Question

Which of the following tools would be the most appropriate to use in order to ascertain whether a server was experiencin...

Which of the following tools would be the most appropriate to use in order to ascertain whether a server was experiencing a bottleneck in its CPU?

A. Remote Desktop Connection

B. Remote Desktops MMC snapin

C. Reliability and Performance Monitor, run remotely with focus directed to the server

D. Reliability and Performance Monitor, run locally on the server

Which is the correct answer and why?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The correct answer is D. Reliability and Performance Monitor, run locally on the server.

Reliability and Performance Monitor collects all the information related to the processes running in background, analyze the data and display the results graphically using System Stability Chart enabling the debugger to find the process(es) which is creating the bottleneck in its CPU.

And it should be run locally on the server so that the process which is creating bottleneck from another remote machine can be detected.

Hence the correct answer is Reliability and Performance Monitor, run locally on the server.

Add a comment
Know the answer?
Add Answer to:
Which of the following tools would be the most appropriate to use in order to ascertain whether a server was experiencin...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • which one of the following tools would be most appropriate for marking copy in a textbook

    which one of the following tools would be most appropriate for marking copy in a textbook?a)dark red highlighter b)ballpoint pen c)felt-tip marker d)pencel

  • 2. Which one of the following types of audits would be most likely to focus on...

    2. Which one of the following types of audits would be most likely to focus on objectives related to the efficient use of resources? a. Operational audit b. Independent audit c. Compliance audit d. Information systems audit 3. Which of the following is a reason for independent checks? a. To assess an employee and determine whether he or she is following control procedures b. To detect and correct errors and misappropriation of assets c. To ensure that mistakes can be...

  • Which of the following matters would an auditor most likely consider to be a significant deficiency to be communicated to the audit committee

    1. Which of the following matters would an auditor most likely consider to be a significant deficiency to be communicated to the audit committee? A. Management's failure to renegotiate unfavorable long-term purchase commitments.B. Recurring operating losses that may indicate going concern problems.C. Evidence of a lack of objectivity by those responsible for accounting decisions.D. Management's current plans to reduce its ownership equity in the entity. 2. After obtaining an understanding of internal control and arriving at a preliminary assessed level...

  • 1) analyze the following case 2) give a summary and suggest ways for the company ——————...

    1) analyze the following case 2) give a summary and suggest ways for the company —————— Salesforce.com, one of the most disruptive technology companies of the past few years, has single-handedly shaken up the software industry with its innovative business model and resounding success. Salesforce provides customer relationship management (CRM) and other application software solutions in the form of software as a service leased over the Internet, as opposed to software bought and installed on machines locally. The company was...

  • Which of the following is an advantage of technology in nursing practice? a. inclination of nurses...

    Which of the following is an advantage of technology in nursing practice? a. inclination of nurses to focus on the equipment rather than the patient b. increased ability to monitor patients remotely c. increased confidentiality of patient information d. reliability of internet resources 2. When using computers in direct patient care, it is important to remember to: a. assess the patient and provide care based on the individual's needs b. look up the clinical practice guidelines for each illness use...

  • Learn to apply your ethical values using the Giving Voice to Value (GVV) method. There are...

    Learn to apply your ethical values using the Giving Voice to Value (GVV) method. There are multiple GVV documents in this Module. Review them all. You may do the exercises suggested in the documents but you do not have to post them in Canvas. You will learn how to factor your personal values into your ethical decisions from the method, you will still use the IDEA case analysis method when analyzing the GVV case, The Client Who Fell Through The...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT