways to achieve this goal?()A、Monitor the events in the application log on Server1.B、Monitor the events in the security log on Server1.C、Monitor the Web server connections on Server1 by using a performance log.D、Monitor network traffic to Server1 by using Network Monitor.E、Monitor the IIS logs on Server1.

单选题You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.   You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts. What should you do?()AUse Network Monitor to capture traffic between Server1 and all client computers.BUse Network Monitor to capture traffic between Server1 and Server2.CMonitor Event Viewer for Net Logon error or warning events.DRun the tracert command on Server1.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain.  The domain contains a Windows Server 2003 computer named Server1 that is located in an organizational unit (OU) named Servers. Server1 contains confidential data, and all network communications with Server1 must be encrypted by using IPSec.   The default Client (Respond Only) IPSec policy is enabled in the Default Domain Policy Group Policy object (GPO). You create a new GPO and link it to the Servers OU. You configure the new GPO by creating and enabling a custom IPSec policy. You monitor and discover that network communications with Server1 are not being encrypted.  You need to view all IPSec policies that are being applied to Server1.   What should you do?  ()A Use Local Security Policy to view the Security Options for Server1.B Use Resultant Set of Policy (RSoP) to run an RSoP logging mode query to view the IP Security Policies on Local Computer for Server1.C Use Resultant Set of Policy (RSoP) to run an RSoP planning mode query to view the Security Options for Server1.D Use IP Security Monitor to view the Active Policy for Server1.E Use IP Security Monitor to view the IKE Policies for Server1.

单选题Your company has a server named DC1 that runs Windows Server 2008 R2. Server1 has the DHCP Server server role installed.You find that a desktop computer named Computer1 is unable to obtain an IP configuration from the DHCP server.You install the Microsoft Network Monitor 3.0 application on Server1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between Server1 and Computer1.The network interface configuration for the two computers is shown in the following table. Server1 Computer1 IP address 192.168.2.1 169.254.15.84 MAC address 00-0A-5E-1C-7F-67 00-17-31-D5-5E-FF You need to build a filter in the Network Monitor application to capture the DHCP traffic between Server1 and Computer1. Which filter should you use?()AIPv4.Address == 169.254.15.84 DHCPBIPv4.Address == 192.168.2.1 DHCPCEthernet.Address == 0x000A5E1C7F67 DHCPDEthernet.Address == 0x001731D55EFF DHCP