Windows 2000 Server Quiz
|Description: Windows 2000 Server Quiz
|Number of Questions: 20
|Created by: Aliensbrain Bot
You have IIS running on your Windows 2000 server. Recently the web site is responding slowly. What tool do you use to monitor the performance of IIS?
To monitor the performance of IIS (Internet Information Services) on a Windows 2000 server, you would use the tool called "System Monitor".
Let's go through each option to understand why it is correct or incorrect:
Option A) IISMon - This option is incorrect because there is no tool called "IISMon" specifically designed to monitor the performance of IIS.
Option B) System Monitor - This option is correct because "System Monitor" is a built-in tool in Windows that allows you to monitor various performance counters, including those related to IIS.
Option C) Vmmon - This option is incorrect because "Vmmon" is not a tool used to monitor the performance of IIS. It is more commonly associated with virtual machine monitoring.
Option D) Vmstat - This option is incorrect because "Vmstat" is a performance monitoring tool used in Unix-like operating systems, not Windows.
Option E) Rmon - This option is incorrect because "Rmon" is a network monitoring tool, not specifically designed for monitoring the performance of IIS.
The correct answer is B) System Monitor. This option is correct because it is a built-in tool in Windows that allows you to monitor the performance of IIS and other system components.
Proxy Server is ideal for creating which of the following network elements/components?
To answer this question, let's go through each option to understand why it is correct or incorrect:
Option A) Host-based IDS - This option is incorrect because a proxy server does not directly create a host-based Intrusion Detection System (IDS). Host-based IDS typically involves installing IDS software on individual hosts to monitor and detect any suspicious activities.
Option B) Network-based IDS - This option is incorrect because a proxy server does not directly create a network-based IDS. Network-based IDS usually involves dedicated hardware or software that monitors network traffic for suspicious activities.
Option C) Network perimeter - This option is correct. A proxy server is commonly used to create a network perimeter, which acts as a boundary between the internal network and the external network (such as the internet). By using a proxy server, organizations can control and monitor the traffic flowing in and out of their network, enhancing security and privacy.
Option D) Network entrapment point - This option is incorrect because a proxy server is not specifically used as a network entrapment point. A network entrapment point refers to a location within a network where unauthorized activities or threats can be detected or captured.
Therefore, the correct answer is option C) network perimeter. A proxy server is ideal for creating a network perimeter to enhance network security and control the flow of traffic.
John Doe wants to make IPX/SPX and TCP/IP the two protocols used on his computer but is not sure whether he can do that on one nic card or if he needs a second one. How many protocols can you bind to a single nic card?
To make the site more user-friendly and address the issue of error pages popping up due to deleted pages, the best option would be:
C. Create a custom error page with a link back to the main site.
This option is the best choice because it provides a user-friendly experience when a user encounters a deleted page or a broken link. By creating a custom error page, you can include a clear message explaining that the page the user is trying to access is no longer available. Additionally, including a link back to the main site allows the user to easily navigate back to the main site and continue their browsing experience.
Now let's go through each option and explain why it is right or wrong:
A. Create a custom pop-up window to redirect the user: This option is not the best choice because using pop-up windows can be intrusive and disruptive to the user experience. It may also cause frustration for users if they encounter multiple pop-up windows when trying to access deleted pages.
B. Reinstall the missing pages: This option may not be feasible or practical, especially if there are a large number of missing pages. Reinstalling the missing pages would require identifying and locating each missing page and then restoring them, which can be time-consuming and may not be a permanent solution if the issue continues to occur.
C. Create a custom error page with a link back to the main site: This option is the best choice because it provides a user-friendly experience when encountering deleted pages or broken links. By creating a custom error page, you can inform the user about the issue and provide a clear message, along with a link back to the main site, allowing them to easily navigate back to the main site and continue their browsing experience.
D. Redirect the broken links to another page on the site: This option may not be the best choice because redirecting broken links to another page on the site without informing the user about the issue can lead to confusion and frustration. It is important to provide clear communication to the user when encountering deleted pages or broken links.
The Answer is: C. Create a custom error page with a link back to the main site.
Host based IDS works by scanning:
What is a security tradeoff when you utilize an intrusion detection system?
To solve this problem, the user needs to have basic knowledge of networking and troubleshooting. The user should check the possible causes of the issue and try to eliminate each cause until the correct one is identified.
In this scenario, the user is unable to communicate with a host on a different department of the company but has no issue communicating with others on the same subnet. Other hosts on the subnet can also reach remote hosts. Based on this information, we can eliminate options A and B as incorrect subnet masks would affect all communication outside the subnet, not just one specific host.
Option D can also be eliminated as the WINS server is not used for basic network communication, and the issue is only with one specific host.
Therefore, the correct answer is:
C. Incorrect default gateway on your computer
This option is the most likely cause of the issue as the default gateway is responsible for forwarding traffic to remote networks. If the default gateway is not configured correctly, the traffic will not be directed to the correct destination, resulting in the inability to communicate with remote hosts.
DNS and WINS are often being considered as the:
If you saw the output in the example below, what tool would you be using?
To answer this question, the user needs to understand the purpose of the security log in Windows 2000 server.
The security log in Windows 2000 server is primarily used for auditing purposes. It records events related to security and authentication, such as successful or failed logon attempts, changes to user accounts and permissions, and other security-related events.
Therefore, the correct option is:
The Answer is: C. auditing.
Which port is the NetBIOS User Datagram Protocol (UDP) port?
On a Windows NT system, where would you go to manage shares to work with other computers?
What is the first thing to do when implementing a security policy?
What is the Order of Name resolution on Windows NT4.0 machines?