A. Use Performance Monitor to create a trace log. Trace Process creations/deletions.
B. Use Performance Monitor to create a trace log. Trace Thread creations/deletions.
C. Use Task Manager to view processes. View the Base Priority column.
D. Use Task Manager to view performance. On the View menu, select Show Kernel Times.
第1题
A. Use Task Manager to monitor processor and memory performance.
B. Use Windows Explorer to monitor the size of the Windows\System32\Spool\prtprocs folder.
C. Use System Monitor to view the Print Queue\Jobs counter.
D. Use System Monitor to view the Print Queue\Enumerate Network Printer Calls counter.
第2题
A.FromWindowsFirewallwithAdvancedSecurity,createapredefinedrule.
B.FromWindowsFirewallwithAdvancedSecurity,createacustomrule.
C.FromNetworkandSharingCenter,modifythenetworklocationsettings.
D.FromNetworkandSharingCenter,modifytheadvancedsharingsettings.
第3题
A.UseNetworkMonitortocapturetrafficbetweenServer1andallclientcomputers.
B.UseNetworkMonitortocapturetrafficbetweenServer1andServer2.
C.MonitorEventViewerforNetLogonerrororwarningevents.
D.RunthetracertcommandonServer1.
第4题
A. Review the log files created by IIS on the Web server.
B. Review the security log in Event Viewer on the Web server.
C. Review the security log in Event Viewer on the ca.
D. Review the contents of the Failed Requests folder on the ca.
第5题
A. Check the application log on the Web server.
B. Use Network Monitor to capture network traffic on the Web server.
C. Review the log files created by IIS on the Web server.
D. Configure a performance log to capture all Web service counters. Review the performance log data.
第6题
A. Assign the Generate security audits user right to the ITSecurity global group.
B. Assign the Manage auditing and security logs user right to the ITSecurity global group.
C. Assign the Allow logon through Terminal Services user right to the ITSecurity global group.
D. Assign the Act as part of the operating system user right to the ITSecurity global group.
第7题
A. Assign the Generate security audits user right to the ITSecurity global group.
B. Assign the Manage auditing and security logs user right to the ITSecurity global group.
C. Assign the Allow logon through Terminal Services user right to the ITSecurity global group.
D. Assign the Act as part of the operating system user right to the ITSecurity global group.
第8题
A. Configure the printer permissions to assign the Allow - Take Ownership permission to Peter. Restart the Print Spooler service on Print1.
B. Make Peter‘s user account the owner of the printer. Restart the Print Spooler service on Print1.
C. Create a new printer on Print1 and configure it to print to the print device. In the Advanced tab of the new printer properties, select the Print directly to the printer option. Configure Peter‘s computer to print to the new printer.
D. Create a new printer on Print1 and configure it to print to the print device. Modify the priority of the new printer. Configure Peter‘s computer to print to the new printer.
第9题
A. Automated System Recovery (ASR)
B. normal
C. primary
D. authoritative
第10题
A. Log on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for Peter‘s user account.
B. Log on to Client1 as a local Administrator. Use Event Viewer to view the local security log. Use the Find option to list only the events for the Client1 computer account. Use Event Viewer to view the security log on each domain controller. Use the Find option to list only the events for Peter‘s user account. Use Event Viewer to view the security log on each domain controller.
C. Set a filter to list only the events for Peter‘s user account. Use Event Viewer to view the security log on each domain controller.
D. Set a filter to list only the events for the Client1 computer account.
为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!