networking essentials lab 3 & 4 review. if you have configured an event log retention setting to...
TRANSCRIPT
![Page 1: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/1.jpg)
Networking Essentials
Lab 3 & 4 Review
![Page 2: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/2.jpg)
If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens when the maximum log file size is reached?
A. New file is created with an EV1 extensionB. Original file is copied to a BK1 file and
new log file is startedC. Events are no longer written to the fileD. Events continue to be written to the
file but an alert is sent to the administrator prompting him or her to clear the log manually
![Page 3: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/3.jpg)
If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens when the maximum log file size is reached?
C. Events are no longer written to the file
![Page 4: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/4.jpg)
True or False
Memory is the single most important subsystem to
monitor because memory problems can affect all other
subsystems
![Page 5: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/5.jpg)
True
Memory is the single most important
subsystem to monitor because memory
problems can affect all other subsystems
![Page 6: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/6.jpg)
True or False
An autochanger increases the overall storage capacity of a backup solution
by automatically inserting and removing media from a drive.
![Page 7: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/7.jpg)
True
An autochanger increases the overall storage capacity
of a backup solution by automatically inserting and
removing media from a drive.
![Page 8: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/8.jpg)
In Event Viewer, you are configuring a filter that will display events that describe the successful operation of an application, driver, or service, and events that relate to significant problems, such as loss of data or loss of functionality. Which of the events would you include in the filter?
A. Information, WarningB. Warning, ErrorC. Error, InformationD. Success, Error
![Page 9: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/9.jpg)
In Event Viewer, you are configuring a filter that will display events that describe the successful operation of an application, driver, or service, and events that relate to significant problems, such as loss of data or loss of functionality. Which of the events would you include in the filter?
C. Error, Information
![Page 10: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/10.jpg)
Which of the following methods can be used to start the Task Manager?
A. Pressing Ctrl+Alt+DelB. Pressing Ctrl +Alt+EscC. Double-clicking on the taskbar
and selecting Task ManagerD. Right-clicking on My Computer
and selecting Task Manager
![Page 11: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/11.jpg)
Which of the following methods can be used to start the Task Manager?
A. Pressing Ctrl+Alt+Del
![Page 12: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/12.jpg)
True or False
If a server that you are working on has a File Replication Service event log and a Directory Service
event log, then it must be a domain controller.
![Page 13: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/13.jpg)
True
If a server that you are working on has a File
Replication Service event log and a Directory Service event log, then it must be
a domain controller.
![Page 14: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/14.jpg)
Which of the following media has the largest data storage capacity?
A. Zip cartridgeB. CDC. DVDD. Jaz cartridge
![Page 15: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/15.jpg)
Which of the following media has the largest data storage capacity?
D. Jaz cartridge
![Page 16: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/16.jpg)
In Task Manager, what tab allows you to view processes running on the current user’s computer?
A. ProcessesB. UsersC. PerformanceD. Applications
![Page 17: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/17.jpg)
In Task Manager, what tab allows you to view processes running on the current user’s computer?
A. Processes
![Page 18: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/18.jpg)
Which of the following is not a recognized type of backup?
A. IncrementalB. DifferentialC. SupplementalD. Full
![Page 19: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/19.jpg)
Which of the following is not a recognized type of backup?
C. Supplemental
![Page 20: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/20.jpg)
You do a full backup to a single tape on a Friday night and incremental backups individual tapes on all other days of the week. A system failure occurs Monday morning. How many tapes are required to perform a full restore?
A. 1B. 3C. 7D. 8
![Page 21: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/21.jpg)
You do a full backup to a single tape on a Friday night and incremental backups individual tapes on all other days of the week. A system failure occurs Monday morning. How many tapes are required to perform a full restore?
B. 3
![Page 22: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/22.jpg)
On a Windows Server 2003 system, where do you enable the volume shadow copy feature?
A. Local Disk, Properties, Advanced tabB. Volume Shadow tab of My ComputerC. Control Panel, Volume Shadow appletD. Local Disk, Properties, Shadow Copies tab
![Page 23: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/23.jpg)
On a Windows Server 2003 system, where do you enable the volume shadow copy feature?
D. Local Disk, Properties, Shadow Copies
tab
![Page 24: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/24.jpg)
What does the term target mean when discussing the development of a new backup strategy?
A. The system hosting the tape driveB. The backup deviceC. The data object to be backed upD. The media in the backup device
![Page 25: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/25.jpg)
What does the term target mean when discussing the development of a new backup strategy?
C. The data object to be backed up
![Page 26: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/26.jpg)
True or False
There is always more data included in a differential
backup than a full backup.
![Page 27: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/27.jpg)
False
There is always more data included in a differential
backup than a full backup.
![Page 28: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/28.jpg)
True or False
Using counters with comparable values is not a way to ensure pertinent
information is visible.
![Page 29: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/29.jpg)
False
Using counters with comparable values is not a way to ensure pertinent
information is visible.
![Page 30: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/30.jpg)
True or False
Network performance refers to how efficiently the network responds to user
needs.
![Page 31: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/31.jpg)
True
Network performance refers to how efficiently the network responds to user
needs.
![Page 32: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/32.jpg)
How does using the volume shadow copy feature help system administrators?
A. Reduces need to perform backupsB.Allows multiple copies of a file to
be written to different locations at same timeC.Reduces amount of time it takes
to perform a backupD.Reduces need to restore
individual files from backup
![Page 33: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/33.jpg)
How does using the volume shadow copy feature help system administrators?
D. Reduces need to restore individual files from backup
![Page 34: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/34.jpg)
Which of the following logs are available using Event Viewer if you are functioning as an application server? (Choose all correct answers.)
A. ApplicationB. Directory ServiceC. SystemD. SecurityE. File Replication Service
![Page 35: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/35.jpg)
Which of the following logs are available using Event Viewer if you are functioning as an application server? (Choose all correct answers.)
A. ApplicationC. SystemD. Security
![Page 36: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/36.jpg)
You restart the system in Directory Services Restore Mode to restore Active Directory from a backup and are prompted for a username and password. Your Administrator username and password will not allow you to log on. You know the username and password have not changed since last logon. What is the most likely cause of the problem?
A. Must use first password ever associated with Administrator
accountB. Must use username DSRESTORE and
Administrator password C. Must use restore mode password for
Administrator that you specified when you installed Active Directory
D. Must use an account other than Administrator that is a
member of the Domain Admins group
![Page 37: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/37.jpg)
You restart the system in Directory Services Restore Mode to restore Active Directory from a backup and are prompted for a username and password. Your Administrator username and password will not allow you to log on. You know the username and password have not changed since last logon. What is the most likely cause of the problem?
C. Must use restore mode password for Administrator that you specified when you installed Active Directory
![Page 38: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/38.jpg)
You perform a full backup each Friday and a differential backup on all other weekdays at 9 P.M. On Wednesday at 11 A.M., the drive holding the customer database fails. How would you go about restoring the data?A. Obtain full backup from Friday and
differential backup from Tuesday. Restore full backup, then restore differential backupB. Obtain full backup from Friday and
differential backup from Tuesday. Restore differential backup, then restore full backup C. Obtain full backup from Friday and
differential backups from Monday and Tuesday. Restore full backup, then restore differential backups from Monday and then Tuesday.D. Obtain full backup from Friday and
differential backups from Monday and Tuesday. Restore differential backups from Monday, then Tuesday, the full backup from Friday
![Page 39: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/39.jpg)
You perform a full backup each Friday and a differential backup on all other weekdays at 9 P.M. On Wednesday at 11 A.M., the drive holding the customer database fails. How would you go about restoring the data?
A.Obtain full backup from Friday and differential backup from Tuesday. Restore full backup, then restore
differential backup
![Page 40: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/40.jpg)
Describe the purpose and function of a baseline.
![Page 41: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/41.jpg)
Describe the purpose and function of a baseline.
Set of statistics, taken under various conditions, used for future comparison. Without a baseline, there is really no way to answer claims such as “The server is slow” or “The network is slow.” Baseline comparison allows you to determine if there is indeed an issue affecting performance.
![Page 42: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/42.jpg)
Describe a memory leak and the potential result of a leak occurring on the system.
![Page 43: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/43.jpg)
Describe a memory leak and the potential result of a leak occurring on the system. One of the most common conditions that cause memory-related problems. Result of a program allocating memory for use but not freeing up that memory when it is finished using it. Over time, computer’s free memory can be totally consumed, degrading performance and ultimately halting the system.
![Page 44: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/44.jpg)
Why are network performance issues the most difficult to track and solve?
![Page 45: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/45.jpg)
Why are network performance issues the most difficult to track and solve?
They are difficult to quantify, develop gradually, often unreported, intermittent, tuning is based on educated guesswork, and solutions are often hard to sell upper management.
![Page 46: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/46.jpg)
Explain difference between real-time and logged monitoring, and circumstances under which each is useful. What are examples of tools used for ?
![Page 47: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/47.jpg)
Explain difference between real-time and logged monitoring, and circumstances under which each is useful. What are examples of tools used for ?
Real-time uses tools like Task Manager and System Monitor that display a continuous stream of statistics about what the system is doing right now. Provides most current information but must be continually monitored. Useful to address immediate issues critical to system performance or those affecting a single user on the network.
![Page 48: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/48.jpg)
Explain difference between real-time and logged monitoring, and circumstances under which each is useful. What are examples of tools used for ?
Logged allows administrators to observe trends that develop over longer periods of time than those observed in real-time. Useful in determining if system performance has degraded over time an addressing less critical issues. Tools: Performance Logs and Alerts.
![Page 49: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/49.jpg)
What is the purpose of backing up data?
![Page 50: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/50.jpg)
What is the purpose of backing up data?
Back up data so we have copies of files available in case we are unable to access originals. Reasons for backing up data is because storage devices can fail, users can overwrite files by mistake, files can become corrupt, computers can get stolen, and we might need to look at an earlier version of a file.
![Page 51: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/51.jpg)
What is a bottleneck? What is a common network performance bottleneck?
![Page 52: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/52.jpg)
What is a bottleneck? What is a common network performance bottleneck? Hardware device or software component that limits the performance of the system. Every system has a bottleneck. Question is whether bottleneck is actually causing a performance issue. In most cases the process of improving the performance of a system is simply identifying the component that is causing a bottleneck and upgrading it. Common bottlenecks: increased server load, hardware failure, changed server roles
![Page 53: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/53.jpg)
What three elements should a backup solution include?
![Page 54: Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens](https://reader035.vdocument.in/reader035/viewer/2022081602/5519edfe5503464c588b45aa/html5/thumbnails/54.jpg)
What three elements should a backup solution include?
Backup device, backup software, and data that is to be backed up (and a plan to use backup tools).