A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver
to determine which server generates the most traffic?
A.
NBTSTAT
B.
NETSTAT.EXE
C.
Performance Monitor
D.
Network Monitor
E.
ARP.EXE

1 Answer

Answer :

Network Monitor

Related questions

Description : The …………………... option tells netstat to display the status of all configured network interfaces. A. -n B. -i C. either a or b D. neither a nor b

Last Answer : B. -i

Description : Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because a. UDP is slower b. DNS servers has to keep connections c. DNS requests are generally very small and fit well within UDP segments d. None of these

Last Answer : c. DNS requests are generally very small and fit well within UDP segments

Description : _____________ consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. A. Computing Planning B. Cloud infrastructure C. Cloud Computing Technologies D. Cloud Computing Architecture

Last Answer : Cloud infrastructure

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : The limited capability of this routing table is easily verified with the ………………………... command. A. ping B. traceroute C. route D. netstat

Last Answer : A. ping

Description : Routes are built automatically by………………….., manually by the system administrator, or dynamically by routing protocols. A. route B. traceroute C. ifconfig D. netstat

Last Answer : C. ifconfig

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? a. ARQ (Automatic Repeat Request) b. ARP (Address Resolution Protocol) c. SLIP (Serial Line Internet Protocol) d. PLIP (Parallel Line Internet Protocol)

Last Answer : b. ARP (Address Resolution Protocol)

Description : The ………………………. protocol was originally developed as a mechanism to enable diskless hosts to be remotely booted over a network as workstations. A. RARP B. ARP C. DHCP D. BOOTP

Last Answer : D. BOOTP

Description : …………………………………. converts a physical network address into an IP address. A. ARP B. RARP C. DNS D. DHCP

Last Answer : B. RARP

Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : B. 1. true, 2. false, 3.true

Description : Which is the protocol that maps varying IP addresses to the Physical MAC Address of a machine in a LAN network? A. ARQ Automatic Repeat Request B. ARP Address Resolution Protocol C. SLIP Serial Line Internet Protocol D. PLIP Parallel Line Internet Protocol

Last Answer : B. ARP Address Resolution Protocol

Description : What is RS.exe utility?

Last Answer : exe utility is used for deploying the report on report server. It comes with the report

Description : A byte consists of a. One bit b. Four bits c. Eight bits d. Sixteen bits

Last Answer : Eight bits

Description : A byte consists of a. One bit b. Four bits c. Eight bits d. Sixteen bits

Last Answer : Eight bits

Description : The number of network segments on which the datagram is allowed to travel before a router should discard it is called _______. A. Time to Live (TTL) B. Time to Die(TTD) C. self recognition D. both a and b

Last Answer : A. Time to Live (TTL)

Description : The _______ is a server whose zone consists of the whole tree. A. domain server B. zone server C. root server D. none of the above

Last Answer : C. root server

Description : Anyone know anything about srcds.exe? (Source dedicated server)

Last Answer : Seems like CS-S is not ready to run on Win7. your best option is to rollback your OS to WinXPPro SP3.

Description : The ________ protocol is the transmission mechanism used by the TCP/IP suite. A) ARP B) IP C) RARP D) noneof the above

Last Answer : IP

Description : A _______is an ARP thatacts on behalf of a set of hosts. A) ARP B) RARP C) proxy ARP D) noneof the above

Last Answer : proxy ARP

Description : . A technique called______ isused tocreate a subnetting effect. A) ARP B) RARP C) proxy ARP D) noneof the above

Last Answer : proxy ARP

Description : An ARP request is normally _______. A) broadcast B) multicast C) unicast D) noneof the above

Last Answer : broadcast

Description : An ARP reply isnormally_______. A) broadcast B) multicast C) unicast D) noneof the above

Last Answer : unicast

Description : The target hardware address on an Ethernet is _______ in an ARP request. A) 0x000000000000 B) 0.0.0.0 C) variable D) class dependent

Last Answer : 0x000000000000

Description : _______ isa dynamic mapping protocol in which a physical address is found for agiven logicaladdress. A) ARP B) RARP C) botha and b D) noneof the above

Last Answer : ARP

Description : The address resolution protocol (ARP) is used for a. Finding the IP address from the DNS b. Finding the IP address of the default gateway c. Finding the IP address that corresponds to a MAC address d. Finding the MAC address that corresponds to an IP address

Last Answer : Finding the MAC address that corresponds to an IP address

Description : Choose the Protocols working in the Data Link Control Layer of OSI model below. a. ATM (Asynchronous Transfer Mode), Frame Relay b. HDLC (High Level Data Link Control), SDLC (Synchronous Data Link Control) c. ARP (Address Resolution Protocol), IEEE802.3 d. All the above

Last Answer : d. All the above

Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP

Last Answer : c. TCP

Description : Which protocol does switch use at the layer 2 for finding MAC address? a. ICMP b. UDP c. ARP d. TCP

Last Answer : c. ARP

Description : . The newer technique uses a distributed database system called ………………….. to translate names to addresses. A. DNS B. IP C. ARP D. Telnet

Last Answer : A. DNS

Description : The _______ is a dynamic mapping protocol in which a physical address is found for a given logical address. A. ARP B. RARP C. both a and b D. none of the above

Last Answer : B. RARP

Description : Where can I find Windows NT server log files?

Last Answer : The Windows NT operating system is full of issues. The fact they do not have specific server file is one of them. Any file can be converted to a server file.

Description : What is the name of the latest Server Operating System developed by Microsoft? 1) Windows NT 2) Windows 2008 3) Windows XP 4) Windows 2003

Last Answer : 2) Windows 2008

Description : What is the name of the latest Server Operating System developed by Microsoft? 1 Windows NT 2 Windows 2008 3 Windows XP 4 Windows 2003

Last Answer : 2 Windows 2008

Description : Point out the wrong statement. a) Google App Engine lets you deploy the application and monitor it b) From the standpoint of the client, a cloud service provider is different than any other networked ... be brought to bear to solve mobile, desktop, and local server issues d) All of the mentioned

Last Answer : From the standpoint of the client, a cloud service provider is different than any other networked service

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : . A _____ DBMS distributesdata processing tasks between the workstation anda network server. A. Network B. Relational C. Client Server D. Hierarchical E. None of the above

Last Answer : Client Server

Description : Personal computers can be connectedtogether to form a– (A) server (B) supercomputer (C) network (D) enterprise (E) None of these

Last Answer : network

Description : VLANs can_________. A) reduce network traffic B) provide anextra measure of security C) either (a)or (b) D) both (a) and (b)

Last Answer : both (a) and (b)

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the bus speed. ii) It is multipoint configuration. A) True, True B) B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive

Last Answer : c. Congestive collapse

Description : Intranetsand extranets can use their network fire walls andother security features to establish secureInternet links within an enterpriseor with its trading partners. Select the best fit for answer: A. Network Server B. Virtual Private Network C. Networkoperating system D. OS

Last Answer : Virtual Private Network

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : The purpose of a proxy server is to control exchange of data between the two networks at …………..instead of ……….. A. an application level , an IP level B. network layer, physical layer C. an application layer, physical layer D. Network layer , an application layer

Last Answer : A. an application level , an IP level

Description : Which field of cookie in WWW represents the server's directory structure by identifying the utilization of part associated with server's file tree? a. Domain b. Path c. Content d. Secure

Last Answer : b. Path

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : A set of rules that governs data communication is called a. Protocols b. Standards c. RFCs d. Servers

Last Answer : a. Protocols