Monitoring the Network Flashcards
Where does Windows Server store IIS log files?
c: \logs
c: \windows\system32\logfiles
c: \iislogs
c:\windows\system32\logfiles
The IIS log files are stored in the c:\windows\system32\logfiles folder. There is then a separate subfolder for each service. If you host multiple websites on the web server, there will be a folder per website with the logs for that website
Internet downloads have become extremely slow, and Bob would like to monitor activity and get some bandwidth statistics. What tool should he use?
PPTP
IPSEC
SNMP
SNMP
SNMP is a protocol that can be loaded on devices and systems that allows you to monitor or manage the device across a TCP/IP network. SNMP allows you to review information about a device, including statistics such as bandwidth utilization
Jeff is responsible for managing three Linux servers and two Windows servers. He would like to review all logs on these servers from a central location. What technology should he use?
Syslog
SNMP
Baselines
Syslog
Syslog is a technology that allows you to configure each device and system on the network to send their log data to a syslog server
Bob is the network administrator for Company ABC and is troubleshooting why one of his switches is constantly shutting down at the same time each day. Which of the following tools should Bob use to help diagnose the problem?
Port scanner
Environmental monitor
Cable tester
Environmental monitor
It is possible that the switch is shutting down at the same time each day because it is overheating. You can use an environmental monitor or temperature monitor to determine if the device is overheating
A few of the systems on your network are performing slowly, and you suspect that there may be a virus on the network. Which of the following tools could you use to capture and analyze the network traffic?
Port scanner
System Monitor
Packet sniffer
Packet sniffer
A packet sniffer is used to capture and analyze network traffic. You can use the packet sniffer to locate suspicious traffic on the network, such as traffic generated by a virus
Jeff, a senior network administrator, is monitoring network traffic and notices that the network is running at about 74 percent capacity. Which of the following could be used to determine if 74 percent capacity is normal or not?
Syslog
SNMP
Baselines
Baselines
A baseline is recorded when the system is operating normally so that you can compare to the baseline at a later time if the system is not performing well
You are monitoring network traffic and notice a large amount of packet loss. Which of the following could cause this large amount of packet loss?
Faulty network hardware
Port mirroring
Port security
Faulty network hardware
Faulty network hardware is one of the reasons why you can have a large amount of packet loss