Download presentation
Presentation is loading. Please wait.
Published byBraulio Hebard Modified over 10 years ago
1
Networking Essentials Lab 3 & 4 Review
2
If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens when the maximum log file size is reached? A. New file is created with an EV1 extension B.Original file is copied to a BK1 file and new log file is started C. Events are no longer written to the file D.Events continue to be written to the file but an alert is sent to the administrator prompting him or her to clear the log manually
3
If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens when the maximum log file size is reached? C. Events are no longer written to the file
4
True or False Memory is the single most important subsystem to monitor because memory problems can affect all other subsystems
5
True Memory is the single most important subsystem to monitor because memory problems can affect all other subsystems
6
True or False An autochanger increases the overall storage capacity of a backup solution by automatically inserting and removing media from a drive.
7
True An autochanger increases the overall storage capacity of a backup solution by automatically inserting and removing media from a drive.
8
In Event Viewer, you are configuring a filter that will display events that describe the successful operation of an application, driver, or service, and events that relate to significant problems, such as loss of data or loss of functionality. Which of the events would you include in the filter? A.Information, Warning B.Warning, Error C.Error, Information D.Success, Error
9
In Event Viewer, you are configuring a filter that will display events that describe the successful operation of an application, driver, or service, and events that relate to significant problems, such as loss of data or loss of functionality. Which of the events would you include in the filter? C.Error, Information
10
Which of the following methods can be used to start the Task Manager? A. Pressing Ctrl+Alt+Del B. Pressing Ctrl +Alt+Esc C.Double-clicking on the taskbar and selecting Task Manager D.Right-clicking on My Computer and selecting Task Manager
11
Which of the following methods can be used to start the Task Manager? A. Pressing Ctrl+Alt+Del
12
True or False If a server that you are working on has a File Replication Service event log and a Directory Service event log, then it must be a domain controller.
13
True If a server that you are working on has a File Replication Service event log and a Directory Service event log, then it must be a domain controller.
14
Which of the following media has the largest data storage capacity? A.Zip cartridge B.CD C.DVD D.Jaz cartridge
15
Which of the following media has the largest data storage capacity? D.Jaz cartridge
16
In Task Manager, what tab allows you to view processes running on the current users computer? A.Processes B.Users C.Performance D.Applications
17
In Task Manager, what tab allows you to view processes running on the current users computer? A.Processes
18
Which of the following is not a recognized type of backup? A.Incremental B.Differential C.Supplemental D.Full
19
Which of the following is not a recognized type of backup? C.Supplemental
20
You do a full backup to a single tape on a Friday night and incremental backups individual tapes on all other days of the week. A system failure occurs Monday morning. How many tapes are required to perform a full restore? A.1 B.3 C.7 D.8
21
You do a full backup to a single tape on a Friday night and incremental backups individual tapes on all other days of the week. A system failure occurs Monday morning. How many tapes are required to perform a full restore? B.3
22
On a Windows Server 2003 system, where do you enable the volume shadow copy feature? A. Local Disk, Properties, Advanced tab B. Volume Shadow tab of My Computer C. Control Panel, Volume Shadow applet D. Local Disk, Properties, Shadow Copies tab
23
On a Windows Server 2003 system, where do you enable the volume shadow copy feature? D. Local Disk, Properties, Shadow Copies tab tab
24
What does the term target mean when discussing the development of a new backup strategy? A.The system hosting the tape drive B.The backup device C.The data object to be backed up D.The media in the backup device
25
What does the term target mean when discussing the development of a new backup strategy? C.The data object to be backed up
26
True or False There is always more data included in a differential backup than a full backup.
27
False There is always more data included in a differential backup than a full backup.
28
True or False Using counters with comparable values is not a way to ensure pertinent information is visible.
29
False Using counters with comparable values is not a way to ensure pertinent information is visible.
30
True or False Network performance refers to how efficiently the network responds to user needs.
31
True Network performance refers to how efficiently the network responds to user needs.
32
How does using the volume shadow copy feature help system administrators? A. Reduces need to perform backups B.Allows multiple copies of a file to be written to different locations at same time C.Reduces amount of time it takes to perform a backup D.Reduces need to restore individual files from backup
33
How does using the volume shadow copy feature help system administrators? D. Reduces need to restore individual files from backup backup
34
Which of the following logs are available using Event Viewer if you are functioning as an application server? (Choose all correct answers.) A. Application B. Directory Service C. System D. Security E. File Replication Service
35
Which of the following logs are available using Event Viewer if you are functioning as an application server? (Choose all correct answers.) A. Application C. System D. Security
36
You restart the system in Directory Services Restore Mode to restore Active Directory from a backup and are prompted for a username and password. Your Administrator username and password will not allow you to log on. You know the username and password have not changed since last logon. What is the most likely cause of the problem? A.Must use first password ever associated with Administrator account B.Must use username DSRESTORE and Administrator password C.Must use restore mode password for Administrator that you specified when you installed Active Directory D.Must use an account other than Administrator that is a member of the Domain Admins group
37
You restart the system in Directory Services Restore Mode to restore Active Directory from a backup and are prompted for a username and password. Your Administrator username and password will not allow you to log on. You know the username and password have not changed since last logon. What is the most likely cause of the problem? C. Must use restore mode password for Administrator that you specified when you installed Active Directory
38
You perform a full backup each Friday and a differential backup on all other weekdays at 9 P. M. On Wednesday at 11 A. M., the drive holding the customer database fails. How would you go about restoring the data? A.Obtain full backup from Friday and differential backup from Tuesday. Restore full backup, then restore differential backup B.Obtain full backup from Friday and differential backup from Tuesday. Restore differential backup, then restore full backup C.Obtain full backup from Friday and differential backups from Monday and Tuesday. Restore full backup, then restore differential backups from Monday and then Tuesday. D.Obtain full backup from Friday and differential backups from Monday and Tuesday. Restore differential backups from Monday, then Tuesday, the full backup from Friday
39
You perform a full backup each Friday and a differential backup on all other weekdays at 9 P. M. On Wednesday at 11 A. M., the drive holding the customer database fails. How would you go about restoring the data? A.Obtain full backup from Friday and differential backup from Tuesday. Restore full backup, then restore differential backup
40
Describe the purpose and function of a baseline.
41
Set of statistics, taken under various conditions, used for future comparison. Without a baseline, there is really no way to answer claims such as The server is slow or The network is slow. Baseline comparison allows you to determine if there is indeed an issue affecting performance.
42
Describe a memory leak and the potential result of a leak occurring on the system.
43
One of the most common conditions that cause memory-related problems. Result of a program allocating memory for use but not freeing up that memory when it is finished using it. Over time, computers free memory can be totally consumed, degrading performance and ultimately halting the system.
44
Why are network performance issues the most difficult to track and solve?
45
They are difficult to quantify, develop gradually, often unreported, intermittent, tuning is based on educated guesswork, and solutions are often hard to sell upper management.
46
Explain difference between real-time and logged monitoring, and circumstances under which each is useful. What are examples of tools used for ?
47
Real-time uses tools like Task Manager and System Monitor that display a continuous stream of statistics about what the system is doing right now. Provides most current information but must be continually monitored. Useful to address immediate issues critical to system performance or those affecting a single user on the network.
48
Explain difference between real-time and logged monitoring, and circumstances under which each is useful. What are examples of tools used for ? Logged allows administrators to observe trends that develop over longer periods of time than those observed in real-time. Useful in determining if system performance has degraded over time an addressing less critical issues. Tools: Performance Logs and Alerts.
49
What is the purpose of backing up data?
50
Back up data so we have copies of files available in case we are unable to access originals. Reasons for backing up data is because storage devices can fail, users can overwrite files by mistake, files can become corrupt, computers can get stolen, and we might need to look at an earlier version of a file.
51
What is a bottleneck? What is a common network performance bottleneck?
52
What is a bottleneck? What is a common network performance bottleneck? Hardware device or software component that limits the performance of the system. Every system has a bottleneck. Question is whether bottleneck is actually causing a performance issue. In most cases the process of improving the performance of a system is simply identifying the component that is causing a bottleneck and upgrading it. Common bottlenecks: increased server load, hardware failure, changed server roles
53
What three elements should a backup solution include?
54
Backup device, backup software, and data that is to be backed up (and a plan to use backup tools).
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.