单选题You need to use the Event Viewer window to review the event logs for only critical and error events. You also need the maximum amount of detail for each of these events. What should you do? ()AEdit the filter for the Administrative Events view.BCreate a custom view. Enable the Critical, Error, and Information level events. Select all logs.CCreate a custom view. Select the Critical checkbox, Error checkbox, and Verbose checkbox. Select all logs.DSearch for the Critical or Error string by using the Find option of the Administrative Events view.

单选题
You need to use the Event Viewer window to review the event logs for only critical and error events. You also need the maximum amount of detail for each of these events. What should you do? ()
A

Edit the filter for the Administrative Events view.

B

Create a custom view. Enable the Critical, Error, and Information level events. Select all logs.

C

Create a custom view. Select the Critical checkbox, Error checkbox, and Verbose checkbox. Select all logs.

D

Search for the Critical or Error string by using the Find option of the Administrative Events view.


参考解析

解析: 暂无解析

相关考题:

You create a Web application. The Web application enables users to change fields in their personal profiles. Some of the changes are not persisting in the database. You need to raise a custom event to track each change that is made to a user profile so that you can locate the error.Which event should you use? ()A. WebAuditEventB. WebEventManagerC. WebBaseEventD. WebRequestEvent

Your network contains a server named Server1 that runs Windows Server 2008 R2.You have a user named User1.You need to ensure that User1 can view the events in the Security event log. The solution must minimize the number of rights assigned to User1. What should you do?()A、In Event Viewer, filter the Security log.B、In Event Viewer, configure the properties of the Security log.C、In the Local Security Policy console, modify the Security Options.D、In the Registry Editor, add a Security Descriptor Definition Language (SDDL) value.

Your company’s client computers run Windows 7.   Your company’s network has a wireless access point (WAP). A user reports that he regularly loses connectivity to the WAP.    You need to display information about client connectivity to the WAP.   What should you do?()A、Use Event Viewer to view events from a source of WlanConn.B、Use Event Viewer to view events from a source of WLAN AutoConfig.C、Use auditpol.exe to enable failed attempts in the Object Access category.D、Use auditpol.exe to enable successful attempts in the Object Access category.

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A user named King uses a client computer named TestKing1. This computer has a locally attached tape device. You grant King the necessary permission to perform backups of a member server named TestKingSrvB. King runs the Backup utility on TestKing1 to back up the files located on TestKingSrvB. You need to use your client computer to view the most recent backup logs for TestKingSrvB. What should you do?()A、Use Notepad to view the contents of the backup report located on TestKingSrvb.B、Use Notepad to view the contents of the backup report located on TestKing1.C、Use Event Viewer to view the contents of the application log located on TestKingSrvb.D、Use Event Viewer to view the contents of the application log located on TestKing1

You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()A、Enable the Problem Reporting feature for all users.B、Configure a custom view to monitor failed logon events on your computer.C、Use the Computer Management console to connect to your computer from another computer and monitor the audit logs.D、In the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.

You have an Exchange Server 2010 Service Pack 1 (SP1) Mailbox server that contains multiple mailbox databases. You need to ensure that you are notified when deleted mailboxes are purged from the server.What should you do?()A、Attach a new task to the Application event log.B、Modify the properties of the mailbox database objects.C、Create a new Data Collector Set.D、Create a new Event Viewer Subscription.

You have a single Active Directory directory service domain. All servers run Windows Server 2003. You create several new Group Policies. You need to determine the end result of these Group Policies before applying the settings.  What should you do?()A、 Use Resultant Set of Policy (RSoP) in Planning mode.B、 Use Resultant Set of Policy (RSoP) in Logging mode.C、 Use Event Viewer to view the system log.D、 Use Event Viewer to view the application log.

Your network consists of a single Active Directory domain.? All domain controllers run Windows Server 2008. You need to identify the Lightweight Directory Access Protocol (LDAP) clients that are using the largest amount of available CPU resources on a domain controller. What should you do()A、Review performance data in Resource Monitor.B、Review the Hardware Events log in the Event Viewer.C、Run the LAN Diagnostics Data Collector Set. Review the LAN Diagnostics report.D、Run the Active Directory Diagnostics Data Collector Set. Review the Active DirectoryDiagnostics

You need to use the Event Viewer window to review the event logs for only critical and error events. You also need the maximum amount of detail for each of these events. What should you do? ()A、Edit the filter for the Administrative Events view.B、Create a custom view. Enable the Critical, Error, and Information level events. Select all logs.C、Create a custom view. Select the Critical checkbox, Error checkbox, and Verbose checkbox. Select all logs.D、Search for the Critical or Error string by using the Find option of the Administrative Events view.

Your network consists of a single Active Directory domain.? All domain controllers run Windows  Server 2008 R2.     You need to identify the Lightweight Directory Access Protocol (LDAP) clients that are using the  largest amount of available CPU resources on a domain controller.     What should you do()A、Review performance data in Resource Monitor.B、Review the Hardware Events log in the Event Viewer.C、Run the LAN Diagnostics Data Collector Set. Review the LAN Diagnostics report.D、Run the Active Directory Diagnostics Data Collector Set. Review the Active Directory Diagnostics report

You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()A、Use Event Viewer to review the application logs on each of the seven servers.B、Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.C、Use Task Manager to view the performance data on each of the seven servers.D、Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.

You are developing a Windows Presentation Foundation (WPF) application. An event triggers a workflow such that a parent control executes the event handlers before the child controls. You need to ensure that if a parent controls event handler encounters an error, the subsequent handlers are not called. What should you do?()A、Use handlers for a tunneling routed event and mark the event as handled in the case of a problem.B、Use handlers for a tunneling routed event and make the event as handled in the finally portion of a try-catch-finally code block.C、Use handlers for a bubbling routed event and mark the event as handled in the case of a problem.D、Use handlers for a bubbling routed event and set the Handled property of the RoutedEventArgs object to true in the catch portion of a try-catch-finally code block.

You create a Web application. The Web application enables users to change fields in their personal profiles. Some of the changes are not persisting in the database. You need to raise a custom event to track each change that is made to a user profile so that you can locate the error. Which event should you use?()A、WebAuditEventB、WebEventManagerC、WebBaseEventD、WebRequestEvent

You had installed an Active Directory Federation Services (AD FS) role on a Windows server 2008 in your organization. Now you need to test the connectivity of clients in the network to ensure that they can successfully reach the new Federation server and Federation server is operational. What should you do()A、Go to Services tab, and check if Active Directory Federation Services is runningB、In the event viewer, Applications, Event ID column look for event ID 674.C、Open a browser window, and then type the Federation Service URL for the new federation server. D、None of the above

You need to implement an auditing strategy that will fulfill the company’s business requirements.What should you do?()A、Use C2 auditing.B、Use DML triggers.C、Use DDL triggers.D、Use event notifications.

You are developing a user control for Windows Presentation Foundation (WPF) application. The user control contains a button. Both the user control and the hosting control must receive the button click event. You need to ensure that the user control responsd to the button click event before hosting control responds to the event. What should you do ?()A、Use a bubbling routed event. In the button click event handler, set the Handled property to TrueB、Use a bubbling routed event. In the button click event handler, set the Handled property to FalseC、Use a standard Microsoft .NET event. Set Handled property to true.D、Use a tunneling routed event. Set the handled property to false.

单选题You are the network administrator for The network consists of a single Active Directory domain named All five domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. The domain's audit policy ensures that all account logon events are audited. A temporary employee named King uses a client computer named TestKing1. When King's temporary assignment concludes, his employment is terminated. Now you need to learn the times and dates when King logged on to the domain. You need to accomplish this goal by reviewing the minimum amount of information. What should you do?()ALog on to TestKing1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for King's user account.BLog on to TestKing1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for the TestKing1 computer account.CUse Event Viewer to view the security log on each domain controller. Use the Find option to list only the events for King's user account.DUse Event Viewer to view the security log on each domain controller. Set a filter to list only the events for King's user account.EUse Event Viewer to view the security log on each domain controller. Set a filter to list only the events for the TestKing1 computer account.

单选题Your network contains a server named Server1 that runs Windows Server 2008 R2.You have a user named User1.You need to ensure that User1 can view the events in the Security event log. The solution must minimize the number of rights assigned to User1. What should you do?()AIn Event Viewer, filter the Security log.BIn Event Viewer, configure the properties of the Security log.CIn the Local Security Policy console, modify the Security Options.DIn the Registry Editor, add a Security Descriptor Definition Language (SDDL) value.

单选题Your network contain 10 domain controller that run Windows Server    R2.   The network contain a member server that is configured to collect all of events that occur on the  domain controllers.   Your need to ensure that administrators are notified when a specific event occurs on any of the  domain controllers. You want to achive the goal by using the minimum amount effort.   What should you do()AFrom Event Viewer on the member server, create a subscription.BFrom Event Viewer on each domain controller, create a subscription.CFrom Event Viewer on the member server, run the Create Basic Task Wizard.DFrom Event Viewer on each domain controller,run the Create Basic Task Wizard.

单选题You discover audit log entries that report attempts to log on to your computer. You need to be notified of all logon attempts that occur on your computer.  What should you do?()AEnable the Problem Reporting feature for all users.BConfigure a custom view to monitor failed logon events on your computer.CUse the Computer Management console to connect to your computer from another computer and monitor the audit logs.DIn the Event Viewer window, attach a task to a failed logon event. Configure this task to send an e-mail message to your e-mail account.

单选题Your network contains a server named Server1 that runs Windows Server 2008 R2. You need to ensure that an administrator is notified by e-mail if the Event Viewer logs any error. What should you do from the Event Viewer console?()ACreate a custom view, and then click the Filter Current Custom View action.BCreate a custom view, and then click the Attach Task to This Custom View action.CFrom the System log, click the Filter Current Log action.DFrom the System log, select an Error event, and then click the Attach Task to This Event action.

单选题You have configured the system to purge mailboxes after 8 days of being deleted. You need to receive a notification when the mailboxes are purged. What should you do?()AStart a data collectorBStart an event viewer subscriptionCAdd a task to the application event logDModify the properties of the mailbox database

多选题You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application contains a composite user control that includes a TextBox control named txtInput. The user control will be hosted in a window and will have handlers for the text-changed event of txtInput. You need to ensure that the application meets the following requirements: AddHandler(TextBox.TextChangedEvent, new RoutedEventHandler(Audit_TextChanged), true); Which of the following statments are TRUE ?()AA text-changed event handler, named Audit_TextChanged, was Created for the txtInput control.BAudit_TextChanged will stop running because the event is marked as handled by certain event handlers.CEven through the event is marked handled by certain event handlers, Audit_TextChanged will still run.DAudit_TextChanged will continue to run until the event is marked as handled.

单选题You manage a member server that runs Windows Server 2008. The server runs the Terminal Server Gateway (TS Gateway) role service.  You need to find out whether a user named User1 has ever connected to his office workstation through the TS Gateway server. What should you do?()AView the events in the Monitoring folder from the TS Gateway Manager console.BView the Event Viewer Security log.CView the Event Viewer Application log.DView the Event Viewer Terminal Services-Gateway log.

单选题You are auditing some events on your Windows 2000 Professional computer. You make changes in the system time of this computer. Under what event will this log be generated in the event viewer? ()APrivilege UseBObject UseCSecurity Settings UseDSystem Use

单选题You are an Administrator at Cer-tech .com. you manage a member server that runs Windows Server 2008.The Terminal Server Gateway (TS Gateway) is also installed on the member server. You want to find outwhether a group of users have ever connected to their workstations remotely through TS Gateway server. What should you do to achieve this task?()AOpen the TS gateway console and view the events in the monitoring fieldBView the Windows Server 2008 Event Viewer for TS Gateway connectionsCView Event Viewer security logDView the Event Viewer Terminal Services-gateway log

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All five domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. The domain's audit policy ensures that all account logon events are audited. A temporary employee named Peter uses a client computer named Client1. When Peter's temporary assignment concludes, his employment is terminated. Now you need to learn the times and dates when Peter logged on to the domain. You need to accomplish this goal by reviewing the minimum amount of information. What should you do?()ALog on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for Peter's user account.BLog on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for the Client1 computer account. Use Event Viewer to view the security log on each domain controller. Use the Find option to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.CSet a filter to list only the events for Peter's user account. Use Event Viewer to view the security log on each domain controller.DSet a filter to list only the events for the Client1 computer account.

单选题You have a single Active Directory directory service domain. All servers run Windows Server 2003. You create several new Group Policies. You need to determine the end result of these Group Policies before applying the settings.  What should you do?()A Use Resultant Set of Policy (RSoP) in Planning mode.B Use Resultant Set of Policy (RSoP) in Logging mode.C Use Event Viewer to view the system log.D Use Event Viewer to view the application log.