Вы находитесь на странице: 1из 3

This view of resource monitor Lists network activity on a per-process basis,but also lists the destination

address, sent bits per second,received bits per second, and total bits per second. - Network Activity
________ is a suite of Institute of Electrical and Electronics Engineers (IEEE)standards that enable Converged
Fabrics in the data center, where storage, data networking, cluster IPC and management traffic all share
the same Ethernet network infrastructure.
- Data Center Bridging (DCB)
This authentication method can be used on networks that include systems running an earlier version of
the Windows operating system and on standalone systems. - Computer (NTLMv2)
System Drivers is the lowest layer in the networkstack, and contains the network driver that communicates
directlywith the network adapter. – False

RSS is a network driver technology that enables the efficient distribution of network receive processing
across multiple CPUs in multiprocessor systems. – True
This method of firewall filtering analyzes the header of every packet and checks if it matches the
configured rules. - Packet Filtering
These are network devices built into the IT infrastructure and they stand between public and internal
networks. - Network-based firewall
Packet Stack is the lowest layer in the network stack, and contains the network driver that communicates
directly with the network adapter. – False
__________________ distributes incoming network I/O packets among logical processors so that packets
which belong to the same TCP connection are processed on the same logical processor, which preserves
ordering - Receive Side Scaling (RSS)
This type of firewall runs on individual systems, physical or virtual. It is a piece of software installed on an
operating system which stands between the host and other network devices. - Host-based firewall
This policy enables you to set the location of the collector computer. - Configure Target Subscription
Manager

Disable-NetworkAdapterRss command disables RSS on the network adapter that you specify. – False
This policy determines the maximum event forwarding rate in events per second. If this policy is not
configured, events will be transmitted as soon as they are recorded. - Configure Forwarder Resource
Usage
The _________________________ feature distributes traffic across several servers by using the TCP/IP
networking protocol. By combining two or more computers that are running applications in Windows
Server 2012 into a single virtual cluster - Network Load Balancing (NLB)
____________ is a virtual layer-2 network switch that provides programmatically managed and extensible
capabilities to connect virtual machines to the physical network - Hyper-V virtual switch
This view of resource monitor lists the ports and addresses that services and applications are listening on.
Also provides information about the firewall status for these roles and services. - Listening Ports
This command sets the RSS properties onthe network adapter that you specify. - Set-NetAdapterRss

This command disables RSS on thenetwork adapter that you specify. - Disable-NetAdapterRss
These are typically clients that use a transport data extension (TDX) or Winsock Kernel (WSK) interface to
expose interfaces to user-mode applications. - System Drivers
______________ is used in TCP/IP networks for naming computers and network services - Hyper-V network
virtualization

This view of resource monitor lists processes by name and ID; and provides information on bits sent per
second,bits received per second, and total bits per second. - Processes With Network Activity
This command enables RSS on the network adapter that you specify. - Enable-NetAdapterRss
A network firewall is also referred to as a gateway firewall, or an application firewall. It stands between the
internet and the devices in the private network. – False
Enable-NetworkAdapterRss command enables RSS on the network adapter that you specify. – False

The default signing algorithm for this authentication method is RSA, but Elliptic Curve Digital Signature
Algorithm (ECDSA)–P256 and ECDSA-P384 are also supported signing algorithms. - Computer certificate
In Automatic software updates deployment, a set of software updates is selected the SCCM console and
these updates are deployed to the target collection. – False
Set-NetAdapterRss command sets the RSS properties onthe network adapter that you specify. – True
_________________ Is an Internet Engineering Task Force (IETF) standarddesigned to reduce the
administration burden and complexity ofconfiguring hosts on a TCP/IP-based network, such as a
privateintranet - Dynamic Host Configuration Protocol (DHCP)
Network-based firewall are network devices built into the IT infrastructure and they stand between public
and internal networks. Anetwork-based firewall can be a hardware device or a virtual solution. – True

System Drivers are typically clients that use a transport data extension (TDX) or Winsock Kernel (WSK)
interface to expose interfaces to user-mode applications. The WSK interface was introduced in Windows
Server® 2008 and Windows Vista, and it is exposed by AFD.sys. The interface improves performance by
eliminating the switching between user mode and kernel mode – True
____________ enables you to access recorded event information. - Event Viewer
_________ enables you to monitor how a computer running the Windows Server 2012 and Windows Server
2012 R2 operating system uses CPU, memory, disk, and network resources. - Resource Monitor
This data integrity algorithm is not recommended and is provided for backward compatibility only. -
Message-Digest  algorithm  5  (MD5)

_____________________________ typically contain applications that require very fast inter-process


communication (IPC) and inter-computer communications, a high degree of predictability regarding
latency and transaction response times, and the ability to handle very high message rates. - Low-latency
workloads technologies
____________ is the successor to Network Monitor. You can use this to perform network traffic capture and
analysis. Message Analyzer also functions as a replacement for LogParser - Message Analyzer
This method of firewall filtering inspects every packet and keeps the information for the current
connection. This includes TCP protocol information, source and destination IP addresses, and port
numbers. - Stateful Inspection
RSS is the ability to group packets together to minimize the header processing that is necessary for the
host to perform. A maximum of 64 KB of received payload can be coalesced into a single larger packet for
processing. – False

This is the lowest layer in the networkstack, and contains the network driver that communicates
directlywith the network adapter. - Network interface

 implements protocols suchas TCP/IP and UDP/IP. These layers expose the transport layerinterface for
layers above them.
- Protocol Stack

_________________ exposes interfaces for the driver below it and for the layers above it,such as the Protocol
Stack. - Network Driver Interface Specification (NDIS)
_______________ Provides for administration and monitoring of servers running Dynamic Host Configuration
Protocol (DHCP) and Domain Name System (DNS). - IP Address Management (IPAM)
Get-NetAdapterRss command retrieves RSS properties of the network adapter that you specify. – True
distributes incoming network I/O packets among logical processors so that packets which belong to the
same TCP connection are processed on the same logical processor, which preserves ordering - Receive
Side Scaling (RSS)
_________________ enable you to create customized views of events across any event log stored on a server,
including events in the forwarded event log. - Event log views

This view of resource monitor provides information on connections on the basis of local address, port,
and remote address and port. - TCP Connections
The network stack implements protocols such as TCP/IP and UDP/IP. These layers expose the transport
layerinterface for layers above them. – False
Network adapters that support this can target their interrupts to specific logical processors. - Message-
Signaled Interrupts (MSI/MSI-X)

This data integrity algorithm is stronger than MD5 but uses more resources. - Secure Hash Algorithm 1
(SHA-1)

Network-based firewall runs on individual systems, physical or virtual. It is a piece of software installed on
an operating system which stands between the host and other network devices. – False
_____________ is a wide area network (WAN) bandwidth optimization technology that is included in some
editions of the Windows Server2012 and Windows 8 operating systems. To optimize WAN bandwidth
when users access content on remote servers – BranchCache

Вам также может понравиться