• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back

System and network administrators should perform ______ to avoid the risk of losing crucial network-accessed resources and business continuity.

performance monitoring

True or False? Effective network monitoring should be proactive and thorough.

True

Which of the following is NOT a protocol for monitoring network activity?




a. SNMP


b. SMTP


c. WMI


d. IMPI

b. SMTP

WMI is a(n) ______ that provides for the control and management of network devices and systems.

application program interface (API)

True or False? IPMI is a standard system interface that allows network administrators to connect to remote operating systems.

False

True or False? The standard utility for logging computer system messages is SMTP

False

A(n) ______ is automatically sent by a system resource to notify of a fault, failure, or potential issue.

alert notification

What is the percentage of a resource assigned to a process called?




a. Share


b. Reservation


c. Quota


d. Hard limit

a. Share

What is the specific percentage of a system resource allocated to a process called?




a. Share


b. Reservation


c. Quota


d. Hard limit

b. Reservation

A ______ sets an upper limit on the amount of a resource a process can consume.

hard limit

True or False? Monitoring systems use notification filters to avoid unnecessary notifications.

True

What establishes the acceptable levels of system performance against which system monitoring can measure actual performance?




a. Performance objects


b. Performance counters


c. Performance baseline


d. Performance quota

c. Performance baseline

Monitoring systems use performance objects and _____.

counters

True or False? A resource quota limits the amount of time a process can exceed the soft limit.

True

What technology or method can cloud service providers use to verify and control resource licensing utilization?




a. Device fingerprinting


b. Software fingerprinting


c. Biometric identification


d. User authentication

a. Device fingerprinting