搜题
用户您好, 请在下方输入框内搜索其它题目:
搜题
题目内容 (请给出正确答案)
提问人:网友 发布时间:
【单选题】

You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a&en

A、Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.

B、Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.

C、Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.

D、Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

更多“ You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a&en”相关的问题
第3题

A、You are working on a database where downtime is not tolerated.  B、You are working on a database where downtime can be tolerated.  C、You are working on a database that operates in ARCHIVELOG mode.  D、You are working on a database that operates in NOARCHIVELOG mode.  E、You are working on a database where all the tablespaces are locally managed.  F、You are working on a database where control files and redo log files are multiplexed.  H、You are working on a database where control files and redo log files are not multiplexed.  

点击查看答案
第6题

A、You should verify that the simple recovery model is used by the database.  B、You should verify that the full recovery model is used by the database.  C、You should verify that the checksum page verify option is used by the database.   D、You should verify that the bulk-logged recovery model is used by the database.   

点击查看答案
第10题

A、Flashback logs are not deleted.  B、Flashback logs are deleted automatically.  C、Flashback logs are deleted only if you are using Recovery Manager (RMAN).  D、Flashback logs are deleted only if you are using Oracle Managed Files (OMF).  E、Flashback logs are deleted only if you are using Automatic Storage Management (ASM).  

点击查看答案
客服
TOP

请使用微信扫码支付

订单号:
遇到问题请联系在线客服