Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
System and network administrators should perform ______ to avoid the risk of losing crucial network-accessed resources and business continuity. |
performance monitoring |
|
True or False? Effective network monitoring should be proactive and thorough. |
True
|
|
Which of the following is NOT a protocol for monitoring network activity? a. SNMP b. SMTP c. WMI d. IMPI |
b. SMTP
|
|
WMI is a(n) ______ that provides for the control and management of network devices and systems. |
application program interface (API)
|
|
True or False? IPMI is a standard system interface that allows network administrators to connect to remote operating systems. |
False
|
|
True or False? The standard utility for logging computer system messages is SMTP |
False
|
|
A(n) ______ is automatically sent by a system resource to notify of a fault, failure, or potential issue. |
alert notification
|
|
What is the percentage of a resource assigned to a process called? a. Share b. Reservation c. Quota d. Hard limit |
a. Share
|
|
What is the specific percentage of a system resource allocated to a process called? a. Share b. Reservation c. Quota d. Hard limit |
b. Reservation
|
|
A ______ sets an upper limit on the amount of a resource a process can consume. |
hard limit
|
|
True or False? Monitoring systems use notification filters to avoid unnecessary notifications. |
True
|
|
What establishes the acceptable levels of system performance against which system monitoring can measure actual performance? a. Performance objects b. Performance counters c. Performance baseline d. Performance quota |
c. Performance baseline
|
|
Monitoring systems use performance objects and _____. |
counters
|
|
True or False? A resource quota limits the amount of time a process can exceed the soft limit. |
True
|
|
What technology or method can cloud service providers use to verify and control resource licensing utilization? a. Device fingerprinting b. Software fingerprinting c. Biometric identification d. User authentication |
a. Device fingerprinting
|