Module2Quiz1 Flashcards

1
Q

What is the role of the svchost.exe process on a running system?

A

It is a vital process for running .dll files that provide a foundation for Windows operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What term is used to describe the number of bytes of memory a process has designated for use and that are promised to a designated portion of the page file?

A

Committed memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(True or False) The WinDBG Microsoft utility can be used to process dump files created by processes.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What statement regarding the use of virtual memory in Windows Server is accurate?

A

Virtual memory usage involves a hit to performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are attempting to recover from an issue that is preventing you from logging in to your Windows Server 2016 system, and are about to utilize the Last Known Good Configuration boot option. Where is this configuration information stored in the Registry?

A

HKEY_LOCAL_MACHINE\System\CurrentControlSet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens when two devices end up with conflicting IRQ assignments?

A

Both devices become inoperable until new IRQs are assigned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What logs should you check in Event Viewer if you suspect that a service failure might be due to the Windows Firewall configuration?

A

Admin logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the % Privileged Time counter represent?

A

It is the amount of time spent by the CPU for system activities in privileged mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(True or False) The best way to reboot for clearing a temporary error is to turn the power off, wait several seconds for the hard disks to fully come to a stop, then turn on the power.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(True or False) When using the BPA to generate a report and problems are found, analysis of each role yields a report that shows four levels of severity.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A Server 2019 installation is crashing and failing to create a crash dump file. What is the most likely cause for the failure to create the dump file?

A

The paging file is disabled on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When viewing logs in the Event Viewer, what symbol is used to indicate that log is an error log entry?

A

A red circle with a white exclamation point in the middle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is the priority at which a process runs normally set?

A

The process priority is always determined by the system, and is always set to normal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(True or False) Instances are the components of a performance object that monitor a specific type of event.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is NOT one of the four main categories that are monitored by Resource Monitor?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is NOT one of the tasks that can be performed using the Device Manager?

A

Virtual devices can be installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What Registry key contains profile information for each user who has signed in to a computer?

A

HKEY_USERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The templates used by the Data Collector Sets tool are stored using what data format on the local computer?

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A type of event log that gives the system administrator information about a specific problem and its causes, and might also suggest how to solve the problem.

A

Admin log

20
Q

An event log that records information about how software applications are performing.

A

Application log

21
Q

An event log used by application developers to help trace problems in programs so they can fix program code or program structures.

A

Debug log

22
Q

Contains events recorded by remote computers and forwarded to one computer, which is called the collector computer.

A

forwarded events log

23
Q

A type of event log that tracks occurrences of specific operations, such as when a disk drive is added.

A

operational log

24
Q

A boot mode that enables Windows Server to be booted using the most generic default settings, such as for the display, disk drives, and pointing device-and only those services needed to boot a basic configuration.

A

Safe mode

25
Q

An event log that records access and security information about logon accesses, file, folder, and system policy changes.

A

Access log

26
Q

An event log that contains a record of installation events, such as installing a role or feature through Server Manager.

A

Setup log

27
Q

An event log that records information about system-related events such as hardware errors, driver problems, and hard drive errors.

A

System log

28
Q

A shared folder set up when Active Directory is installed that contains scripts, Group Policy Objects (GPOs), and software distribution files, several of which are needed for domain access. SYSVOL folders are replicated among DCs.

A

SYSVOL

29
Q

A measurement standard for hardware or software used to establish performance measures under varying loads or circumstances.

A

benchmark

30
Q

A group of hosts that share the same SNMP services.

A

community

31
Q

Used by Performance Monitor, a measurement technique for an object, for example, for measuring the processor performance by percentage in use.

A

counter

32
Q

A combination of techniques for gathering performance and diagnostic data that is rendered in a report or log format. The basic data gathering techniques can be one or a combination of performance counters, event traces, and system configuration data.

A

data collector set

33
Q

A resource, such as a file, is used by a program that has its own identification so the program can access it.

A

handle

34
Q

Output of information gathered via Performance Monitor objects, counters, and instances configured within a data collector set.

A

performance counter report

35
Q

Used for network management and performance monitoring on TCP/IP-based networks.

A

SNMP

36
Q

A block of program code executing within a running process.

A

Thread

37
Q

Capture of a specific event when it occurs, such as a page fault or input to a disk.

A

Trace

38
Q

A specific situation or event detected by SNMP that a network administrator may want to be warned about or to track via network management software, for example, when a network device is unexpectedly down or offline.

A

Trap

39
Q

What type of applications or programs might not work with Data Execution Prevention (DEP) enabled?

A

Programs that utilize dynamic code generation.

40
Q

What is the general rule for configuring the initial size of a paging file?

A

The paging file should be 1.5 times the amount of RAM installed.

41
Q

What process represents the Windows kernel and system process on a running Windows 2016 Server installation?

A

NtKrnl

42
Q

(True or False) The System File Checker is useful in recovering system files that have been corrupted because of a hardware power problem or power failure.

A

True

43
Q

How is the priority at which a process runs normally set?

A

The process priority is normally set in the program code of the application. If not specified, it is run at normal priority.

44
Q

What is NOT one of the available priorities that can be assigned to a process?

A

Critical

45
Q

(True or False) Server performance is improved if the paging file configured for the system is placed on the boot partition.

A

False