You are the administrator of a Windows Server 2003 computer named Server1. Server1 is an FTP server located in the company’s internal network.Administrators report an increased amount of FTP traffic to Server1.
You need to configure Server1 to achieve the following goals: Identify the media access control (MAC) address of any computer that is performing FTP transfers from Server1.Find out the exact FTP commands that were executed. Ensure that you do not disrupt the operation of Server1.
What should you do?()
A.Configure a performance alert to write an event to the application event log whenever the number of established FTP connections exceeds 1.
B.Use a Network Monitor filter to capture IP traffic from any computer to Server1.
C.Run the finger command on Server1 to identify the source of the FTP requests.
D.Run the arp command on Server1 to identify the source of the FTP requests.
您可能感兴趣的试卷
你可能感兴趣的试题
You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.
You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts.
What should you do?()
A.Use Network Monitor to capture traffic between Server1 and all client computers.
B.Use Network Monitor to capture traffic between Server1 and Server2.
C.Monitor Event Viewer for Net Logon error or warning events.
D.Run the tracert command on Server1.
You are the administrator of an Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.A server named Filesrv1 contains confidential data that is only available to users in the human resources (HR) department.You want all computers in the HR department to connect to Filesrv1 by using an IPSec policy. You assign the Server (Request Security) IPSec policy to Filesrv1. Using Network Monitor, you notice that some computers in the HR department connect to Filesrv1 without using the IPSec policy.You need to configure Filesrv1 to ensure that all computers connect to it by using the IPSec policy.
What should you do?()
A.Assign the Secure Server (Require Security) IPSec policy.
B.Assign the Client (Respond Only) IPSec policy.
C.Unassign the Server (Request Security) IPSec policy.
D.Restart the IPSec Services service.
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.
The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS.
What should you do?()
A.Check the application log on the Web server.
B.Use Network Monitor to capture network traffic on the Web server.
C.Review the log files created by IIS on the Web server.
D.Configure a performance log to capture all Web service counters. Review the performance log data.
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections.
What should you do?()
A.Run the net view command.
B.Run the gpresult command.
C.Use the IP Security Monitor console.
D.Use the IPSec Policy Management console.
You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.
What should you do?()
A.Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.
B.Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.
C.Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.
D.Create a Pattern Match capture trigger for the 131.107.0.1 IP address.
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.
Immediately send a notification to a network administrator that the infected computer needs to be repaired.
What should you do?()
A.Configure a WMI event trigger.
B.Configure a Network Monitor capture filter.
C.Configure a Network Monitor trigger.
D.Configure a System Monitor alert.
You are the network administrator for Humongous Insurance. The network consists of a single Active Directory domain named humongous.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure several Group Policy objects (GPOs) to enforce the use of IPSec for certain types of communication between specified computers.
A server named Server2 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Server2 are encrypted by using IPSec. However, when you monitor network traffic, you notice that Telnet connections are not being encrypted.You need to view all of the IPSec settings that are applied to Server2 by GPOs.
Which tool should you use?()
A.the IP Security Policy Management console
B.the IP Security Monitor console
C.the Resultant Set of Policy console
D.Microsoft Baseline Security Analyzer (MBSA)
You are the network administrator for Fabrikam, Inc. The network consists of a single Active Directory domain named fabrikam.com. A Windows Server 2003 computer named Server1 functions as the DNS server for the domain.Wingtip Toys is a division of Fabrikam, Inc. The Wingtip Toys network consists of a single Active Directory domain named wingtiptoys.com. Server1 is a secondary zone server for wingtiptoys.com.You are monitoring notification traffic between the two domains. You need to keep a record of when the primary DNS server for wingtiptoys.com informs Server1 of available changes in the wingtiptoys.com zone.
What should you do?()
A.Use the Performance console to create a log of the DNS performance counter Notification Received on Server1.
B.Enable debug logging on Server1. Configure the log to record Notification events.
C.Run the replmon command to monitor replication events on Server1.
D.Run the dcdiag command to check DNS registration on Server1.
You are the DNS administrator for Adventure Works.Adventure Works is an Internet service provider (ISP) that hosts Web sites for many companies.
Each Adventure Works DNS server hosts multiple DNS zones for customers. Several Adventure Works administrators are allowed to add DNS zones.You want to produce a weekly report that will list all the zones that are hosted on each DNS server.
What should you do?()
A.Use the dnslint utility to query each DNS server.
B.Use the dnscmd utility to query each DNS server.
C.Use the nslookup utility to query each DNS server.
D.Use the adsiedit utility to query Active Directory for a list of DNS zones.
You are the network administrator for Contoso, Ltd. The network consists of two Active Directory domains named contoso.com and corp.contoso.com. All DNS zones are configured to be Active Directory-integrated zones. You create a global security group named ConsoleAdmins in corp.contoso.com. You add a member of the Domain Users global group named Anne to ConsoleAdmins.
Anne logs on to her Windows XP Professional computer named Computer1. Anne runs the nslookup command and receives the output shown in the exhibit. (Click the Exhibit button.)
You need to configure the zone properties to ensure that Anne can list the contents of corp.contoso.com from Computer1. What should you do?()
A.Allow zone transfers to 192.168.2.47.
B.Allow zone transfers to 192.168.2.45.
C.Allow zone transfers to 192.168.2.27.
D.Allow zone transfers to 169.254.25.142.
E.Assign the ConsoleAdmins group the Allow - Full Control permisson.
F.Assign the ConsoleAdmins group the Allow - List Contents permission.
最新试题
你是公司网络管理员。你在公司Chicago的办公室工作。你们办公室网络中有40台Windows XP Pro桌面机和1台Windows Server 2003 服务器Server1。Server1通过一条512-Kbps的租用线路连接互联网。公司主办公室在Seattle。在Chicago办公室中的桌面机用户是一种新软件产品的开发人员。你要让这些用户在Server1上的一个共享文件夹中保存每天的工作记录。你要让在Seattle的用户可以同FTP从该文件夹中下载这些记录据。你在Server1安装了IIS并配置了FTP服务站点,以便Seattle的用户可以下载这些数据。 但是你监视发现有来自互联网的连接试探,并注意到有大量的HTTP连接。你要加强Server1的安全,以便不受互联网中恶意用户的影响。Server1也必须连接到互联网中下载升级数据和更新病毒库。你需要再采购一些硬件或软件。你将对Server1如何操作?()
你是Coho Winery的网络管理员。网络中包含一个单活动目录域cohowinery .net。所有的域控制器都配置成DNS服务器并为cohowinery .net运行着一个活动目录合并区域。 本地ISP向用户提供互联网连接服务。cohowinery .com中的所有站点都部署在网络周边。cohowinery .com的一个辅助区域部署在内网的一台Windows Server 2003服务器上Server1上。所有的客户端只向Server1提交名称解析。你需要配置DNS解析以确保所有的客户端计算机能够登陆网络,并且访问Web站点浏览互联网。你也要确保cohowincery .net区域尽可能的安全。你将采取哪两个操作步骤?()
你是公司网络管理员。网络是一个单活动目录域环境。所有的服务器运行Windows Server 2003系统。所有的客户端运行打了SP4补丁的Windows 2000 Professional或Windows XP Professional。你在Server2上安装WSUS服务。你创建了一个组策略对象配置所有的客户机从Server2上获取软件升级。一周后,你在所有的客户机上运行Microsoft baseline security Analyzer(MBSA,微软基准安全分析)以找出是否所有的升级都被执行应用。你发现所有的Windows 2000 Professional客户机都顺利获取利了升级,但是所有的Windows XP Professional客户机则不然。你检查验证了指派在所有Windows XP Professional客户机上的GPO设置。你要确保所有Windows XP Professional客户机都从Server2处获取升级。你该如何操作?()
你是公司网络管理员。网络通过一台Windows server 2003服务器Router11连接互联网。你发现网络中的部分计算机感染了蠕虫病毒,该病毒不时地外网的不同主机发送信息。这些信息都使用同一个TCP/IP端口。你要检查出是哪些计算机感染了病毒。你需要在Router11上配置一个解决方案,该方案须做到以下两点:检测并识别出该蠕虫病毒发送的信息。立即发送一个通知给管理员去修复被感染的计算机。你该如何操作?()
你是公司网络管理员。网络是一单活动目录域环境。域中有35台Windows server 2003,3000台Windows XP Pro,2200台Windows 2000 Pro。公司的安全策略规定域中所有的计算机必须检查检修,符合以下要求: 检查是否所有的可用安全升级都被安装;检查是否共享目录都可用;在每个硬盘上记录文件系统类型,你需要提供每台计算机的安全评估分析,并核实满足制定的安全策略要求。你该如何操作?()
你是公司网络管理员。网络中包含一个单活动目录域。域中有35台Windows Server 2003计算机,3000台Windows XP Professional计算机和2000台Windows 2000 Professional计算机。Windows Server Update Service(WSUS)安装在服务器Server1上。配置了必须的组策略对象(GPO)。你需要确认域中的所有计算机都从Server1上接受到了被核准的升级包。你该如何操作?()
你是公司网络管理员。网络中包含一个单IP子网。所有的服务器运行Windows Server2003。所有的客户端运行Windows XP Professional。你要在Server1上安装WSUS服务。Server1的磁盘空间有限。Server1上只存有极少量的本地信息。客户端计算机需要安装Microsoft公司紧急升级包。你要确保客户端计算机从Microsoft公司直接下载安装升级数据。并且只有审核通过的升级包下载安装。你该如何操作?()
你是公司网络管理员。网络中包含一个单活动目录域。所有的服务器运行Windows Server 2003。所有的客户端运行Windows XP Professional。 你要实施一个新的软件升级结构。你发现网络中的所有客户计算机都没有安装安全补丁,紧急升级,升级包。你在一台Windows Server 2003服务器Server5上安装了WSUS服务。你进行同步并批准了当前所有的安全补丁,紧急升级,升级包数据。你要确保所有的客户端计算机接收到全部的Microsoft安全补丁,紧急升级,升级包数据。你将采取哪两个操作?()
你是一台Windows Server 2003 服务器Server1的管理员。Server1是位于公司内部网络的FTP服务器。管理员报告说连接到Server1的FTP通信量增加。你需要配置Server1以实现以下目的:识别所有正在和Server1进行FTP传输的计算机的MAC地址。准确查找出已被执行的FTP命令。 确保不会中断Server1上的操作。你该如何操作?()
你是A.Datum公司的网络管理员。网络是一个单活动目录域环境,域名adatum.net。Adatum.com域名下的所有Web服务,电子邮件服务都外包给了一家ISP。所有对adatum.com的名称解析都由ISP提供。你无权管理ISP处的DNS服务器。你不可以在ISP的DNS服务器上使用nslookup命令列出阿datum .com的资源内容。一台Windows Server 2003计算机Server1上配置了adatum .net的一个主要区域。Server1上的所有根提示已被删除了。所有客户端计算机都向这台计算机提交名称解析。你要配置该服务器的DNS解析以保证所有的客户端计算机都能定位并访问adatum.com,adatum.net及互联网的资源。你该如何操作?()