You are on page 1of 10

Lesson 8: Managing and Monitoring Windows 7 Performance Multiple Choice 1.

To keep Windows reliable and secure, you must download and install Windows ________ on a regular basis a) Shims b) Updates c) Viruses d) Worms Answer: b Difficulty: Easy Section Reference: Updating Windows 7 Explanation: Keeping Windows 7 systems updated with the latest software is one of the primary tasks of the technical specialist, who should be familiar with the types of update releases and the methods for deploying updates. The regular application of operating system updates is imperative, for reasons of compatibility, performance, and most importantly, security. There is no better way to protect a Windows 7 computer than to make sure to apply all of the latest security updates. 2. Which of the following is a Windows update that addresses a specific problem or issue with Windows? a) Hotfix b) Security update c) Cumulative updates d) Service packs Answer: a Difficulty: Easy Section Reference: Updating Windows 7 Explanation: A hotfix is an update consisting of one or more files designed to address a specific problem or issue with the operating system. Some hotfixes are intended for all Windows users and are released using the Microsoft Update Web site, whereas others are intended for special circumstances and are released only to users experiencing a particular problem. 3. A _________ is a cumulative set of all updates for a particular operating system version, usually going back to its original release and are extensively tested. a) Hotfix b) Security update c) Cumulative updates d) Service packs Answer: d Difficulty: Easy Section Reference: Updating Windows 7

Page 1 of 10

Explanation: A service pack is a cumulative set of all updates for a particular operating system version, usually going back to its original release. Unlike updates, service packs can contain new or enhanced features. More than any other type of update, service packs are extensively tested until Microsoft is confident that all users can safely apply them. To a certain degree, service packs are an extension of the operating system release itself. After a service pack is released, Microsoft and original equipment manufacturer (OEM) providers typically distribute Windows with the service pack integrated into the installation. 4. Which of the following is NOT a method to install Windows patches and updates? a) Windows Update b) Windows Server Update Services c) Windows AntiVirus d) System Center Configuration Manager Answer: c Difficulty: Easy Section Reference: Updating Windows 7 Explanation: Unlike the Automatic Updates client in Windows XP, the Windows Update client in Windows 7 is an independent application that can download updates from any of the following three locations: Windows Update, Windows Server Update Services (WSUS), and System Center Configuration Manager (SCCM). 5. Which of the following is used to download Windows updates using the networks idle bandwidth? a) BITS b) SNMP c) SMTP d) NTTP Answer: a Difficulty: Medium Section Reference: Using Windows Update Client Explanation: After determining which updates it needs, the client initiates a download using the Background Intelligent Transfer Service (BITS). BITS is an HTTP-based file transfer service that downloads files using only the networks idle bandwidth. This enables Windows Update to perform downloads without affecting other applications that are using the network. BITS downloads are also resumable in the event they are interrupted. 6. __________ is a program that downloads updates from the Microsoft Update Web site, stores them for administrative evaluation, and deploys the updates when they are released by the administrators. a) SNMP b) WSUS c) SCOM d) WDS

Page 2 of 10

Answer: b Difficulty: Medium Section Reference: Using Windows Server Update Services Explanation: WSUS enables enterprise network administrators to centralize the workstation update process, conserving network bandwidth and exercising greater control over the upgrades distributed to the network. 7. The best way to configure the WSUS clients is through ______________. a) Group policies b) Control Panel c) Registry d) Administrative tools Answer: a Difficulty: Medium Section Reference: Configuring WSUS Clients Explanation: When using a WSUS server, you must configure their Windows Update clients. The Windows Update control panel in Windows 7 does not provide any means of configuring the client to use an internal WSUS server instead of the Microsoft Update Web site, and even if it did, individual client configuration would not be a practical solution for a large enterprise network. To configure the Windows Update clients on your network, you must use a Group Policy. 8. ______________________ is a set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification interface to managed resources in Windows and it is used to create scripts to configure performance parameters. a) WMI b) SMS c) WSUS d) CMS Answer: a Difficulty: Medium Section Reference: Monitoring Performance Explanation: Windows Management Instrumentation (WMI) is an interface to managed resources in Windows 7 that administrators can use to create scripts to configure performance parameters, among many other things. WMI classes describe the properties of managed resources in Windows 7 and the actions that WMI can use to manage those resources. Administrators can create WMI scripts using Microsoft Visual Basic, Jscript, or any language supported by the Windows Scripting Host (WSH) engine. 9. Logs are traditionally text files, but the Windows operating systems have long used a graphical application called ___________ to display the log information gathered by the operating system. a) Log Viewer

Page 3 of 10

b) Performance Monitor c) Event Viewer d) WMI Viewer Answer: c Difficulty: Easy Section Reference: Using Event Viewer Explanation: A log is a list of events that can track the activity of the software, document errors, and provide analytical information to administrators. Logs are traditionally text files, but the Windows operating systems have long used a graphical application called Event Viewer to display the log information gathered by the operating system. 10. Which of the following is NOT a traditional type of Windows Log? a) Application b) Security c) System d) Installation Answer: d Difficulty: Easy Section Reference: Using Event Viewer Explanation:Windows has maintained the same three basic logs throughout several versions: a System log, a Security log, and an Application log. Recent versions have added a Setup log, and servers performing certain roles have additional logs, such as those tracking DNS and File Replication activities. 11. You can use the ___________ console on one computer to connect to another computer and display its logs. a) Event Viewer b) Remote Viewer c) Remote Log Viewer d) Remote Controller Answer: a Difficulty: Medium Section Reference: Subscribing to Events Explanation: The Event Viewer console can provide an enormous amount of information about a Windows 7 computer, but for a technical specialist responsible for hundreds of workstations, this can be too much information to handle. You can use the Event Viewer console on one computer to connect to another computer and display its logs. 12. What system rating quantifies capabilities of Windows 7 computer by breaking it down into categories and assigning each one a rating? a) QWC b) WEI c) PIF

Page 4 of 10

d) INI Answer: b Difficulty: Easy Section Reference: Using Performance Information and Tools Explanation: The System control panel contains a system rating called the Windows Experience Index (WEI), which quantifies the capabilities of a Windows 7 computer by breaking it down into categories and assigning each one a rating. One key function of this rating is to help users determine why a particular computer is unable to run the Windows Aero user experience. 13. What tool can display information for hundreds of different statistics in a variety of ways so you can get a thorough picture of how well your system is performing? a) WEI b) Performance Monitor c) QWC d) Snap Shot Viewer Answer: b Difficulty: Easy Section Reference: Using the Performance Monitor Console Explanation: Performance Monitor is a tool that can display information for hundreds of different statistics (called performance counters) in a variety of ways. You can use Performance Monitor to create a customized graph or report containing any statistics you choose. 14. To capture counter statistics in the Performance Monitor console for later review, you must create a(n) ________________. a) DCS b) PIF c) INI d) PCC Answer: a Difficulty: Medium Section Reference: Creating Data Collector Sets Explanation: To capture counter statistics in the Performance Monitor console for later review, you must create a data collector set (DCS). 15. What tool automatically tracks events that can have a negative effect on system stability and uses them to calculate a stability index? a) Performance Monitor b) Reliability Monitor c) Stability tool d) WEI Answer: b Difficulty: Easy

Page 5 of 10

Section Reference: Using Reliability Monitor Explanation: Reliability Monitor is a tool that automatically tracks events that can have a negative effect on system stability and uses them to calculate a stability index, which is a measurement based on the number and type of negative events occurring in the preceding 28 days. 16. What program quickly shows the current processes and how much memory each process takes? a) Performance Monitor b) Task Manager c) Event Viewer d) Computer Management console Answer: b Difficulty: Easy Section Reference: Working with Processes Explanation: Windows Task Manager is often one of the first tools that many administrators and users turn to when they experience performance problems on a Windows computer. The default Windows Task Manager screen lists the applications currently running on the computer, and lets you switch to them or end them, but Task Managers true power lies on its other tabs. The Performance tab contains graphs that display the computers processors and memory utilization in real time. The Processes tab also shows resource utilization, but this tab breaks it down by individual executables, displaying the CPU and memory used by each one. 17. Which program displays a more comprehensive breakdown of process and performance statistics than the Task Manager does? a) Performance Monitor b) Resource Monitor c) Event Viewer d) Stability Monitor Answer: b Difficulty: Medium Section Reference: Using Resource Monitor Explanation: On the Overview tab, four real-time line graphs display information about the main system hardware components. Each of the four components also has a separate, expandable section beside the graphs, displaying more detailed information in text form, such as the resources being utilized by individual applications and processes. 18. What program is used to configure and troubleshoot the Windows 7 startup process? a) Performance Monitor b) Event Viewer c) System Configuration tool d) Service Manager Answer: c

Page 6 of 10

Difficulty: Medium Section Reference: Using the System Configuration Tool Explanation: The System Configuration tool (Msconfig.exe) is designed primarily to configure and troubleshoot the Windows 7 startup process. It does not appear in the Start menu; you can only run it by executing the Msconfig.exe program or typing msconfig in the Start menus search box. Although the program is not directly involved with performance tuning, you can use it to identify programs and configuration settings that might have a negative effect on system performance. 19. _________ is known as virtual memory in Windows 7. a) Temporary files b) Paging files c) I/O buffers d) HiberFil.sys file Answer: b Difficulty: Easy Section Reference: Configuring Performance Option Settings Explanation: A paging file is an area of disk space that Windows uses to store data that overflows from system memory. This virtual memory enables Windows to run programs that utilize more memory than is available in the system, but at the cost of reduced performance. This is because memory I/O is inherently faster than disk I/O. 20. Which of the following is used to increase a computers memory capacity using nonvolatile memory in the form of a USB flash drive or a flash memory card? a) ReadyBoost b) SuperFetch c) Ready Mem d) Mem Boost Answer: a Difficulty: Easy Section Reference: Using Ready Boost Explanation: Windows 7 includes a feature called ReadyBoost, which you can use to increase a computers memory capacity using non-volatile memory in the form of a USB flash drive or a flash memory card. Although Windows Vista was limited to Secure Digital (SD) cards, Windows 7 enables you to use Compact Flash (CF) and most other memory cards as well. 21. What is a caching routine that enables Windows 7 to restore user access to applications faster than Windows XP? a) ReadyBoost b) SuperFetch c) Ready Mem d) Mem Boost Answer: b

Page 7 of 10

Difficulty: Easy Section Reference: Using Ready Boost Explanation: SuperFetch is a caching routine that enables Windows 7 to restore user access to applications much faster than Windows XP. All of the Windows operating systems use a virtual memory management technique called paging. When nearly all of the physical memory in a Windows computer is in use, the operating system begins swapping some of the data currently in memory to a paging file on the hard disk. This increases the memory capacity of the computer, but it also slows down some processes because hard disks transfer data much slower than memory chips. 22. ReadyBoost requires a computer with USB 2.0 interface and a ________ or larger flash drive. a) 64 MB b) 256 MB c) 512 MB d) 1 GB Answer: b Difficulty: Medium Section Reference: Using Ready Boost Explanation: ReadyBoost requires a computer with a USB 2.0 interface and a 256 MB or larger flash drive or other storage device that is fast enough to be useful. When you insert the drive into a USB slot, Windows 7 tests the speed of the device and, if its fast enough, gives you the option of using it for ReadyBoost. In Windows 7, the 4 GB limit for a ReadyBoost drive from Windows Vista has been removed. You can now use as many as eight devices for ReadyBoost, totaling up to 256 GB. 23. What service or program does WSUS require to operate? a) IIS b) SNMP c) SMTP d) NTTP Answer: a Difficulty: Medium Section Reference: Using Windows Server Update Services Explanation: Windows Update clients connect to a WSUS server by accessing a Web site, just as they do when connecting to the Microsoft Update site directly. Therefore, before you install WSUS, you must add the web Server (IIS) role to the computer. WSUS also requires a database, in which it maintains information about its updates and operations. The program can use the Windows Internal Database, which is included with Windows Server, but for larger installations, you might want to use a separate SQL Server database. 24. A computer is considered to be working too hard if the processor utilization is consistently more than ______. a) 30%

Page 8 of 10

b) 50% c) 60% d) 80% Answer: d Difficulty: Medium Section Reference: Using the Performance Monitor Console Explanation: If the system is consistently more than 80% for the processor utilization, the system is working too hard. You should then reduce its workload or upgrade/replace the system. Fill in the Blank 26.While looking at the logs in the Event Viewer, the ________ is an event that warns of a problem that is not likely to affect the performance of the component or process where the problem occurred, but that could affect the performance of other components or processes on the system. Answer: Error Difficulty: Medium Section Reference: Using Event Viewer Explanation: The Windows event logs contain different types of events, which are identified by icons. An Error is an event that warns of a problem that is not likely to affect the performance of the component or process where the problem occurred, but that could affect the performance of other components or processes on the system. 27. ________________ enable administrators to receive events from other computers (called sources) in the Event Viewer console on their own computers (called collectors). Answer: Subscriptions Difficulty: Hard Section Reference: Subscribing to Events Explanation: Subscriptions enable administrators to receive events from other computers (called sources) in the Event Viewer console on their own computers (called collectors). You create subscriptions in the Event Viewer console, but before you can do so, you must configure both the source and collector to run the appropriate services needed for communication between the computers. Source computers require a service called Windows Remote Management and collectors need the Windows Event Collector service. Short Answer 28. What command do you execute at the collector computer to enable subscriptions? Answer: wecutil qc Difficulty: Hard Section Reference: Subscribing to Events

Page 9 of 10

Explanation: Source computers require a service called Windows Remote Management and collectors need the Windows Event Collector service. To configure the computers, open an elevated command prompt, type the wecutil qc command, and press Enter. 29. A(n) __________ is a set of readings, captured under normal operating conditions, which you can save and compare to a reading taken at a later time. Answer: Baseline Difficulty: Medium Section Reference: Creating Data Collector Sets Explanation: It is a good idea to use tools like Performance Monitor to establish the operational baseline levels for a workstation. A baseline is simply a set of readings, captured under normal operating conditions, which you can save and compare to readings taken at a later time. By comparing the baseline readings to the workstations current readings at regular intervals, you might detect trends that eventually affect the computers performance. Essay 30. Explain how to create a subscription so that your Event Viewer console can receive events from other computers. Answer: Source computers require a service called Windows Remote Management and collectors need the Windows Event Collector service. To configure the computers, use the following procedures: On the collector computer, open an elevated command prompt, type the following command, and press Enter: wecutil qc On each source computer, open an elevated command prompt, type the following command, and press Enter: winrm quickconfig Open the Computer Management console, and in the Local Users and Groups snap-in, add the computer account for the collector to the local Administrators group. After you complete these tasks, you can proceed to create a subscription in the Event Viewer console on the collector computer. To do this, right click the Subscriptions node and from the context menu, select Create Subscription. Then, select Collector initiated or Source computer imitated. You then configure your query. Difficulty: Hard Section Reference: Subscribing to Events

Page 10 of 10

You might also like