RESTORING A FILE IN THIS PROCEDURE, YOU RESTORE THE FILE YOU MODIFIED...

2.

Which of the following System Monitor performance counters can you use to

determine whether the DNS server is the target of a DoS attack?

a.

Segments Retransmitted/Sec in the TCPv4 performance object

b.

Zone Transfer Failure in the DNS performance object

c.

Datagrams Received/Sec in the UDPv4 performance object

d.

Total Query Received/Sec in the DNS performance object

e.

Messages/Sec in the ICMP performance object

Chapter Summary

System Monitor is an MMC snap-in that monitors specific computer resources in

real time, displaying the information in Graph, Histogram, or Report view.

Performance Logs And Alerts is an MMC snap-in that uses System Monitor’s per­

formance counters to capture information to log files over a long period of time.

Network Monitor is a protocol analyzer that can capture packets from the network

and analyze their contents in detail.

Network services such as DHCP, DNS, WINS, and RRAS all have various mecha­

nisms you can use to track their statistics and ongoing activities, including log files,

status screens, and performance counters.

Server performance degradations are frequently caused by a bottleneck, that is, a

slowdown of a key component that prevents the system from performing up to its

potential.

When looking for the bottleneck on a server, check its four primary subsystems:

processor, memory, storage, and network.

A network backup solution consists of backup drives, backup software, and a

backup plan.

Chapter 6 Maintaining Server Availability

6

-

47

Incremental and differential backup jobs save tape by backing up only the files that

have changed since the last backup, based on the status of each file’s archive bit.

Performing regular test restores is a crucial part of backup administration.

Volume shadow copy is a Window Server 2003 feature that enables users to access

multiple copies of files they have accidentally deleted or damaged.

Exam Highlights

Before taking the exam, review the key points and terms that are presented below to

help you identify topics you need to review. Return to the lessons for additional prac­

tice, and review the “Further Reading” sections in Part 2 for pointers to more informa­

tion about topics covering the exam objectives.

Key Points

The Performance console can monitor specific computer resources in real time,

displaying the information in Graph, Histogram, or Report view. You can use Sys­

tem Monitor to monitor network traffic by selecting performance counters corre­

sponding to network interfaces, protocols, or applications.

and analyze their contents by displaying the values of the individual header fields

in each protocol.

The MMC consoles for the various Windows Server 2003 network services have a

variety of screens that enable you to monitor the operational status of the services.

Most of the services can also maintain logs and include performance counters that

you can use in System Monitor.

Server performance degradations are frequently caused by a bottleneck, that is, a

potential. When looking for the bottleneck on a server, check its four primary

subsystems: processor, memory, storage, and network, using the performance

counters provided in System Monitor.

Planning a network backup solution consists of selecting backup drives and

backup software, and devising a backup plan. Incremental and differential backup

jobs save tape by backing up only the files that have changed since the last

backup, based on the status of each file’s archive bit.

Automated System Recover is a disaster recovery feature included in Windows

Server 2003 that enables you to restore an entire computer without reinstalling the

operating system. Volume shadow copy is another feature that enables users to

access multiple copies of files they have accidentally deleted or damaged.

Key Terms

Promiscuous mode

An operational mode that enables a network interface adapter

to receive and process all the packets transmitted on the network, not just those

transmitted to or by the computer containing the adapter

Bottleneck

A condition in which a single component in a computer or on a network

is preventing the rest of the system from operating up to its full potential

Incremental backup

A type of backup job that copies only the files that have

changed since the last backup of any kind, and then resets the files’ archive bits

Differential backup

A type of backup job that copies only the files that have

changed since the last full backup, and does not reset the files’ archive bits

Questions and Answers

6

-

49

Questions and Answers

Lesson 1 Review

Page