Your network contains 100 servers that run Windows Server 2008 R2.A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network.You need to define the Custom Event Delivery Optimization settings on Server1.Which tool should you use?()A、Event ViewerB、Task SchedulerC、WecutilD、Wevtutil

Your network contains 100 servers that run Windows Server 2008 R2.A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network.You need to define the Custom Event Delivery Optimization settings on Server1.Which tool should you use?()

  • A、Event Viewer
  • B、Task Scheduler
  • C、Wecutil
  • D、Wevtutil

相关考题:

Your network contains a Distributed File System (DFS) target folder named Folder1 that contains 100 GB of data. You plan to create a new DFS replica of Folder1 on a server named Server2. You need to prestage the data in Folder1 on Server2. The solution must ensure that the amount of initial DFS replication traffic is minimized.Which tool should you use to prestage the Folder1 data?()A. DfscmdB. DfsrmigC. DfsutilD. Wbadmin

Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()A. Acct-Session-IdB. Acct-Status-TypeC. ClassD. NAS-Identifier

Your network contains a Network Policy Server (NPS) named NPS1.You deploy a new NPS named NPS2.You need to ensure that NPS2 sends all authentication requests to NPS1.What should you modify on NPS2?() A. health policiesB. network policiesC. RADIUS clientsD. remote RADIUS server groups

Your network contains a server named Server1 that runs Windows Server 2008 R2. The network contains multiple subnets.An administrator reports that Server1 fails to communicate with computers on remote subnets.You run route.exe print on Server1 as shown in the exhibit. (Click the Exhibit button.)You need to ensure that Server1 can communicate with all computers on the network.What should you do?()A. Disable IPv6.B. Change the subnet mask.C. Add a default gateway address.D. Change the default metric to 100.

Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?() A.Local Security PolicyB.ScwC.SeceditD.Services console

Your company has two data centers.  Each data center contains a perimeter network.  Your network contains an Exchange Server 2010 organization.  You plan to deploy Exchange Server 2010 Edge Transport servers in the perimeter networks.  You need to recommend a solution for the Edge Transport servers that meets the following requirements:.Distribute inbound e-mail messages across all Edge Transport servers  .Ensure that users receive inbound e-mail messages if an Edge Transport server fails  .Ensure that users receive inbound e-mail messages if a single data center network becomes unavailable .Minimize costs  What should you recommend?()A、In each perimeter network, deploy one Edge Transport server. Implement failover clustering.B、In each perimeter network, deploy two Edge Transport servers. Implement failover clustering.C、In each perimeter network, deploy one Edge Transport server. Configure a mail exchange (MX) record for each server.D、In each perimeter network, deploy two Edge Transport servers. Configure a mail exchange (MX) record for each server.

Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A、3389 and 25B、3389 and 636C、50636 and 25D、50636 and 135

Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()A、a conditional forwarderB、a GlobalNames zoneC、a secondary zoneD、a zone delegation

Your network contains an internal network and a perimeter network. The internal network contains a single Active Directory site.  The perimeter network contains two Exchange Server 2010 Edge Transport servers. You plan to deploy an Exchange Server 2010 organization on the internal network.  You need to plan the deployment of Hub Transport server roles to meet the following requirements:.If a single Hub Transport server fails, e-mail messages from the Internet must be delivered to the Mailboxservers. .If a single Hub Transport server fails, users must be able to send e-mail messages to other users thathave mailboxes on the same Mailbox server.  What should you include in the plan?()A、Deploy one Edge Transport server on the internal network, and then configure EdgeSync synchronization.B、Deploy one Hub Transport server on the internal network, and then configure EdgeSync synchronization.C、Deploy one Hub Transport server on the internal network and one Hub Transport server on the perimeter network.D、Deploy two Hub Transport servers on the internal network.

Your network contains a server that runs Windows Server 2008 R2.You need to enable access-based enumeration (ABE) on a shared folder.Which console should you use?()A、Disk ManagementB、File Server Resource ManagerC、Share and Storage ManagementD、Storage Explorer

Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()A、Acct-Session-IdB、Acct-Status-TypeC、ClassD、NAS-Identifier

Your network contains a server named Server1 that runs Windows Server 2003 Service Pack (SP2). You install a new network adapter on Server1. You need to view the media access control (MAC) address for the new network adapter. What should you do? ()A、At the command prompt, run Ipconfig /all.B、At the command prompt, run Net view //server1.C、From the Device Manager snap-in, view the properties of the network adapter.D、From the Services snap-in, view the properties on the Network Connections service.

Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()A、Join the new server to an Active Directory domain.B、Install Active? Directory Lightweight Directory Services on the new server.C、Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.D、Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.

You are a network administrator for your company. The network contains a Windows Server 2003 computer named Server1. Server1 has a single CPU, 512 MB of RAM, and a single 100-Mb network adapter.   All network users’ home folders are stored on Server1. Users access their home folders by using a mapped network drive that connects to a shared folder on Server1.   After several weeks, users report that accessing home folders on Server1 is extremely slow at certain times during the day.   You need to identify the resource bottleneck that is causing the poor performance.   What should you do?  ()A、 Capture a counter log by using LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects, and view the log data information that is captured during periods of poor performance.B、 Configure Alerts on Server1 to log entries in the event logs for the LogicalDisk, PhysicalDisk, Processor, Memory, and Network Interface performance objects when the value of any object is more than 90.C、 Capture a trace log that captures Page faults, File details, Network TCP/IP, and Process creations/deletions events.D、 Implement auditing on the folder that contains the users’ home folders. Configure Network Monitor on Server1.

Your network contains an Active Directory domain named adatum.com. The domain contains a  member server named LON-DC1. LON-DC1 runs Windows Server 2012 R2 and has the DHCP  Server server role installed.The network contains 100 client computers and 50 IP phones. The computers and the phones arefrom the same vendor. You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254.You need to ensure that the IP phones receive IP addresses in the range of 172.16.1.100 to 172.16.1.200. The solution must minimize administrative effort.  What should you create?()A、Server level policiesB、FiltersC、ReservationsD、Scope level policies

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper- V server role installed. The domain contains a virtual machine named VM1. A developer wants to attach a debugger to VM1. You need to ensure that the developer can connect to VM1 by using a named pipe. Which virtual machine setting should you configure?()A、Network AdapterB、BIOSC、ProcessorD、COM 1

单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 runs Windows Server 2012 R2. You need to create 3-TB virtual hard disk (VHD) on Server1. Which tool should you use?()AFile Server Resource Manager (FSRM)BNew-StoragePoolCDiskpartDShare and Storage Management

单选题Your network consists of a single Active Directory domain. The network contains 20 file servers that run Windows Server 2008 R2. Each file server contains two volumes. One volume contains the operating system. The other volume contains all data files.    You need to plan a recovery strategy that meets the following requirements: èAllows the operating system to be restored èAllows the data files to be restored èEnsures business continuity   èMinimizes the amount of time to restore the server What should you include in your plan?()AWindows Deployment Services (WDS)BWindows Automated Installation Kit (Windows AIK) and folder redirectionCthe Multipath I/O feature and Volume Shadow CopiesDthe Windows Server Backup feature and System Image Recovery

单选题Your network contains an internal network and a perimeter network that are separated by a firewall. The perimeter network contains an Exchange Server 2010 Edge Transport server.  You plan to deploy an internal Exchange Server 2010 organization that meets the following requirements:.Support EdgeSync synchronization .Support encrypted delivery of outbound e-mail messages to the Edge Transport server .Minimize the attack surface of the internal network  Which TCP ports should you allow from the internal network to the perimeter network?()A3389 and 25B3389 and 636C50636 and 25D50636 and 135

单选题Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()AAcct-Session-IdBAcct-Status-TypeCClassDNAS-Identifier

单选题Your network contains an Active Directory domain.The domain contains a member server named Server1. Server1 has a single network connection.You need to log every attempt to connect to Server1 on a restricted port.What should you do?()AChange the settings of the private firewall profile.BChange the settings of the domain firewall profile.CModify the properties of the inbound firewall rules.DModify the properties of the outbound firewall rules.

单选题Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()ALocal Security PolicyBScwCSeceditDServices console

单选题Your network contains a single Active Directory domain named contoso.com.The domain contains a DNS server named Server1 that hosts the contoso.com zone.The network is connected to the network of a partner company. The partner companys network contains a DNS server that hosts a zone named nwtraders.com.You need to ensure that computers in contoso.com can resolve the names of computers in nwtraders.com.The solution must not require any changes to the zone configuration of nwtraders.com.What should you configure on Server1?()Aa conditional forwarderBa GlobalNames zoneCa secondary zoneDa zone delegation

单选题Your network contains a Distributed File System (DFS) target folder named Folder1 that contains 100 GB of data. You plan to create a new DFS replica of Folder1 on a server named Server2. You need to prestage the data in Folder1 on Server2. The solution must ensure that the amount of initial DFS replication traffic is minimized. Which tool should you use to prestage the Folder1 data?()ADfscmdBDfsrmigCDfsutilDWbadmin

单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?()AEdge traversalBAuthorized computersCInterface typesDRemote IP address

单选题Your network contains an Active Directory domain named adatum.com. The domain contains a  member server named LON-DC1. LON-DC1 runs Windows Server 2012 R2 and has the DHCP  Server server role installed.The network contains 100 client computers and 50 IP phones. The computers and the phones arefrom the same vendor. You create an IPv4 scope that contains addresses from 172.16.0.1 to 172.16.1.254.You need to ensure that the IP phones receive IP addresses in the range of 172.16.1.100 to 172.16.1.200. The solution must minimize administrative effort.  What should you create?()AServer level policiesBFiltersCReservationsDScope level policies