Apply Your Knowledge


In this chapter, you have examined some basic means to troubleshoot problems in Windows Server 2003. In the following exercises, you will practice some of the concepts and methods discussed in this chapter.

Exercises

9.1. Creating a Baseline Counter Log

In this exercise, you will use the Performance console to create a baseline counter log. You will then be able to use the baseline as a comparison point for future performance monitoring.

Estimated Time: 30 minutes

  1. Open the Performance console.

  2. Expand the Performance Logs and Alerts node and click the Counter Logs entry.

  3. Create a new counter log and name it BASELINELOG1.

  4. Add entire objects or specific counters as desired. For this example, add the Packets Sent/Sec, Packets Received/Sec, and Packets Received Errors counters.

  5. Leave the default data collection rate and account settings as is.

  6. Configure the type of log file to be used as binary. Choose the numbering system of your choice.

  7. Leave the default schedule of manual activation as is.

  8. Click OK to save the counter log settings.

  9. Allow the counter log to run for approximately 20 minutes and then stop the counter log.

  10. Switch to the System Monitor node and click the database icon to open the counter log for viewing.

  11. Click the Add button to locate and add the counter log file.

  12. On the Data tab, ensure that you have configured all the same counters to be displayed as you used in the counter log itself. Click OK. The counter log data is displayed in the System Monitor.

9.2. Monitoring Performance

In this exercise, you will monitor the current performance characteristics of a computer's network adapter.

Estimated Time: 15 minutes

  1. Open the Performance console.

  2. Click System Monitor.

  3. Click the + icon to open the Add Counters dialog box. Add the counters you want to monitor on your computer. These might include Packets Sent/Sec, Packets Received/Sec, and Packets Received Errors.

  4. Click Close when you are finished. Watch the configured counters for 10 minutes while performing various activities that require network transfer to and from your computer.

9.3. Capturing Network Traffic

In this exercise, you will use the Network Monitor to capture traffic going to and from a Windows Server 2003 computer.

Estimated Time: 15 minutes

  1. Open the Network Monitor. If prompted to do so, select the network to be monitored.

  2. Click Capture, Start to begin the capture session. Network Monitor records activity to and from this computer. You can generate some activity by sending a ping command or browsing the Internet.

  3. Select Capture, Stop and View to examine the results of the network data capture.

  4. Double-click any packet to examine it in greater detail. You can scroll through the list in the Summary pane and click any packet you want to examine in the Detail and Hex panes.

  5. Close the Display window to return to the Network Statistics window.

Exam Questions

1.

You are a network consultant and have been hired by Fruity Flavor Beverage Distribution Group, Inc. You have been brought in to determine what protocols are running on the network that do not need to be running. What should be the first tool that you use to determine what network protocols are and are not required on the Fruity Flavor Beverage Distribution Group network?

A.

System Monitor

B.

kerbtray.exe

C.

Counter logs

D.

Network Monitor


2.

You are the systems administrator for Bob's Boom Shack, a stereo retailer. You have recently completed a network capture using the Network Monitor. You did not set any capture filters before beginning the capture, and now you have more than 100,000 packets of capture data. You need to be able to quickly discard all packets except those related to AppleTalk. What can you do?

A.

Create a capture filter and start a new capture.

B.

Click the Protocol column heading to sort the packets by protocol.

C.

Create a display filter to filter out all protocols except those related to AppleTalk.

D.

Purchase the full version of Network Monitor that comes with SMS.


3.

You are an assistant network technician for Joe's Jackhammer, Ltd. For some time now, you have been collecting reports about a general slowdown in network performance. You suspect that some of your legacy Windows 95 and Windows 98 workstation computers may be flooding the network with broadcast traffic. What tools could you use to determine how much broadcast traffic is being seen at specific Windows Server 2003 computers on the network? (Choose two.)

A.

Application log

B.

Network Monitor

C.

System Monitor

D.

pathping

E.

nslookup


4.

You are an assistant network technician for Joe's Jackhammer, Ltd. You have decided that you will use the Network Monitor to gather information about why one of the network's Windows Server 2003 computers seems to be responding slowly despite showing no memory or CPU problems. You suspect that the cause of the problem is a flood of broadcast traffic from some of the Windows 95 computers located on the same subnet as the Windows Server 2003 computer. From where do you need to perform the installation of the Network Monitor?

A.

The Manage Your Server window

B.

The Windows Components Wizard

C.

The SUPPORT\TOOLS folder on the Windows Server 2003 CD

D.

The Windows Server 2003 Resource Kit


5.

You are the systems administrator for Not Quite Evil Enough Enterprises, Inc. You have just completed a 30-minute Network Monitor capture on one of the network's Windows Server 2003 computers. During this time, you have accessed several Internet Web sites, performed file transfers, and pinged this server from another workstation. You are trying to monitor DNS and browser traffic to and from this server, but when you look at the capture log, you see nothing for these two protocols. What is the most likely reason for this problem?

A.

You did not specify that these protocols were to be captured.

B.

You created a capture filter that excluded these protocols.

C.

You created a display filter that excluded these protocols.

D.

The capture buffer overflowed and dumped the data for which you were looking.


6.

You are the third-shift systems administrator for Bob's Bull Riding College. You have just completed the installation and configuration of a new Windows Server 2003 file server. What should you do on this new computer over the next day or so to provide troubleshooting guidance in the future should network traffic problems occur?

A.

Remove all unnecessary protocols from the server's network adapters.

B.

Create a baseline counter log that documents what the server's performance was like at the time it was placed on the network.

C.

Check the event logs to ensure that no abnormal events occurred when the computer was joined to the network.

D.

Configure and implement IPSec to secure network traffic to and from the file server.


7.

You are trying to monitor the performance statistics of your Windows Server 2003 computer's network interface. You have only one network interface installed on the computer. After you have selected the desired counters from the Network Interface object and returned to the System Monitor, you see no performance statistics displayed for the selected counters, even though you have been accessing Internet Web sites and transferring files across the network. What is the most likely cause of this problem?

A.

The network interface is disabled.

B.

The network interface does not support the System Monitor.

C.

You have selected the internal loopback network interface.

D.

You did not click Add to add the counters to be monitored.


8.

You have recently completed the configuration of a baseline counter log that you will use to collect data about the performance of a new server you have just placed on the network. You configured a maximum log file size of 1MB. You let the counter log run for approximately six hours before stopping it. When you look at the data you have collected, you see only a fraction of this total time displayedthe last 45 minutes or so that you had the counter log catching data. What is the most likely reason for this problem?

A.

There has not been enough activity to generate more data than this.

B.

You configured the file type as binary.

C.

You configured the file type as binary circular.

D.

The computer was experiencing operating system instability problems that prevented the collection of more data.


9.

You are configuring a counter log that is to run automatically each day and collect information about the performance of the network interface installed in your file server. Which of the following log numbering systems would most likely make the resulting counter logs easy to track back to the date and time they were created?

A.

nnnnnn

B.

yyyymm

C.

mmddhhmm

D.

yyyymmddhh


10.

You are the systems administrator for Joe's Crab Shack, a regional restaurant chain. Your in-house development team is currently developing a new Point of Sale (POS) application that operates in a client-server arrangement. Because the application is still in development, the developers want to be informed every time one of the application's services stops. What can you do to ensure the developers are automatically informed of service failures?

A.

Configure the services so that they automatically restart upon a failure.

B.

Configure the services to run a program upon failure.

C.

Configure the services to restart the server automatically upon a failure.

D.

Configure the services to use a different logon account.


11.

You are the systems administrator for Widgets and Hammerstein, LLC. You have a 10-node Windows Server 2003 Web cluster that provides a Web-based application to your internal network. The Web-based application is a custom-developed application that sometimes causes the SNMP service on the servers to stop. In the past, this service has been very difficult to restart after a failure caused by this application. You need the SNMP Service running to facilitate status monitoring on your server. How can you configure the service to ensure it will be restarted after a failure occurs?

A.

Configure the service so that it will automatically restart upon a failure.

B.

Configure the service to run a program upon failure.

C.

Configure the service to restart the server automatically upon a failure.

D.

Configure the service to use a different logon account.


12.

You are a network consultant hired by Claire's Clown Colleges, Inc. Claire, the owner, has asked you to help her systems administrators determine what, if any, servers on their network are transmitting usernames and passwords in clear text during FTP sessions. Which tool should you use to collect the information you need to provide Claire with her answer?

A.

Application log

B.

Network Monitor

C.

System Monitor

D.

Counter logs


Answers to Exam Questions

1.

D. The first tool you would normally use to analyze the network for nonrequired, and usually troublesome, networking protocols is the Network Monitor. Recall that the version supplied in Windows Server 2003 can be used only to capture traffic sent to or from the computer on which it is running. The System Monitor, and any Counter Logs it might create, would not be useful in troubleshooting unneeded network services; thus Answers A and C are incorrect. The kerbtray.exe tool is useful for monitoring and troubleshooting Kerberos ticket issues; thus Answer B is incorrect. For more information, see the section "Using the Network Monitor."

2.

C. In this case, the best option is to create a display filter that shows only AppleTalk-related protocols. You will not actually be losing any datajust filtering it out. You've already run the capture; thus there is no real reason to do it again. Therefore, Answer A is incorrect. Sorting will not eliminate any data; thus Answer B is incorrect. There is no need to use the Network Monitor included in SMS, as you have already performed the capture; thus Answer D is incorrect. For more information, see the section "Interpreting Captured Data."

3.

B, C. You can use both the Network Monitor and the System Monitor to determine how much broadcast traffic a particular server is being subjected to. The Network Monitor also allows you to determine the source and contents of the broadcast traffic, which can be helpful when you're performing additional troubleshooting. The Application Log in the Event Viewer is not going to have any useful information about what you need to see; thus Answer A is incorrect. The pathping and nslookup tools won't help you determine how much traffic a server is receiving; thus Answers D and E are incorrect. For more information, see the sections "Using the Network Monitor" and "Using the System Monitor."

4.

B. The scaled-down version of the Network Monitor that is included in Windows Server 2003 can be installed from the Windows Components Wizard under the Management and Monitoring option group; thus Answers A, C, and D are all incorrect. For more information, see the section "Installing Network Monitor."

5.

B. The most likely reason that you are not seeing any DNS or browser traffic in the capture logs is that you inadvertently filtered (excluded) the logs from being captured through a capture filter. Capture filters capture only protocol types that are enabled; thus Answer A is incorrect. Conversely, a display filter can be used after a capture has been completed to display only specific protocols; thus Answer C is incorrect. The buffer may dump some traffic if it becomes full, but certainly not all of the traffic you're looking for in most cases; thus Answer D is incorrect. For more information, see the section "Interpreting Captured Data."

6.

B. The best thing for you to do at this time would be to configure a counter log that collects information about the performance of the server over the next day or so to use as a baseline for future troubleshooting efforts. This baseline log should contain counters for any pertinent objects that you will likely want to monitor and troubleshoot later, including network, memory, and other objects. In addition, you should consider creating a document that lists all applications and services that are running on the server. This can be helpful later, when you are trying to determine what might be causing changes in performance over time. Removing any unneeded protocols is never a bad idea, but won't accomplish the goal stated here; thus Answer A is incorrect. Checking the event logs is also a good idea, but doesn't help for future troubleshooting; thus Answer C is incorrect. Configuring IPSec is not mentioned in the question and has no value in future troubleshooting efforts; thus Answer D is incorrect. For more information, see the section "Creating Baseline Counter Logs."

7.

C. The most likely reason for this problem is that you have mistakenly selected the internal loopback interface instead of the actual network interface that the computer is using. By default, the loopback interface is selected if the name of the network interface starts with a letter after I. Although certainly possible, having the network interface disabled is not the most likely reason for this problem; thus Answer A is incorrect. Any network interface that is installed and operating properly in Windows can be monitored by the System Monitor; thus Answer B is incorrect. The problem statement indicates that you did in fact add counters and are seeing no activity on the counters; thus Answer D is incorrect. For more information, see the section "Monitoring Performance by Using the System Monitor."

8.

C. Configuring the counter log file format as binary circular causes the log file to overwrite older information when it has reached its maximum allowed size; thus Answers A, B, and D are incorrect. For more information, see the section "Creating Baseline Counter Logs."

9.

D. The yyyymmddhh log numbering format would provide the easiest method of determining the data and time each counter log was created. Using the nnnnnn format will produce logs that are sequentially numbered, but do not readily indicate the date and time they were created; thus Answer A is incorrect. Using the yyyymm format will only indicate the year and month the log was created; thus Answer B is incorrect. Using the mmddhhmm format is not a bad choice, but it does not indicate the year the log was created; thus Answer C is incorrect. For more information, see the section "Creating Baseline Counter Logs."

10.

B. Because you need to provide the developers with notification each time a service fails, but you'd probably rather not manually inform them once you detect a service failure, your best course of action is to configure the services to run a program upon failure. As an example, many command-line SMTP mailers exist that can be called from a DOS batch (.bat) file that can send a notification to your Exchange server, and thus to your developers; thus Answers A, C, and D are incorrect.

11.

C. Because the service is prone to failures caused by your Web-based application and the service is often difficult to restart after a failure, you should configure the service to restart the server upon a failure of the service; thus Answers A and B are incorrect. Because the servers are part of a 10-node Web cluster, they should be able to be safely restarted in the event of a failure of the service. Using a different logon account won't help if the service is running and then stopping due to another application; thus Answer D is incorrect. For more information, see the section "Configuring Service Properties."

12.

B. You will need to use the Network Monitor, installed on each server, to collect network traffic. Once you have performed your captures (using no capture filters), you can configure display filters to include only TCP/IP and FTP traffic. The user names and passwords for the FTP sessions will be very easy to find after the filter is in place. The Application Log in the Event Viewer will not contain the information you need; thus Answer A is incorrect. The System Monitor and any counter logs it creates will not help you determine what you need to know; thus Answers C and D are incorrect. For more information, see the section "Using the Network Monitor."




MCSA(s)MCSE 70-291(c) Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
MCSA/MCSE 70-291: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam Prep)
ISBN: 0789736497
EAN: 2147483647
Year: 2006
Pages: 196
Authors: Will Schmied

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net