Which network mask should you use to support 2000 subnets?
Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53. You need to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use? A. /61 B. /62 C. /63 D. /64
What should you do to capture the HTTP traffic to and from a server every day between 09:00 and 10:00?
You need to capture the HTTP traffic to and from a server every day between 09:00 and 10:00. What should you do? A. Create a scheduled task that runs the Netsh tool. B. Create a scheduled task that runs the Nmcap tool. C. From Network Monitor, configure the General options. D. From Network Monitor, configure […]
Which command should you run to monitor network traffic, you see the interface identifiers derived from the Ex
Your network contains a single Active Directory domain. All servers run Windows Server 2008 R2. A DHCP server is deployed on the network and configured to provide IPv6 prefixes. You need to ensure that when you monitor network traffic, you see the interface identifiers derived from the Extended Unique Identifier (EUI)-64 address. Which command should […]
What should you do minimize the amount of data collected?
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the Routing and Remote Access service (RRAS) role service installed. You need to view all inbound VPN packets. The solution must minimize the amount of data collected. What should you do? A. From RRAS, create an inbound packet filter. B. […]
Which tool should you use to ensure that each time the script runs, an entry is added to the Application event
Your network contains a server that runs Windows Server 2008 R2. You plan to create a custom script. You need to ensure that each time the script runs, an entry is added to the Application event log. Which tool should you use? A. Eventcreate B. Eventvwr C. Wecutil D. Wevtutil Explanation/Reference: You can create custom […]
Which tool should you use to configure the SNMP security settings on the server?
Your network contains a server that has the SNMP Service installed. You need to configure the SNMP security settings on the server. Which tool should you use? A. Local Security Policy B. Scw C. Secedit D. Services console
What should you do to change the identification information returned by Server1?
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has the SNMP Service installed. You perform an SNMP query against Server1 and discover that the query returns the incorrect identification information. You need to change the identification information returned by Server1. What should you do? A. From the properties of […]
Which tool should you use to define the Custom Event Delivery Optimization settings on Server1?
Your network contains 100 servers that run Windows Server 2008 R2. A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network. You need to define the Custom Event Delivery Optimization settings on Server1. Which tool should you […]
What should you do to ensure that you can deploy DirectAccess on Server3?
Your network contains an Active Directory domain named contoso.com. Contoso.com contains three servers. The servers are configured as shown in the following table.
You plan to give users access to the files shares on Server2 by using DirectAccess.
You need to ensure that you can deploy DirectAccess on Server3.
exhibit What should you do?
What should you do to ensure that only members of Group1 can add files to Folder1 over the network?
Your network contains a file server named Server1. Server1 contains a folder named Folder1. The permissions for Folder1 are in the following table.
You need to ensure that only members of Group1 can add files to Folder1 over the network.
exhibit What should you do?