Performance Log and Alerts
Event Viewer
Security Configuration and Analysis
IP Security Monitor
第1题:
Which two commands can be used to monitor firewall user authentication?()
第2题:
Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements. What should your plan include?()
第3题:
A user reports that each day some files are deleted from the department share. The administrator needs to find who deleted these files. Which of the following actions should the administrator perform?()
第4题:
Which of the following tools can an administrator use to get a server baseline?()
第5题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
第6题:
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()
第7题:
You need to receive an e-mail message whenever a domain user account is locked out. Which tool should you use()
第8题:
Enable audit object access and specify files and folders to monitor using Task Manager.
Enable audit policy change and specify files and folders to monitor using Windows Explorer.
Enable audit object access and specify files and folders to monitor using Windows Explorer.
Open Performance Monitor and monitor folder activity.
第9题:
Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production department
Run Security and Configuration Analysis to analyze the security settings of all servers in the production department
Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance object
Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department
第10题:
Power Users.
Administrators.
Performance Log Users.
Performance Monitor Users.
第11题:
Performance Log and Alerts
Event Viewer
Security Configuration and Analysis
IP Security Monitor
第12题:
wlmcntrl
wlmstat
wlmcheck
wlmassign
第13题:
You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()
第14题:
A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()
第15题:
Which of the following protocols should be used to monitor network performance?()
第16题:
Which of the following would be used to monitor unauthorized access to data files?()
第17题:
Which of the following WLM commands should be used to monitor performance on a system running wlm?()
第18题:
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: (1)Allow Admin1 to monitor events in the system event log and the application event log (2)Allow Admin1 to create and view counter logs in Performance Monitor (3)Minimize the user rights assigned to Admin1 To which group should you add Admin1?()
第19题:
SNTP
SMTP
HTTP
SNMP
第20题:
Configure a directory service access audit policy. Increase the maximum size of the security log.
Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.
Configure an object access audit policy for the directory. Increase the maximum size of the system log.
Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.
第21题:
Honeynet
Honeypot
Vulnerability scanner
Network based IDS
第22题:
Power Users
Administrators
Performance Log Users
Performance Monitor Users
第23题:
Advanced Correlation Engine
Advanced Notification Engine
CiscoWorks Dashboard
Management Center for CSA
第24题:
From IP Security Monitor, view the Main Mode Statistics.
From Microsoft Baseline Security Analyzer, scan Server1.
From the Security event log, view the events from the IPSec source.
From System Monitor, add the IPSec V4 Driver : Active Security Associations counter.