单选题You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do? ()ACreate a scheduled task that runs the Netsh tool.BCreate a scheduled task that runs the Nmcap tool.CFrom Network Monitor,configure the General options.DFrom Network Monitor,configure the Capture options.

单选题
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do? ()
A

Create a scheduled task that runs the Netsh tool.

B

Create a scheduled task that runs the Nmcap tool.

C

From Network Monitor,configure the General options.

D

From Network Monitor,configure the Capture options.


参考解析

解析: 暂无解析

相关考题:

Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?() A.B.C.D.

You need to design a strategy to log access to the company Web site. What should you do?()A、Enable logging on the company Web site and select the NCSA Common Log File Format. Store the log files on a SQL Server computerB、Use System Monitor to create a counter log that captures network traffic to the Web server by using the Web Service object. Store the log files on a SQL Server computerC、Run the Network Monitor on the Web server. Create a capture filter for the SNA protocol and save the results to a capture file. Store the capture file on a SQL Server computerD、Enable logging on the company Web site and select ODBC Logging. Configure the ODBC logging options by using a nonadministrative SQL account

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).A firewall separates the internal network from the Internet.  The firewall blocks all outbound traffic except for HTTP and SMTP traffic.You install a DNS server. The DNS server is configured to use the default root hints. You need to ensure that the DNS server can resolve the host names on the Internet.  Which port should you open on the firewall?()A、53B、135C、500D、3389

You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1. You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the e:/data.cap file. You create a scheduled task. You add a new Start a program action to the task. You need to add the application name and the application arguments to the new action. What should you do?() A、 Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap / stopwhen /timeafter 11hours line as argumentsB、 Add netmon.exe as the application name. Add the /networks */capture LDA /file e:/data.cap /stopwhen / T.imeafter 11hours line as argumentsC、 Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as argumentsD、 Add nmconfig.exe as the application name. Add the /networks */capture LDAP /file e:/data.cap / stopwhen /timeafter 11hours line as arguments

You have a Web server that runs Windows Server 2003 Service Pack 2 (SP2). You need to collect the following information from the Web server:  (1)Unauthorized attempts to upload files  (2)Unsuccessful commands that try to run executables  You must achieve this goal by using the minimum amount of administrative effort.What should you do?()A、From Network Monitor, start a capture.B、From the Performance snap-in, create a counter log.C、From Internet Information Services (IIS) Manager, enable logging.D、From Computer Management, modify the properties of the application log.

You have a server named Server1 that is located in a remote office. Server1 runs Windows Server 2003 Service Pack 2 (SP2). You need to view the current processor activity on Server1 remotely. What should you do? ()A、From Event Viewer, connect to Server1.B、From the System Monitor snap-in, add a counter.C、From the Performance Logs and Alerts snap-in, create a new trace log.D、Install Network Monitor Tools and create a new capture.

You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data. What should you do? ()A、Apply the display filter !DNS and save the displayed frames as a DNSdata.cap file.B、Apply the capture filter DNS and save the displayed frames as a DNSdata.cap file.C、Add a new alias named DNS to the aliases table and save the file as DNSdata.cap.D、Run the nmcap.exe /inputcapture data.cap /capture DNS /file DNSdata.cap command.

You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 is configured as a FTP server.You need to view all the FTP packets sent to Server1 for a period of one hour.What should you do?()A、From System Monitor, add all counters for the Network object. B、From Network Monitor, create a new capture and then create a display filter. C、From the command prompt, run Ftp.exe –d server1. Review the files in %systemdrive%/intepub/ftproot/. D、From Internet Information Services (IIS) Manager, enable and configure logging for the FTP site. Open the FTP log.

You have a Web server that runs Windows Server 2003 Service Pack 2 (SP2). You need to collect the following information from the Web server: Unauthorized attempts to upload filesUnsuccessful commands that try to run executables You must achieve this goal by using the minimum amount of administrative effort.  What should you do?()A、From Network Monitor, start a capture.B、From the Performance snap-in, create a counter log.C、From Internet Information Services (IIS) Manager, enable logging.D、From Computer Management, modify the properties of the application log.

You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.  Which inbound traffic should be allowed? ()A、 VPN TrafficB、 DNS TrafficC、 LDAP TrafficD、 HTTP TrafficE、 HTTPS TrafficF、 Traffic from the network address of 192.168.10/24

You are the administrator of a Windows Server 2003 computer named Server1. Server1 is an FTP server located in the company’s internal network.Administrators report an increased amount of FTP traffic to Server1.   You need to configure Server1 to achieve the following goals: Identify the media access control (MAC) address of any computer that is performing FTP transfers from Server1.Find out the exact FTP commands that were executed.  Ensure that you do not disrupt the operation of Server1. What should you do?()A、Configure a performance alert to write an event to the application event log whenever the number of established FTP connections exceeds 1.B、Use a Network Monitor filter to capture IP traffic from any computer to Server1.C、Run the finger command on Server1 to identify the source of the FTP requests.D、Run the arp command on Server1 to identify the source of the FTP requests.

You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). You need to monitor the performance of the VPN server for one day. What should you do? ()A、From the Performance console, create a trace log.B、From the Performance console, create a counter log.C、Install Network Monitor Tools. From Network Monitor create a new capture.D、Install Network Monitor Tools. From Network Monitor create a new parser file.

You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do? ()A、Create a scheduled task that runs the Netsh tool.B、Create a scheduled task that runs the Nmcap tool.C、From Network Monitor,configure the General options.D、From Network Monitor,configure the Capture options.

You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()A、From a command prompt, run the diskperf command.B、Run Network Monitor in dedicated capture mode.C、Configure a Network Monitor capture filter.D、Increase the buffer size in Network Monitor.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()AInstall the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.BOpen Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.CInstall Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.DOpen Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

单选题Your company has a server named DC1 that runs Windows Server 2008 R2. Server1 has the DHCP Server server role installed.You find that a desktop computer named Computer1 is unable to obtain an IP configuration from the DHCP server.You install the Microsoft Network Monitor 3.0 application on Server1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between Server1 and Computer1.The network interface configuration for the two computers is shown in the following table. Server1 Computer1 IP address 192.168.2.1 169.254.15.84 MAC address 00-0A-5E-1C-7F-67 00-17-31-D5-5E-FF You need to build a filter in the Network Monitor application to capture the DHCP traffic between Server1 and Computer1. Which filter should you use?()AIPv4.Address == 169.254.15.84 DHCPBIPv4.Address == 192.168.2.1 DHCPCEthernet.Address == 0x000A5E1C7F67 DHCPDEthernet.Address == 0x001731D55EFF DHCP

单选题You need to specify the changes to the existing firewall configuration settings that are required by the HTTP endpoint that will be used by the proseware_projects database. What should you do?()ACreate a Web publishing rule on ISA2 that allows HTTP traffic on port 5017 from IIS1 to the SQL Server computer.BCreate a Web publishing rule on ISA1 that allows HTTP traffic on port 5017 from IIS1 to the SQL Server computer.CCreate a Web publishing rule on ISA2 that allows HTTPS traffic on port 5017 from IIS1 to the SQL Server computer.DCreate a Web publishing rule on ISA1 that allows HTTPS traffic on port 5017 from IIS1 to the SQL Server computer.

单选题Your network consists of an internal network and a perimeter network. On the internal network there is a server named Server1. On the perimeter network there is a server named Server2. All servers run Windows Server 2003 Service Pack 2 (SP2).  You schedule a task to transfers files from Server1 to Server2 by using FTP.You monitor the network traffic from Server1 to Server2 and notice that the user name and password used for the FTP transfer are sent as plain text. You need to ensure that all FTP traffic between Server1 and Server2 is encrypted.  What should you do?()AImplement IPSec.BInstall a server certificate on Server1.CInstall a server certificate on Server2.DUse the Encrypting File System on Server1.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()ACreate an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.BCreate a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.CCreate an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.DCreate a Pattern Match capture trigger for the 131.107.0.1 IP address.

单选题Your company has a server named DC1 that runs Windows Server 2008. DC1 has the DHCP server role installed. You find taht a desktop computer named SALES4 is unable to obtain an IP configuration from the DHCP server. You install the Microsoft Network Monitor 3.0 application on DC1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between DC1 and SALES4 The network interface configuration for the two computers is shown in the following table. (missing again wow). You need to build a filter int he Network Monitor application to capture the DHCP traffic between DC1 and SALES4  Which filter should you use()?AIPv4 Address == 169.254.15.84  DHCPBIPv4 address == 192.168.2.1  DHCPCEthernet Address == 0x000A5E1C7F67  DHCPDEthernet Address == 0x001731D55EFF  DHCP

单选题You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). You need to monitor the performance of the VPN server for one day. What should you do? ()AFrom the Performance console, create a trace log.BFrom the Performance console, create a counter log.CInstall Network Monitor Tools. From Network Monitor create a new capture.DInstall Network Monitor Tools. From Network Monitor create a new parser file.

单选题Your company has a server named DC1 that runs Windows Server 2008 R2. Server1 has the DHCP Server server role installed.You find that a desktop computer named Computer1 is unable to obtain an IP configuration from the DHCP server.You install the Microsoft Network Monitor 3.0 application on Server1. You enable P-mode in the Network Monitor application configuration. You plan to capture only the DHCP server-related traffic between Server1 and Computer1.The network interface configuration for the two computers is shown in the following table. Server1 Computer1 IP address 192.168.2.1 169.254.15.84 MAC address 00-0A-5E-1C-7F-67 00-17-31-D5-5E-FF You need to build a filter in the Network Monitor application to capture the DHCP traffic between Server1 and Computer1. Which filter should you use?()AIPv4.Address == 169.254.15.84 DHCPBIPv4.Address == 192.168.2.1 DHCPCEthernet.Address == 0x000A5E1C7F67 DHCPDEthernet.Address == 0x001731D55EFF DHCP

单选题You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.   You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts. What should you do?()AUse Network Monitor to capture traffic between Server1 and all client computers.BUse Network Monitor to capture traffic between Server1 and Server2.CMonitor Event Viewer for Net Logon error or warning events.DRun the tracert command on Server1.

单选题You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()AFrom a command prompt, run the diskperf command.BRun Network Monitor in dedicated capture mode.CConfigure a Network Monitor capture filter.DIncrease the buffer size in Network Monitor.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()ACheck the application log on the Web server.BUse Network Monitor to capture network traffic on the Web server.CReview the log files created by IIS on the Web server.DConfigure a performance log to capture all Web service counters. Review the performance log data.