单选题Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets?  ()AAdvanced Correlation EngineBAdvanced Notification EngineCCiscoWorks DashboardDManagement Center for CSA

题目
单选题
Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets?  ()
A

 Advanced Correlation Engine

B

 Advanced Notification Engine

C

 CiscoWorks Dashboard

D

 Management Center for CSA


相似考题
更多“Which VMS Security Monitor tool allows you to monitor data f”相关问题
  • 第1题:

    Which can NOT be selected for supported services in Cisco WCS Planning Tool?()

    • A、data/coverage
    • B、location with Monitor Mode access points
    • C、demand
    • D、high density

    正确答案:D

  • 第2题:

    Which of the following would be used to monitor unauthorized access to data files?()

    • A、Performance Log and Alerts
    • B、Event Viewer
    • C、Security Configuration and Analysis
    • D、IP Security Monitor

    正确答案:B

  • 第3题:

    Which command allows you to decode packets in JUNOS?()

    • A、debug packet interface-name
    • B、show interface extensive
    • C、traceoptions interface-name
    • D、monitor traffic interface interface-name

    正确答案:D

  • 第4题:

    You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)

    • A、The security update in the synchronization log.
    • B、The security update in the approval log.
    • C、The status of Internet Explorer 5.5x in the Monitor Server window.
    • D、The status of Internet Explorer 6.x in the Monitor Server window.

    正确答案:A,B

  • 第5题:

    You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks. A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data. You should utilize the least amount of administrative effort to finish the task.    Which tool will you utilize to finish the task?() 

    • A、To finish the task, you should utilize Resource Governor. 
    • B、To finish the task, you should utilize Database Engine Tuning Advisor.
    • C、To finish the task, you should utilize Extended Events. 
    • D、To finish the task, you should utilize Performance Monitor (SYSMON). 

    正确答案:C

  • 第6题:

    You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do? ()

    • A、Create a scheduled task that runs the Netsh tool.
    • B、Create a scheduled task that runs the Nmcap tool.
    • C、From Network Monitor,configure the General options.
    • D、From Network Monitor,configure the Capture options.

    正确答案:B

  • 第7题:

    单选题
    Which of the following would be used to monitor unauthorized access to data files?()
    A

    Performance Log and Alerts

    B

    Event Viewer

    C

    Security Configuration and Analysis

    D

    IP Security Monitor


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week.  What should you do?()
    A

    From Reliability Monitor, review the informational events.

    B

    From System Information, review the Software Environment.

    C

    From Performance Monitor, review the System Diagnostics Report.

    D

    From Performance Monitor, run the System Performance Data Collector Set.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    多选题
    You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)
    A

    The security update in the synchronization log.

    B

    The security update in the approval log.

    C

    The status of Internet Explorer 5.5x in the Monitor Server window.

    D

    The status of Internet Explorer 6.x in the Monitor Server window.


    正确答案: D,A
    解析: 暂无解析

  • 第10题:

    单选题
    You are a professional level SQL Sever 2008 Database Administrator in an international corporation named Wiikigo. You are experienced in managing databases in an enterprise-level organization, optimizing and sustaining the database life cycle. In the company, your job is to implement solutions on security, troubleshooting, deployment and optimization. A SQL Server 2008 infrastructure is managed by you. After a regular test, you find that performance degradation is experienced by an instance for the three reasons: Excessive CPU usage, Server processes paging and Deadlocks. A monitoring solution should be implemented to provide data, monitor and troubleshoot performance issues. And detailed deadlock information should be contained in the provided data. You should utilize the least amount of administrative effort to finish the task.    Which tool will you utilize to finish the task?()
    A

    To finish the task, you should utilize Resource Governor. 

    B

    To finish the task, you should utilize Database Engine Tuning Advisor.

    C

    To finish the task, you should utilize Extended Events. 

    D

    To finish the task, you should utilize Performance Monitor (SYSMON). 


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You have a computer that runs Windows 7. You need to identify the disk, memory, CPU, and networkresources that an application is currently using.  Which tool should you use?()
    A

    Component Services

    B

    Performance Information and Tools

    C

    Reliability Monitor

    D

    Resource Monitor


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You create a new Active Directory domain. The functional level of the domain is Windows Server  2008 R2.   The domain contains five domain controllers. You need to monitor the replication of the group  policy template files.  Which tool should you use()
    A

    Dfsrdiag

    B

    Fsutil

    C

    Ntdsutil

    D

    Ntfrsutl


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which of the following is an easy-to-use tool that allows you to easily configure and monitor Cisco Integrated Services Routers?()

    • A、Cisco NAC Appliance
    • B、Cisco SDM
    • C、Cisco MWAM
    • D、Cisco Unified Communications Manager Express

    正确答案:B

  • 第14题:

    Which command would you use to view interface usage details in real time?()

    • A、show interfaces terse
    • B、show interfaces extensive
    • C、monitor interface traffic
    • D、monitor traffic interface

    正确答案:C

  • 第15题:

    You are the network administrator for Humongous Insurance. The network consists of a single Active Directory domain named humongous.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure several Group Policy objects (GPOs) to enforce the use of IPSec for certain types of communication between specified computers.   A server named Server2 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Server2 are encrypted by using IPSec. However, when you monitor network traffic, you notice that Telnet connections are not being encrypted.You need to view all of the IPSec settings that are applied to Server2 by GPOs. Which tool should you use?()

    • A、the IP Security Policy Management console
    • B、the IP Security Monitor console
    • C、the Resultant Set of Policy console
    • D、Microsoft Baseline Security Analyzer (MBSA)

    正确答案:C

  • 第16题:

    You are the network administrator for your company. The network contains 12 Windows Server 2003 computers and 300 Windows XP Professional computers. Three servers named Server4, Server5, and Server6 run a critical business application. When performing performance baselining on these three servers, you notice that Server6 has a larger number of concurrently connected users at any given moment than Server4 or Server5. The additional workload is causing performance problems on Server6. You need to identify which client computers are connecting to Server6.You plan to run Network Monitor on Server6 to capture all packets sent to Server6. The capture task must be configured to meet the following requirements.To reduce the size of the captured data, you want to capture only the packet headers.If a large number of packets are captured, the packets must be retained on the server. Captured packets must not overwrite previously captured packets.   Which two tasks should you perform to configure Network Monitor?()

    • A、Configure the Network Monitor display filters.
    • B、Configure the Network Monitor capture filters.
    • C、Increase the Network Monitor buffer size setting.
    • D、Decrease the Network Monitor buffer size setting.
    • E、Increase the Network Monitor frame size setting.
    • F、Decrease the Network Monitor frame size setting.

    正确答案:C,F

  • 第17题:

    You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. A user reports that when he runs a query, it takes a quite long time and it is still unfinished. As the IT support, you have to verify whether the query is blocked.  Which tool should you use? () 

    • A、You should use the Database Engine Tuning Advisor tool 
    • B、You should use the Windows System Monitor tool 
    • C、You should use the Job Activity Monitor tool in Microsoft SQL Server Management Studio 
    • D、You should use the Activity Monitor tool in Microsoft SQL Server Management Studio

    正确答案:D

  • 第18题:

    Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()

    • A、Add the Security Compliance group to the local administrators group of each VM
    • B、Add the Security Compliance group to the local administrators group of each Hyper-V server
    • C、In the InitialStore.xml file of each VM, define an access policy for the Security Compliance group
    • D、in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group

    正确答案:A

  • 第19题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()
    A

    Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.

    B

    Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.

    C

    Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.

    D

    Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Which command allows you to view interface usage details in real-time?()
    A

    user@host> debug interface interface-name

    B

    user@host> monitor usage interface-name

    C

    user@host> monitor interface interface-name

    D

    user@host> traceoptions interface interface-name


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You develop a Windows Communication Foundation (WCF) service. You enable all performance counters and run multiple calls to the service.The service must isolate session data to each user. You need to monitor the instancing behaviour used in the service. Which performance counter should you monitor?()
    A

    ServiceModeService 4.0.0.0/Calls

    B

    ServiceModeService 4.0.0.0/Instances

    C

    ASP.Net StateService / Server Sessions Active

    D

    ASP.Net StateService / Server Sessions Total


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. A user reports that when he runs a query, it takes a quite long time and it is still unfinished. As the IT support, you have to verify whether the query is blocked.  Which tool should you use? ()
    A

    You should use the Database Engine Tuning Advisor tool 

    B

    You should use the Windows System Monitor tool 

    C

    You should use the Job Activity Monitor tool in Microsoft SQL Server Management Studio 

    D

    You should use the Activity Monitor tool in Microsoft SQL Server Management Studio


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()
    A

    Add the Security Compliance group to the local administrators group of each VM

    B

    Add the Security Compliance group to the local administrators group of each Hyper-V server

    C

    In the InitialStore.xml file of each VM, define an access policy for the Security Compliance group

    D

    in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group


    正确答案: B
    解析: 暂无解析