Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do...

Post on 31-Mar-2015

213 views 1 download

Tags:

Transcript of Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do...

Networking Essentials

Lab 3 & 4 Review

If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens when the maximum log file size is reached?

A. New file is created with an EV1 extensionB. Original file is copied to a BK1 file and

new log file is startedC. Events are no longer written to the fileD. Events continue to be written to the

file but an alert is sent to the administrator prompting him or her to clear the log manually

If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens when the maximum log file size is reached?

C. Events are no longer written to the file

True or False

Memory is the single most important subsystem to

monitor because memory problems can affect all other

subsystems

True

Memory is the single most important

subsystem to monitor because memory

problems can affect all other subsystems

True or False

An autochanger increases the overall storage capacity of a backup solution

by automatically inserting and removing media from a drive.

True

An autochanger increases the overall storage capacity

of a backup solution by automatically inserting and

removing media from a drive.

In Event Viewer, you are configuring a filter that will display events that describe the successful operation of an application, driver, or service, and events that relate to significant problems, such as loss of data or loss of functionality. Which of the events would you include in the filter?

A. Information, WarningB. Warning, ErrorC. Error, InformationD. Success, Error

In Event Viewer, you are configuring a filter that will display events that describe the successful operation of an application, driver, or service, and events that relate to significant problems, such as loss of data or loss of functionality. Which of the events would you include in the filter?

C. Error, Information

Which of the following methods can be used to start the Task Manager?

A. Pressing Ctrl+Alt+DelB. Pressing Ctrl +Alt+EscC. Double-clicking on the taskbar

and selecting Task ManagerD. Right-clicking on My Computer

and selecting Task Manager

Which of the following methods can be used to start the Task Manager?

A. Pressing Ctrl+Alt+Del

True or False

If a server that you are working on has a File Replication Service event log and a Directory Service

event log, then it must be a domain controller.

True

If a server that you are working on has a File

Replication Service event log and a Directory Service event log, then it must be

a domain controller.

Which of the following media has the largest data storage capacity?

A. Zip cartridgeB. CDC. DVDD. Jaz cartridge

Which of the following media has the largest data storage capacity?

D. Jaz cartridge

In Task Manager, what tab allows you to view processes running on the current user’s computer?

A. ProcessesB. UsersC. PerformanceD. Applications

In Task Manager, what tab allows you to view processes running on the current user’s computer?

A. Processes

Which of the following is not a recognized type of backup?

A. IncrementalB. DifferentialC. SupplementalD. Full

Which of the following is not a recognized type of backup?

C. Supplemental

You do a full backup to a single tape on a Friday night and incremental backups individual tapes on all other days of the week. A system failure occurs Monday morning. How many tapes are required to perform a full restore?

A. 1B. 3C. 7D. 8

You do a full backup to a single tape on a Friday night and incremental backups individual tapes on all other days of the week. A system failure occurs Monday morning. How many tapes are required to perform a full restore?

B. 3

On a Windows Server 2003 system, where do you enable the volume shadow copy feature?

A. Local Disk, Properties, Advanced tabB. Volume Shadow tab of My ComputerC. Control Panel, Volume Shadow appletD. Local Disk, Properties, Shadow Copies tab

On a Windows Server 2003 system, where do you enable the volume shadow copy feature?

D. Local Disk, Properties, Shadow Copies

tab

What does the term target mean when discussing the development of a new backup strategy?

A. The system hosting the tape driveB. The backup deviceC. The data object to be backed upD. The media in the backup device

What does the term target mean when discussing the development of a new backup strategy?

C. The data object to be backed up

True or False

There is always more data included in a differential

backup than a full backup.

False

There is always more data included in a differential

backup than a full backup.

True or False

Using counters with comparable values is not a way to ensure pertinent

information is visible.

False

Using counters with comparable values is not a way to ensure pertinent

information is visible.

True or False

Network performance refers to how efficiently the network responds to user

needs.

True

Network performance refers to how efficiently the network responds to user

needs.

How does using the volume shadow copy feature help system administrators?

A. Reduces need to perform backupsB.Allows multiple copies of a file to

be written to different locations at same timeC.Reduces amount of time it takes

to perform a backupD.Reduces need to restore

individual files from backup

How does using the volume shadow copy feature help system administrators?

D. Reduces need to restore individual files from backup

Which of the following logs are available using Event Viewer if you are functioning as an application server? (Choose all correct answers.)

A. ApplicationB. Directory ServiceC. SystemD. SecurityE. File Replication Service

Which of the following logs are available using Event Viewer if you are functioning as an application server? (Choose all correct answers.)

A. ApplicationC. SystemD. Security

You restart the system in Directory Services Restore Mode to restore Active Directory from a backup and are prompted for a username and password. Your Administrator username and password will not allow you to log on. You know the username and password have not changed since last logon. What is the most likely cause of the problem?

A. Must use first password ever associated with Administrator

accountB. Must use username DSRESTORE and

Administrator password C. Must use restore mode password for

Administrator that you specified when you installed Active Directory

D. Must use an account other than Administrator that is a

member of the Domain Admins group

You restart the system in Directory Services Restore Mode to restore Active Directory from a backup and are prompted for a username and password. Your Administrator username and password will not allow you to log on. You know the username and password have not changed since last logon. What is the most likely cause of the problem?

C. Must use restore mode password for Administrator that you specified when you installed Active Directory

You perform a full backup each Friday and a differential backup on all other weekdays at 9 P.M. On Wednesday at 11 A.M., the drive holding the customer database fails. How would you go about restoring the data?A. Obtain full backup from Friday and

differential backup from Tuesday. Restore full backup, then restore differential backupB. Obtain full backup from Friday and

differential backup from Tuesday. Restore differential backup, then restore full backup C. Obtain full backup from Friday and

differential backups from Monday and Tuesday. Restore full backup, then restore differential backups from Monday and then Tuesday.D. Obtain full backup from Friday and

differential backups from Monday and Tuesday. Restore differential backups from Monday, then Tuesday, the full backup from Friday

You perform a full backup each Friday and a differential backup on all other weekdays at 9 P.M. On Wednesday at 11 A.M., the drive holding the customer database fails. How would you go about restoring the data?

A.Obtain full backup from Friday and differential backup from Tuesday. Restore full backup, then restore

differential backup

Describe the purpose and function of a baseline.

Describe the purpose and function of a baseline.

Set of statistics, taken under various conditions, used for future comparison. Without a baseline, there is really no way to answer claims such as “The server is slow” or “The network is slow.” Baseline comparison allows you to determine if there is indeed an issue affecting performance.

Describe a memory leak and the potential result of a leak occurring on the system.

Describe a memory leak and the potential result of a leak occurring on the system. One of the most common conditions that cause memory-related problems. Result of a program allocating memory for use but not freeing up that memory when it is finished using it. Over time, computer’s free memory can be totally consumed, degrading performance and ultimately halting the system.

Why are network performance issues the most difficult to track and solve?

Why are network performance issues the most difficult to track and solve?

They are difficult to quantify, develop gradually, often unreported, intermittent, tuning is based on educated guesswork, and solutions are often hard to sell upper management.

Explain difference between real-time and logged monitoring, and circumstances under which each is useful. What are examples of tools used for ?

Explain difference between real-time and logged monitoring, and circumstances under which each is useful. What are examples of tools used for ?

Real-time uses tools like Task Manager and System Monitor that display a continuous stream of statistics about what the system is doing right now. Provides most current information but must be continually monitored. Useful to address immediate issues critical to system performance or those affecting a single user on the network.

Explain difference between real-time and logged monitoring, and circumstances under which each is useful. What are examples of tools used for ?

Logged allows administrators to observe trends that develop over longer periods of time than those observed in real-time. Useful in determining if system performance has degraded over time an addressing less critical issues. Tools: Performance Logs and Alerts.

What is the purpose of backing up data?

What is the purpose of backing up data?

Back up data so we have copies of files available in case we are unable to access originals. Reasons for backing up data is because storage devices can fail, users can overwrite files by mistake, files can become corrupt, computers can get stolen, and we might need to look at an earlier version of a file.

What is a bottleneck? What is a common network performance bottleneck?  

What is a bottleneck? What is a common network performance bottleneck? Hardware device or software component that limits the performance of the system. Every system has a bottleneck. Question is whether bottleneck is actually causing a performance issue. In most cases the process of improving the performance of a system is simply identifying the component that is causing a bottleneck and upgrading it. Common bottlenecks: increased server load, hardware failure, changed server roles 

What three elements should a backup solution include?

What three elements should a backup solution include?

Backup device, backup software, and data that is to be backed up (and a plan to use backup tools).