Monitoring the Network Flashcards

1
Q

Where does Windows Server store IIS log files?

c: \logs
c: \windows\system32\logfiles
c: \iislogs

A

c:\windows\system32\logfiles

The IIS log files are stored in the c:\windows\system32\logfiles folder. There is then a separate subfolder for each service. If you host multiple websites on the web server, there will be a folder per website with the logs for that website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internet downloads have become extremely slow, and Bob would like to monitor activity and get some bandwidth statistics. What tool should he use?

PPTP

IPSEC

SNMP

A

SNMP

SNMP is a protocol that can be loaded on devices and systems that allows you to monitor or manage the device across a TCP/IP network. SNMP allows you to review information about a device, including statistics such as bandwidth utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Jeff is responsible for managing three Linux servers and two Windows servers. He would like to review all logs on these servers from a central location. What technology should he use?

Syslog

SNMP

Baselines

A

Syslog

Syslog is a technology that allows you to configure each device and system on the network to send their log data to a syslog server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bob is the network administrator for Company ABC and is troubleshooting why one of his switches is constantly shutting down at the same time each day. Which of the following tools should Bob use to help diagnose the problem?

Port scanner

Environmental monitor

Cable tester

A

Environmental monitor

It is possible that the switch is shutting down at the same time each day because it is overheating. You can use an environmental monitor or temperature monitor to determine if the device is overheating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A few of the systems on your network are performing slowly, and you suspect that there may be a virus on the network. Which of the following tools could you use to capture and analyze the network traffic?

Port scanner

System Monitor

Packet sniffer

A

Packet sniffer

A packet sniffer is used to capture and analyze network traffic. You can use the packet sniffer to locate suspicious traffic on the network, such as traffic generated by a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jeff, a senior network administrator, is monitoring network traffic and notices that the network is running at about 74 percent capacity. Which of the following could be used to determine if 74 percent capacity is normal or not?

Syslog

SNMP

Baselines

A

Baselines

A baseline is recorded when the system is operating normally so that you can compare to the baseline at a later time if the system is not performing well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are monitoring network traffic and notice a large amount of packet loss. Which of the following could cause this large amount of packet loss?

Faulty network hardware

Port mirroring

Port security

A

Faulty network hardware

Faulty network hardware is one of the reasons why you can have a large amount of packet loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly