You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.
You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts.
What should you do?()
A.Use Network Monitor to capture traffic between Server1 and all client computers.
B.Use Network Monitor to capture traffic between Server1 and Server2.
C.Monitor Event Viewer for Net Logon error or warning events.
D.Run the tracert command on Server1.
您可能感兴趣的试卷
你可能感兴趣的试题
You are the administrator of an Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.A server named Filesrv1 contains confidential data that is only available to users in the human resources (HR) department.You want all computers in the HR department to connect to Filesrv1 by using an IPSec policy. You assign the Server (Request Security) IPSec policy to Filesrv1. Using Network Monitor, you notice that some computers in the HR department connect to Filesrv1 without using the IPSec policy.You need to configure Filesrv1 to ensure that all computers connect to it by using the IPSec policy.
What should you do?()
A.Assign the Secure Server (Require Security) IPSec policy.
B.Assign the Client (Respond Only) IPSec policy.
C.Unassign the Server (Request Security) IPSec policy.
D.Restart the IPSec Services service.
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.
The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS.
What should you do?()
A.Check the application log on the Web server.
B.Use Network Monitor to capture network traffic on the Web server.
C.Review the log files created by IIS on the Web server.
D.Configure a performance log to capture all Web service counters. Review the performance log data.
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections.
What should you do?()
A.Run the net view command.
B.Run the gpresult command.
C.Use the IP Security Monitor console.
D.Use the IPSec Policy Management console.
You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.
What should you do?()
A.Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.
B.Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.
C.Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.
D.Create a Pattern Match capture trigger for the 131.107.0.1 IP address.
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.
Immediately send a notification to a network administrator that the infected computer needs to be repaired.
What should you do?()
A.Configure a WMI event trigger.
B.Configure a Network Monitor capture filter.
C.Configure a Network Monitor trigger.
D.Configure a System Monitor alert.
You are the network administrator for Humongous Insurance. The network consists of a single Active Directory domain named humongous.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure several Group Policy objects (GPOs) to enforce the use of IPSec for certain types of communication between specified computers.
A server named Server2 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Server2 are encrypted by using IPSec. However, when you monitor network traffic, you notice that Telnet connections are not being encrypted.You need to view all of the IPSec settings that are applied to Server2 by GPOs.
Which tool should you use?()
A.the IP Security Policy Management console
B.the IP Security Monitor console
C.the Resultant Set of Policy console
D.Microsoft Baseline Security Analyzer (MBSA)
You are the network administrator for Fabrikam, Inc. The network consists of a single Active Directory domain named fabrikam.com. A Windows Server 2003 computer named Server1 functions as the DNS server for the domain.Wingtip Toys is a division of Fabrikam, Inc. The Wingtip Toys network consists of a single Active Directory domain named wingtiptoys.com. Server1 is a secondary zone server for wingtiptoys.com.You are monitoring notification traffic between the two domains. You need to keep a record of when the primary DNS server for wingtiptoys.com informs Server1 of available changes in the wingtiptoys.com zone.
What should you do?()
A.Use the Performance console to create a log of the DNS performance counter Notification Received on Server1.
B.Enable debug logging on Server1. Configure the log to record Notification events.
C.Run the replmon command to monitor replication events on Server1.
D.Run the dcdiag command to check DNS registration on Server1.
You are the DNS administrator for Adventure Works.Adventure Works is an Internet service provider (ISP) that hosts Web sites for many companies.
Each Adventure Works DNS server hosts multiple DNS zones for customers. Several Adventure Works administrators are allowed to add DNS zones.You want to produce a weekly report that will list all the zones that are hosted on each DNS server.
What should you do?()
A.Use the dnslint utility to query each DNS server.
B.Use the dnscmd utility to query each DNS server.
C.Use the nslookup utility to query each DNS server.
D.Use the adsiedit utility to query Active Directory for a list of DNS zones.
You are the network administrator for Contoso, Ltd. The network consists of two Active Directory domains named contoso.com and corp.contoso.com. All DNS zones are configured to be Active Directory-integrated zones. You create a global security group named ConsoleAdmins in corp.contoso.com. You add a member of the Domain Users global group named Anne to ConsoleAdmins.
Anne logs on to her Windows XP Professional computer named Computer1. Anne runs the nslookup command and receives the output shown in the exhibit. (Click the Exhibit button.)
You need to configure the zone properties to ensure that Anne can list the contents of corp.contoso.com from Computer1. What should you do?()
A.Allow zone transfers to 192.168.2.47.
B.Allow zone transfers to 192.168.2.45.
C.Allow zone transfers to 192.168.2.27.
D.Allow zone transfers to 169.254.25.142.
E.Assign the ConsoleAdmins group the Allow - Full Control permisson.
F.Assign the ConsoleAdmins group the Allow - List Contents permission.
You are the network administrator for Margies Travel. The network consists of a single Active Directory forest that contains two domains named europe.margiestravel.com and namerica.margiestravel.com. The network contains Windows Server 2003 computers and Windows XP Professional computers. All client computers and 25 servers are dynamically assigned IP addresses by DHCP. All company computers are registered in either the europe.margiestravel.com DNS zone or the namerica.margiestravel.com DNS zone. All DNS servers contain copies of all zones. The written company network management policy states that computers cannot have duplicate host names. Client computers always connect to other computers by specifying only the name of the target computer. A fully qualified domain name (FQDN) is not required.You need to configure the client computers to ensure that all computer names can be resolved by using DNS without the domain name being specified. The configuration of client computers must be automated so that they do not need to be manually reconfigured if an additional domain is added to the forest.
What should you do?()
A.Configure the Append these DNS suffixes option in the DNS client configuration of each client computer.
B.Configure the 015 DNS Domain Name option on all DHCP scopes.
C.Configure the Default Domain Policy Group Policy object (GPO) in each domain. Enable the DNS Suffix Search List policy setting in the GPO.
D.Configure the Default Domain Policy Group Policy object (GPO) in each domain. Enable the Primary DNS Suffix policy setting in the GPO.
最新试题
你是Adventure Works的DNS管理员。Adventure Works是一家互联网服务提供商(ISP),为许多公司提供Web站点运行服务。每一个Adventure Works的DNS服务器上都为用户们运行着多个DNS区域。几个Adventure Works管理员被允许添加DNS区域。你打算每周制定一个报告,列出在每个DNS服务器上的全部区域。你该如何操作?()
你是公司网络管理员。所有的服务器运行Windows Server 2003。有20名公司员工连到终端服务器Server2上运行程序和通过它访问外网。 这20名员工报告说当他们浏览外网站点时,收到一些安全提示消息。并且一旦连接到Server2上时就不能修改自己客户端计算机浏览器的安全设置项。你需要让这20名用户在连上Server2时能够在自己的计算机上修改IE的安全设置项。你该如何做?()
你是公司网络管理员。网络中包含一个单IP子网。所有的服务器运行Windows Server2003。所有的客户端运行Windows XP Professional。你要在Server1上安装WSUS服务。Server1的磁盘空间有限。Server1上只存有极少量的本地信息。客户端计算机需要安装Microsoft公司紧急升级包。你要确保客户端计算机从Microsoft公司直接下载安装升级数据。并且只有审核通过的升级包下载安装。你该如何操作?()
你是Coho Winery的网络管理员。网络中包含一个单活动目录域cohowinery .net。所有的域控制器都配置成DNS服务器并为cohowinery .net运行着一个活动目录合并区域。 本地ISP向用户提供互联网连接服务。cohowinery .com中的所有站点都部署在网络周边。cohowinery .com的一个辅助区域部署在内网的一台Windows Server 2003服务器上Server1上。所有的客户端只向Server1提交名称解析。你需要配置DNS解析以确保所有的客户端计算机能够登陆网络,并且访问Web站点浏览互联网。你也要确保cohowincery .net区域尽可能的安全。你将采取哪两个操作步骤?()
你是公司的网络管理员。网络是一单活动目录域环境。域中有3台Windows Server 2003域控制器,20台Windows Server 2000域成员服务器,还有750台Windows XP Pro计算机。域中配置为只允许使用Kerberos协议对服务器连接认证授权。有用户报告当他试图连接一台域成员服务器时,收到“Access denied”(访问拒绝)错误提示。你要在用户的客户机上测试Kerberos授权功能。在用户的客户机上的命令提示符(cmd)下,你要运行那些命令?()
你是公司网络管理员。网络是一单活动目录域环境。域中有35台Windows server 2003,3000台Windows XP Pro,2200台Windows 2000 Pro。公司的安全策略规定域中所有的计算机必须检查检修,符合以下要求: 检查是否所有的可用安全升级都被安装;检查是否共享目录都可用;在每个硬盘上记录文件系统类型,你需要提供每台计算机的安全评估分析,并核实满足制定的安全策略要求。你该如何操作?()
你是公司网络管理员。网络是一个单活动目录域环境。所有的服务器运行Windows Server 2003。你需要为6台在网络中高度可见的服务器使用WSUS服务进行紧急升级。你批准通过所有的升级。你要确保升级操作在1小时内完成。你该如何操作?()
你是公司网络管理员。所有的客户端运行Windows XP Professional。所有的服务器运行Windows Server 2003。公司在Los Angeles(洛杉矶),San Francisco(旧金山),Seattle(西雅图)都有办公室。每个办公室配置成一个独立的IP子网。网络中只用DNS进行名称解析。你要在网络中的实施一次软件升级结构。在Los Angeles办公室中的Server1上你装了WSUS服务。Server1上WSUS用的默认设置。你创建了一个组策略对象(GPO)WSUS。并不打算安装别的WSUS服务器。你要客户端计算机能成功的连接到WSUS服务器。你该如何操作?()
你是公司网络管理员。在Denver(丹佛)的办公室当前正使用一台Windows Server 2003服务器Server23连接到公共WAN上。Server23被配置为一台拨号连接路由器。在Server23上有两块网卡,一块连接本地LAN以太网。另一块连接外网宽带。公司计划在Denver办公室增加至少25%的新雇员,你要确保当前的网络宽带连接能满足将来的扩展需要。你要在Server23上使用系统监视器察看现在的宽带网络连接利用率。你该如何操作?()
你是公司网络管理员。所有的服务器运行Windows Server 2003。你配置了Server2作为网络地址转换(NAT)服务器。Server2上有一块网卡和一个猫(调制解调器)。Server2通过demand-dial(拨号连接)互联网。用户反应当他们试图连接互联网上的站点时。间歇性的收到如下错误提示信息“Page not find”。在等待几分钟后,又能够连上站点了。这种情况整天都出现。你需要配置Server2让用户始终都能够连接互联网站点。 你该怎么操做?()