Custom Search

News World

Dec 29, 2008

FAQ - Windows Server 2003 – 06

1. What advantage does a failover cluster provide?

If one node in the cluster fails, the other node or nodes can continue doing the work the failed node was doing.


2. What technique allows the two nodes in a failover cluster to beproductive at the same time?

Active-active clustering allows both nodes to perform useful work. In the event that one node fails, the remaining node picks up the entire workload of both.


3. What are two examples of Microsoft server applications that arecluster-aware?

Microsoft SQL Server and Microsoft Exchange Server.


4. What are the basic requirements for an application to be cluster-compatible?

It must use TCP/IP to communicate with its clients; it must allow its data to be stored separate from its executable files; and its client software must tolerate brief timeouts during a cluster failover.


5. What server name should you connect to in order to manage a cluster?

The virtual server name that the cluster uses, rather than the individual names of the cluster nodes.


6. What service provides clustering appropriate for Web servers?

Network Load Balancing (NLB) provides a form of clustering and load balancing suitable for Web servers.


7. What is the difference between a certificate authority that youcreate and a commercial certificate authority like VeriSign?

Users’ Web browsers are preconfigured to trust certificates issued by VeriSign. They are not preconfigured to trust certificates issued by your own CA.


8. What basic certificate-issuing policy is included with CertificateServices?

The basic policy can be configured to immediately issue certificates or to wait for an administrator to approve a certificate before issuing it.


9. What are digital certificates used for?

Digital signatures, identification, and encryption.


10. What is the difference between a symmetric key and an asymmetric key?

A symmetric key’s two halves are identical and must be protected in order for the key to remain secure because either half can be used to encrypt or decrypt. An asymmetric key’s halves are different, and the public half does not need to be protected.


11. When should you conduct a performance baseline?

When your servers are first configured and placed into a normal production environment.


12. What is the purpose of performance trending?

To monitor performance over time so that you can predict when performance will fall below acceptable levels before it actually happens.


13. What are the four main areas of a computer that create performance bottlenecks?

Memory, network throughput, hard disk throughput, and processor speed.


14. What are the key elements in fine-tuning a file server’s performance?

Hard disk throughput and network throughput.


15. What are the key elements in fine-tuning an application server’s performance?

Memory, network throughput, hard disk throughput, and processor speed.


16. What are the key elements in fine-tuning Terminal Services performance?

Memory, processor speed, and, to a lesser degree, hard disk throughput.

No comments:

IT Conversations

Moneycontrol Latest News

Latest new pages on Computer Hope

Latest from Infoworld

Door Lock

Door Lock Import Top Door Lock from China Contact Quality Manufacturers Now