You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests
that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1.
You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that
the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing
capture file that contains only DNS-related data. What should you do?
You need to create a file named DNSdata.cap from the existing capture file that contains only DNS-related data
You perform a security audit of a server named CRM1. You want to build a list of all DNS requests
that are initiated by the server. You install the Microsoft Network Monitor 3.0 application on CRM1.
You capture all local traffic on CRM1 for 24 hours. You save the capture file as data.cap. You find that
the size of the file is more than 1 GB. You need to create a file named DNSdata.cap from the existing
capture file that contains only DNS-related data. What should you do?
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What
should you do?
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What
should you do?
Which tool should you use?
Your network contains 200 servers that run Windows Server 2008 R2. You need to archive the
Security log for each server on a daily basis. Which tool should you use?
Which tool should you use?
Your network contains 200 servers that run Windows Server 2008 R2. You need to archive the
Security log for each server on a daily basis. Which tool should you use?
Which tool should you use?
Your network contains a server named Server1 that runs Windows Server 2008 R2. You need to
identify which processes perform the most disk writes and disk reads per second. Which tool should
you use?
Which tool should you use?
Your network contains a server named Server1 that runs Windows Server 2008 R2. You need to
identify which processes perform the most disk writes and disk reads per second. Which tool should
you use?
Which options should you modify?
Your network contains two Windows Server Update Services (WSUS) servers named Server1 and
Server2. Server1 is a member of a domain named contoso.com. Server2 is a standalone server.
Server2 is configured as an autonomous downstream server. You need to ensure that all updates
approved on Server1 are automatically approved on Server2. Which options should you modify?
You need to ensure that an administrator is notified by e-mail if the Event Viewer logs any error
Your network contains a server named Server1 that runs Windows Server 2008 R2. You need to
ensure that an administrator is notified by e-mail if the Event Viewer logs any error. What should
you do from the Event Viewer console?