Appendix -- Questions and Answers

[Previous] [Next]

Chapter 1

Review

  1. List the client operating systems in SMS 2.0 that support the following functions:
  2. Hardware and software inventory

    Windows 16-bit and Windows 32-bit operating systems

    Remote tools

    Windows 16-bit and Windows 32-bit operating systems

    Event-to-trap Translation

    Windows NT 3.51 _ 2000

    Software metering

    Windows 32-bit operating systems

    Software distribution

    Windows 16-bit and Windows 32-bit operating systems

  3. How can inventory data be collected from a computer running the MS-DOS, OS/2, or Macintosh operating systems?
  4. By configuring an SMS 1.2 site server to be a child site in an SMS 2.0 site hierarchy.

  5. The Event to Trap Translator requires what Windows NT/2000 service to forward trap events to an NMS?
  6. The SNMP Service

  7. Why can a primary site server be both a child and a parent while a secondary site server can only be a child?
  8. A primary site server, server A, can attach to another primary site server, server B. Server A is then a child to server B and server B is the parent to server A. A secondary site server can connect to a primary site server but a primary site server cannot connect to a secondary site server. This means that the secondary site server can be a child to a primary site server but it can never be a parent.

  9. Which site system is required to run SMS?
  10. Only the site server is required to run SMS. The site server can run all services for a site, including the site database.

  11. How does CIMOM support the WBEM initiative?
  12. CIMOM is the proxy of most data and interfaces that comply with the WBEM initiative. For example, the SMS Administrator console uses the CIMOM API to communicate with the SMS provider and WBEM namespace.

Chapter 2

  1. Which database is the site database and which database is the software metering server database?
  2. SMS_S01 is the site database and SMS_S01_LICDB is the software metering database.

  3. Enter the initial size for each database:
Database Primary data file name and initial size Transaction Log file name and initial size
SMS_S01 Name: SMS_S01_Data (actual filename: SMS_S01_Data.MDF) Name: SMS_S01_Log (actual filename: SMS_S01_Log.LDF)
Size: 20 MBSize: 10 MB
SMS_S01_LICDB Name: SMS_S01_LICDB_Data.MDF Name: SMS_S01_LICDB_Log.LDF
Size: 10 MBSize: 10 MB

Review

  1. Why is SQL Server access critical to a successful installation of SMS 2.0? Further, what rights must an account have to SQL Server to complete the installation of SMS 2.0?
  2. The SMS installation routine must access SQL Server to create the site database, and optionally, the license metering database. The account used to create the databases must have the following rights to the master database:

    • Create database
    • Backup database (called dump database in SQL Server version 6.5)
    • Backup Log (called dump transaction in SQL Server version 6.5)

  3. Why is sizing the database and adjusting other configuration parameters to support SMS 2.0 less important in SQL Server version 7.0 than it is in SQL Server version 6.5?
  4. SQL Server version 7.0 is designed to self-configure parameters as needed. This database engine will start with allocating resources to accommodate minimum configuration settings and allocate more resources as needed, up to the maximum values of the configuration settings. If SQL Server resource requirements diminish, allocated system resources are returned to the pool of available system resources.

  5. Name two conditions that would cause the SMS setup routine to disallow the `Install an SMS 2.0 primary site' option to be selected.
    1. The SMS setup routine is run on a Windows NT Workstation.
    2. SMS 2.0 is already installed on the Windows NT Server.
    3. There is no NTFS partition available to install SMS.

  6. True or False: Only Windows NT/2000 Server domain controllers can be used as SMS 2.0 site servers.
  7. False. A Windows NT/2000 Server member server can be used as an SMS 2.0 site server and a Windows 2000 Server.

  8. Explain why a user does not log on to the SMS Administrator console in order to gain access to the site database.
  9. The SMS Administrator console is a WBEM-compliant application. WBEM uses a combination of the user's rights gained from logging on to the network (and thus the WBEM namespace) and rights configured for the user in the SMS Administrator console.

  10. Name the primary SMS process and explain the function of a thread component.
  11. The primary SMS process is the SMS Executive. The SMS Executive uses thread components to complete a wide variety of SMS related tasks, such as configuration management performed using the Hierarchy Manager and the Site Control Manager thread components.

  12. Using the SMS Custom setup method, what two post-installation steps must be completed before resource discovery will occur?
  13. 1) Assign a site boundary. 2) Enable a discovery method.

  14. True or False: Computer resources that have not been discovered can run a client installation method but they will not be discovered until a discovery method is enabled.
  15. False. If a computer resource runs a client installation method, it will automatically be discovered regardless of discovery method settings.

  16. An SMS 1.2 to 2.0 upgrade cannot be completed if a computer is running SQL Server version 6.0 and Windows NT Server version 3.51. What is the recommended procedure for preparing the operating system and database version for an upgrade to SMS 2.0?
  17. The recommended procedure is to upgrade to SQL Server version 6.5 running SP4 and then upgrade to Windows NT Server version 4.0 running SP4a. SQL Server version 6.0 is not supported on Windows NT Server version 4.0

Chapter 3

  1. What are the two categories of inventory collection?
  2. Hardware inventory and software inventory.

  3. Select the correct inventory scheduling model and recurrence pattern to be used, given the followings scenarios:
  4. Scenario 1: You wish to collect hardware and software inventory once a week.

    Use a simple schedule set for weekly collection. Set this for both the Hardware Inventory Client Agent and the Software Inventory Client Agent.

    Scenario 2: You want to collect only hardware inventory and you need it to occur at 2 a.m. every third Monday of the month.

    Use a full schedule from the properties of the Hardware Inventory Client Agent. Set the `Start' value to the third Monday of the current month. Set the `Recurrence Pattern' to Weekly, set the `Recur every' value to 3, and select the `Monday' radio button. Also, verify that the Software Inventory Client Agent is disabled.

  5. Which computer maintains hardware inventory for a Windows 32-bit client computer and a Windows 16-bit client computer?
  6. Hardware inventory history is maintained on the Windows 32-bit client computer. The site server maintains hardware inventory history for a Windows 16-bit client computer.

  7. What is the role of the Inventory Processor in the inventory collection process?
  8. The Inventory Processor processes all incoming NHM and RAW hardware inventory files and converts RAW files into binary MIF files. The NHM and RAW files are moved to the DATALDR.BOX directory by the Inventory Processor so that the Inventory Data Loader may move the data into the database.

  9. What is the purpose of SMS_DEF.MOF?
  10. It defines the classes and properties of hardware inventory that should be collected from client computers.

Chapter 4

  1. What is contained in a package?
  2. A package contains at least one program and may contain source files. Distribution points are specified as part of the package to begin the package distribution process.

  3. Name three functions other than application installation that software distribution serves.
  4. Software distribution can accomplish scheduled maintenance tasks like virus detection and disk defragmentation; file updates such as a company phone lists distributed to all mobile computers; and application uninstall.

  5. Why is the software and hardware configuration of the reference computer important when building an SMS Installer-based installation routine?
  6. The reference computer is used to determine exactly what changes an installation routine makes to a computer. This information can be used to build an installation script. If the reference computer is significantly different in configuration from the client computers, the installation repackaging process may not build an installation script that will properly install the application.

  7. What is the difference between the repackage function and the watch function?
  8. The Repackage function monitors an application installation, recording all files copied and all files or registry settings modified. The Watch function monitors an application execution (not installation) to determine which compiler support files are necessary to successfully execute the application. It is normally used for custom-developed applications.

  9. What, from the administrator's point of view, is the difference between rolling back an installation and uninstalling an installation?
  10. Uninstalling an application is simply a matter of selecting a single checkbox to enable it.

    Rolling back an application is a matter enabling uninstall support, then either presenting a dialog box to the user to request the backup directory or defining a default backup location.

Chapter 5

  1. What directory was added as a result of installing the Software Metering Client Agent?
  2. LICMTR

Review

  1. How does the software metering system keep the software metering database from growing too large?
  2. It uses data summarization schedules.

  3. How can you prevent the unwanted metering of standard utilities?
  4. Exclude these programs from metering.

  5. How can you prevent users from getting past license requirements by renaming a file?
  6. Configure SMS to use Original names instead of Standard names when identifying programs.

  7. How does an administrator know how many licenses to configure for a single product on each software metering server?
  8. The administrator does not need to know. Automatic license configuring, called license balancing, is managed automatically by SMS.

Chapter 6

  1. What directory was added as a result of installing the Software Metering Client Agent?
  2. REMCTRL under \windir\MS\SMS\CLICOMP

  3. Select Start Windows NT Diagnostics.
  4. The Windows NT Diagnostics - \\COMPUTER2 window appears.

    What version of Windows NT is running on Computer 2? Are any service packs applied?

    Windows NT Workstation Version 4.0 with Service Pack 4a applied.

  5. Is the SMS Remote Control Agent started on Computer 2?
  6. No, as determined by using the Services tab.

Review

  1. Which Remote Tools utilities require the Remote Tools Client Agent?
  2. All Remote Tools utilities with the exception of the Windows NT Diagnostics require the Remote Tools Client Agent.

  3. List the five basic requirements for using remote functions on client computers.
  4. The computer resource must be an SMS client computer.

    The client and the viewing computer must use a common protocol.

    The client computer must have the Remote Tools Client Agent installed and started.

    The client computer must have enabled permissions for the administrator if the administrator will not control these settings from a central location.

    The client computer platform must be Windows 16-bit, Windows 95/98, or Windows NT 3.51 or greater.

  5. You attempt to remotely control a Windows NT client computer, but the diagnostic buttons are unavailable. What is the problem?
  6. Windows NT client computers use Windows NT Diagnostics, not the Remote Tools diagnostics.

  7. You attempt to remotely control a client computer, but the connection fails. What might be the problem?
  8. Protocols are mismatched on the client computer and the viewing computer.

    The Remote Tools Client Agent is not started or installed.

Chapter 7

  1. In the Detail pane (middle), expand Frame: Base frame properties.
  2. How large was the packet?

    Answers vary depending on the number of shared resources in the list.

  3. In the Detail pane (middle), expand IP: ID = value; Proto = TCP; Len: value.
  4. What is the source IP address?

    128.1.1.2

  5. In the Detail pane (middle), select R_SRVSVC: RPC Server response srvsvc:NetrSHareEnum(..).
  6. In the Hex pane (bottom), scroll to find the list of share resources that are available on SERVER1.
  7. What shares were listed for SERVER1?

    Answers may vary, but should include: Netlogon, Admin$, IPC$, C$, D$, SMS, CAP_S01, SMS_SITE, and SMS_S01.

  8. From the Summary pane (top), open the last frame of the capture. Then from the Detail pane (middle), expand STATS.
  9. What was the elapsed time of the capture?

    Answers vary.

    How many bytes were transmitted during the capture session?

    Answers vary.

    Were there any broadcast frames in the capture?

    Answers vary.

  10. In the [Run 1: filepath\*.cap] window, notice the Protocol Distribution and Top Users tabs.
  11. Which protocol (other than FRAME or ETHERNET) generated the highest number of frames?

    Answers may vary, but probably IP, TCP, and IP.

    Which protocol generated the highest number of bytes claimed?

    R_SRVSVC or SMB, depending upon the state of any connections.

  12. Select the Top Users tab.
  13. Which address generated the highest number of frames?

    Answers vary, but usually SERVER1.

    Which address generated the highest number of bytes?

    SERVER1.

Review

  1. How is the Network Monitor Agent version 2 different from the SMS client agents?
  2. The Network Monitor Agent version 2 only runs on Windows NT/2000, and is only required if Network Monitor needs to monitor traffic on a remote segment. This agent is completely independent of SMS services and is not configured from the Client Agents node of the SMS Administrator console.

  3. If you need to filter out all network traffic except for traffic between two computers and you also need to locate specific data within the packets, which Network Monitor filter features should you specify?
  4. Filter for Address Pairs specifies the media access control address of each computer. Filter for Pattern Matches filters for specific patterns in Hex or ASCII contained in the packets.

  5. What two native Windows NT/2000 characteristics support event-to-trap translation?
  6. 1) Windows NT/2000 computers run the SNMP service to support the Event to Trap Translator Client Agent. 2) Windows NT/2000 computers log events using the Event Logging service, which writes to the event logs.

  7. What two components in SMS 2.0 support event-to-trap translation?
  8. The Event to Trap Translator Client Agent and the Event to Trap Translator application.

  9. If the Event to Trap Translator Client Agent is installed after the SNMP service is installed, what must you do to enable event-to-trap translation?
  10. Stop and start the SNMP service.

Chapter 8

  1. What three services appearing in the Services application run Crystal Info?
  2. Info Agent, Info APS, and Info Sentinel.

Review

  1. Can you query using attributes contained in different object types inside the same query? Can you query using attributes contained in different attribute classes inside the same query?
  2. You can only query using attributes within one object type at a time. For example, if you create a query using the Package object type, you cannot query using attributes contained in the System Resource object type. You can query using more than one attribute within multiple attribute classes as long as the attribute classes are contained in the same object type.

  3. What role does the WBEM schema play in creating queries using Query Builder?
  4. Queries use the WBEM Query Language (WQL) rather than the Structured Query Language (SQL) traditionally used to query SQL server databases. Query data is returned to the SMS Administrator console in the WBEM schema.

  5. Name three methods for limiting the results of a query.
  6. 1) Define criterion or criteria. 2) Limit the query to a collection. 3) Use the Run Query Special feature to limit the number of records returned from the query.

  7. What must you select to create a prompted query? Give an example of a useful prompted query.
  8. You must select the Prompted Query criterion type. The answer to the second part of this question will vary. One possible answer is to create a prompted query using available disk space. When the query is run, a prompt will ask the user running the query to enter a percentage of available disk space to complete the query expression.

  9. Which Crystal Info service is responsible for checking user permissions before running a report?
  10. Info APS is responsible for this task. It is the core service of the reporting function in SMS 2.0.

Chapter 9

Review

  1. A bank's main headquarters is located in a major city, with 100 branch offices located throughout the country. List four circumstances which would suggest that each branch office should be configured as a separate site (primary or secondary).
  2. 1) A low performance network connection exists between the main headquarters and the branch office. 2) Local administrative staff are available to manage SMS locally. 3) There is political and organizational pressure to segregate the sites. 4) Software distribution will be used extensively between the main headquarters and the branch offices.

  3. Using the situation in question 1 above, name three circumstances which would suggest combining branches into one or more larger sites.
  4. 1) Fast and underutilized network connections exist between the main headquarters and branch offices. 2) There is a need to reduce administrative tasks by implementing sites only at the main headquarters. 3) Hardware inventory is the only SMS function that will be implemented between the main headquarters and the branch offices.

  5. The IS department for a corporation is located in an engineering office that supports about 100 employees. The main headquarters of the corporation is located in another city and supports 3,000 employees. Given that each location is a primary site, where would you locate the central site?
  6. The central site should be located at the main headquarters where most employees are being supported. This will reduce the amount of network traffic generated from intersite communications.

Chapter 10

  1. How and where are logon points created in the SMS Administrator console? How is this different from the way in which other site systems are created?
  2. Logon points are created in the SMS Administrator console from the Discovery Methods and Client Installation Methods node. Other site systems are created from the Site Systems node.

  3. What is the purpose of the *.CT1, *.CT2, and *.CT0 files?
  4. These files are involved in change management. The Hierarchy Manager creates a *.CT1 file to inform the SMS Site Control Manager of a proposed change. The Site Control Manager reads the *.CT1 proposed change, makes a copy of the master site control file (*.CT0) and initiates the change. A *.CT2 file is created and returned to the Hierarchy Manager to update the database with the changes made to the system.

  5. Name a common use for a component server site system.
  6. All site systems are considered component servers. A common use of a component server is to provide a WAN Sender connection to other sites. This is often implemented using the RAS dial-out client software.

  7. Name one way that the site layout is different from the trace layout in Network Trace.
  8. The site layout shows the entire network structure of the site. The trace layout only traces the path from the selected site system back to the site server.

Chapter 11

  1. From the SMS Administrator console running at site S01, how can you tell whether the parent-child relationship has been established?
  2. View the site hierarchy from the parent site server (S01). The child site server name will be added to the hierarchy below the parent site.

  3. What is the child site's parent code?
  4. S01

  5. What are the site boundaries for the child site?
  6. 128.1.0.0

  7. What address and account is the child site using when communicating with the parent site?
  8. SERVER1 and DOMAIN1\SMSSERVICE.

  9. How can you tell whether the site is a primary or secondary site?
  10. The `Type' value designates primary or secondary site status.

Review

  1. What is the difference between a parent site and a child site?
  2. A parent site is a site with subsites below it. A child site is a site that has a parent site.

  3. What type of site, primary or secondary, can be configured as a parent site?
  4. Only a primary site can be a parent site.

  5. What is the maximum number of senders that can be configured from one site to another?
  6. Each site can support one of each sender type. Therefore, a total of six sender types can be configured to communicate between sites: Standard Sender, SNA RAS Sender, Asynchronous RAS Sender, ISDN RAS Sender, X.25 RAS Sender, and the Courier Sender.

  7. Which senders fully support site-to-site communications?
  8. All senders except the Courier Sender fully support site-to-site communications. The Courier Sender supports only site-to-site package transfer using removable media.

  9. Explain the purposes of an address and a sender.
  10. The purpose of an address is to tell the sender how to reach the other site and how the network should be utilized when data is transmitted from one site to another. The purpose of a sender is to provide a mechanism for transporting data from one site to another.

  11. Explain the functions of address rate limits, address schedules, sender control settings, and sender priorities.
  12. Rate limits tell the sender how much and when the network connection should be utilized for transmitting data from one site to another. A schedule tells the sender when an address is available to receive data and what level of data priority is necessary to send data. Sender control settings control how many sender threads are created to send data from one site to another site or from one site to all sites. Retry settings control how many times and how often the sender attempts to transmit data between sites. In a multiple-sender configuration, sender priorities control the order of priority among all senders configured for a site. If a sender fails, the next highest priority sender transmits the data.

  13. List the advantages of assigning multiple addresses and senders to a site.
  14. 1) Provide redundancy in case of sender failure. 2) Provide more than one route for sending multiple jobs. 3) Provide the option of scheduling senders based on cost and time of transmission.

  15. How does a parent site receive information about resources at a child site?
  16. Discovery data is sent from the child to the parent site.

  17. Why is it not necessary to configure an address between site servers that are more than one-level deep in the hierarchy?
  18. If a package and other data must be sent from a primary site to a site that is more than one-level deep in the hierarchy, the data can be sent via package routing.

Chapter 12

  1. What accounts have security rights configured by default?
  2. NT Authority\System and Administrator.

  3. What objects have security rights configured by default?
  4. Collections, packages, advertisements, status messages, sites, and queries.

  5. What types of object instances can have security rights assigned?
  6. All object instances of each object class.

  7. According to the default security rights, what objects should a standard user be able to access in the SMS Administrator console?
  8. A user should not be able to access any objects.

  9. Were you successful? Why or why not?
  10. No. The shortcut to the SMS Administrator console could not be found.

  11. Were you successful in viewing the properties of the file? Why or why not?
  12. No. NTFS permissions prevented access to the file.

  13. Who has permissions to this directory?
  14. The Administrators local group with Full Control permission and the SMS Site System Connection account with Read permission.

  15. Were you successful? Why or why not?
  16. Yes. NTFS permissions allowed access to the required files.

  17. Were you successful in connecting to the SMS site database? Why or why not?
  18. No. The user does not have permissions to the SMS site database through the WBEM/SMS Provider interface.

  19. Were you successful? Why or why not?
  20. Yes. NTFS permissions allowed access to the required files.

  21. Were you successful in connecting to the SMS site database? Why or why not?
  22. Yes. The user does have the required permissions to the SMS site database through the SMS Provider.

  23. Are any collections displayed?
  24. No.

  25. Are you able to create a new collection?
  26. No.

  27. Are any queries displayed?
  28. No.

  29. Are any packages displayed?
  30. No.

  31. Are any packages displayed?
  32. Yes.

  33. Are the package properties displayed?
  34. Yes.

  35. Are you able to create a new package? Why or why not?
  36. No. Only Read permissions were granted.

  37. Are any queries displayed?
  38. No.

  39. Are you able to create a new query? Why or why not?
  40. No. No permissions to queries were granted.

  41. What account is listed as the SMS Service account? When was this account created?
  42. DOMAIN1\SMSService. This account was created during SMS setup.

  43. Of what groups is this account a member?
  44. Administrators, Domain Admins, and Domain Users.

  45. Which SMS services use the SMSService account to run?
  46. Info Agent, Info APS, Info Sentinel, SMS_Executive, SMS_Site_Component_Manager, and SMS_SQL_Monitor.

  47. What is this account used for?
  48. It is used for remotely installing Windows NT client computers when the logged-on user does not have local administrator permissions.

  49. What account is used when there is no assigned SMS Client Remote Installation account?
  50. The SMS Service account. For your configuration, it is DomaiN1\SMSService.

  51. How is the SMS Service account able to install the SMS client computer software on the Windows NT client computer?
  52. The SMS Service account must be added as a local administrator. This is accomplished by the automatic inclusion of the Domain Admins global group as a member of the client computer's Administrators local group.

  53. Is there an account listed for the SQL Server account? Why or why not?
  54. No account is listed if integrated security is used. Standard security is being used for the site database, it displays sms_serv as the SQL Server account. This is the SQL Server account you created in Chapter 2 to access the site database.

  55. What account is listed as the service account?
  56. SWMAccount.

  57. Of what groups is this account a member?
  58. Administrators and Domain Users.

  59. Switch to the Services application to determine which SMS services use the software metering account to run.
  60. SMS_LICENSE_SERVER.

  61. What account is listed for the client connection account?
  62. DOMAIN1\SMSClient_S01.

  63. Of what groups is this account a member?
  64. Domain Users.

  65. Switch to the Services application to determine which SMS services, if any, use the SMS Client Connection account to run.
  66. No services on the site server use this account to run.

  67. Of what groups is this account a member?
  68. Administrators and SMSInternalCliGrp.

  69. Of what groups is this account a member?
  70. Administrators.

  71. Does the account exist in the domain?
  72. No.

  73. How do the Windows NT Workstation client computer SMS components connect to site systems if the SMS Client Service account does not exist at the site server?
  74. The SMS client components on the Windows NT client computer connect to the SMS site systems using the SMS Client Connection account.

  75. Under Connected Users, which client account is connected to the server?
  76. The SMS Client Connection account, SMSClient_S01.

  77. Are any accounts listed as a site system connection account?
  78. No.

  79. Do any server connection accounts exist?
  80. Yes, SMSServer_S01.

  81. Of what groups is this account a member?
  82. Domain Users.

  83. When is this account used?
  84. This account is used when SMS_Executive services, running on servers other than the site server, need to connect to the site server to transfer files.

  85. Do any server connection accounts exist?
  86. Yes, SMSLogonSvc.

  87. Of what groups is this account a member?
  88. Administrators and Domain Users.

  89. Which service uses this Server Connection account, which was identified earlier in this exercise.
  90. The SMS_NT_Logon_Discovery_Service on the domain controller uses this account to connect to the site server to transfer data discovery records (DDRs).

Review

  1. You are concerned about users logging on to your site server, starting the SMS Administrator console, and administering the SMS site. Should you be concerned? Why or why not?
  2. No, there is no need for concern.

    First, the site server should be physically secured from user access (in a locked room). Next, the Windows NT account policies prevent the user from improperly accessing the SMS site server directory structure.

    If a user could physically log on to the site server, NTFS permissions would prevent the user from running the SMS Administrator console. Further, the user would need permissions to access the data through the WBEM namespace. Finally, the SMS Provider would prevent the user from accessing any objects to which they do not have rights. By default, the user would have no rights.

  3. Your company has divided the tasks of administering SMS among three groups. One group will monitor status messages and log files. Another group will manage software distribution. The third group will manage site configuration. What should you do to limit members of each of these groups to their areas of responsibility?
  4. Each group should install the SMS Administrator console on local Windows NT Workstation computers.

    Windows NT global groups should be created for each administrative group.

    Appropriate users should be added to each Windows NT group.

    SMS security objects should be created for each group for the appropriate objects.

    For each group custom SMS snap-ins should be created that present the appropriate SMS objects.

  5. You have created a package and an advertisement for Windows NT client computers. All of the Windows NT client computers receive the package but the installation fails. You have thoroughly tested the application installation and know that this is not the cause of the failure. What is the cause of the failure?
  6. The installation routine is attempting to access network resources that the client computer user does not have the rights to access. If a program requires administrative permissions and network access, the program should be configured to use the Windows NT Client Software Installation account. This is done by selecting the `Use Windows NT client software installation account' checkbox on the program's Environment tab. This option is found under a package listed below the Packages node.

  7. A NetWare site system is properly configured in the SMS Administrator console. However, the user account configured in the SMS Administrator console is unable to access the NetWare server. You can connect to the NetWare server through the Windows NT Explorer on the site server. What is the most likely reason that access to the NetWare server is failing?
  8. The user account and password specified in the SMS Administrator console has not been created in the NetWare user account database.

Chapter 13

  1. The SMS Administrator console starts, but fails to connect you to the SMS database. What could be the problem?
  2. The MSSQLServer service is not running on the SQL Server. If all of the SMS services are stopped, connection to the site database will be successful.

  3. You have detected that your site is not updating when you change a setting in the SMS Administrator console. You also notice that tasks that you have scheduled are not running. What components are responsible for informing other SMS components of site configuration changes and running tasks scheduled through the Database Maintenance node?
  4. The SMS SQL Monitor process and the Trigger Manager thread.

  5. You check your site server services and see that there is no SMS SQL Monitor service running. Why not?
  6. SQL Monitor is installed on the computer running SQL Server. In this situation, SQL Server must be located on a computer other than the site server.

  7. It appears the site control file is corrupted. You are able to access the SQL Server database. Name two methods for restoring the site control file.
  8. 1) Restore SITECTRL.CT0 from a previous backup. 2) Run PREINST /DUMP to rebuild a site control file from the site database.

  9. You have chosen to run weekly backups of the entire SMS databases. You notice that the tempdb device continues to increase in size and you understand that it is not necessary to continually back up the transaction log device. What is one possible cause for the uncontrolled transaction log file growth?
  10. The `truncate log on checkpoint' option is disabled for tempdb. Enable this option so that the transaction log does not grow out of control.

  11. You have just completed a restoration of the SMS databases. The site server did not fail, so you did not need to reinstall SMS. What do you need to do to fully restore the SMS system?
  12. You have two choices:

    1) Restore the SMS registry keys and site control file that were saved with the database. This restores the system to its configuration when the backup was run.

    2) Reset the site through SMS setup, which will synchronize the database with the current SMS registry and site control file.

  13. You back up an SMS database, the site server SMS registry key, the NAL key, and the site control file on Monday. You add a new logon point to the site the following Wednesday, but do not back up the SMS registry keys. The site server fails on Friday. In restoring the site server and its database, how do you restore the logon point added on Wednesday?
  14. If a Windows NT/2000 domain controller is part of a domain that is defined using the Windows Networking Logon Discovery method or the Windows Networking Logon Installation method, SMS will automatically install it as a logon point. If a NetWare server is enabled using the NetWare Bindery Logon Discovery method, the NetWare NDS Logon Discovery method, the NetWare Bindery Client Installation method, or the NetWare NDS Client Installation method, then the logon point will automatically reinstall. If the NetWare server does not appear using these discovery or installation methods, add it through the SMS Administrator console.

Chapter 14

  1. Which components are actual SMS services (processes)? Hint: Sort the list of components by clicking the `Component Type' column.
  2. SMS_EXECUTIVE, SMS_SITE_COMPONENT_MANAGER, SMS_SQL_MONITOR, and SMS_NT_LOGON_DISCOVERY_AGENT

  3. Which components have a status of `Stopped'? Hint: Sort the list of components by clicking the `Status' column.
  4. SMS_NETWORK_DISCOVERY and SMS_WINNT_SERVER_DISCOVERY_AGENT.

  5. How large is the drive on which SMS is installed?
  6. If the instructions in "About This Book" are followed, the size of the SMS installation drive (drive D:) is approximately 2GB or larger.

Review

  1. You regularly monitor your Windows NT Server running as a site server. You notice SMS application events appearing in the Windows NT Event Viewer Application log. Why is this happening and how can you stop SMS application event logging to the Windows NT Event Viewer?
  2. Someone has enabled a status filter rule that logs events to the Windows NT Event Viewer Application log. Find and disable the status filter rule in the details pane of the Status Filter Rules node that is logging events to the Windows NT Event Viewer Application event log.

  3. You use the SMS Service Manager to stop SMS Executive. You then query all of the components appearing in the SMS Service Manager and notice that many components have stopped. Why did stopping the SMS Executive also stop many of the components appearing in the SMS Service Manager?
  4. The SMS Executive is a process that runs many threads appearing in the SMS Service Manager. When the SMS Executive is stopped, so are all of the threads run by the SMS Executive.

  5. You stop the SMS Component Manager, the SMS Executive, the SMS SQL Monitor, and the SQL Server running the site database. You then run WBEMTest and notice that you can connect to the WBEM site namespace. You then attempt to access site object instances and the procedure fails. Why were you able to access the site namespace but not site object instances?
  6. The SMS site namespace is stored in the WBEM repository, not the site database. Therefore, even though the SQL Server running the site database was stopped, the namespace is still available. Object instances, however, are stored in the site database. Therefore, you must first start the SQL Server running the site database before accessing this information.

  7. After installing HealthMon on your site server, you register all of your Windows NT/2000 computers in the site as monitored systems. No data appears in HealthMon except down arrows next to all registered computers. Why is this happening?
  8. The HealthMon Client Agent must be installed on all Windows NT/2000 computers that will be monitored by HealthMon.

  9. From the primary site server, you install a secondary site server. The status of the secondary site server in the SMS Administrator console is 'Pending.' You wait 48 hours, verify that your addresses to and from the secondary site server are correct, and ensure that the computer being configured as a secondary site server is accessible from the primary site server. You check the computer that will be a secondary site server to see if the secondary site server package has been delivered. You see that the package has been delivered, but it has not been installed. What are two possible causes for the p`Pending' status? Also, what log file should you analyze to determine the cause of the failure?
  10. There are a number of reasons why a secondary site installation fails. Two possible causes are that the service account used to install the secondary site server does not have enough rights to the secondary site server. This account must be granted administrative privileges to the secondary site server and be granted the `Logon as a service' advanced user right to complete the installation. Another cause for a secondary site server installation failure is a lack of disk space or the fact that there are no partitions formatted to NTFS. Review the SMS_BOOTSTRAP.log on the computer targeted for the secondary site server installation.



Microsoft Systems Management Server 2.0 Training Kit
Microsoft Systems Management Server 2.0 Training Kit
ISBN: 1572318341
EAN: 2147483647
Year: 1999
Pages: 107

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net