Test your basic knowledge |

MCTS: Monitoring Computers

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Present only on computers with wireless capabilities - the ______ Data Collector Set logs the same info as the LAN Diagnostics Data Collector Set - plus info relevant to troubleshooting wireless network connections.






2. ______ graphically shows real-time performance data - including processor utilization - network bandwidth usage - and thousands of other statistics.






3. ______ tracks a computer's stability.






4. This captures all traffic on all network interfaces and saves it to a file named Filename.cap. When you are finished capturing - press ______.






5. The wecutil ______ parameter performs the initial configuration required to collect events. If a subscription already exists - the necessary configuration must have already been performed.






6. Computers that have no errors and no new software installations are considered stable and can achieve the maximum system stability index of ______.






7. To configure a computer running Vista - Win 7 - Win Srvr 2008 - or Win Srvr 2008 R2 to collect events - open a command prompt with administrative privileges. Then - run the following command to configure the Windows Event Collector service:






8. After using a Data Collector Set to gather information and then stopping the Data Collector Set - you can view a summary by right-clicking the Data Collector Set and then choosing ______.






9. Event forwarding uses HTTP or HTTPS to send events from a forwarding computer to a collecting computer. Instead of using the standard TCP ports 80 and 443 - HTTP and HTTPS use ports ______ - respectively.






10. To trigger a task when an event occurs - follow one of these three procedures:






11. Custom views are filters that can display events from ______.






12. To run a file named Respond.exe whenever event 177 is published in the System event log - run the following command:






13. Logs all the info included in the System Performance Data Collector Set - plus detailed system information. Use the ______ Data Collector Set when troubleshooting reliability problems such as problematic hardware - driver failures - or Stop errors (a






14. The Minimize Bandwidth and Minimize Latency options of Event Subscriptions - both batch a default number of items at a time. You can determine the value of this default by typing the following command at a command prompt:






15. Logs processor - disk - memory - and network performance counters and kernel tracing. Use the ______ Data Collector Set when troubleshooting a slow computer or intermittent performance problems.






16. This Windows log contains events generated by applications.






17. In Win Srvr 2008 and Win Srvr 2008 R2 - you can also simply select the ______ node in the console tree of Event Viewer to confiture the collecting computer.






18. Event forwarding uses ______ or ______ to send events from a forwarding computer to a collecting computer.






19. What command should you run to configure a forwarding computer?






20. One of the most useful ways to use Task Scheduler is to launch a task in response to a specific event type that appears in Event Viewer. You can respond to events in three ways:






21. This Windows log contains auditing events that Windows adds when a user accesses or attempts to access a resource that has been configured for auditing.






22. Using event forwarding requires you to configure both the forwarding and collecting computers. First - you must start the following services on both the forwarding and collecting computer:






23. In Task Scheduler - click Create Basic Task in the actions pane. On the Trigger page of the wizard - select ______. Then - specify the Log - Source - and Event ID.






24. Windows Logs contains five subnodes:






25. To open Reliability Monitor - right-click the ______ node in Server Manager and then click View System Reliability.






26. At a command prompt with administrative privileges - run the following command to configure the Windows Remote Management service on the forwarding computer:






27. You can open Event Viewer from within ______ by selecting the DiagnosticsEvent Viewer node.






28. Present only on DCs - the ______ Data Collector Set logs kernel trace data - AD trace data - performance counters - and AD registry configuration.






29. This Windows log contains core system events. Other system events are contained with Applications And Services Logs.






30. To use a Data Collector Set - right-click it - and then choose ______.






31. To capture network traffic from a command prompt - switch to the Network Monitor installation folder (C:Program FilesMicrosoft Network Monitor 3 by default) and run the following command:






32. The log files are contained in two subnodes:






33. To create a custom Data Collector Set - follow these steps:






34. Check the Applications And Services LogsMicrosoftWindowsEventlog-ForwardingPluginOperational event log and verify that the subscription was created successfully. Event ID 100 indicates a new subscription whereas Event ID ______ indicates a subscripti






35. To configure Event Forwarding to use HTTPS - create a Windows Firewall exception for TCP port 5986 and run the following command:






36. Find an example of the event in Event Viewer. Then - right-click the event and click ______. A wizard will guide you through the process.






37. Microsoft provides ______ - a powerful protocol analyzer - as a free download.






38. When you create a custom view - Event Viewer saves it within the ______ node so that you can quickly view the same set of events.






39. The Reliability Monitor displays data gathered by the Reliability Analysis Component (RAC) - which is implemented using ______ command.






40. Windows Server 2008 R2 includes several built-in Data Collector Sets located at Data Collector SetsSystem:






41. You can create two types of subscriptions:






42. This Windows log contains events forwarded to this computer from other computers.






43. Because the forwarding computer must have HTTP and possibly HTTPS available - you can attempt to connect to it from the collecting computer by using Windows Internet Explorer






44. What command should you run to configure a collecting computer?






45. With ______ - you can send events that match specific criteria to an administrative computer - allowing you to centralize event management.






46. With ______ subscriptions - the forwarding computers contact the collecting computer.






47. With event forwarding - only these Windows versions can act as collecting computers:






48. The wecutil ______ parameter deletes a subscription.






49. Network Monitor can capture only traffic that the ______ receives.






50. To use a filter capture - type the filter capture in quotation marks after the /capture parameter. For example - the following command captures only DNS traffic: