• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
What topics does this objective cover?
- Configuring and analyzing event logs
- Configuring Task Manager
- Monitoring system resources
- Optimizing networking performance
- Configuring event subscriptions
- Optimizing the desktop environment
- Configuring indexing options
What new capabilities did Microsoft announce were going to be incorporated into Task Manager for Windows 8?
-Clearer relationship between apps and processes
-Easy- to-read performance metrics per process
-Expanded PC performance information, similar to Resource Monitor default view.
-App performance history
-List of Startup programs, with option to disable
Although Msconfig.exe is still present, what does the redundant Start-Up tab inform you to do?
Open up Task Manager to configure start up items.
What does the heat map with in Task Manager do?
Graphically highlights the largest values.
What in the Task Manager is useful when trouble shooting Windows 8.
The Details tab. Identify processes and right clicking give many tools.
Where can you run Resource Monitor?
The start menu or Run command. The executable is resmon.exe.
Why might the Resource Monitor not be used very often?
Because of all the enhancements made to Task Manager.
What are the five key aspects of hardware that are scored in the Windows Experience Index (WEI)?
-Processor
-Memory (RAM)
-Graphics
-Gaming graphics
-Hard disk
Which sub score determines the overall score in the WEI?
The lowest.
Which version of W8 does not display WEI?
Windows RT (mobile version)
Performance Monitor
Allows IT pros to monitor - at a very low level - the activity of their computers, either in read-time monitoring or by building collector sets that are designed to store a configuration and be rerun at defined times.
How do you add or delete additional counters within the Performance Monitor?
You use the green plus and red X buttons.
How do you add a counter from a remote computer?
Use the Select counter from computer dialog.
How are the reports categorized in the Performance Monitor tree pane?
User Defined and System reports.
How do you create a custom Data Collector Set?
Right-click the User Defined node, select New, and the select Data Collector Set.
What in the Data Collector report will you be able to utilize?
Drill into the data or view the performance graph.
Performance Counter - %Processor Time
Bottleneck - Measures how busy the processor is. Apart from bursts of activity, constant operation at greater than 80 percent is a sign of an overworked or under powered processor. Consider upgrading the processor to a faster unit or adding additional processors/cores.
Performance Counter - Page faults/sec
If memory isn't available when the processors call for it, page faults can occur. If the page/sec is greater than 20, add more memory to the system.
Performance Counter - Page/sec
Increase the memory available if the value is above 1.5.
Performance Counter - %Avg. Disk Queue Length
Some queuing is acceptable, but if the average value is 2 or higher, consider installing a faster disk drive such as an SSD.
Performance Counter - Interrupts/sec
Interrupts relate to the requests that the processor is responding to. A figure less than 1000/sec is acceptable; otherwise, investigate potential hardware failure or driver issues.
What was Action Center called in XP SP2?
Security Center.
What are the are the Action Center additions that include support for new features....
-Windows SmartScreen
-Microsoft account and Trust this PC
-File History
-Drive Status
-Status
-Startup apps
-Storage Spaces
-Advanced recovery tools
What are the recorded event results are shown on the graph in the Reliability Monitor.
Application failures (severe)
Windows failures (severe)
Miscellaneous failures (severe)
Warnings
Informational event (not necessarily issues)
When is it a good time to create a restore point or back up?
After you create a stable benchmark in the Reliability Monitor
What are the three issues related to networking?
Working, broken, or intermittent.
What are the key points for achieving reliability and optimal networking that a modern computer expects?
Updated driver for nic's and Wi-Fi Card
Flash router and/or moden with most recent ROM.
Good quality Ethernet cabling and route away from energy sources
Consider updating Wi-fie router each decade
What has been rewritten in TCP/IP for W8 to increase and retain?
Performance and reliability.
Backward compatibilty
If a network becomes slow or unresponsive (intermittent/regular occurrence), it is likely internal. What are the likely issues?
A failing component
A broken or loos cable
Virus/malware
A corrupt driver
Interference (power source) or obstacle
Security settings not configured properly
Wi-Fi antenna issues, such as misalignment.
What potential network issues maybe outside your direct influence?
Increase internet volume (users)
Changes to the service provision or contention ratio from ISP
Congestion/traffic overload on external network.
What are the two main types or logs in the Event Viewer?
Windows logs.
Application and services logs.
1. These logs record system events related to applications, security, setup, and system components. The Windows logs folder contains the following logs: Application, Security, Setup, System, and Forwarded Events.
2. These logs are generated by specific applications or services to record specific events.
What is a System log?
The first log that you view when you are diagnosing a system problems.
Event Viewer log entry - Level: Information
An informational event.
Event Viewer log entry - Level: Audit Success
An event related to the successful execution of an audit-related action
Event Viewer log entry - Level: Audit Failure
An event related to the failed execution of an audit-related action
Event Viewer log entry - Level: Warning
An event that warns that problems are occurring on the computer
Event Viewer log entry - Level: Error
An error, such as the failure of a service or application.
Event Viewer log entry - Level: Critical
An event that warns of a significant loss of functionality or data
What are the two types of event subscriptions the w8 supports?
Collector initiated
Source computer initiated
1. Subscriptions receive event from the source computer. Each computer must be configured manually to participate.
2. In this model, each source computer sends events to the collector. The configuration details can be distributed by Group Policy, allowing this type of subscription to be suitable on large networks.
To configure necessary services to run, what are the commands for the collector and source pc.
wecutil qc
winrm quickconfig
What is necessary to configure event subscriptions?
Administrator or member of the Event Reader group.
How are event subscriptions communicated across a network?
Via HTTP or HTTPS, using TCP port 5985 for HTTP or TCP port 5986 if HTTPS.
Performance Information and Tools: Adjust visual effects
Visual effects can sometimes slow down other tasks on you PC. You can turn these effects on and off and view more options.
Performance Information and Tools: Adjust indexing options
You can fine-tune indexing and searching to focus on the files and folders that you most commonly use.
Performance Information and Tools: Adjust power settings
Power settings on your PC can significantly affect its performance. You can change settings to balance your PC the way you want to between higher performance and longer batter life.
Performance Information and Tools: Open disk cleanup
Freeing up space on hard disk can increase performance, especially if the disk is quite full.
Performance Information and Tools: Advanced tools
This option displays additional system tools, such as System Information, Task Manager, and Event Logs.
You are a support technician working for a small charity with 43 computer and four servers, Each client computer is running W8, and the servers run 2012 Enterprise. You want to complete a weekly maintenance checklist for each computer and server to detail such items as the amount of free space on the primary hard disk, logon attempts outside office hours, and the number of running tasks that each computer is running. You want to perform this task with the minimum amount of effort and without incurring any additional costs. How would you accomplish this?
You could manually inspect each machine to extract the information and update your check-list manually. Some of the required items relate to performance metrics (such as available disk space),
whereas others relate to items that would be captured by each computer Event Log (such as
logon attempts).
To save time and automate the process, you could use an Event Collection to collect
some of the specific events. Disk-related and process-related data could be collected via the
Performance Monitor tool to configure a user-defined Data Collector Set, which can then be
used to update the checklist.
What did this objective cover?
The WEI allows you to rate you system using an index on a range from 1.0 to 9.9
Start-up conditions for installed apps has been moved from msconfig.exe tool to the Task Manager.
Resource Monitor offers a rich and detailed graphical view of system resources and can be launched from the Performance tab of Task Manager.
Performance Monitor continues to offer a very low level reporting and bench-marking tool for troubleshooting system performance
Action Center is further enhanced in w8 and now offers even greater integration and support to protect the computer
Event Viewer provides an indispensable tool for monitoring the healt of your system and troubleshooting issues when they arise
Event subscriptions enable administrators to collect events from computer within their network automatically