You are the administrator of an Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional and are members of the domain. The domain contains a single DNS server named Server1. Root hints are enabled on Server1. Internet access for the company is provided by a Network Address Translation (NAT) server named Server2. Server2 is connected to the Internet by means of a permanent connection to the company’s ISP. Users report that they can no longer connect to http://www.adatum.com. Users can connect to internal resources and to other Internet Web sites. You can successfully access http://www.adatum.com from a computer outside of the corporate network.You need to ensure that the users can access http://www.adatum.com. You must also ensure that users retain their ability to access internal resources.
Which two actions should you perform?()
A.Disable Routing and Remote Access on Server2.
B.Create a root zone on Server1.
C.On all affected users’ computers, run the ipconfig /flushdns command.
D.Configure all affected users’ computers to use the ISP’s DNS server.
E.Use the DNS console on Server1 to clear the DNS cache.
您可能感兴趣的试卷
你可能感兴趣的试题
You are the administrator of an Active Directory domain. The network contains a Windows Server 2003 domain controller named Server1Users report that they experience intermittent delays when they log on to Server1. Administrators report that replication attempts between Server1 and other domain controllers are occasionally delayed.You need to verify the cause of the intermittent connection delays to Server1. You also need to find out whether the problem is related to a hardware deficiency on Server1. You need to track these delays over a period of one day.
What should you do first?()
A.Run the netdiag /verbose command to perform a network diagnostic test on Server1.
B.Run the replmon command to view the Active Directory replication status on Server1.
C.Use Network Monitor to view the network traffic packet contents between Server1 and all other computers.
D.Create a System Monitor counter to track the queue lengths on the network adapter on Server1.
You are the administrator of a Windows Server 2003 computer named Server1. Server1 is an FTP server located in the company’s internal network.Administrators report an increased amount of FTP traffic to Server1.
You need to configure Server1 to achieve the following goals: Identify the media access control (MAC) address of any computer that is performing FTP transfers from Server1.Find out the exact FTP commands that were executed. Ensure that you do not disrupt the operation of Server1.
What should you do?()
A.Configure a performance alert to write an event to the application event log whenever the number of established FTP connections exceeds 1.
B.Use a Network Monitor filter to capture IP traffic from any computer to Server1.
C.Run the finger command on Server1 to identify the source of the FTP requests.
D.Run the arp command on Server1 to identify the source of the FTP requests.
You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.
You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts.
What should you do?()
A.Use Network Monitor to capture traffic between Server1 and all client computers.
B.Use Network Monitor to capture traffic between Server1 and Server2.
C.Monitor Event Viewer for Net Logon error or warning events.
D.Run the tracert command on Server1.
You are the administrator of an Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.A server named Filesrv1 contains confidential data that is only available to users in the human resources (HR) department.You want all computers in the HR department to connect to Filesrv1 by using an IPSec policy. You assign the Server (Request Security) IPSec policy to Filesrv1. Using Network Monitor, you notice that some computers in the HR department connect to Filesrv1 without using the IPSec policy.You need to configure Filesrv1 to ensure that all computers connect to it by using the IPSec policy.
What should you do?()
A.Assign the Secure Server (Require Security) IPSec policy.
B.Assign the Client (Respond Only) IPSec policy.
C.Unassign the Server (Request Security) IPSec policy.
D.Restart the IPSec Services service.
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.
The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS. You need to collect information about which users are connecting to the Web site by using HTTPS.
What should you do?()
A.Check the application log on the Web server.
B.Use Network Monitor to capture network traffic on the Web server.
C.Review the log files created by IIS on the Web server.
D.Configure a performance log to capture all Web service counters. Review the performance log data.
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections.
What should you do?()
A.Run the net view command.
B.Run the gpresult command.
C.Use the IP Security Monitor console.
D.Use the IPSec Policy Management console.
You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.
What should you do?()
A.Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.
B.Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.
C.Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.
D.Create a Pattern Match capture trigger for the 131.107.0.1 IP address.
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.
Immediately send a notification to a network administrator that the infected computer needs to be repaired.
What should you do?()
A.Configure a WMI event trigger.
B.Configure a Network Monitor capture filter.
C.Configure a Network Monitor trigger.
D.Configure a System Monitor alert.
You are the network administrator for Humongous Insurance. The network consists of a single Active Directory domain named humongous.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure several Group Policy objects (GPOs) to enforce the use of IPSec for certain types of communication between specified computers.
A server named Server2 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Server2 are encrypted by using IPSec. However, when you monitor network traffic, you notice that Telnet connections are not being encrypted.You need to view all of the IPSec settings that are applied to Server2 by GPOs.
Which tool should you use?()
A.the IP Security Policy Management console
B.the IP Security Monitor console
C.the Resultant Set of Policy console
D.Microsoft Baseline Security Analyzer (MBSA)
You are the network administrator for Fabrikam, Inc. The network consists of a single Active Directory domain named fabrikam.com. A Windows Server 2003 computer named Server1 functions as the DNS server for the domain.Wingtip Toys is a division of Fabrikam, Inc. The Wingtip Toys network consists of a single Active Directory domain named wingtiptoys.com. Server1 is a secondary zone server for wingtiptoys.com.You are monitoring notification traffic between the two domains. You need to keep a record of when the primary DNS server for wingtiptoys.com informs Server1 of available changes in the wingtiptoys.com zone.
What should you do?()
A.Use the Performance console to create a log of the DNS performance counter Notification Received on Server1.
B.Enable debug logging on Server1. Configure the log to record Notification events.
C.Run the replmon command to monitor replication events on Server1.
D.Run the dcdiag command to check DNS registration on Server1.
最新试题
你是Alpine Ski House的网络管理员。网络是一个单活动目录环境,域名为alpineskihouse.com 。你们公司兼并了一家名为Adventure Works的公司。Adventure Works公司的网络是一个单活动目录域环境,域名为Adventure-works.com。在Adventure-works.com域中有一台名为Server32的网络应用程序管理服务器。Server32可以访问所有的客户端计算机以提供自动的软件升级和硬件清点服务。在Server32上的网络管理软件使用不合格的主机名定位其他的桌面计算机,主机名由一台DNS服务器解析到clientname.adventure-works.com。Server32的IP地址是10.10.10.90。你逐渐地将所有adventure-works.com域中的桌面客户端计算机移植到clientname.alpineskihouse.com域中。你不能访问adventure-works.com 的DNS服务器。当Server32试图对客户机进行升级时,网络管理软件返回了大量警报显示没有发现桌面客户机。你要用最小的网络花销,使得Server32上的网络管理软件可以解析adventure-works.com和alpineskihouse.com中的不合格主机名。你该如何操作?()
你是Wingtip Toys.公司网络管理员。网络是一单活动目录域环境,域名wingtiptoys.com。活动目录集成DNS区域wingtiptoys.com被复制到了所有域控制器上。只在域控制器上安装了DNS服务。网络管理部门要求所有在生产分支部门的主机都要在DNS名称空间manufacturing.wingtiptoys.com中注册。manufacturing.wingtiptoys.com名称空间不在任何DNS服务器上。你要为所有的DNS服务器添加对manufacturing.wingtiptoys.com名称空间的支持。为减少管理费用,你要找到一个解决方法,使得即使将来有新的DNS服务器添加的域中,也不需要重新做任何配置。你该如何操作?()
你是活动目录域的管理员。网络中包含一台名为Server1的域控制器。用户报告当他们登陆到Server1上时出现断断续续的延迟。管理报告说在Server1和其他的域控制器间的复制操作偶尔出现延迟。你需要检察出到Server1的网络连接间歇性延迟的原因。你同时要查出问题原因是否和Server1上的硬件资源不足有关。你需要花一天以上的时间来检查追踪延迟的原因。你该如何操作?()
你是公司的网络管理员。网络是一单活动目录域环境。域中有3台Windows Server 2003域控制器,20台Windows Server 2000域成员服务器,还有750台Windows XP Pro计算机。域中配置为只允许使用Kerberos协议对服务器连接认证授权。有用户报告当他试图连接一台域成员服务器时,收到“Access denied”(访问拒绝)错误提示。你要在用户的客户机上测试Kerberos授权功能。在用户的客户机上的命令提示符(cmd)下,你要运行那些命令?()
你是公司网络管理员。网络是一个单活动目录域环境。所有的服务器运行Windows Server 2003。所有的客户端运行Windows XP Professional。有一新的低优先级别升级包Q318138从网络中的WSUS服务器上同步发行。你决定不测试升级包直接批准通过。在该升级包应用在客户机上后,用户反应不能运行一个统计账目程序。 你需要从所有客户端计算机上删除该升级包,直到它被测试通过。你该如何操作?()
你是公司网络管理员。所有的服务器运行Windows Server 2003。你配置了Server2作为网络地址转换(NAT)服务器。Server2上有一块网卡和一个猫(调制解调器)。Server2通过demand-dial(拨号连接)互联网。用户反应当他们试图连接互联网上的站点时。间歇性的收到如下错误提示信息“Page not find”。在等待几分钟后,又能够连上站点了。这种情况整天都出现。你需要配置Server2让用户始终都能够连接互联网站点。 你该怎么操做?()
你是一活动目录域的管理员。所有的服务器运行Windows Server 2003。所有的客户端计算机都是域中成员,运行Windows XP Professional。域中包含唯一的DNS服务器Server1。Server上的根提示功能开启。公司对Internet的访问由服务器Server2提供的网络地址转换功能(NAT)实现。Server2通过ISP和互联网永久连接。用户报告说不能访问http://www.adatum.com..但是可以访问其他的外网站点和内网络的资源。你可以从公司网络之外的计算机上访问http://www.adatum.com.站点。 你需要确保这些用户能够访问http://www.adatum.com.站点。同时要确保这些用户能够继续访问内网资源。下列哪两种操作你将采用?()
你是公司Fabrikam.Inc网络管理员。网络中有一台DNS服务器Server1。Server1被配置来解决对外部网络资源的所有请求。Server1上也运行着活动目录的Fabrikam.com内部区域。用户报告当他们浏览知名的互联网站点时被指向了另外的错误站点。你要最大限度的降低今后用户访问外网时的意外出错。同时最大限度避免用户的网络中断。你该如何操作?()
你是Fabrikam.Inc公司网络管理员。网络是一单活动目录域环境,域名fabrikam.com。一台Windows server 2003服务器Server1为域中提供DNS服务器功能。WingTip Yoys是Fabrikam公司的一个分部。WingTip Toys中有一单活动目录域环境,域名Wingtipyoys.com。Server1是的Wingtipyoys.com的辅助区域服务器。你监视着两个域间的通知通信。当Wingtipyoys.com的主要区域服务器上有可用变化并通知Server1服务器数据同步时,你要将之记录下来。你该怎么操做?()
你是一台Windows Server 2003 服务器Server1的管理员。Server1是位于公司内部网络的FTP服务器。管理员报告说连接到Server1的FTP通信量增加。你需要配置Server1以实现以下目的:识别所有正在和Server1进行FTP传输的计算机的MAC地址。准确查找出已被执行的FTP命令。 确保不会中断Server1上的操作。你该如何操作?()