RESTORING A FILE IN THIS PROCEDURE, YOU RESTORE THE FILE YOU MODIFIED...
2.
Which of the following System Monitor performance counters can you use to
determine whether the DNS server is the target of a DoS attack?
a.
Segments Retransmitted/Sec in the TCPv4 performance object
b.
Zone Transfer Failure in the DNS performance object
c.
Datagrams Received/Sec in the UDPv4 performance object
d.
Total Query Received/Sec in the DNS performance object
e.
Messages/Sec in the ICMP performance object
Chapter Summary
■
System Monitor is an MMC snap-in that monitors specific computer resources in
real time, displaying the information in Graph, Histogram, or Report view.
■
Performance Logs And Alerts is an MMC snap-in that uses System Monitor’s per
formance counters to capture information to log files over a long period of time.
■
Network Monitor is a protocol analyzer that can capture packets from the network
and analyze their contents in detail.
■
Network services such as DHCP, DNS, WINS, and RRAS all have various mecha
nisms you can use to track their statistics and ongoing activities, including log files,
status screens, and performance counters.
■
Server performance degradations are frequently caused by a bottleneck, that is, a
slowdown of a key component that prevents the system from performing up to its
potential.
■
When looking for the bottleneck on a server, check its four primary subsystems:
processor, memory, storage, and network.
■
A network backup solution consists of backup drives, backup software, and a
backup plan.
Chapter 6 Maintaining Server Availability
6
-
47
■
Incremental and differential backup jobs save tape by backing up only the files that
have changed since the last backup, based on the status of each file’s archive bit.
■
Performing regular test restores is a crucial part of backup administration.
■
Volume shadow copy is a Window Server 2003 feature that enables users to access
multiple copies of files they have accidentally deleted or damaged.
Exam Highlights
Before taking the exam, review the key points and terms that are presented below to
help you identify topics you need to review. Return to the lessons for additional prac
tice, and review the “Further Reading” sections in Part 2 for pointers to more informa
tion about topics covering the exam objectives.
Key Points
■
The Performance console can monitor specific computer resources in real time,
displaying the information in Graph, Histogram, or Report view. You can use Sys
tem Monitor to monitor network traffic by selecting performance counters corre
sponding to network interfaces, protocols, or applications.
and analyze their contents by displaying the values of the individual header fields
in each protocol.
■
The MMC consoles for the various Windows Server 2003 network services have a
variety of screens that enable you to monitor the operational status of the services.
Most of the services can also maintain logs and include performance counters that
you can use in System Monitor.
■
Server performance degradations are frequently caused by a bottleneck, that is, a
potential. When looking for the bottleneck on a server, check its four primary
subsystems: processor, memory, storage, and network, using the performance
counters provided in System Monitor.
■
Planning a network backup solution consists of selecting backup drives and
backup software, and devising a backup plan. Incremental and differential backup
jobs save tape by backing up only the files that have changed since the last
backup, based on the status of each file’s archive bit.
■
Automated System Recover is a disaster recovery feature included in Windows
Server 2003 that enables you to restore an entire computer without reinstalling the
operating system. Volume shadow copy is another feature that enables users to
access multiple copies of files they have accidentally deleted or damaged.
Key Terms
Promiscuous mode
An operational mode that enables a network interface adapter
to receive and process all the packets transmitted on the network, not just those
transmitted to or by the computer containing the adapter
Bottleneck
A condition in which a single component in a computer or on a network
is preventing the rest of the system from operating up to its full potential
Incremental backup
A type of backup job that copies only the files that have
changed since the last backup of any kind, and then resets the files’ archive bits
Differential backup
A type of backup job that copies only the files that have
changed since the last full backup, and does not reset the files’ archive bits
Questions and Answers
6
-
49
Questions and Answers
Lesson 1 Review
Page