ITN 200 MOD 12

¡Supera tus tareas y exámenes ahora con Quizwiz!

Margret is a support technician working at Mercorp Inc. She tells the interns that the easiest way to stop a rogue process from causing performance issues is to right click the process in Task Manager and click End Task. An intern asks her what he should do if the specific process restarts even after selecting End Task. What can Margret tell the intern if the process issue is caused by a third-party application and it has no solution yet? Run the same process under a different user Use the process ID and search online for information regarding the process Create a dump file and share it with the in-house development team Check with the program vendor for an update

Check with the program vendor for an update

Lea's organization develops a cloud-based storage application. While running the application on the local server, she notices that a process run by the application consumes excess amounts of memory, which in turn leads to new performance issues. She gets the process ID from Task Manager to search for possible solutions online. However, she is not successful. What should Lea have done instead? Troubleshoot the issue and modify the programming code of the application herself Check the Resource Monitor to check the amount of memory used by the process Create a dump file and share it with the development team so that they can fix the issue Share the process ID with a support technician and get the issue sorted

Create a dump file and share it with the development team so that they can fix the issue

After experiencing several issues with an Active Directory domain controller, you have decided to perform a restore operation on the Active Directory. Which of the following options on the Advanced Boot Options menu should be used to perform the restoration? Safe Mode with Networking Directory Services Repair Mode Repair Your Computer Active Directory Emergency Maintenance Mode

Directory Services Repair Mode

What key should be pressed as soon as the computer boots to enter Safe Mode? Ctrl+Alt+Del F8 Ctrl+Shift+Del Esc

F8

The terms "program" and "process" are one and the same. True False

False

There are two types of event logs in Windows Server 2019, Microsoft logs and Windows logs. True False

False

Andrade is a systems administrator. He goes through several event logs with thousands of events on a regular basis to troubleshoot system issues. What is the easiest way to limit the events to only those that are relevant to a specific problem? He can search for the next occurrence of a specific event in the event log. He can use the Get-EventLog cmdlet in Windows PowerShell to view the events in an event log. He can search for specific events related to a problem using an event ID. He can use the Filter Current Log option in the Actions pane in Event Viewer.

He can use the Filter Current Log option in the Actions pane in Event Viewer.

Your organization has a Windows Server 2019 system called SERVERX. It has come to your notice that several computers have tried to access a file in the server and failed in the attempt. You check the Security event log to check how many of such events attempts have been made in the past six months. The log has only stored information pertaining to the past few days. What can you do to ensure that the log stores more information? View the event log on a day-to-day basis Increase the size limit of the event log Click Clear Log from the Actions menu Take a backup of the event log every week

Increase the size limit of the event log

You are attempting to troubleshoot an issue that is preventing you from logging in to your Windows Server 2019 system by using the information in the Windows Registry used the last time the system successfully booted. Which of the following options would you choose from the Advanced Boot Options menu? Enable low-resolution video Last Known Good Configuration Safe Mode Start Windows Normally

Last Known Good Configuration

You are troubleshooting a network latency issue in your organization. You identify a router as the root cause of the problem. The router was rejecting IP packets sent from computers requesting a service from a Windows Server 2019 system. What will you do to solve this issue? Reinstall Windows Server 2019. Reboot the router. Disable the firewall. Reboot the computers sending the packets.

Reboot the router.

You have created a data collector set called SERVERX Data Collector set. As a system administrator, you want to restrict other users from accessing the results of the data set. Which of the following options under the properties dialog box will you use? General Directory Schedule Security

Security

A computer is running multiple applications simultaneously. They all demand large amounts of processor time, which affects the processing speed of the system. Which of the following options will you use to identify and terminate the process that is consuming the highest processor time? Click the Memory column in the Processes tab of Task Manager Select the Processes tab of Task Manager and click the CPU column Check the User tab to identify the user who started all the processes Select the Services tab and restart stopped services

Select the Processes tab of Task Manager and click the CPU column

Martha is configuring the Network Policy and Access Services server role to configure a Windows Server 2019 system as a RADIUS server so that it can be used with the 802.1X Wireless. After this, she is facing some issues activating the server in Active Directory. She thinks that there were issues with the installation. Which of the following event logs should Martha check to examine events specific to the installation? Security Application Setup System

Setup

Joshua works as a systems administrator. A computer running Windows 2019 Server crashes. However, he is not able to find the root cause of the problem. If the root cause of the problem is processor overload, which of the following should Joshua investigate to troubleshoot the issue? The Security event log The Hardware Events event log The Application event log The System event log

The Hardware Events event log

Your organization launches a new web application for video editing. Multiple users can access the application at the same time and edit their videos online. What will you use to monitor the amount of memory being used by the application in real time? The Reliability Monitor Data Collector Sets Event Viewer The Performance Monitor

The Performance Monitor

The hard disk of a computer running the Windows Server 2019 operating system fails. A colleague tells you that the data on the hard disk can be regenerated as soon as it is replaced with a new one. Can you identify why this solution is feasible? The system need not be powered down to replace the hard disk. The operating system was backed up prior to the disk failure. The Windows system uses a RAID level 5 configuration. The corrupt hard disk contained the boot volume.

The Windows system uses a RAID level 5 configuration.

The programs running on the client systems in your organization are not able to access a service on the server. The problem is not with the server because the network services are running and you are able interact with the network service on your local machine. What do you see as other possible issues with the server access? The client programs are not using the non-standard port number used by the network service. The network service might have failed to start when the client systems were requesting the service. The network service is not responding to the requests from a local machine. There were other client systems that were accessing the network service.

The client programs are not using the non-standard port number used by the network service.

Ahmed, a network administrator, is looking at the events added to a Windows Server 2019 system log in the Event Viewer. He notices three events being highlighted with a yellow exclamation mark. The events were related to a remote access attempt. If Ahmed were to treat this as a warning sign, what kind of issues should he anticipate? The system may become unstable. The services running on the server may not function properly. Users may be prevented from accessing the system. The functionality of the system can be affected.

The functionality of the system can be affected.

Your organization has installed a new application that fetches project details from a database installed on a Windows Server 2019 system to perform financial computations. A bug in the application causes the program to fetch details of incorrect project IDs. The network administrator tries reinstalling the operating system, but the issue remains to be fixed. Can you identify why reinstalling the operation system did not work? The administrator changed the boot volume while installing the operating system. The problem was with a device driver and not with the operating system. The issue was with the software and not the operating system. There was an issue in the installation of the operating system.

The issue was with the software and not the operating system.

You are using the Performance Monitor in Windows Server 2019 to collect information regarding the system's performance. What does the % Idle Time counter indicate? The percentage of time a storage device was not performing a read or write function The percentage of time the processor spends executing processes that do not require privileged access The percentage of free space on a volume The percentage of time the processor spends responding to interrupts

The percentage of time a storage device was not performing a read or write function

Your organization runs several applications that store information on a specific volume on a Windows 2019 Server system. Of late, the applications have become slow and fail to perform as they did earlier. The performance improves after the server administrator defragments the volume. Can you identify what the problem must have been? The applications could not connect to the server. The applications were not configured properly. The hard disk was too slow. The space for file cache was not sufficient.

The space for file cache was not sufficient.

Monitoring is a time-consuming task. True False

True

Performance Monitor allows one to track how individual system resources are being used. True False

True

The ping utility is used to test the connectivity between two devices on a network. True False

True

The workstations in your organization have been upgraded with the latest GPUs. To save costs, the company has procured a brand that is not widely known in the market. To install the drivers, the system administrator reboots the system using the Disable Early Launch Anti-Malware Driver option in the Advanced Boot Options menu. Why do you think this step was required to install the driver? Rebooting helps scan for malwares in the driver at boot time. The driver can be installed only if the system is booted in Safe Mode. The driver did not have a valid digital signature. Windows Defender may have considered the driver to be suspicious.

Windows Defender may have considered the driver to be suspicious.

You are troubleshooting a hard disk error in a Windows Server 2019 system. You are not able to identify the root cause of the problem. A colleague suggests that you look at the system event log for more information. Is your colleague right about the system log? Why? Yes. Events related to hardware issues are usually recorded in the system event log. No. Issues related to hard disk errors are stored in the application event log. Yes. Events from the software applications using the hard disk will be stored in the system event log. No. A Windows Server 2019 system does not use event logs.

Yes. Events related to hardware issues are usually recorded in the system event log.

What command can you use to determine if a network service is listening on the correct port number? netstat -a tracert ping Test-NetConnection

netstat -a


Conjuntos de estudio relacionados

Regulations and Facilities-RATS Final Exam Review

View Set

Health Assessment Questions (practice)

View Set

Chapter 1 - Information and Network Security Concepts

View Set

Lecture 17: Aging: Physiological and evolutionary explanations (Learning Objectives and Questions)

View Set