单选题You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:/data.cap file.You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.What should you do?()AAdd nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.BAdd netmon.exe as the application name. Add the /networks */capture LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.CAdd nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.DAdd nmconfig.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.
单选题
You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:/data.cap file.You create a scheduled task. You add a new Start a program action to the task.You need to add the application name and the application arguments to the new action.What should you do?()
A
Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.
B
Add netmon.exe as the application name. Add the /networks */capture LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.
C
Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.
D
Add nmconfig.exe as the application name. Add the /networks * /capture &LDAP /file e:/data.cap / stopwhen / timeafter 11hours line as arguments.
参考解析
解析:
暂无解析
相关考题:
You are a network administrator for You manage a Windows Server2003 computer named Testking1. Folder Redirection is enabled for the users‘ MyDocuments folders.A user named Peter deletes all the files and folders in his My Documents folderbefore he leaves TestKing. Peter‘s manager asks you to recover documents. You donot know if Peter made modifications to the permissions on the files.You need to restore Peter‘s My Documents folder so that his manager can access thefiles. You want to achieve this goal by using the minimum amount of administrativeeffort.What should you do?()A. Perform a default restoration.B. Run the Automated System Recover (ASR) wizard.C. Perform a restoration, and enable the Restore security option.D. Perform a restoration, and disable the Restore security option
You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1. You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the e:/data.cap file. You create a scheduled task. You add a new Start a program action to the task. You need to add the application name and the application arguments to the new action. What should you do?() A、 Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap / stopwhen /timeafter 11hours line as argumentsB、 Add netmon.exe as the application name. Add the /networks */capture LDA /file e:/data.cap /stopwhen / T.imeafter 11hours line as argumentsC、 Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as argumentsD、 Add nmconfig.exe as the application name. Add the /networks */capture LDAP /file e:/data.cap / stopwhen /timeafter 11hours line as arguments
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data. What should you do? ()A、Apply the display filter !DNS and save the displayed frames as a DNSdata.cap file.B、Apply the capture filter DNS and save the displayed frames as a DNSdata.cap file.C、Add a new alias named DNS to the aliases table and save the file as DNSdata.cap.D、Run the nmcap.exe /inputcapture data.cap /capture DNS /file DNSdata.cap command.
You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1.You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses.You need to display mnemonic host names instead of IP addresses for all the frames. What should you do? ()A、Create a new display filter and apply the filter to the capture.B、Create a new capture filter and apply the filter to the capture.C、Populate the Aliases table and apply the aliases to the capture.D、Configure the Network Monitor application to enable the Enable Conversations option. Recapture the data to a new file.
You have an Exchange Server 2010 organization. You have a global security group named Legal that contains all the members of your companys legaldepartment. The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords. You need to recommend a solution for the organization that complies with the security policy. What should you include in the solution?()A、a Discovery Management role groupB、a legal holdC、administrator audit loggingD、Mailbox journaling
Your company has a server that runs Windows Server 2008. Certification Services is configured as a stand-alone Certification Authority (CA) on the server. You need to audit changes to the CA configuration settings and the CA security settings. Which two tasks should you perform()A、Configure auditing in the Certification Services snap-in.B、Enable auditing of successful and failed attempts to change permissions on files in the %SYSTEM32% /CertSrv directory.C、Enable auditing of successful and failed attempts to write to files in the %SYSTEM32%/CertLog directory.D、Enable the Audit object access setting in the Local Security Policy for the Certification Services server.
You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()A、the Security Templates snap-inB、the Security Configuration WizardC、the Microsoft Baseline Security AnalyzerD、the Security Configuration and Analysis snap-in
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance.You must make sure that all SQL Server instances are consistently configured for naming conventions, security settings, force index creation and avoidance of data fragmentation. So what action should you perform to achieve this goal?() A、You should use the Database Engine Tuning Advisor. B、In Microsoft SQL Server Management Studio, you should create a maintenance plan C、You should use the SQL Server Configuration Manager D、In Microsoft SQL Server Management Studio, you should create a policy
You are the administrator of a SQL Server 2005 computer named SQL1. SQL1 is a member of a Microsoft Active Directory domain. You do not have any rights or privileges to perform domain administration. However, you have been granted membership in the local Administrators group on SQL1. You perform most of the management of SQL1 from your administrative workstation. However, for security reasons, you want to track all attempts for interactive logons and network connections to SQL1. What should you do?()A、Create a Group Policy object (GPO) that is configured for success and failure auditing of the Audit account logon events setting. Ask the domain administrator to link the GPO to the object containing SQL1.B、Configure the SQL Server service on SQL1 to audit all successful and failed logon attempts.C、Edit the local security policy of SQL1. Then, configure success and failure auditing on the Audit logon events setting.D、Run the SQL Server Profiler and use a standard default template.
Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()A、In the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.B、In the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.C、In the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.D、In the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.
多选题Your company has a server that runs Windows Server 2008 R2. Active Directory Certificate Services (AD CS) is configured as a standalone Certification Authority (CA) on the server. You need to audit changes to the CA configuration settings and the CA security settings. Which two tasks should you perform()AConfigure auditing in the Certification Authority snap-in.BEnable auditing of successful and failed attempts to change permissions on files in the %SYSTEM32%/CertSrv directory.CEnable auditing of successful and failed attempts to write to files in the %SYSTEM32%/CertLog directory.DEnable the Audit object access setting in the Local Security Policy for the Active Directory Certificate Services (AD CS) server.
单选题Your network consists of a single Active Directory domain. You have a member server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).You need to record all attempts by domain users and local users to log on to Server1. What should you do?()AIn the Default Domain Controller Policy, enable success and failure for the Audit logon events policy setting.BIn the Default Domain Controller Policy, enable success and failure for the Audit account logon events policy setting.CIn the Local Security Policy on Server1, enable success and failure for the Audit logon events policy.DIn the Local Security Policy on Server1, enable success and failure for the Audit account logon events policy setting.
单选题You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()ACreate a new display filter and apply the filter to the capture.BCreate a new capture filter and apply the filter to the capture.CPopulate the aliases table and apply the aliases to the capture.DConfigure the network monitor application to enable the enable converstations option, recapture the data to a new file.
单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The TS Gateway roleservice is installed on this server. You have to provide a security group access to the TS Gateway server. So what action should you perform?()AA Terminal Services Resource Authorization Policy should be created and configured.BA Terminal Services Connection Authorization Policy should be created and configured.CThe security group should be added to the Remote Desktop Users group.DThe security group should be added to the TS Web Access Computers group.
单选题You have two stand-alone servers named Server1 and Server2. Both servers run Windows Server 2003 Service Pack 2 (SP2).On Server1, you save the local security policy as a template. You need to import the template to Server2. What should you run on Server2?()Athe Security Templates snap-inBthe Security Configuration WizardCthe Microsoft Baseline Security AnalyzerDthe Security Configuration and Analysis snap-in
单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance.You must make sure that all SQL Server instances are consistently configured for naming conventions, security settings, force index creation and avoidance of data fragmentation. So what action should you perform to achieve this goal?()AYou should use the Database Engine Tuning Advisor. BIn Microsoft SQL Server Management Studio, you should create a maintenance plan CYou should use the SQL Server Configuration Manager DIn Microsoft SQL Server Management Studio, you should create a policy