Presentation is loading. Please wait.

Presentation is loading. Please wait.

Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.

Similar presentations


Presentation on theme: "Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens."— Presentation transcript:

1 Networking Essentials Lab 3 & 4 Review

2 If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens when the maximum log file size is reached? A. New file is created with an EV1 extension B.Original file is copied to a BK1 file and new log file is started C. Events are no longer written to the file D.Events continue to be written to the file but an alert is sent to the administrator prompting him or her to clear the log manually

3 If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens when the maximum log file size is reached? C. Events are no longer written to the file

4 True or False Memory is the single most important subsystem to monitor because memory problems can affect all other subsystems

5 True Memory is the single most important subsystem to monitor because memory problems can affect all other subsystems

6 True or False An autochanger increases the overall storage capacity of a backup solution by automatically inserting and removing media from a drive.

7 True An autochanger increases the overall storage capacity of a backup solution by automatically inserting and removing media from a drive.

8 In Event Viewer, you are configuring a filter that will display events that describe the successful operation of an application, driver, or service, and events that relate to significant problems, such as loss of data or loss of functionality. Which of the events would you include in the filter? A.Information, Warning B.Warning, Error C.Error, Information D.Success, Error

9 In Event Viewer, you are configuring a filter that will display events that describe the successful operation of an application, driver, or service, and events that relate to significant problems, such as loss of data or loss of functionality. Which of the events would you include in the filter? C.Error, Information

10 Which of the following methods can be used to start the Task Manager? A. Pressing Ctrl+Alt+Del B. Pressing Ctrl +Alt+Esc C.Double-clicking on the taskbar and selecting Task Manager D.Right-clicking on My Computer and selecting Task Manager

11 Which of the following methods can be used to start the Task Manager? A. Pressing Ctrl+Alt+Del

12 True or False If a server that you are working on has a File Replication Service event log and a Directory Service event log, then it must be a domain controller.

13 True If a server that you are working on has a File Replication Service event log and a Directory Service event log, then it must be a domain controller.

14 Which of the following media has the largest data storage capacity? A.Zip cartridge B.CD C.DVD D.Jaz cartridge

15 Which of the following media has the largest data storage capacity? D.Jaz cartridge

16 In Task Manager, what tab allows you to view processes running on the current users computer? A.Processes B.Users C.Performance D.Applications

17 In Task Manager, what tab allows you to view processes running on the current users computer? A.Processes

18 Which of the following is not a recognized type of backup? A.Incremental B.Differential C.Supplemental D.Full

19 Which of the following is not a recognized type of backup? C.Supplemental

20 You do a full backup to a single tape on a Friday night and incremental backups individual tapes on all other days of the week. A system failure occurs Monday morning. How many tapes are required to perform a full restore? A.1 B.3 C.7 D.8

21 You do a full backup to a single tape on a Friday night and incremental backups individual tapes on all other days of the week. A system failure occurs Monday morning. How many tapes are required to perform a full restore? B.3

22 On a Windows Server 2003 system, where do you enable the volume shadow copy feature? A. Local Disk, Properties, Advanced tab B. Volume Shadow tab of My Computer C. Control Panel, Volume Shadow applet D. Local Disk, Properties, Shadow Copies tab

23 On a Windows Server 2003 system, where do you enable the volume shadow copy feature? D. Local Disk, Properties, Shadow Copies tab tab

24 What does the term target mean when discussing the development of a new backup strategy? A.The system hosting the tape drive B.The backup device C.The data object to be backed up D.The media in the backup device

25 What does the term target mean when discussing the development of a new backup strategy? C.The data object to be backed up

26 True or False There is always more data included in a differential backup than a full backup.

27 False There is always more data included in a differential backup than a full backup.

28 True or False Using counters with comparable values is not a way to ensure pertinent information is visible.

29 False Using counters with comparable values is not a way to ensure pertinent information is visible.

30 True or False Network performance refers to how efficiently the network responds to user needs.

31 True Network performance refers to how efficiently the network responds to user needs.

32 How does using the volume shadow copy feature help system administrators? A. Reduces need to perform backups B.Allows multiple copies of a file to be written to different locations at same time C.Reduces amount of time it takes to perform a backup D.Reduces need to restore individual files from backup

33 How does using the volume shadow copy feature help system administrators? D. Reduces need to restore individual files from backup backup

34 Which of the following logs are available using Event Viewer if you are functioning as an application server? (Choose all correct answers.) A. Application B. Directory Service C. System D. Security E. File Replication Service

35 Which of the following logs are available using Event Viewer if you are functioning as an application server? (Choose all correct answers.) A. Application C. System D. Security

36 You restart the system in Directory Services Restore Mode to restore Active Directory from a backup and are prompted for a username and password. Your Administrator username and password will not allow you to log on. You know the username and password have not changed since last logon. What is the most likely cause of the problem? A.Must use first password ever associated with Administrator account B.Must use username DSRESTORE and Administrator password C.Must use restore mode password for Administrator that you specified when you installed Active Directory D.Must use an account other than Administrator that is a member of the Domain Admins group

37 You restart the system in Directory Services Restore Mode to restore Active Directory from a backup and are prompted for a username and password. Your Administrator username and password will not allow you to log on. You know the username and password have not changed since last logon. What is the most likely cause of the problem? C. Must use restore mode password for Administrator that you specified when you installed Active Directory

38 You perform a full backup each Friday and a differential backup on all other weekdays at 9 P. M. On Wednesday at 11 A. M., the drive holding the customer database fails. How would you go about restoring the data? A.Obtain full backup from Friday and differential backup from Tuesday. Restore full backup, then restore differential backup B.Obtain full backup from Friday and differential backup from Tuesday. Restore differential backup, then restore full backup C.Obtain full backup from Friday and differential backups from Monday and Tuesday. Restore full backup, then restore differential backups from Monday and then Tuesday. D.Obtain full backup from Friday and differential backups from Monday and Tuesday. Restore differential backups from Monday, then Tuesday, the full backup from Friday

39 You perform a full backup each Friday and a differential backup on all other weekdays at 9 P. M. On Wednesday at 11 A. M., the drive holding the customer database fails. How would you go about restoring the data? A.Obtain full backup from Friday and differential backup from Tuesday. Restore full backup, then restore differential backup

40 Describe the purpose and function of a baseline.

41 Set of statistics, taken under various conditions, used for future comparison. Without a baseline, there is really no way to answer claims such as The server is slow or The network is slow. Baseline comparison allows you to determine if there is indeed an issue affecting performance.

42 Describe a memory leak and the potential result of a leak occurring on the system.

43 One of the most common conditions that cause memory-related problems. Result of a program allocating memory for use but not freeing up that memory when it is finished using it. Over time, computers free memory can be totally consumed, degrading performance and ultimately halting the system.

44 Why are network performance issues the most difficult to track and solve?

45 They are difficult to quantify, develop gradually, often unreported, intermittent, tuning is based on educated guesswork, and solutions are often hard to sell upper management.

46 Explain difference between real-time and logged monitoring, and circumstances under which each is useful. What are examples of tools used for ?

47 Real-time uses tools like Task Manager and System Monitor that display a continuous stream of statistics about what the system is doing right now. Provides most current information but must be continually monitored. Useful to address immediate issues critical to system performance or those affecting a single user on the network.

48 Explain difference between real-time and logged monitoring, and circumstances under which each is useful. What are examples of tools used for ? Logged allows administrators to observe trends that develop over longer periods of time than those observed in real-time. Useful in determining if system performance has degraded over time an addressing less critical issues. Tools: Performance Logs and Alerts.

49 What is the purpose of backing up data?

50 Back up data so we have copies of files available in case we are unable to access originals. Reasons for backing up data is because storage devices can fail, users can overwrite files by mistake, files can become corrupt, computers can get stolen, and we might need to look at an earlier version of a file.

51 What is a bottleneck? What is a common network performance bottleneck?

52 What is a bottleneck? What is a common network performance bottleneck? Hardware device or software component that limits the performance of the system. Every system has a bottleneck. Question is whether bottleneck is actually causing a performance issue. In most cases the process of improving the performance of a system is simply identifying the component that is causing a bottleneck and upgrading it. Common bottlenecks: increased server load, hardware failure, changed server roles

53 What three elements should a backup solution include?

54 Backup device, backup software, and data that is to be backed up (and a plan to use backup tools).


Download ppt "Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens."

Similar presentations


Ads by Google