网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()

  • A、NIC filtering is enabled.
  • B、Port security is configured.
  • C、NIC is not in promiscuous mode.
  • D、NIC is in promiscuous mode.

参考答案

更多 “ A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A、NIC filtering is enabled.B、Port security is configured.C、NIC is not in promiscuous mode.D、NIC is in promiscuous mode.” 相关考题
考题 You work as a network Technician. A new workstation has consistently been unable to obtain anIP address from the DHCP server when the workstation boots. Older workstations function normally, and the new workstation obtains an address when manually forced to renew its address.  What should be configured on the switch to allow the workstation to obtain an IP address at boot?()A、UplinkFast on the switch port connected to the serverB、BackboneFast on the switch port connected to the serverC、PortFast on the switch port connected to the workstationD、trunking on the switch

考题 Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A、 Verify the configuration of the connected port on the network switch.B、 Reboot the server.C、 Install a new NIC on the server.D、 Verify that network cables are connected.

考题 Your network consists of an internal network and a perimeter network. On the internal network there is a server named Server1. On the perimeter network there is a server named Server2. All servers run Windows Server 2003 Service Pack 2 (SP2).  You schedule a task to transfers files from Server1 to Server2 by using FTP.You monitor the network traffic from Server1 to Server2 and notice that the user name and password used for the FTP transfer are sent as plain text. You need to ensure that all FTP traffic between Server1 and Server2 is encrypted.  What should you do?()A、Implement IPSec.B、Install a server certificate on Server1.C、Install a server certificate on Server2.D、Use the Encrypting File System on Server1.

考题 An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs

考题 An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues.  All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs

考题 You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.  You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature.  Which of the following is TRUE with regards to Windows Firewall with Advanced Security?()A、It provides host-based,two-way network traffic filtering for a computer.B、It provides host-based,one-way network traffic filtering for a computer.C、It blocks unauthorized network traffic flowing into or out of the local computer.D、It only blocks unauthorized network traffic flowing into the local computer.E、It only blocks unauthorized network traffic flowing out of the local computer.

考题 Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).A firewall separates the internal network from the Internet.  The firewall blocks all outbound traffic except for HTTP and SMTP traffic.You install a DNS server. The DNS server is configured to use the default root hints. You need to ensure that the DNS server can resolve the host names on the Internet.  Which port should you open on the firewall?()A、53B、135C、500D、3389

考题 You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed. ABC.com has a server, named ABC-SR13. ABC-SR13 hosts a shared folder, named ABCShare, which has been shared as ABCShare$. Which of the following is TRUE with regards to sharing the folder in this manner?()A、It allows all users to view ABCShare when browsing the network.B、It prevents users from viewing ABCShare when browsing the network.C、It only allows ABC-SR13’s users to view ABCShare.D、It removes the permissions configured for ABCShare.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A、Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B、Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C、Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D、Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

考题 Your network contains an internal network and a perimeter network. You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network. You need to ensure that you can install the Edge Transport server role on the new server.  What should you do()?  A、Join the new server to an Active Directory domain.B、Install Active?Directory Lightweight Directory Services on the new server.C、Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.D、Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains an application server running Windows Server 2003.   Users report intermittent slow performance when they access the application server throughout the day. You find out that the network interface on the application server is being heavily used during the periods of slow performance. You suspect that a single computer is causing the problem.You need to create a plan to identify the problem computer.   What should you do?()A、 Monitor the performance monitor counters on the application server by using System Monitor.  B、 Monitor the network traffic on the application server by using Network Monitor.C、 Monitor network statistics on the application server by using Task Manager.D、 Run network diagnostics on the application server by using Network Diagnostics.

考题 Your network contains a server named Server1 that has the Routing role service installed. Server1 has two network connections. One network connection connects to the internal network. The other network connection connects to the Internet.All network connections connected to the internal network use private IP addresses. You install a Web server named Web1. Web1 hosts a secured Web site that only allows connections over TCP port 8281. Web1 is connected to the internal network.You need to ensure that the secure Web site can be accessed from the Internet.What should you do from the Routing and Remote Access console?()A、Configure Routing Information Protocol (RIP), and then activate authentication on the RIP interface.B、Configure Routing Information Protocol (RIP), and then configure the incoming packet protocol settings on the RIP interface.C、Configure Network Address Translation (NAT), and then add a new service to the NAT interface.D、Configure Network Address Translation (NAT), and then enable the Secure Web Server (HTTPS) service on the NAT interface.

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server is configured as a network address translation (NAT) router. The server has two network adapters and provides Internet access for the network.You need to prevent traffic on port 21 from being sent to the Internet. All other outbound traffic must be allowed.What should you do?() A、On the network adapter that is connected to the LAN, enable TCP/IP filtering. B、On the network adapter that is connected to the Internet, enable TCP/IP filtering. C、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the Services and Ports tab, and define a new service. D、From the Routing and Remote Access snap-in, open the properties of the interface connected to the Internet, select the NAT/Basic Firewall tab, and define a new static packet filter.

考题 You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()A、From a command prompt, run the diskperf command.B、Run Network Monitor in dedicated capture mode.C、Configure a Network Monitor capture filter.D、Increase the buffer size in Network Monitor.

考题 You are the network administrator for your company. All servers run Windows Server 2003.  You configure a server named Server2 as a Network Address Translation (NAT) server. Server2 has a single network adapter and a modem. Server2 connects to the Internet through a demand-dial connection. Users report that when they attempt to connect to Internet Web sites, they intermittently receive the following error message: "Page not found." After waiting for several minutes, they can connect to the Web sites. These errors occur throughout the day.  You need to configure Server2 to allow users to always connect to Internet Web sites.   What should you do?()A、Set the demand-dial connection to Persistent.B、Set the dial-out hours on the demand-dial connection to any day and any time.C、Set a demand-dial filter. Configure the filter for Only allow the following traffic. Specify a new filter for outbound port 80.D、Configure the demand-dial interface as the private interface.

考题 You are the administrator of a Windows Server 2003 computer named Server1. The network contains another Windows Server 2003 computer named Server2 that has the DNS and WINS services installed. Two hundred Windows 2000 Professional computers regularly connect to Server1 to access file and print resourcesAdministrators report that network traffic has increased and that response times for requests for network resources on Server1 have increased.   You need to identify whether Server1 is receiving requests for resources through NetBIOS broadcasts. What should you do?()A、Use Network Monitor to capture traffic between Server1 and all client computers.B、Use Network Monitor to capture traffic between Server1 and Server2.C、Monitor Event Viewer for Net Logon error or warning events.D、Run the tracert command on Server1.

考题 You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()A、 Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B、 Configure the network adapter on the test network to disable IEEE 802.1x authentication.C、 Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D、 Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E、 Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains 25 Windows Server 2003 computers and 6,000 Windows XP Professional computers.The written company security policy states that network traffic to Web servers must be audited on a regular basis. A server named Server1 is configured as a Web server on the company’s intranet. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on Server1.You run Network Monitor on Server1 for three hours. When you stop the network capture, you see that Network Monitor captured over 40,000 frames. As you look at the captured frames, you notice that an extremely large number of TCP connection requests have all come from the 131.107.0.1 IP address.In Network Monitor, you need to view only the frames for network traffic that are captured between Server1 and the 131.107.0.1 IP address.  What should you do?()A、Create an Address Capture filter for all network traffic between Server1 and the 131.107.0.1 IP address.B、Create a Find Frame Expression filter for network traffic captured between Server1 and the 131.107.0.1 IP address.C、Create an Address Display filter for all network traffic captured between Server1 and the 131.107.0.1 IP address.D、Create a Pattern Match capture trigger for the 131.107.0.1 IP address.

考题 Recently traffic to the company web server has more than doubled, resulting in slower response times from the server.  An administrator has decided to add a second, identical 10/100/1000 NIC to the server.  The server is presently connected to a 10/100/1000 switch, with four open ports on the switch.  Which of the following is the BEST solution to speed up web traffic?()A、Free up more ports on the switchB、Enable server load balancingC、Move the second network adapter to a new subnetD、Enable network adapter teaming

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A NIC filtering is enabled.B Port security is configured.C NIC is not in promiscuous mode.D NIC is in promiscuous mode.

考题 多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs

考题 多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()A  NIC filtering is enabled.B  Port security is configured.C  NIC is not in promiscuous mode.D  NIC is in promiscuous mode.

考题 单选题Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A  Verify the configuration of the connected port on the network switch.B  Reboot the server.C  Install a new NIC on the server.D  Verify that network cables are connected.

考题 单选题You work as a network Exchange administrator at Company.com.The Company.com network currently consists of an internal network and perimeter network.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently deployed a new server to the perimeter network which runs Microsoft Windows Server 2008 R2.During the course of the business week you receive instruction from Company.com to install the Microsoft Exchange Server Edge Transport server role on the server in the perimeter network. What should you do?()A You should consider having the ImportEdgeConfig.ps1 script run on the existing Exchange Server 2010 server.B You should consider having TCP port 88 and TCP port 3268 opened on the firewall between the perimeter network and the internal network.C You should consider having the new server joined to an Active Directory domain.D You should consider having the Active Directory Lightweight Directory Services installed on the new server in the perimeter network.