Admin logging
SNMP logging
Syslog server logging
Event logging
第1题:
A. syslog logging
B. terminal logging
C. buffered logging
D. console logging
第2题:
Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()
第3题:
As there are several logging modes, which mode will a CIS router use when it stores log messages in Random Access Memory?()
第4题:
You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()
第5题:
You have an Exchange Server 2010 organization. You plan to delegate Exchange administrative rights to some users in the organization. You need to recommend a solution that tracks all changes made to the Exchange organization. What should you include in the solution?()
第6题:
You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured. What should you do?()
第7题:
The MAG Series device has multiple ports associated with the certificate.
The MAG Series device's serial number needs to be configured on the SRX Series device.
The SRX Series device must have a certificate signed by the same authority as the MAG Series device.
The MAG Series device and SRX Series device are not synchronized to an NTP server.
第8题:
From a command prompt, run the diskperf command.
Run Network Monitor in dedicated capture mode.
Configure a Network Monitor capture filter.
Increase the buffer size in Network Monitor.
第9题:
From Task Manager, click the Networking tab.
From the command prompt, run Netstat.exe –e.
Right-click Local Area Connection and click Status.
From Device Manager, open the properties of the network card and click the Resources tab.
第10题:
Local Security Policy
Scw
Secedit
Services console
第11题:
Use Device Manager to disable the SCSI CD-ROM.
Create and implement a new hardware profile to exclude the SCSI CD-ROM.
Use Device Manager to update the driver for the SCSI CD-ROM.
Use Device Manager to update the driver for the SCSI controller.
第12题:
the debug logging settings
the event logging settings
the monitoring settings for the contoso.com zone
the zone transfer settings for the contoso.com zone
第13题:
Which term represents the mode that is used when the router stores log messages in RAM memory?()
第14题:
Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()
第15题:
Which term represents the mode that is used when the router stores log messages in RAMmemory? ()
第16题:
Your network consists of a single Active Directory named contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2).You have two DNS servers named Server1 and Server2. Server1 has a primary DNS zone for contoso.com. Server2 has a secondary DNS zone for contoso.com. You need to log all zone transfer requests and client queries made to Server1. What should you configure from the DNS snap-in on Server1?()
第17题:
You are the network administrator for your company. The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Terminal Server is installed on a member server named Server1, which is located in an organization unit (OU) named Servers. User of Server1 report unacceptable response times. To investigate, you start Task Manager on Server1. You discover that the average CPU usage is 80 percent. However, when you select the Processes tab, none of the processes show significant CPU usage. You need to identify the process that is responsible for the CPU usage. What should you do?()
第18题:
You are the network administrator for . Your network consists of a single Active Directory domain named All network servers runWindows Server 2003. You use Microsoft Operations Manager (MOM) to monitor all servers. An e-mail server named MailTK1 is located at a remote data center. MailTK1 runs Microsoft Exchange Server 2003. MailTK1 restarts unexpectedly during business hours. The event log indicates a problem with the SCSI CD-ROM. You need to ensure that MailTK1 remains continuously available during business hours. What should you do?()
第19题:
Admin logging
SNMP logging
Syslog server logging
Event logging
第20题:
On each server in your office, use Performance Logs and Alerts to create a baseline log. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.
From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.
第21题:
The user will be instructed to call the network administrator.
The user will fail authentication.
The user will be prompted to install a new device certificate on the MAG Series device.
The user will successfully authenticate and have full network access.
第22题:
On each server in your office, use Performance Logs and Alers to create a baseline log. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
From a monitoring computer, use Performance Logs and Alerts to create a baseline log for each server in your office. Configure the log to collect data every five minutes for one day. Use the same counters for each server to create a log file. Schedule the log to run weekly.
On each server in your office, use Performance Logs and Alerts to create threshold-based alerts. Configure the alerts to send a message to your monitoring computer when they are triggered. Set each alert to start a new scan when the alert finishes.
From a monitoring computer use Performance Logs and Alerts to create a new counter set in System Monitor. Configure the counters to run continuously.
第23题:
In Task Manager, select the Show processes from all users option.
From a command prompt, run the query process command.
Open the Terminal Services Manager. Select Server1 from the list of servers, and then select the Processes tab.
Edit the Group policy object (GPO) for the Servers OU by adding your user account to the Profile a single process policy. Then use Task Manager to re-examine Server1.
第24题:
Use Task Manager to review network utilization of the VPN adapter.
Use the Performance console to create a log of network utilization outside of business hours.
Use System Monitor to review network utilization of the VPN connection.
Use Task Manager to select Bytes Sent as the Network Adapter History setting.