Chapter 2 Flashcards

1
Q

What is a disk sector?

A

A subdivision of a track

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Can which subdivision size of a drive can be changed?

A

An allocation unit (a.k.a a block or a cluster), NOT a sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the smallest amount of disk space that can be used when storing a file?

A

An allocation unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the term for space wasted in allocation units that are large than the file stored?

A

Slack space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What technique can be used to increase disk performance on volumes with large files?

A

Increase the allocation unit size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the default allocation size for an NTFS volume under 16 TB?

A

4,096 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the size of IO operations that Hyper-V uses for VHD files?

A

512 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the size of IO operations that Hyper-V uses for VHDX files?

A

4,096 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What setting can adversely affect the performance of Hyper-V disks?

A

Setting the allocation unit size smaller than the size of Hyper-V’s IO operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does GPT stand for?

A

GUID partition table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some disadvantages of MBR partition tables?

A

The boot sector is stored only in place at the beginning of the disk
Only 4 partitions are supported
Partitions are limited to 2 TB in size, because partition entries are 32-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some improvements brought by GPT?

A

The partition info is stored in multiple locations with CRC info to detect corruption
Volume size support up to 18 exabytes
Supports unlimited numbers of partitions, though Windows limits to 128 per disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is required to boot from a GPT disk?

A

An EFI-based boot partition, UEFI firmware, and a 64-bit version of Windows (at least Server 2008 or Vista)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the default parition style created by Server Manager in Server 2016?

A

GPT, it has no controls supporting MBR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the default parition style created by the Disk Management MMC?

A

MBR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is Server 2016 available in 32-bit?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of boot sector does a Hyper-V Generation 1 VM require?

A

MBR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of boot sector does a Hyper-V Generation 2 VM require?

A

UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the maximum size of a VHD?

A

2 TB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What versions of Windows are VHDs compatible with?

A

Server 2008 or Windows 7 and above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the maximum size of a VHDX?

A

64 TB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What versions of Windows are VHDXs compatible with?

A

Server 2012 or Windows 8 and above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What tools can be used to create VHDs and VHDXs?

A

The Disk Management MMC or PowerShell’s New-VHD cmdlet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What PowerShell commands are used to create a VHD?

A

Install-WindowsFeature -Name Hyper-V-PowerShell

New-VHD -Path c:\disk.vhdx -SizeBytes 100GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the default size allocation type for VHD’s created by PowerShell?

A

Dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What PowerShell option is used to create a fixed-size VHD?

A

-Fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What options are used to create a differencing disk in PowerShell?

A
  • ParentPath # Specifies the parent disk

- Differencing # Specifies that a differencing disk be created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What option is used in PowerShell to copy a physical disk to a VHD?

A

-SourceDisk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What tools can be used to mount a VHD?

A

Disk Management MMC or the Mount-DiskImage or Mount-VHD cmdlets in PowerShell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What module is the Mount-DiskImage cmdlet included with?

A

Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What module is the Mount-VHD cmdlet included with?

A

Hyper-V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What PowerShell commands are used to mount disk images?

A

Mount-DiskImage -ImagePath c:\image.vhdx

Mount-VHD -Path c:\image.vhdx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What features does NTFS provide that are improvements of FAT?

A
ACL security
Long file names
Volume sizes up to 16 TB (w/ default 4KB allocation) or 256 TB (w/ 64KB allocation)
File compression
Encrypting file System (EFS)
Quotas
Volume Shadow Copy
Resizing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the maximum volume size supported by FAT?

A

4 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the maximum file size supported by FAT?

A

2 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the maximum volume size supported by FAT32?

A

While its theoretical maximum size is 2 TB, Windows will not apply this format to a drive larger than 32 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the maximum file size supported by FAT32?

A

4 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What two NTFS features are incompatible with each other?

A

File compression and EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the maximum volume size supported by ReFS?

A

1 yobibyte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the maximum file size supported by ReFS?

A

16 exabytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What filesystem is recommended by Microsoft for data storage?

A

ReFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What versions of Windows can read ReFS?

A

Server 2012 or Windows 8.1 and above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

When is the Share With tab available in File Explorer?

A

If you are the Creater Owner of a folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What sharing permissions are available in the Share With tab of File Explorer?

A

Users and Read or Read/Write permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What tool provides the most control for configuring file shares?

A

File And Storage Services in Server Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What two types of file sharing protocols are supported by Server 2016?

A

Server Message Block (SMB) and Network File System (NFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What storage role is installed by default in Server 2016?

A

Storage Services role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What storage role service must be installed to manage SMB shares in Server Manager?

A

File Server role service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What role service must be installed to create NFS shares?

A

Server for NFS role service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What PowerShell command is used to install SMB share management?

A

Install-WindowsFeature -Name FS-FileServer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What PowerShell command is used to install NFS share management?

A

Install-WindowsFeature -Name FS-NFS-Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the “SMB Share - Quick” profile used for?

A

Basic sharing with full share and NTFS permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the “SMB Share - Advanced” profile used for?

A

Providing additional services, such as access-denied assistance, folder classification, and quotas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What role service is required to use “SMB Share - Advanced” profile?

A

File Server Resource Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is the “SMB Share - Applications” profile used for?

A

Hyper-V, databases, and other applications that require special sharing settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which SMB sharing option prevents users from searching through folders they cannot access?

A

Enable Access-Based Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which SMB sharing option allows clients to keep copies of files on their local drives?

A

Allow Caching Of Share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which SMB sharing option allows for file access from clients at remote locations?

A

Enable BranchCache On The File Share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which SMB sharing option makes the server encrypt files before transmitting to the client?

A

Encrypt Data Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is the “NFS Share - Quick” profile used for?

A

Basic NFS sharing with authentication and permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is the “NFS Share - Advanced” profile used for?

A

Provides full share and NTFS permissions, plus access-denied assistance, folder classification, and quotas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What role service is required to use “NFS Share - Advanced” profile?

A

File Server Resource Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are the default permissions of shares created with File Explorer?

A

Everyone - Allow Read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What are the default permissions of shares created with Server manager?

A

Everyone - Allow Full Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What access is determined by share permissions vs. NTFS permissions?

A

Share permissions determine access from the network, whereas NTFS permissions determine access from both the network and the filesystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What are the three types of share permissions available?

A

Full Control, Change, and Read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What extra permissions does Full Control have over Change permissions?

A

The ability to change file permissions and to take ownership of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

How are parent folder sharing permissions related to subfolder sharing permissions?

A

They are not related: a user principle’s access is determined by each share they directly attempt to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What PowerShell command is used to create a new SMB file share?

A

New-SmbShare -Name ShareName -Path c:\folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What PowerShell options are used to delegate access to an SMB share?

A
  • FullAccess [group]
  • ReadAccess [group]
  • ChangeAccess [group]
  • NoAccess [group]
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What PowerShell option determines the number of users who can access an SMB share?

A

-ConcurentUserLimit

0 means unlimited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What PowerShell options are available to determine caching for SMB shares?

A
None
Manual  # Select files
Programs
Documents
BranchCache
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What PowerShell option is used to create an SMB share that only persists to the next reboot?

A

-Temporary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What PowerShell cmdlet is used to view active SMB sessions?

A

Get-SmbSession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What PowerShell cmdlet is used to terminate an active SMB session?

A

Close-SmbSession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What variables can be used to determine which SMB sesssion to terminate?

A

Session ID, computer name, username, or the open file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What PowerShell cmdlet is used to delete an SMB share?

A

Remove-SmbShare -Name ShareName

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What PowerShell cmdlet is used to view SMB share access?

A

Get-SmbShareAccess -Name ShareName

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What PowerShell cmdlet is used to provide SMB share access?

A

Grant-SmbShareAccess -Name ShareName -AccountName [account] -AccessRight []

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What PowerShell cmdlet is used to remove SMB share access?

A

Revoke-SmbShareAccess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What PowerShell cmdlet is used to add a Deny ACL to an SMB share?

A

Block-SmbShareAccess

82
Q

What PowerShell cmdlet is used to remove all deny permissions to an SMB share for a security principal?

A

Unblock-SmbShareAccess

83
Q

What PowerShell cmdlets are used to view and change SMB server settings?

A

Get-SmbServerConfiguration and Set-SmbServerConfiguration

84
Q

What is the name of a specific permission assingment in an ACL?

A

Access Control Entry (ACE)

85
Q

What is the name of a user, group, or computer granted permissions?

A

Security principal

86
Q

How does Windows refer to a security principal?

A

With a security identifier (SID)

87
Q

Are permissions stored in the protected element or the security principal?

A

The protected element

88
Q

When sharing on a network, which type of permissions are preferred?

A

NTFS permissions are preferred over Share permissions

89
Q

What kind of security principals does Microsoft recomend assigning permissions to?

A

Groups rather than users, because users can be removed from groups

90
Q

What is the name of the simplified set of permissions NTFS provides?

A

Basic permissions (previously known as standard permissions)

91
Q

What is the name of the more granular set of permissions NTFS profides?

A

Advanced permissions (previously known as special permissions)

92
Q

How many advanced permissions are available on NTFS?

A

14

93
Q

What are the two types of ACEs?

A

Allow and Deny

94
Q

What are the two approaches to assigning permissions?

A

Additive: start with no permissions and grant as needed
Subtractive: start with all possible Alllow permissions and Deny as needed

95
Q

What is the recommended approach to assigning permissions?

A

Additive

96
Q

What are two ways to prevent subordinate security elements from inhereting permissions?

A

Turn off inheritance

Use Deny permissions

97
Q

Which method of preventing subordinate security elements from inheriting permissions is not recommended by Microsoft?

A

Turning off inheritance

98
Q

What is the combination of permissions, both explicit and inherited, for a security element?

A

Effective access

99
Q

What are the permissions precedence rules that determine effective access for a security element?

A

Allow permissions are cumulative
Deny permissions override Allow permissions
Explicit permissions override inherited permissions

100
Q

Where can you view the effective permissions of a security element?

A

In the Effective Access tab in the Advanced Security Settings dialog

101
Q

What are the basic permissions available in NTFS?

A

Full Control, Modify, Read and Execute, List Folder Contents, Read, and Write

102
Q

What permissions does Write grant to a folder?

A

Create new file and subfolders
Modify folder attributes
View folder’s ownership and permissions

103
Q

What permissions does Write grant to a file?

A

Overwrite
Modify attributes
View file’s ownership and permissions

104
Q

What permissions does Read grant to a folder?

A

See files and subfolders in the folder

View folder’s ownership, permissions, and attributes

105
Q

What permissions does Read grant to a file?

A

Read file contents

View file’s ownership, permissions, and attributes

106
Q

What permissions does List Folder Contents grant to a folder?

A

View names of files and subfolders in the folder

107
Q

What permissions does List Folder Contents grant to a file?

A

Not applicable

108
Q

What permissions does Read and Execute grant to a folder?

A

All permissions granted by Read and List Folder Contents

Navigate through restricted folders to reach other files and folders

109
Q

What permissions does Read and Execute grant to a file?

A

All permissions granted by Read

Run applications

110
Q

What permissions does Modify grant to a folder?

A

All permissions granted by Write and Read & Execute

Delete the folder

111
Q

What permissions does Modify grant to a file?

A

All permissions granted by Write and Read & Execute
Modify file
Delete file

112
Q

What permissions does Full Control grant to a folder?

A

All permissions granted by other NTFS permissions
Modify folder permissions
Take ownership of folder
Delete files and subfolders

113
Q

What permissions does Full Control grant to a file?

A

All permissions granted by other NTFS permissions
Modify file permissions
Take ownership of file

114
Q

What are the advanced permissions offered by NTFS?

A
Full Control
Traverse Folder / Execute File
List Folder / Read Data
Read Attributes
Read Extended Attributes
Create Files / Write Data
Create Folders / Append Data
Write Attributes
Write Extended Attributes
Delete Subfolders and Files
Delete
Read Permissions
Change Permissions
Take Ownership
Synchronize
115
Q

What advanced permission allows for the deletion of files and subfolders, even if the Delete permission has not been granted to those items?

A

Delete Subfolders and Files

116
Q

What permissions are granted by the Synchronize permission?

A

Allows or denies different threads to wait on a handle of a file/folder and synchronize with another thread that could signal it

117
Q

How can an administrator regain access to a file that the file owner has set all deny permissions on?

A

By taking ownership of the file and reassigning the correct permissions

118
Q

Who can always modify the permissions of a file or folder, even if they lack permissions?

A

The file owner and the Administrator

119
Q

Can an Administrator take ownership of a file and then reassign the ownership?

A

No, since that would allow undetected access to files by the Administrator

120
Q

What disk virtualization technology is used to allocate storage on disks?

A

Storage Spaces

121
Q

What is the name of the unallocated space available to Storage Spaces?

A

Storage pools

122
Q

What storage units are created from storage pools?

A

Virtual disks

123
Q

What prerequisites are required for a physical disk to be eligible for a storage pool?

A

It must be online and initialized, but with no volumes on it, e.g. Unallocated Space in Disk Management

124
Q

What noun differentiates virtual disks and VHDs in PowerShell?

A

“VirtualDisk” represents the term related to Storage Spaces, while “VHD” is for Hyper-V

125
Q

What term is used to describe the allocation of more storage than the underlying disk?

A

Thin provisioning

126
Q

What term is used to describe the allocation of all storage space at once?

A

Fixed

127
Q

What are the three fault tolerance options available in Storage Spaces?

A

Simple: stripes across disks, best performance, no fault tolerance
Mirror: Writes copies across 2 or 3 disks, no performance penalty, but wastes disk
Parity: Stripes across 3 or more disks along with parity, slightly reduced performance, but less space expensive

128
Q

What are the two mirror resilience types available in Storage Spaces?

A

Two-way mirror: stores two copies of data, protects against single disk failure, requires at least two disks
Three-way mirror: stores three copies of data, protects against two-disk failure, requires at least five disks

129
Q

How does disk parity work?

A

Takes a sum of the bits on each disk and determines if it’s even or odd. If the disk is lost, the even or odd value changes, and the disk can be restored with the correct bit.

130
Q

What is the term for a disk in Storage Spaces that is not used until a failure occurs?

A

Hot spare

131
Q

When is a disk in a Storage Space marked as failed?

A

When it reports a write error to the OS (usually after recovering from several silent failures)
If it encounters a read error, it will first try to recover by writing a copy from the mirror or parity, but if that fails it will default to the write error procedure

132
Q

What Storage Spaces feature allows admins to use high-performance storage for frequently accessed files?

A

Tiered storage

133
Q

What conditions are required to use tiered storage?

A

The storage pool must have both SSDs and HDDs (as recognized by Windows)
The Create Storage Tiers On This Virtual Disk option must be checked when creating a virual disk
There must be enough of each type of media to implement the layout, e.g. 2 SSDs and 2 HDDs in a two-way mirror

134
Q

How can you correct the media type specification when Windows recognizes a disk incorrectly?

A

Use the Set-PhysicalDisk PowerShell cmdlet with the MediaType parameter

135
Q

What PowerShell command is used to pin a specific file to a specific tier?

A

Set-FileStorageTier

136
Q

What part of an iSCSI network initiates communication to the storage device?

A

The iSCSI initiator

137
Q

What is the name for hardware adapters for iSCSI networks?

A

The host bus adapter (HBA)

138
Q

What is the name for the software-based iSCSI initiator in Server 2016?

A

iSCSI Initiator

139
Q

What is the name for the device receiving communication on an iSCSI network?

A

The iSCSI target

140
Q

What address is used to identify a storage device on an iSCSI network?

A

A logical unit number (LUN)

141
Q

What is the name for the iSCSI target software in Windows Server?

A

iSCSI Target Server

142
Q

How is the iSCSI Target Server installed?

A

It is a role service under the File and Storage Services role, or fs-iscsitarget-server in PowerShell

143
Q

How is the iSCSI Initiator installed?

A

It is included in Windows Server by default

144
Q

What is the name of the service used to identify iSCSI targets on a network?

A

iSNS

145
Q

What component of iSNS processes requests from clients?

A

The iSNS server

146
Q

What component of iSNS stores data supplied by clients and retrieves data for queries?

A

iSNS database

147
Q

What component of iSNS registers information about itself to an iSNS server and sends queries about other clients?

A

iSNS clients

148
Q

What component of iSNS is the protocol used for communication?

A

iSNS Protocol (iSNSP)

149
Q

What PowerShell command installs the iSNS server?

A

Install-WindowsFeature -Name iSNS

150
Q

What is the name for a series of standards that allow for SAN communication to take place reliably on LAN networks?

A

Datacenter bridging (DCB)

151
Q

How does datacenter bridging allow SANs to operate reliably on mixed networks?

A

By allocating bandwidth dedicated to the SAN so that it is not interfered with by LAN traffic

152
Q

What is the name of a network that has multiple types of traffic, e.g. SAN and LAN?

A

Converged network

153
Q

What components are required for a server to use DCB?

A

A converged network adapter (CNA) that supports DCB?
Storage devices that support DCB
Switches that support DCB

154
Q

Which PowerShell module allows for configuration of DCB?

A

DcbQos

155
Q

What setting controls the source of CNA configuration settings in DCB?

A

The DCBX Willing bit

156
Q

What setting must be changed to allow for saving DCB configuration of a server without interference from other clients?

A

Set the DCBX Willing bit to false

157
Q

Which PowerShell command sets the DCBX Willing bit to false?

A

Set-NetQosDcbxSetting -Willing 0

158
Q

What are the units of separation for traffic on a DCB network?

A

Traffic Classes

159
Q

Which PowerShell cmdlet is used to modify traffic classes on a DCB network?

A

New-NetQosTrafficClass

160
Q

How many DCB traffic classes are supported by Windows Server?

A

8, though all other network boxes must support that number as well

161
Q

Which PowerShell cmdlet defines the quality of service policy of a network?

A

New-NetQosPolicy

162
Q

Which DCB technology regulates network traffic to provide lossless data transmissions?

A

Priority-based Flow Control (PFC)

163
Q

Which PowerShell cmdlet enables PFC on a DCB network?

A

Enable-NetQosFlowControl

164
Q

Which Windows Server technology allows for SAN devices to revert to alternate paths when a network connection fails?

A

Multipath I/O

165
Q

What components are required to implement Multipath I/O?

A

The Multipath I/O Windows feature
A Device Specific Module (DSM) on every network adapter or HBA on the server that is connected to the SAN
Redundant network components, e.g. two network adapters connected to different network segments

166
Q

What is the maximum number of paths supported by Multipath I/O?

A

32

167
Q

How are devices identified in the MPIO properties sheet?

A

By a combination of an 8 character vendor ID (VID) and a 16 character product ID (PID), often called a VID/PID

168
Q

What technology is used to make sure a device is not seen as a duplicate when using Multipath I/O?

A

Plug and Plan (PnP)

169
Q

What load balancing policies are supported by Microsoft’s DSM?

A

Failover: simply switches to secondary when primary fails
Failback: switches to secondary when primary fails, but reverts to primary when connection restored
Round Robin: all paths take turns, with optional reserved paths in case of failure
Dynamic Least Queue Depth: chooses path with fewest outstanding requests
Weighted Paths: chooses path with lowest “weight,” indicating higher priority

170
Q

What Windows Server feature enables replication of volumes for disaster recovery?

A

Storage Replica (SR)

171
Q

Which two types of replication is possible in Storage Replica?

A

Synchronous replication: writes are coordinated immediately before confirmation, requires fast connection, guarantees consistency
Asynchronous replication: writes are coordinated at their own pace, useful for slow connections, cannot guarantee replication

172
Q

What are the three primary scenarios for Storage Replica?

A

Server-to-server: replication between standalone servers, manual failover
Cluster-to-cluster: replication between clusters, manual failover
Stretch cluster: replication between sites, automated failover

173
Q

What is the process for synchronizing data in Storage Replica?

A

Replication is one-way, SR dismounts the destination volume and performs the synchronization

174
Q

What must be done if SR synchronization is interrupted in order to access the destination volume?

A

The partnership must be removed

175
Q

What protocol does Storage Replica rely on for communication?

A

SMB 3

176
Q

What data units does Storage Replica use?

A

Blocks

177
Q

What improvements does SR have over DFS Replication?

A

Not file-based or checkpoint-based, preventing data loss

178
Q

Which PowerShell cmdlet is used to create an SR partnership?

A

New-SRPartnership

179
Q

Which editions of Windows Server support Storage Replica?

A

Only Datacenter

180
Q

What are the system requirements for running Storage Replica?

A

Windows Server Datacenter edition
4 GB of RAM
Independent storage infrastructure on each side
A separate log disk, at least 9GB in size
Mirrored disks must both have the same physical size and sector size
All disks must be GPT paritioned
None of the disks may contain the OS
Network must support ~5ms round-trip latency for synchronous replication
All servers must be domain-bound
Ports 445, 5445, and 5985 must be open to support SMB, SMB Direct, and WS-MAN, along with ICMP

181
Q

Which PowerShell cmdlet is used to verify Storage Replica topology?

A

Test-SrTopology

182
Q

Which PowerShell cmdlet grants full access to the mirrored Storage Replica units?

A

Grant-SrAccess

183
Q

Which PowerShell cmdlet establishes the Storage Replica partnership?

A

New-SrPartnership

184
Q

Which PowerShell cmdlet is used to view Storage Replica groups?

A

Get-SrGroup

185
Q

Which PowerShell cmdlet can be used to trigger Storage Replica failover and how is it used?

A

Set-SrPartnership, used to reverse source and destination roles so that the destination is accessible

186
Q

What is the name of the role service used to consolidate redundant files on NTFS?

A

Data deduplication

187
Q

On what level does the data deduplication service operate?

A

Volume level (not file)

188
Q

What PowerShell command installs the Data Deduplication feature?

A

Install-WindowsFeature -Name FS-Data-Deduplication

189
Q

What are the Data Deduplication options available?

A

Disabled
General Purpose File Server: typical fileserver, background, in-use files ignroed
Virtual Desktop Infrastructure (VDI) Server: for Hyper-V functions, background, in-use and partial files optimized
Virtualized Backup Server: priority, in-use files optimized

190
Q

What option allows for running data deduplication at a normal priority with maximum performance?

A

Enable Throughput Optimization

191
Q

Which PowerShell cmdlet is used to turn on Data Deduplication?

A

Enable-DedupVolume

192
Q

Where are file chunks identified by Data Dedeuplication stored?

A

Chunk store

193
Q

What technology is used to redirect files to deduplicated chunks?

A

Reparse points

194
Q

What technology does data deduplication replace?

A

Single Instance Store (SIS)

195
Q

What is the name for the accumulation of unoptimized files on a deduplicated volume?

A

Churn

196
Q

What process is used by data deduplication to find chunks that no longer have reparse points attached to them?

A

Garbage collection

197
Q

What process is used by Data Deduplication to find damage or corruption in the chunk store and replace it with mirror or parity data?

A

Integrity scrubbing

198
Q

What process is used by Data Deduplication to restore files back to their original state?

A

Unoptimization

199
Q

What factors should be considered before using Data Deduplication?

A

The server should have enough idle time to run the deduplication process
The data should be susceptible to redundancy
The data should not be encrypted
The data should be read successively (e.g., not a database)

200
Q

What tool can be used to determine the space savings that could be gained using Data Deduplication?

A

Data Deduplication Savings Evaluation Tool (Ddpeval.exe)

201
Q

Which PowerShell cmdlet is used to monitor Data Deduplication?

A

Get-DedupStatus

202
Q

What member of the results of Get-DedupStatus determines if the deduplication job has completed successfully?

A

LastOptimizationResult