网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do? ()

  • A、Create a scheduled task that runs the Netsh tool.
  • B、Create a scheduled task that runs the Nmcap tool.
  • C、From Network Monitor,configure the General options.
  • D、From Network Monitor,configure the Capture options.

参考答案

更多 “You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do? ()A、Create a scheduled task that runs the Netsh tool.B、Create a scheduled task that runs the Nmcap tool.C、From Network Monitor,configure the General options.D、From Network Monitor,configure the Capture options.” 相关考题
考题 You have recently created an application, and want to capture all debugging text messages generated by it.You would like these debugging messages to display on the command line. The application that you created contains the following code:Debug.WriteLine (Start the processing);Console.WriteLine (Generated by Console.WriteLine);Debug.WriteLine (End the processing);You need to ensure that you are able to capture all debugging messages to the command line.What should you do?()A.B.C.D.

考题 You plan to capture a Windows 7 image by using the Windows Preinstallation Environment (Windows PE).You need to ensure that Windows PE supports the Windows Scripting Host (WSH).  Which tool should youuse?()A、Bcdedit.exe.B、Dism.exe.C、Imagex.exe.D、Oscdimg.exe.

考题 You perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1. You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the e:/data.cap file. You create a scheduled task. You add a new Start a program action to the task. You need to add the application name and the application arguments to the new action. What should you do?() A、 Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap / stopwhen /timeafter 11hours line as argumentsB、 Add netmon.exe as the application name. Add the /networks */capture LDA /file e:/data.cap /stopwhen / T.imeafter 11hours line as argumentsC、 Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as argumentsD、 Add nmconfig.exe as the application name. Add the /networks */capture LDAP /file e:/data.cap / stopwhen /timeafter 11hours line as arguments

考题 You perform a security audit of a server named CRM1. You want to build a list of all DNS requests that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1. You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data. What should you do? ()A、Apply the display filter !DNS and save the displayed frames as a DNSdata.cap file.B、Apply the capture filter DNS and save the displayed frames as a DNSdata.cap file.C、Add a new alias named DNS to the aliases table and save the file as DNSdata.cap.D、Run the nmcap.exe /inputcapture data.cap /capture DNS /file DNSdata.cap command.

考题 You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1.You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses.You need to display mnemonic host names instead of IP addresses for all the frames. What should you do? ()A、Create a new display filter and apply the filter to the capture.B、Create a new capture filter and apply the filter to the capture.C、Populate the Aliases table and apply the aliases to the capture.D、Configure the Network Monitor application to enable the Enable Conversations option. Recapture the data to a new file.

考题 Your network consists of a single Active Directory domain. All domain controllers run Windows  Server 2008 R2.     You need to capture all replication errors from all domain controllers to a central location.     What should you do()A、Configure event log subscriptions.B、Start the System Performance data collector set.C、Start the Active Directory Diagnostics data collector set.D、Install Network Monitor and create a new capture.

考题 You have a computer that runs Windows 7. You need to capture the operating system and all the computerconfigurations to a Windows image (WIM) file.  What should you do before you capture the image?()A、Run Oscdimg.exe.B、Run Windows System Image Manager (Windows SIM).C、Open a command prompt that has elevated privileges.D、Start the computer by using Windows Preinstallation Environment (Windows PE).

考题 You are a network administrator for your company.A Windows Server 2003 computer named Server1 is exhibiting connectivity problems. You monitor Server1 by using System Monitor and Network Monitor. While monitoring, you notice that Server1 has approximately 4 MB of available memory, and the average CPU utilization is running at 95 percent. When you investigate the Network Monitor capture, you notice that some network packets sent to Server1 during the capture have not been captured. You need to ensure that the impact of monitoring on Server1 is reduced and that all packets sent to the computer are captured.   What should you do?()A、From a command prompt, run the diskperf command.B、Run Network Monitor in dedicated capture mode.C、Configure a Network Monitor capture filter.D、Increase the buffer size in Network Monitor.

考题 You need to recommend a solution for the Web server content that meets the company’s technical requirements.   What should you include in the recommendation?()A、Distributed File System (DFS) ReplicationB、folder redirectionC、HTTP redirectionD、IIS Shared Configuration

考题 单选题You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()A Create an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).B Create an HTTP endpoint with digest authentication, and create a service principal name (SPN).C Create an HTTP endpoint with integrated authentication, and create a service principal name (SPN).D Create an HTTP endpoint with Kerberos authentication.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

考题 单选题Your network consists of a single Active Directory domain All domain controllers run WIndows Server 2008. You need to capture all replication errors from all domain controllers to a central localion What should you do()A configure event log subscriptions.B Start the System Performance data collector set.C start the Active Directory Diagnostics data collector set.D Install Network Monitor and create a new a new capture.

考题 单选题You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()A Create a new display filter and apply the filter to the capture.B Create a new capture filter and apply the filter to the capture.C Populate the aliases table and apply the aliases to the capture.D Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.

考题 单选题You have an existing Windows Communication Foundation (WCF) service that exposes a service contract over HTTP. You need to expose that contract over HTTP and TCP. What should you do?()A Add a net.tcp base address to the host.B Add an endpoint configured with a netTcpBinding.C Add an endpoint behavior named netTcpBehavior to the existing endpoint.D Add a binding configuration to the existing endpoint named netTcpBinding.

考题 单选题You plan to capture a Windows 7 image by using the Windows Preinstallation Environment (Windows PE).You need to ensure that Windows PE supports the Windows Scripting Host (WSH).  Which tool should youuse?()A Bcdedit.exe.B Dism.exe.C Imagex.exe.D Oscdimg.exe.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. All users are required to connect to the intranet site by authenticating and using HTTPS. However, because an automated Web application must connect to the Web site by using HTTP, you cannot configure the intranet site to require HTTPS.  You need to collect information about which users are connecting to the Web site by using HTTPS.   What should you do?()A Check the application log on the Web server.B Use Network Monitor to capture network traffic on the Web server.C Review the log files created by IIS on the Web server.D Configure a performance log to capture all Web service counters. Review the performance log data.