Lab 3 & 4 Review

makeshiftklipInternet και Εφαρμογές Web

31 Οκτ 2013 (πριν από 3 χρόνια και 11 μήνες)

67 εμφανίσεις

Networking Essentials


Lab 3 & 4 Review

If you have configured an event log retention setting to
Do Not Overwrite Events (Clear Log Manually), what
happens when the maximum log file size is reached?




A. New file
is created with an EV1
extension

B.
Original
file is copied to a BK1 file and
new
log




file
is
started

C. Events
are no longer written to the
file

D.
Events
continue to be written to the file but an alert



is
sent to the administrator prompting him or her



to clear
the log
manually

If you have configured an event log retention setting to
Do Not Overwrite Events (Clear Log Manually), what
happens when the maximum log file size is reached?




C. Events
are no longer written to the
file

True or False


Memory is the single most
important subsystem to monitor
because memory problems can
affect all other subsystems

True


Memory is the single most
important subsystem to
monitor because memory
problems can affect all
other subsystems

True or False


An
autochanger

increases the
overall
storage capacity of a backup solution
by automatically inserting and
removing media from a drive.

True


An
autochanger

increases the overall
storage capacity of a backup solution
by automatically inserting and
removing media from a drive.


In Event Viewer, you are configuring a filter
that will display events that describe the
successful operation of an application, driver,
or service, and events that relate to significant
problems, such as loss of data or loss of
functionality. Which of the
events
would you
include in the filter
?


A.

Information, Warning

B
.

Warning, Error

C
.

Error, Information

D
.

Success,
Error

In Event Viewer, you are configuring a filter
that will display events that describe the
successful operation of an application, driver,
or service, and events that relate to significant
problems, such as loss of data or loss of
functionality. Which of the
events
would you
include in the filter
?


C.

Error,
Information

Which of the following methods can be
used to start the Task Manager
?


A.


Pressing
Ctrl+Alt+Del

B.


Pressing
Ctrl +
Alt+Esc

C.
Double
-
clicking
on the taskbar and



selecting
Task Manager

D.
Right
-
clicking
on My Computer and



selecting
Task Manager




Which of the following methods can be
used to start the Task Manager
?


A.


Pressing
Ctrl+Alt+Del



True or False


If a server that you are working on
has a File Replication Service event
log and a Directory Service event log,
then it must be a domain controller.

True


If a server that you are working on
has a File Replication Service
event log and a Directory Service
event log, then it must be a
domain controller.

Which of the following media has the
largest data storage capacity
?


A
.

Zip
cartridge

B
.

CD

C
.

DVD

D
.

Jaz
cartridge

Which of the following media has the
largest data storage capacity
?


D.

Jaz
cartridge

In Task Manager, what tab allows you
to view processes running on the
current user’s computer
?


A
.

Processes

B
.

Users

C
.

Performance

D
.

Applications

In Task Manager, what tab allows you
to view processes running on the
current user’s computer
?


A
.

Processes


Which of the following is
not

a
recognized type of backup
?


A
.

Incremental

B
.

Differential

C
.

Supplemental

D
.

Full

Which of the following is
not

a
recognized type of backup
?


C.

Supplemental

You
do a full backup to a single tape on a
Friday night and
incremental backups
individual tapes
on all other days of the
week. A
system failure occurs Monday
morning. How many tapes are required to
perform a full restore
?


A.

1

B
.

3

C
.

7

D
.

8

You
do a full backup to a single tape on a
Friday night and
incremental backups
individual tapes
on all other days of the
week. A
system failure occurs Monday
morning. How many tapes are required to
perform a full restore
?


B
.

3

On a Windows Server 2003 system, where
do you enable the volume shadow copy
feature
?


A. Local
Disk, Properties, Advanced tab

B. Volume
Shadow tab of My Computer

C. Control
Panel, Volume Shadow applet

D. Local
Disk, Properties, Shadow Copies



tab

On a Windows Server 2003 system, where
do you enable the volume shadow copy
feature
?


D. Local
Disk, Properties, Shadow Copies



tab

What does the term
target

mean when
discussing the development of a new
backup
strategy?


A
.

The system hosting the tape drive

B
.

The backup device

C
.

The data object to be backed up

D
.

The media in the backup device

What does the term
target

mean when
discussing the development of a new
backup
strategy?


C.

The data object to be backed
up

True or False


There is always
more data
included in
a differential backup
than a full
backup.

False


There is always
more data
included in
a differential backup
than a full
backup.

True or False


Using counters with comparable
values is not a way to ensure
pertinent information is visible.

False


Using counters with comparable
values is not a way to ensure
pertinent information is visible.

True or False


Network performance refers to
how efficiently the network
responds to user needs.

True


Network performance refers to
how efficiently the network
responds to user needs.

How does using the volume shadow copy
feature
help
system administrators
?


A.


Reduces need
to perform
backups

B.
Allows multiple
copies of a file to be



written
to different locations at
same time

C.
Reduces amount
of time
it
takes to perform a



backup

D.
Reduces need
to restore individual files from



backup

How does using the volume shadow copy
feature
help
system administrators
?


D. Reduces need
to restore individual files from



backup

Which of the following logs are available
using Event Viewer if you are functioning
as an application server? (Choose all
correct answers
.)


A
.
Application

B
.
Directory Service

C
.
System

D
.
Security

E
.
File Replication Service

Which of the following logs are available
using Event Viewer if you are functioning
as an application server? (Choose all
correct answers
.)


A
. Application

C
.
System

D
.
Security


You restart
the system in Directory Services Restore Mode to
restore Active Directory from a
backup and are
prompted for a
username and
password. Your
Administrator
username and
password will not allow you
to log on. You
know the username
and password have not changed since last logon.
What is the
most likely cause of the problem
?


A.
Must use first
password ever associated with
Administrator



account

B.
Must use username
DSRESTORE and
Administrator
password

C.
Must
use
restore
mode password for
Administrator that
you specified when you installed Active
Directory

D.
Must
use an account other than Administrator that is a



member
of the Domain Admins
group

You restart
the system in Directory Services Restore
Mode to restore Active Directory from a
backup and
are
prompted for a username and
password. Your
Administrator
username and password will not
allow you
to log on. You
know the username and
password have not changed since last logon.
What
is the most likely cause of the problem
?


C. Must
use
restore
mode password for
Administrator that
you specified when you
installed Active
Directory

You
perform a full backup each Friday and a differential
backup on all other weekdays at 9
P
.
M
. On Wednesday at 11
A
.
M
., the drive holding the customer database fails.
How
would you go about restoring the data?

A.
Obtain full
backup from Friday
and
differential backup



from
Tuesday. Restore
full
backup,
then
restore


differential backup

B.
Obtain full
backup from Friday and
differential
backup



from
Tuesday. Restore
differential
backup,
then
restore




full backup

C.
Obtain full
backup from Friday and
differential
backups



from
Monday and Tuesday. Restore
full
backup,
then



restore differential
backups from Monday and then



Tuesday
.

D.
Obtain full
backup from Friday and
differential
backups



from
Monday and Tuesday. Restore
differential
backups



from Monday, then Tuesday, the full
backup from
Friday


You
perform a full backup each Friday and a
differential backup on all other weekdays at 9
P
.
M
.
On Wednesday at 11
A
.
M
., the drive holding the
customer database fails.
How
would you go about
restoring the data
?


A.
Obtain full
backup from Friday
and
differential
backup
from
Tuesday. Restore
full
backup,
then
restore
differential backup


Describe the purpose and function of a
baseline.

Describe the purpose and function of a
baseline.


Set
of statistics, taken under various conditions,
used
for future comparison. Without a baseline,
there is really no way to answer claims such as
“The server is slow” or “The network is slow.”
Baseline comparison allows you to determine if
there is indeed an issue affecting performance.


Describe a memory leak and the potential
result of a leak occurring on the system.


Describe a memory leak and the potential
result of a leak occurring on the system.

One of
the most common conditions that cause
memory
-
related
problems. Result
of a program
allocating memory for use but not freeing up that
memory when it is finished using it.
Over
time,
computer’s free memory can be totally consumed,
degrading performance and ultimately halting the
system.


Why are network performance issues the
most difficult to track and solve?

Why are network performance issues the
most difficult to track and solve?


They
are difficult to quantify, develop
gradually, often unreported, intermittent,
tuning is based on educated guesswork,
and solutions are often hard to sell upper
management.

Explain
difference
between real
-
time and logged monitoring,
and
circumstances
under which each
is
useful. What are
examples
of tools
used for
?



Explain
difference
between real
-
time and logged monitoring, and
circumstances
under which each
is
useful. What are examples
of
tools
used for
?


Real
-
time uses tools like Task Manager and System Monitor
that
display a continuous stream of statistics about what the system
is doing right
now.
Provides most current information but must
be continually monitored. Useful to address immediate issues
critical
to system
performance or those affecting
a single user
on the network.



Explain
difference
between real
-
time and logged monitoring, and
circumstances
under which each
is
useful. What are examples
of
tools
used for
?


Logged allows administrators to observe trends that develop
over longer periods of time than those observed in real
-
time.
Useful in determining if system performance has degraded over
time an addressing less critical issues. Tools: Performance Logs
and Alerts.



What is the purpose of backing up data?




What is the purpose of backing up data?


B
ack
up data so we have copies of files available in
case we are unable to access
originals
.
Reasons
for
backing up data is because storage devices can fail,
users can overwrite files by mistake,
files
can
become corrupt, computers can get stolen, and we
might need to look at an earlier version of a file.



What is a bottleneck? What is a common
network performance bottleneck
?



What is a bottleneck? What is a common network
performance bottleneck
?



Hardware device
or software component that limits
the performance of the system. Every system has a
bottleneck. Question
is whether
bottleneck
is actually
causing a performance issue.
In most
cases the process
of improving the performance of a system is simply
identifying the component that is causing a bottleneck
and upgrading it.
Common
bottlenecks: increased
server load, hardware failure, changed server roles



What three elements should a backup
solution include?

What three elements should a backup
solution include?


Backup
device, backup
software, and data
that is to be backed up (and a plan to use
backup tools).