Test your basic knowledge |

MCTS: Monitoring Computers

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Present only on DCs - the ______ Data Collector Set logs kernel trace data - AD trace data - performance counters - and AD registry configuration.






2. To open Reliability Monitor - right-click the ______ node in Server Manager and then click View System Reliability.






3. With ______ subscriptions - the collecting computer contacts the source computers to retrieve events.






4. At a command prompt with administrative privileges - run the following command to configure the Windows Remote Management service on the forwarding computer:






5. What command should you run to configure a collecting computer?






6. Computers that have no errors and no new software installations are considered stable and can achieve the maximum system stability index of ______.






7. After using a Data Collector Set to gather information and then stopping the Data Collector Set - you can view a summary by right-clicking the Data Collector Set and then choosing ______.






8. Find an example of the event in Event Viewer. Then - right-click the event and click ______. A wizard will guide you through the process.






9. The log files are contained in two subnodes:






10. Check the Applications And Services LogsMicrosoftWindowsEventlog-ForwardingPluginOperational event log and verify that the subscription was created successfully. Event ID 100 indicates a new subscription whereas Event ID ______ indicates a subscripti






11. This Windows log contains core system events. Other system events are contained with Applications And Services Logs.






12. ______ tracks a computer's stability.






13. This Windows log contains events generated by applications.






14. What command should you run to configure a forwarding computer?






15. To create a custom Data Collector Set - follow these steps:






16. To configure a computer running Vista - Win 7 - Win Srvr 2008 - or Win Srvr 2008 R2 to collect events - open a command prompt with administrative privileges. Then - run the following command to configure the Windows Event Collector service:






17. The wecutil ______ parameter deletes a subscription.






18. The Minimize Bandwidth and Minimize Latency options of Event Subscriptions - both batch a default number of items at a time. You can determine the value of this default by typing the following command at a command prompt:






19. Event forwarding uses ______ or ______ to send events from a forwarding computer to a collecting computer.






20. With ______ subscriptions - the forwarding computers contact the collecting computer.






21. The wecutil ______ parameter defines subscription configuration. To specify a custom interval for a subscription - run the following commands: ______.






22. Windows Logs contains five subnodes:






23. Custom views are filters that can display events from ______.






24. Microsoft provides ______ - a powerful protocol analyzer - as a free download.






25. To verify that the forwarding computer has the Windows Remote Management listener properly configured - from an elevated command prompt - run the following command:






26. You can open Event Viewer from within ______ by selecting the DiagnosticsEvent Viewer node.






27. This Windows log contains events generated while installing and updating Windows.






28. Windows Server 2008 R2 includes several built-in Data Collector Sets located at Data Collector SetsSystem:






29. To configure Event Forwarding to use HTTPS - create a Windows Firewall exception for TCP port 5986 and run the following command:






30. To use a filter capture - type the filter capture in quotation marks after the /capture parameter. For example - the following command captures only DNS traffic:






31. This captures all traffic on all network interfaces and saves it to a file named Filename.cap. When you are finished capturing - press ______.






32. To run a file named Respond.exe whenever event 177 is published in the System event log - run the following command:






33. Event forwarding uses HTTP or HTTPS to send events from a forwarding computer to a collecting computer. Instead of using the standard TCP ports 80 and 443 - HTTP and HTTPS use ports ______ - respectively.






34. Logs all the info included in the System Performance Data Collector Set - plus detailed system information. Use the ______ Data Collector Set when troubleshooting reliability problems such as problematic hardware - driver failures - or Stop errors (a






35. This Windows log contains events forwarded to this computer from other computers.






36. ______ graphically shows real-time performance data - including processor utilization - network bandwidth usage - and thousands of other statistics.






37. Because the forwarding computer must have HTTP and possibly HTTPS available - you can attempt to connect to it from the collecting computer by using Windows Internet Explorer






38. You can create two types of subscriptions:






39. To use a Data Collector Set - right-click it - and then choose ______.






40. To capture network traffic from a command prompt - switch to the Network Monitor installation folder (C:Program FilesMicrosoft Network Monitor 3 by default) and run the following command:






41. Present only on computers with wireless capabilities - the ______ Data Collector Set logs the same info as the LAN Diagnostics Data Collector Set - plus info relevant to troubleshooting wireless network connections.






42. Logs processor - disk - memory - and network performance counters and kernel tracing. Use the ______ Data Collector Set when troubleshooting a slow computer or intermittent performance problems.






43. One of the most useful ways to use Task Scheduler is to launch a task in response to a specific event type that appears in Event Viewer. You can respond to events in three ways:






44. ______ gather system information - including configuration settings and performance data - and store it in a data file.






45. The Reliability Monitor displays data gathered by the Reliability Analysis Component (RAC) - which is implemented using ______ command.






46. The wecutil ______ parameter displays the status of subscriptions.






47. With ______ - you can send events that match specific criteria to an administrative computer - allowing you to centralize event management.






48. To trigger a task when an event occurs - follow one of these three procedures:






49. The wecutil ______ parameter performs the initial configuration required to collect events. If a subscription already exists - the necessary configuration must have already been performed.






50. Although you can create data collector sets using the Logman tool - creating them using the Data Collector Sets console is easier. You can then run the data collector set by using the following command: