comptiaa q1-4-2 Flashcards
Permissions and other security considerations need to be considered when selecting, installing and configuring —
software applications.
Reliability Monitor displays a log of system stability events, so you can see at a glance whether a particular application has stopped —
responding frequently.
Task Manager is where you can monitor utilization statistics in —
real time.
Resource Monitor shows an enhanced version of the sort of snapshot monitoring provided by Task Manager. You can see graphs of resource performance along with key statistics, such as threads started by a process or —
hard page faults/second.
Performance Monitor is used to configure detailed reports on different system statistics and log —
performance over time.
Counter Logs allow you to collect statistics about resources, such as memory, disk, and processor. These can be used to determine system —
health and performance.
Trace Logs can collect statistics about services, providing you with detailed reports about resource behavior. In essence, trace logs provide extensions to the Event Viewer logging data that would otherwise be —
inaccessible.
In Performance Monitor, you can create log files, referred to as Data Collector Sets, to record information for viewing at a —
later date.
Objects have counters representing different performance statistics and there can be multiple instances of the same —
type of object.
The System Log is a principal default Windows log file that contains information about service load failures, hardware conflicts, and —
driver load failures.
The Security Log is a principal default Windows log file that holds the audit —
data for the system.
The Application Log is a principal default Windows log file that contains information regarding application errors. There are many other logs stored under the Applications log. You would investigate these when troubleshooting a particular Windows service or —
third-party application.
The Setup is a principal default Windows log file that records events generated during —
installation.
Installation and deployment options is that most applications are installed from a set up file. The setup file packs the application’s executable(s), configuration files, and —
media files within it.