Advanced Correlation Engine
Advanced Notification Engine
CiscoWorks Dashboard
Management Center for CSA
第1题:
Which can NOT be selected for supported services in Cisco WCS Planning Tool?()
第2题:
Which of the following would be used to monitor unauthorized access to data files?()
第3题:
Which command allows you to decode packets in JUNOS?()
第4题:
You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)
第5题:
You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks. A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data. You should utilize the least amount of administrative effort to finish the task. Which tool will you utilize to finish the task?()
第6题:
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do? ()
第7题:
Performance Log and Alerts
Event Viewer
Security Configuration and Analysis
IP Security Monitor
第8题:
From Reliability Monitor, review the informational events.
From System Information, review the Software Environment.
From Performance Monitor, review the System Diagnostics Report.
From Performance Monitor, run the System Performance Data Collector Set.
第9题:
The security update in the synchronization log.
The security update in the approval log.
The status of Internet Explorer 5.5x in the Monitor Server window.
The status of Internet Explorer 6.x in the Monitor Server window.
第10题:
To finish the task, you should utilize Resource Governor.
To finish the task, you should utilize Database Engine Tuning Advisor.
To finish the task, you should utilize Extended Events.
To finish the task, you should utilize Performance Monitor (SYSMON).
第11题:
Component Services
Performance Information and Tools
Reliability Monitor
Resource Monitor
第12题:
Dfsrdiag
Fsutil
Ntdsutil
Ntfrsutl
第13题:
Which of the following is an easy-to-use tool that allows you to easily configure and monitor Cisco Integrated Services Routers?()
第14题:
Which command would you use to view interface usage details in real time?()
第15题:
You are the network administrator for Humongous Insurance. The network consists of a single Active Directory domain named humongous.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure several Group Policy objects (GPOs) to enforce the use of IPSec for certain types of communication between specified computers. A server named Server2 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Server2 are encrypted by using IPSec. However, when you monitor network traffic, you notice that Telnet connections are not being encrypted.You need to view all of the IPSec settings that are applied to Server2 by GPOs. Which tool should you use?()
第16题:
You are the network administrator for your company. The network contains 12 Windows Server 2003 computers and 300 Windows XP Professional computers. Three servers named Server4, Server5, and Server6 run a critical business application. When performing performance baselining on these three servers, you notice that Server6 has a larger number of concurrently connected users at any given moment than Server4 or Server5. The additional workload is causing performance problems on Server6. You need to identify which client computers are connecting to Server6.You plan to run Network Monitor on Server6 to capture all packets sent to Server6. The capture task must be configured to meet the following requirements.To reduce the size of the captured data, you want to capture only the packet headers.If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets. Which two tasks should you perform to configure Network Monitor?()
第17题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. A user reports that when he runs a query, it takes a quite long time and it is still unfinished. As the IT support, you have to verify whether the query is blocked. Which tool should you use? ()
第18题:
Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()
第19题:
Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.
Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.
Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.
Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.
第20题:
user@host> debug interface interface-name
user@host> monitor usage interface-name
user@host> monitor interface interface-name
user@host> traceoptions interface interface-name
第21题:
ServiceModeService 4.0.0.0/Calls
ServiceModeService 4.0.0.0/Instances
ASP.Net StateService / Server Sessions Active
ASP.Net StateService / Server Sessions Total
第22题:
You should use the Database Engine Tuning Advisor tool
You should use the Windows System Monitor tool
You should use the Job Activity Monitor tool in Microsoft SQL Server Management Studio
You should use the Activity Monitor tool in Microsoft SQL Server Management Studio
第23题:
Add the Security Compliance group to the local administrators group of each VM
Add the Security Compliance group to the local administrators group of each Hyper-V server
In the InitialStore.xml file of each VM, define an access policy for the Security Compliance group
in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group