1. Trang chủ
  2. » Công Nghệ Thông Tin

Windows 2000 Server PHẦN 10 doc

77 157 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Review Questions 645 5. Which remote access authentication method should you use if you want the RAS server and the remote access client to negotiate an authentication scheme or use an authentication scheme that clients with smart cards can use? A. EAP B. MS-CHAP v2 C. CHAP D. PAP 6. Which remote access authentication method should you use if you have no idea which client software will be used and you want to support plain text passwords? A. EAP B. MS-CHAP v2 C. CHAP D. PAP 7. Which remote access authentication method should you use if you need to support non-Microsoft clients using the Message Digest 5 hashing scheme to encrypt the response that is sent from the RAS client to the RAS server? A. EAP B. MS-CHAP v2 C. CHAP D. PAP Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com 646 Chapter 13  Managing Remote Network Connections 8. Which technology is used to allow several physical connections to be combined into single logical connection for remote network access? A. MPPC B. BAP C. LCP D. Multilink 9. Which of the following protocols is used with remote access to specify how much bandwidth should be allocated to a specific connection? A. MPPC B. BAP C. LCP D. Multilink 10. Which of the following protocols is used to specify that any data that is sent over the remote access or demand-dial connection should be compressed? A. MPPC B. BAP C. LCP D. Multilink 11. A user is having difficulty connecting to the RAS server. You decide to enable PPP logging to attempt to troubleshoot the problem. After logging is enabled, where can you find the log file? A. \Windir \Logs\ppp.log B. \Windir \Ras\ppp.log C. \Windir \Tracing\ppp.log D. \Windir \System32\ppp.log Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com Review Questions 647 12. Which of the following options is not set as a part of the remote access profile? A. Dial-in constraints, which are used to configure restrictions such as maximum session time and the dial-in access telephone number B. IP settings, which restrict IP address assignment and allow you to configure IP packet filters for the connection C. Port settings, which define whether users have dial-in or dial-out access D. Multilink settings, which are used to configure multilink settings and BAP settings 13. Which of the following utilities is used to configure dial-in permissions for a specific user on a Windows 2000 domain controller? A. Routing and Remote Access B. Dial-in Administrator C. Active Directory Users and Computers D. Routing and Remote Access Security 14. You want your remote users to be able to connect to your Windows 2000 Server computer through the Internet. Which of the following routing and remote access configurations should you configure? A. Internet connection server B. RAS server C. Virtual private network (VPN) server D. Internet private network (IPN) server 15. Which of the following remote client protocols are installed on an RAS server by default? A. TCP/IP B. IPX C. NetBEUI D. Whatever protocols are installed on the server Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com 648 Chapter 13  Managing Remote Network Connections Answers to Review Questions 1. D. The Point-to-Point Tunneling Protocol (PPTP) is not a connec- tion mechanism. 2. A. You can create server-side connections through Administrative Tools  Routing and Remote Access. Client-side connections are created through Control Panel, Network and Dial-up Connections. 3. C. When you install RAS servers or VPN servers, you have the option of installing a Remote Authentication Dial-In User Service (RADIUS) server, which is used to manage RAS servers centrally by providing a central authentication database. 4. A, D. The only authentication services that are provided by RAS server are Windows authentication and RADIUS authentication. RADIUS authentication requires a RADIUS server. 5. A. Extensible Authentication Protocol (EAP) is an authentication pro- tocol that allows the RAS server and the remote access client to negoti- ate an authentication scheme, such as Generic Token Card, MD5- Challenge, Transport Level Security (used with smart cards), and S/Key. 6. D. The PAP protocol uses plain text passwords and is the least secure authentication protocol. 7. C. CHAP is a challenge-response authentication protocol. It is used by non-Microsoft clients to provide challenge-response authentication using the Message Digest 5 (MD5) hashing scheme to encrypt the response that is sent from the RAS client to the RAS server. 8. D. Multilink connections are used to allow several physical connections to be combined into a single logical connection. This allows you to combine several slow-speed lines into a single logical higher-speed line. 9. B. The Bandwidth Allocation Protocol (BAP) or the Bandwidth Allocation Control Protocol (BACP) can be used to control how much bandwidth will be allocated to a specific connection. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com Answers to Review Questions 649 10. A. The Microsoft Point-to-Point Compression Protocol (MPPC) is used to compress any data that is sent over the remote access or demand-dial connection. 11. C. In the Event Logging tab of the RAS server Properties dialog box, you can specify whether Point-to-Point (PPP) logging is enabled. If you enable PPP logging, all of the events related to the PPP connection process will be written to the \Windir \Tracing\ppp.log file. 12. C. Port settings are not configured as a part of the remote access profile. 13. C. On a domain controller, you assign permissions to users who can access an RAS server through the Dial-in tab of the user Properties dialog box in the Active Directory Users and Computers utility. 14. C. VPN servers allow remote computers to connect to the network through the Internet. 15. D. When you install an RAS server, by default, it will try to install whatever network protocols you have installed on your server as the remote client protocols. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com Chapter 14 Optimizing Windows 2000 MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER  Deploy service packs.  Monitor and optimize usage of system resources.  Manage processes.  Set priorities and start and stop processes.  Optimize disk performance. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com O ne way to make sure that your Windows 2000 system is working at its best is to keep it up to date. Using the Windows Update utility, you can check for and download the latest software, such as drivers. You’ll also want to install Windows 2000 Server service packs as they become available, to fix bugs and sometimes add new features. To have an optimized system, you must monitor its performance. The tools for monitoring Windows 2000 Server are System Monitor, Performance Logs and Alerts, and Task Manager. With these tools, you can track memory, pro- cessor activity, the disk subsystem, the network subsystem, and other computer subsystems. This chapter begins with discussions of the Windows Update utility and service packs. Then you will learn how to monitor and optimize Windows 2000 Server using the System Monitor, Performance Logs and Alerts, and Task Manager utilities. You will also learn how to manage processes. The procedures for monitoring and optimizing Windows 2000 are the same for both Windows 2000 Server and Windows 2000 Professional. Keeping Windows 2000 Up to Date A n optimal operating system is one that is running the most up-to-date software and has had the most recent service pack installed. Microsoft provides the Windows Update utility to help you obtain updated Windows 2000 software. Microsoft issues service packs as necessary to update the operating system with bug fixes and new features. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com Keeping Windows 2000 Up to Date 653 Using the Windows Update Utility The Windows Update utility connects your computer to Microsoft’s Web site and checks your files to make sure that you have all of the latest and greatest updates. To use Windows Update, you must first have a valid Internet connection. Then simply choose Start  Windows Update to go to the correct URL for updates. For product updates, click the Product Updates option on the home page and follow the directions to choose which files you want to update. The files in the update section are arranged by the following categories:  Critical updates  Picks of the month  Recommended updates  Additional Windows features  Device drivers Within each category, you will see the available updates, along with a description, file size, and download time estimate for each update. Just check the files you want to update and click the Download icon to download your selections. Using Windows Service Packs Service packs are used to deliver bug fixes (and sometimes new features) to Windows operating systems. Windows 2000 offers a new technology for service packs called slipstream . With slipstream technology, service packs are applied once, and they are not overwritten as new services are added to the computer. This means that you should not need to reapply service packs after new services are added, which sometimes was required when Windows NT 4 service packs were applied.  Microsoft Exam Objective Deploy service packs. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com 654 Chapter 14  Optimizing Windows 2000 You can determine if any service packs have been installed on your computer by using the winver command. To issue this command, select Start  Programs  Accessories  Command Prompt. In the Command Prompt dialog box, type winver and press Enter. You will see a dialog box that shows which service packs are currently installed. Using System Monitoring Tools B efore you can optimize the performance of Windows 2000 Server, you must monitor critical subsystems to determine how your system is currently per- forming and what (if anything) is causing system bottlenecks. Windows 2000 Server ships with two tools that you can use to track and monitor system perfor- mance: the System Monitor utility and the Performance Logs and Alerts utility. You can access the monitoring tools by adding the System Monitor snap-in and the Performance Logs and Alerts snap-in to the MMC. The System Monitor snap-in is added as an ActiveX control. In Exercise 14.1, you will create a management console for monitoring system performance.  Microsoft Exam Objective Monitor and optimize usage of system resources.  Microsoft Exam Objective Optimize disk performance. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com Using System Monitoring Tools 655 All of the exercises in this chapter can be performed from either your Windows 2000 member server or domain controller. In Windows NT 4, the functions of the System Monitor utility and the Performance Logs and Alerts utility were implemented in the Performance Monitor utility. EXERCISE 14.1 Creating a Management Console for Monitoring System Performance 1. Select Start  Run, type MMC in the Run dialog box, and click the OK button. 2. Select Console  Add/Remove Snap-in. 3. In the Add/Remove Snap-in dialog box, click the Add button. In the Add Standalone Snap-in dialog box, select ActiveX Control and click the Add button. 4. In the Insert ActiveX Control dialog box, click the Next button. 5. In the Insert ActiveX Control dialog box, select System Monitor Control and click the Next button. Click the Finish button. 6. In the Add Standalone Snap-in dialog box, select Performance Logs and Alerts and click the Add button, then click the Close button. 7. In the Add/Remove Snap-in dialog box, click the OK button. 8. Select Console  Save As. 9. In the Save As dialog box, select Save in Administrative Tools (the default selection) and save the file as Monitor. You can now access this console by selecting Start  Programs  Administrative Tools  Monitor. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com [...]... generating excessive interrupts Leave System Monitor open, because you will use this utility again in Exercise 14.5 Using Multiple Processors Windows 2000 Server can support up to two processors (or four processors if you upgraded from Windows NT Server 4) Windows 2000 Advanced Server can support up to eight processors If your computer is capable of supporting multiple processors, you should follow the computer... also can affect your computer’s performance, so you should create baselines before and after you make any changes to your Windows 2000 Server configuration Copyright 2000 SYBEX , Inc., Alameda, CA www.sybex.com Using System Monitoring Tools 657 For the most part, Windows 2000 Server is a self-tuning operating system If you decide to tweak the operating system, you should take baselines before and... Tools Monitor and clicking Performance Logs and Alerts Figure 14 .10 shows the expanded Performance Logs and Alerts snap-in From here, you can define new counter logs, trace logs, and alerts, as described in the following sections Copyright 2000 SYBEX , Inc., Alameda, CA www.sybex.com 668 Chapter 14 Optimizing Windows 2000 FIGURE 14 .10 The expanded Performance Logs and Alerts snap-in Creating a Counter... performance object from the drop-down list All Windows 2000 system resources are tracked as performance objects, such as Cache, Memory, Paging File, Process, and Processor The sum of all objects represents your total system Some performance objects exist on all Windows 2000 computers; other objects appear only if specific processes or services are Copyright 2000 SYBEX , Inc., Alameda, CA www.sybex.com... real-time manner FIGURE 14.2 The chart view in System Monitor Copyright 2000 SYBEX , Inc., Alameda, CA www.sybex.com Using System Monitoring Tools FIGURE 14.3 The histogram view in System Monitor FIGURE 14.4 The report view in System Monitor Copyright 2000 SYBEX , Inc., Alameda, CA www.sybex.com 661 662 Chapter 14 Optimizing Windows 2000 Adding Counters To use System Monitor, you must add counters To... is generating spurious interrupts Copyright 2000 SYBEX , Inc., Alameda, CA www.sybex.com Using System Monitoring Tools 679 If you suspect that you have a processor bottleneck, you can try the following solutions: Use less processor-intensive applications Upgrade your processor If your computer supports multiple processors, add a processor Windows 2000 Server can support up to two processors, which...656 Chapter 14 Optimizing Windows 2000 Now that you’ve added the monitoring tools to the MMC, you can use them to monitor and optimize Windows 2000 The following sections describe how to evaluate your system’s current performance; how to use System Monitor and Performance Logs and Alerts;... Remove buttons You can also select a specific counter and define the color, scale, width, and size that is used to represent the counter in the graph Copyright 2000 SYBEX , Inc., Alameda, CA www.sybex.com 666 Chapter 14 Optimizing Windows 2000 FIGURE 14.8 The Data tab of the System Monitor Properties dialog box Graph Properties The Graph tab, shown in Figure 14.9, contains the following options, which... the next six months, you’re going to have a problem Before performance becomes so slow that your system is not responding, you can upgrade the hardware Copyright 2000 SYBEX , Inc., Alameda, CA www.sybex.com 658 Chapter 14 Optimizing Windows 2000 Using Alerts for Problem Notification The Performance Logs and Alerts utility provides another tool for proactive management in the form of alerts Through... location of the log file, the filename, the log file type, and the log file size FIGURE 14.13 The Log Files tab of the counter log Properties dialog box Copyright 2000 SYBEX , Inc., Alameda, CA www.sybex.com 670 Chapter 14 Optimizing Windows 2000 In the Schedule tab, shown in Figure 14.14, you can specify when the log file will start, when the log file will stop, and what action should be taken, if any, . procedures for monitoring and optimizing Windows 2000 are the same for both Windows 2000 Server and Windows 2000 Professional. Keeping Windows 2000 Up to Date A n optimal operating. any changes to your Windows 2000 Server configuration. Copyright 2000 SYBEX , Inc., Alameda, CA www.sybex.com Using System Monitoring Tools 657 For the most part, Windows 2000 Server is a self-tuning. performance of Windows 2000 Server, you must monitor critical subsystems to determine how your system is currently per- forming and what (if anything) is causing system bottlenecks. Windows 2000 Server

Ngày đăng: 07/08/2014, 02:22

Xem thêm: Windows 2000 Server PHẦN 10 doc