单项选择题
Cer-tech .com has a server named Server01.Server01 runs Windows Server 2008.A web server(IIS) roleis also installed on Server01.A public website is hosted on Server01.While monitoring the traffic on thepublic site,you notice an unusual high volume of traffic on the website. You need to find the source of thetraffic.
What should you do to achieve this objective?()
A.Open the IIS server manager and enable website logging to filter the logs for the source IP address
B.Install a third-party traffic analysis software to view the source IP address of the traffic
C.Execute net session - at command on the server
D.Execute net stat/all command to view the traffic statistics
E.None of the above
相关考题
-
单项选择题
Cer-tech .com has a server that runs Windows Server 2008. A Web Server (IIS) server role is installed onthe server. The server hosts a website that is configured to use only Windows Authentication. The companyhas a security group named EG1 which contains 50 user accounts. You need to prevent this group fromaccessing the website while allowing all other to access the website. Which website feature should youconfigure to achieve this task?()
A.Group Access Policy
B.Authorization Rules
C.IIS group permissions
D.SSL certificates
E.None of the above -
单项选择题
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system.You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. There is a single Active Directory domain in your network. The networkcontains a Terminal Server that runs Windows Server 2008, and client computers that run Windows Vista.All computers are members of the domain. You use the TS RemoteApp Manager to deploy an application.The Terminal Servers security layer is set to Negotiate. You have to make sure that domain users are notprompted for credentials when they access the application. What action should you perform to make sureof this?()
A.The Credential Delegation settings in the local Group Policy should be modified on the server.
B.The Password Policy settings in the local Group Policy should be modified on the server.
C.The Credential Delegation settings in the local Group Policy should be modified on all client computers.
D.The Password Policy settings in the local Group Policy should be modified on all client computers. -
单项选择题
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There are four Terminal Servers that run Windows Server 2008. The TerminalServers are respectively named S01, S02, S03, and S04. You have the Terminal Server Session Brokerrole service installed on S01. You have to configure load balancing for the four Terminal Servers. Now youreceive an order from the company management. According to the company requirement, you must makesure that S02 is the preferred server for Terminal Services sessions. Which tool should you choose to use?()
A.You should choose to use TS Gateway Manager
B.You should choose to use Terminal Services Manager
C.You should choose to use Group Policy Management
D.You should choose to use Terminal Services Configuration
