Chapter 2 - Implement Storage Solutions Flashcards

1
Q

You are the administrator for your company network. You have a Windows Server 2016 server named Server1. The server contains a storage pool named Pool1. Pool1 contains five physical disks named Disk1, Disk2, Disk3, Disk4, and Disk5. A virtual disk named VD1 is stored in Pool1. VD1 uses the parity storage layout. Which two commands should you run if you need to remove Disk3 after it fails from Pool1? (Choose two.)
A. Remove-PhysicalDisk-FriendlyName Disk3
B. Update-StoragePool-FriendlyName Pool1
C. Reset-PhysicalDisk-FriendlyName Disk3
D. Set-PhysicalDisk-FriendlyName Disk3-Usage Retired
E. Set-ResiliencySetting-StoragePool Pool1-PhysicalDiskRedundancyDefault 4

A

A, E. The Remove-PhysicalDisk cmdlet removes a physical disk from a specified storage pool. The Set-ResiliencySetting cmdlet modifies the properties of the specified resil- iency setting name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
You are the administrator for your company network. You have been asked to configure the company’s Windows Server 2016 domain controller. Company policy requires that all new computer accounts be placed in the General OU whenever computers join the domain. What command should you use to accomplish this?
A. Dsmove
B. Netdom
C. Redircmp
D. None of these
A

C. The Redircmp command is used to redirect the default OU of a newly created object such as a user to another OU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are the administrator for your company network. You have two Windows Server 2016 servers named Server1 and Server2. Server1 contains a volume named Volume1. You decide to implement a Storage Replica that replicates the contents of Volume1 from Server1 and Server2. One day, Server1 fails. You need to ensure that you can access the contents of Volume1. What command/cmdlet should you run from Server2?
A. Set-SRPartnership
B. Update-StoragePool
C. vssadmin revert shadow D. Clear-FileStorageTier

A

A. The Set-SRPartnership command modifies a replication partnership between two rep- lication groups. You can use this cmdlet to add replicated volumes, and you can also change the direction of replication that makes a source volume into a destination volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are the administrator for your company network. You and a colleague are discuss- ing Windows Server 2016 platforms. The Windows Server 2016 platform can support two main filesystems. What are they? (Choose two.)
A. File Allocation Table (FAT)
B. File Allocation Table 32 (FAT32) C. Windows NT File System (NTFS) D. Resilient File System (ReFS)

A

C and D. The Windows Server 2016 platform supports two main filesystems: Windows NT File System (NTFS) and Resilient File System (ReFS). Although ReFS was new to Windows Server 2012, NTFS has been around for many years, and NTFS in Windows Server 2016 has been improved for better performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are the administrator for your company network. You have a Windows Server 2016 server named Server1. Server1 has four SCSI disks and a storage pool named Pool1 that contains three disks. You create a virtual disk named VDisk1 that uses a mirrored layout.
You create a partition named Partition1 that uses all of the available space on VDisk1. You
want to extend Partition1. What should you do first?
A. Run the Expand-IscsiVirtualDisk cmdlet from Windows PowerShell. B. Run the Resize-VirtualDisk cmdlet from Windows PowerShell.
C. Extend the volume from Disk Management.
D. Modify the properties of Partition1 from Disk Management.

A

B. The Resize-VirtualDisk cmdlet resizes an existing virtual disk to be larger or smaller. If there is a partition on the virtual disk, then the partition must also be resized in order for the client to have additional space on the disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are the administrator for your company network. You have two Windows Server 2016 servers named Server1 and Server2. You plan to implement Storage Replica to rep- licate the contents of volumes on Server1 to Server2. What cmdlet should you run if you need to ensure that the replication traffic between the servers is limited to a maximum of 100 Mbps?
A. Set-NetUDPSetting
B. New-StorageQosPolicy C. Set-SmbBandwidthLimit D. Set-NetTCPSetting

A

C. The Set-SmbBandwidthLimit cmdlet adds a Server Message Block (SMB) bandwidth cap for the traffic categories that you specify. SMB bandwidth caps limit the amount of data that the server can send for each traffic category

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are the administrator for your company network. You have a server and you want to provision a new volume that will be used to create large, fixed-size VHDX files. You want to minimize the amount of time required to create the VHDX files. What type of filesystem should you use on the new volume?
A. ReFS B. NTFS C. CVFS D. exFAT

A

A. ReFS has the fastest creation times for large, fixed-size VHDX files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are the administrator for your company network. The network contains an Active Directory domain. The domain contains a new file server named Server1 that runs a Server Core installation of Windows Server 2016. Server1 has an ReFS-formatted volume D: and NTFS-formatted volume E:. The volumes do not contain any data. You install the Data Deduplication role service on Server1. You want to implement Data Deduplication for vol- umes on D: and E:. What should you do?
A. From Windows PowerShell, run Format-Volume D: -FileSystem EXFat and Enable-DeDupVolume -Volume D:,E:
B. From Windows PowerShell, run Format-Volume E: -FileSystem ReFS and Enable-DeDupVolume -Volume D:,E:
C. From Windows PowerShell, run Enable-DeDupVolume-Volume D:,E:
D. From Windows PowerShell, run Enable-DeDupVolume-Volume E: D:

A

B. The Format-Volume cmdlet formats one or more existing volumes, or a new volume on an existing partition. This cmdlet returns the object representing the volume that was just formatted, with all properties updated to reflect the format operation. The Enable-DeDupVolume cmdlet enables data deduplication on one or more volumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are the administrator for your company network. You are planning to install Active
Directory. What filesystem must you use in order to install Active Directory? A. ReFS
B. exFAT
C. FAT
D. NTFS

A

D. Although the features of the other filesystems will compel most system administrators to use NTFS, additional reasons make using it mandatory. The most important reason is that the Active Directory data store must reside on an NTFS partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are the administrator for your company network. The network contains an Active Directory domain. The domain contains two servers named Server1 and Server2. Both serv- ers have the same hardware configuration. What should you do if you need to asynchro- nously replicate volume F: from Server1 to Server2?
A. Run New-SRPartnership and specify the –ReplicationMode parameter.
B. Install the Failover Clustering feature and create a new cluster resource group. C. Install the Failover Clustering feature and use Cluster Shared Volumes (CSV). D. Run Set-DfsrServiceConfiguration and specify the –RPCPort parameter.

A

A. The New-SRPartnership cmdlet creates a replication partnership between two new
or existing replication groups. This cmdlet can create the complete replication topology. It can also tie together separately created replication groups. The -ReplicationMode switch specifies the desired mode of replication for this source and destination pair. The acceptable values for this parameter are:
■■ Synchronous or 1: The synchronous mode requires all writes to commit on the destina- tion server and on the source server, which guarantees data integrity between computers. This is the default value.
■■ Asynchronous or 2: The asynchronous mode writes to the source server without wait- ing for the destination server, which allows for replication over high-latency, geographic networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are the administrator for your company network. You and a colleague are discussing the Master Boot Record (MBR). On the disk drive, a MBR has a partition table that indi- cates where the partitions are located. How big are volumes that are supported by a MBR?
A. 1 TB (1,024 GB) B. 2 TB (2,048 GB) C. 3 TB (3,072 GB) D. 4 TB (4,096 GB)

A

B. A MBR has a partition table that indicates where the partitions are located on the disk drive, and with this particular partition style, only volumes up to 2 TB (2,048 GB) are sup- ported. A MBR drive can have up to four primary partitions, or it can have three primary partitions and one extended partition that can be divided into unlimited logical drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are the administrator for your company network and you have a Windows Server 2016 server. You install three additional physical disks named Disk1, Disk2, and Disk3. You want to use these physical disks to store data. You plan to create a volume to store data. What actions should you perform if you need to prevent data loss in the event of a single disk failure? (Choose three.)
A. Create a virtual disk.
B. Create a storage pool.
C. Create a new storage tier.
D. Create a volume.
E. Assign a single tier to a virtual disk.
F. Create a virtual disk clone.

A

A, B, and D.
Step 1: First you will want to create a storage pool. Specify which disks should be included
in the storage pool.
Step 2: After creating the storage pool, start creating a virtual disk for the pool you created. When the Storage Pool Wizard finishes, mark the Create A Virtual Disk option to create a virtual disk after this wizard. Select the storage pool to create a virtual disk. When shown in the New Virtual Disk Wizard, select the Storage Layout. Select Parity.
Step 3: After creating the virtual disk, create a volume with the New Volume Wizard. Use the volume you created earlier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
You are the administrator for the company network. You have client computers that run Windows Server 2016. Each computer has two hard drives. Which kind of dynamic volume should you create if you need to create a dynamic volume on each computer that will maxi- mize write performance and provide data fault tolerance?
A. Striped volume
B. RAID-5 volume
C. Spanned volume
D. Mirrored volume
A

D. A mirrored volume duplicates data across two disks. This type of volume is fault toler- ant because if one drive fails, the data on the other disk is unaffected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are the administrator for your company network. You have a Windows Server 2016 server named Server1. The disks on Server1 are configured as shown in the following table:
Volume Type Filesystem Capability
C: Attached Locally NTFS 150 GB
D: Attached Locally exFAT 100 GB
E: Attached Locally NTFS 20 GB
F: Attached Locally ReFS 1 TB
G: iSCSI LUN NTFS 2 TB

Windows Server 2016 is installed in C:\Windows. You want to enable data deduplication. Which two volumes can you use for data deduplication? (Choose two.)
A. C: 
B. D: 
C. E: 
D. F: 
E. G:
A

C, E. Data deduplication on volumes must meet the following requirements: The volume must not be a system or boot volume. Deduplication is not supported on operating system volumes. It can be partitioned as a master boot record (MBR) or a GUID Partition Table (GPT), and it must be formatted using the NTFS filesystem. It can reside on shared storage. It can’t be smaller than 2 GB or larger than 64 TB in size. It must be exposed to the operat- ing system as nonremovable drives. Remotely mapped drives are not supported. So, that leaves options C and E as acceptable drives to use for deduplication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are the administrator for your company network. You and a colleague are discussing using the convert command. What does the command convert d: /fs:ntfs do?
A. Formats drive D to FAT.
B. Converts drive D from NTFS to FAT. C. Converts drive D from FAT to NTFS. D. Scans drive D for errors.

A

C. If you want to convert an existing partition from FAT or FAT32 to NTFS, you must to use the convert command-line utility and insert the drive letter where d is in the com- mand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are the administrator for your company network. You want to remove the host from the iSNS server. What command should you use?
A. iscsicli addisnsserver
B. iscsicli removeisnsserver C. iscsicli refreshisnsserver D. iscsicli listisnsservers

A

B. The iscsicli removeisnsserver command removes the host from the iSNS server. The iscsicli addisnsserver command manually registers the host server to an iSNS server. Refreshisnsserver refreshes the list of available servers. Listisnsservers lists the available iSNS servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You are the administrator for your company network. You want to register the iSCSI initia- tor manually to an iSNS server. What command should you use?
A. iscsicli addisnsserver
B. iscsicli removeisnsserver C. iscsicli refreshisnsserver D. iscsicli listisnsservers

A

A. The iscsicli addisnsserver command manually registers the host server to an
iSNS server. Refreshisnsserver refreshes the list of available servers. Removeisnsserver removes the host from the iSNS server. Listisnsservers lists the available iSNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You are the administrator for your company network. You are looking at using shared folder permissions. Which of the following are true regarding shared folder permissions? (Choose all that apply.)
A. Apply to files
B. Apply to folders
C. Apply locally to the data D. Apply remotely to the data

A

B and D. Shared folder permissions apply only across the network (remotely) and can only be placed on folders. NTFS permissions can apply locally and remotely, and NTFS can be placed on files or folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You are the administrator for your company network. You are trying to determine what the default TCP port for iSCSI is. Which one is it?
A. 21
B. 1433 C. 3260 D. 3389

A

C. The iSCSI default port is TCP 3260. Port 21 is used for FTP. Port 1433 is used for Microsoft SQL, and port 3389 is used for RDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You are the administrator for your company network. Matt is a member of both the Human Resources and Marketing departments. There is a shared folder called Apps that everyone uses. Here are the current permissions on the Apps shared folder:
Group/User NTFS Shared
Sales Read Deny
Marketing Modify Full Control
R&D Read Read
HR Full Control Deny
Admin Full Control Change

What will Matt’s local and remote permissions be when he logs into the Apps folder? A. Local = Full Control and Remote = Deny
B. Local = Deny and Remote = Deny
C. Local = Full Control and Remote = Change
D. Local = Change and Remote = Read

A

A. Permissions are additive among themselves. This means you get the highest level of per- missions. But when the two permissions meet, the most restrictive set of permission applies. In this question, the NTFS side would be Full Control (this would be the local permission) and the shared permission would be Deny. But when the two permissions meet, the most restrictive, Deny, would apply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
You are the administrator for your company network. You have a Windows Server 2016 computer that has a shared folder named C:\Sales. The shared folder is on an NTFS volume. The current NTFS and share permissions are configured as follows: User1 is a member of both the Everyone group and the Sales group. User1 must access C:\Sales from across the network. What permission should you set if you need to identify the effective permissions of User1 to the C:\Sales folder?
A. Full Control
B. Read and Execute
C. Read
D. Modify
A

D. User1 is a member of both the Everyone group and the Marketing group and must access C:\Sales from across the network. When accessing a file locally, you combine the NTFS permissions granted to your account either directly or by way of group membership. The “least” restrictive permission is then the permission that applies. In this question, the NTFS permission is the least restrictive of Read/Execute and Modify—so Modify is the effective permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You are the administrator for your company network. You have a computer named Server1 that runs Windows Server 2016. You add a 1 TB hard drive and create a new volume that has the drive letter D. You format the drive by using NTFS. You need to limit the amount of space that each user can consume on D: to 200 GB. Members of the Administrators group should have no limit. What actions should you perform? (Choose three.)
A. Set a default quota limit.
B. Run convert D: /FS:NTFS.
C. Run fsutil quota violations D:.
D. Enable the Deny disk space to users exceeding quota limit setting.
E. Add a quota entry.

A

A, C, and D. Fsutil quota manages disk quotas on NTFS volumes to provide more pre- cise control of network-based storage. The violations switch searches the system and application logs and displays a message to indicate that quota violations have been detected or that a user has reached a quota threshold or quota limit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You are the administrator for your company network. You have a computer that runs Windows Server 2016. You add three new 3 TB disks and you want to create a new 9 TB volume. What two actions should you perform? (Choose two.)
A. Create a new spanned volume using Disk Management.
B. Convert all of the 3 TB disks to GPT using Disk Management.
C. Run the New-VirtualDisk cmdlet using PowerShell.
D. Bring all the disks offline using Disk Management.
E. Run the convert MBR command using Diskpart.
F. Run the Add-PhysicalDisk cmdlet using PowerShell

A

A and B. A spanned volume is a dynamic volume consisting of disk space on more than one physical disk. If a simple volume is not a system volume or boot volume, you can extend it across additional disks to create a spanned volume, or you can create a spanned volume in unallocated space on a dynamic disk. A GPT disk uses the GUID partition table (GPT) disk partitioning system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You are the administrator of your company network. Your network contains a single
Active Directory domain. The domain contains two computers named Server1 and Server2. A user named User1 is a member of the local Administrators group on Server1 and Server2. User1 fails to remotely manage the devices on Server2 by using Device Manager on Server1. User1 can connect to Server2 remotely by using Computer Management. What do you need to do to ensure that User1 can disable a device on Server2 remotely?
A. On Server2, modify the Windows Firewall settings.
B. Enable Remote Desktop on Server2 and instruct User1 to use Remote Desktop.
C. On Server2, start the Plug and Play and Remote Registry services.
D. On Server2, enable the Allow remote access to the Plug and Play interface Group Policy setting.

A

A. You must enable the Remote Event Log Management exception in the Windows Firewall settings on the remote computer that you want to connect to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
You are the administrator for your company network. You have a computer that runs Win- dows Server 2016. You install a second hard disk drive on the computer and create a new volume named E. What tool can you use to set up the new hard drive and volume?
A. The wbadmin command
B. The Settings app
C. Computer Management
D. The Set-Volume cmdlet
A

C. The Disk Management utility allows you to set up and create new hard drive volumes. Disk Management can be accessed directly or through Computer Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
You are the administrator for your company network. You have a computer named Com- puter1 that has a 1 TB volume named E. What tool should you use if you want to receive a notification when volume F has less than 100 GB of free space?
A. Performance Monitor
B. Disk Cleanup
C. System Configuration
D. Resource Monitor
E. Event Viewer
A

A. The Microsoft Windows Performance Monitor is a tool that administrators can use to examine how programs running on their computers affect the computer’s performance. The tool can be used in real time and also be used to collect information in a log to analyze the data at a later time. With Performance Monitor, you can set up counter logs and alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
You are the administrator for your company network. You have a Computer1 that runs Windows Server 2016. Computer1 has two volumes named C and D. Vol- ume C is formatted NTFS and volume D is formatted exFAT. What should you use if you need to ensure that you can recover files stored in D:\Data?
A. System Restore points
B. File History
C. wbadmin.exe
D. Backup and Restore
A

B. File History allows for easy automated backups of data and works with a number of devices on which data can be stored. File History continuously protects your personal files stored in libraries, desktop, favorites, and contacts folders. It periodically (every hour by default) scans the filesystem for changes and copies changed files to another location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You are the administrator for your company network. You have two computers named Computer1 and Computer2 that run Windows Server 2016. You create a provisioning pack- age named Package1 on Computer1. What file must be applied to Computer2 if you plan to apply the provisioning package to Computer2?
A. Package1.icdproj.xml B. Customizations.xml C. Package1.ppkg
D. Package1.cat

A

C. A provisioning package (.ppkg) is a container for a collection of configuration settings. An administrator can create provisioning packages that let them quickly and efficiently con- figure a device without having to install a new image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
You are the administrator for your company network. You have a computer named Computer1 that has a virtual hard disk (VHD) named Disk1.vhdx. You plan to configure Computer1 for dual boot from Disk1.vhdx. You need to install Windows on Disk1.vhdx by using dism.exe. What should you run before you install Windows Server 2016?
A. Add-Windows Image B. bcdboot.exe
C. bcdedit.exe
D. bootcfg.exe
E. bootim.exe
F. bootsect.exe
G. diskpart.exe
H. Expand-Windows Image
A

G. Diskpart is a command-line utility that configures and manages disks, volumes, and partitions on the host computer. It can also be used to script many of the storage manage- ment commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
You are the administrator for your company network. You have a computer named Computer1. Computer1 has a virtual hard disk (VHD) named Disk1.vhdx. Windows is installed on Disk1.vhdx. In File Explorer, Disk1.vhdx is visible as drive E. You need to configure Computer1 to start from VHDX. Hardware virtualization must not be available when Computer1 starts from VHDX. What should you run?
A. Add-Windows Image B. bcdboot.exe
C. bcdedit.exe
D. bootcfg.exe
E. bootim.exe
F. bootsect.exe
G. diskpart.exe
H. Expand-Windows Image
A

B. BCDBoot is a command-line tool used to configure the boot files on a PC or device to run the Windows operating system. It enables you to quickly set up a system partition or repair the boot environment located on the system partition. The system partition is set up by copying a simple set of Boot Configuration Data (BCD) files to an existing empty partition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

You are the administrator for your company network. You have a computer that runs Win- dows Server 2012 R2. You create a system image backup on the computer and then you upgrade to Windows Server 2016. You need to access a file from the backup. The solution must use the least amount of administrative effort. What should you do?
A. Add a drive from the Backup section of the Settings app.
B. Add a drive from the File History section of the Settings app.
C. Attach a VHD from the Computer Management console.
D. Restore the personal files from the File History Control Panel item.

A

C. A Virtual Hard Disk (VHD) is a file format that represents a virtual disk drive. A VHD can be used to store virtual disk data in files that can be easily transferred from one com- puter to another. It contains what is found on physical HDDs, such as the disk partition and filesystem. Once they are attached, you can treat them like physical disks and use them to store data. To attach the VHD, you use the Computer Management console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
You are the administrator for your company network. You are looking at the NTFS filesys- tem. What are some of the advantages to using NTFS?
A. Compression
B. Encryption
C. Quotas
D. Security
E. All of the above
A

E. There are many advantages to using NTFS. Compression, encryption, quotas, and secu- rity are just a few of them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

You are the administrator for your company network. You want to turn your FAT32 partition into an NTFS partition. What command-line utility should you use
A. upgrade
B. convert
C. change part D. Ntfsutil

A

B. The convert command is the command-line utility that allows a FAT or FAT32 parti- tion to be upgraded to NTFS. You can also use Disk Management to convert the disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

You are the administrator for your company network. You have a virtual machine named VM1. VM1 uses a fixed size virtual hard disk (VHD) named Disk1.vhd. Disk1.vhd is 200 GB. You shut down VM1. What action should you use from the Edit Virtual Hard Disk Wizard if you need to reduce the size of Disk1.vhd?
A. Merge
B. Compact C. Shrink D. Convert

A

D. In this question we have a fixed disk, so you would need to “convert” that first to Dynamic to be able to “compact” it later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

You are the administrator for your company network. You create a new virtual disk in a storage pool by using the New Virtual Disk Wizard. You discover that the new virtual disk has a write-back cache of 1 GB. What should you do if you need to ensure that the virtual disk has a write-back cache of 5 GB?
A. Detach the virtual disk and then run the Resize-VirtualDisk cmdlet.
B. Detach the virtual disk and then run the Set-VirtualDisk cmdlet.
C. Delete the virtual disk and then run the New-StorageSubSystemVirtualDisk cmdlet. D. Delete the virtual disk and then run the New-VirtualDisk cmdlet

A

D. You cannot modify the cache size, but you can specify it at the time that you create a new virtual hard disk. So, in order to do so, you have to delete the virtual disk and then run the New-VirtualDisk PowerShell cmdlet.

36
Q

You are the administrator for your company network. You decide to purchase a new desk- top computer that has four external USB hard drives. You want to create a single volume by using the four USB drives. You want the volume to be expandable, portable, and resilient in the event of failure of an individual USB hard drive. What should you do so you can create the required volume?
A. Create a new Storage Space across the four USB hard drives. Set the resiliency type to a three-way mirror.
B. Create a new spanned volume.
C. Create a new Storage Space across the four USB hard drives. Set the resiliency type to
parity.
D. Create a new striped volume.

A

C. Storage Spaces can combine multiple hard drives into a single virtual drive. To create a Storage Space, you need to connect two or more internal or external drives to the computer to create a storage pool. When the drive begins to fill up and nears the physical limit, Win- dows will display a notification prompting you to add additional physical Storage Space. Selecting the Parity resiliency type allows Windows to store parity information with the data, thereby protecting you from a single drive failure.

37
Q

You are the administrator of your company network. The network contains three servers named ServerA, ServerB, and ServerC. All servers run Windows Server 2016. What should you do on ServerA so that it can provide iSCSI storage for the other two servers?
A. Start the Microsoft iSCSI Initiator Service and configure the iSCSI Initiator Properties. B. Install the iSNS Server service feature and create a discovery domain.
C. Install the Multipath I/O (MPIO) feature and configure the MPIO Properties.
D. Install the iSCSI Target Server role service and configure iSCSI targets.

A

D. iSCSI is an industry standard protocol that allows sharing block storage over the Ethernet. The server that shares the storage is called the iSCSI target. The server (machine) that consumes the storage is called the iSCSI initiator.
The target is an object that allows the iSCSI initiator to make a connection. The target keeps track of the initiators that are allowed to be connected to it. The target also keeps track of the iSCSI virtual disks that are associated with it. Once the initiator establishes the connection to the target, all the iSCSI virtual disks associated with the target will be acces- sible by the initiator.
The iSCSI target server is the server that runs the iSCSI target. It is also the iSCSI Target role name in Windows Server 2016.

38
Q

You are the administrator for your company network. You are trying to determine the default TCP port for RDP. Which one is it?
A. 21
B. 1433 C. 3260 D. 3389

A

D. The default port for RDP is port 3389. Port 21 is used for FTP. Port 1433 is used for Microsoft SQL, and iSCSI uses port 3260.

39
Q

You are the administrator for your company network. Lisa is a member of both the Sales and R&D departments. There is a shared folder called Apps that everyone uses. Here are the current permissions on the Apps shared folder:
Group/User NTFS Shared
Sales Read Deny
Marketing Modify Full Control
R&D Read Read
HR Full Control Deny
Admin Full Control Change

What will Lisa’s local and remote permissions be when she logs into the Apps folder? A. Local = Read and Remote = Read
B. Local = Read and Remote = Deny
C. Local = Deny and Remote = Read
D. Local = Deny and Remote = Deny

A

B. Permissions are additive among themselves. This means you get the highest level of per- missions. But when the two permissions meet, the most restrictive set of permission applies. In this question, the NTFS side would be Read (this would be the local permission) and the shared permission would be Deny. So, when the two permissions meet, the most restrictive, Deny, would apply.

40
Q

You are the administrator for your company network. You are debating the benefits of the various filesystems available. Which filesystem was designed specifically with the issues of scalability and performance in mind?
A. FAT B. exFAT C. NTFS D. ReFS

A

D. One of the issues that IT members have had to face over the years is the problem of rapidly growing data sizes. As we continue to rely more and more on computers, our data continues to get larger and larger. This is where ReFS can help an IT department. ReFS was designed specifically with the issues of scalability and performance in mind.

41
Q

You are the administrator for your company network. You are debating the benefits of the NTFS filesystem. You are thinking about establishing disk quotas. By default, Windows Server 2016 supports disk quota restrictions. At which level is the default?
A. Folder level B. Drive level
C. Volume level D. Partition level

A

C. To restrict the amount of disk space used by users on the network, system adminis- trators can establish disk quotas. By default, Windows Server 2016 supports disk quota restrictions at the volume level. That is, you can restrict the amount of Storage Space that a specific user uses on a single disk volume.

42
Q
You are the administrator for your company network. You are discussing the benefits of using the NTFS filesystem with a colleague. One of the benefits allows you to move infre- quently used files to external hard drives. What benefit are you discussing?
A. Mounted drives
B. Self-healing NTFS
C. Dynamic volumes
D. Remote storage
A

D. System administrators can use the Remote Storage features supported by NTFS to off- load seldom-used data automatically to a backup system or other devices. The files, how- ever, remain available to users. If a user requests an archived file, Windows Server 2016 can automatically restore the file from a remote storage device and make it available.

43
Q

You are the administrator for your company network. You are planning on installing Active Directory. You remember that the NTFS filesystem is required. But you also know that a mandatory number of partition(s) are needed to run Active Directory. How many partitions are required to run Active Directory?
A. One B. Two C. Three D. Four

A

A. The Active Directory data store must reside on an NTFS partition. Therefore, before you begin installing Active Directory, make sure you have at least one NTFS partition available.

44
Q

You are the administrator for your company network. You and a colleague are discussing disk configurations. Microsoft Windows Server 2016 supports two types of disk configura- tions. What are they? (Choose two.)
A. Basic
B. Primary C. Dynamic D. Effective

A

A and C. Windows Server 2016 supports two types of disk configurations: basic and dynamic. Basic disks are divided into partitions and can be used with previous versions of Windows. Dynamic disks provide features that basic disks do not, such as the ability to cre- ate volumes that span multiple disks (spanned and striped volumes) and the ability to create fault-tolerant volumes (mirrored and RAID-5 volumes)

45
Q

You are the administrator for your company network. Your network contains an Active Directory domain that contains two Windows Server 2016 servers named Server1 and Server2. Each server has an operating system disk and four data disks. All of the disks are locally attached SATA disks. Each disk is a basic disk, is initialized as a MBR disk, and has a single NTFS volume. You plan to implement Redundant Array of Independent Disks (RAID) by using the data disks on Server1 and Server2. What should you do if you need to prepare the data disks for the implementation?
A. Initialize the data disks as GPT disks and create a ReFS volume on each disk. B. Format the volumes on the data disks as exFAT.
C. Delete the volumes from the data disks.
D. Convert the data disks to dynamic disks.

A

D. The convert command is the command-line utility that allows a FAT or FAT32 parti- tion to be upgraded to NTFS. You can also use Disk Management to convert the disk. Since you want to implement RAID, you must convert the basic disks to dynamic disks.

46
Q

You are the network administrator for your company network. You are discussing managing volumes with a colleague. When talking about volume sets, you are discussing a volume set
that is a simple volume that spans multiple disks. What type of volume are you discussing?
A. Simple volume
B. Spanned volume
C. Striped volume
D. Mirrored volume
E. RAID-5 volume

A

B. A spanned volume is a simple volume that spans multiple disks, with a maximum of 32.
Use a spanned volume if the volume needs are too great for a single disk

47
Q
You are the network administrator for your company network. You are discussing manag- ing volumes with a colleague. When talking about volume sets, you are discussing a volume set that duplicates data across two disks. What type of volume are you discussing?
A. Simple volume
B. Spanned volume
C. Striped volume
D. Mirrored volume
E. RAID-5 volume
A

D. A mirrored volume duplicates data across two disks. This type of volume is fault toler- ant because if one drive fails, the data on the other disk is unaffected.

48
Q
48. You are the network administrator for your company network. You are discussing managing volumes with a colleague. When talking about volume sets, you are discussing a volume set that stores data in stripes across three or more disks. What type of volume are you discussing?
A. Simple volume
B. Spanned volume
C. Striped volume
D. Mirrored volume
E. RAID-5 volume
A

E. A RAID-5 volume stores data in stripes across three or more disks. This type of volume is fault tolerant because if a drive fails, the data can be re-created from the parity off the remaining disk drives. Operating system files and boot files cannot reside on the RAID-5 disks.

49
Q

You are the network administrator You are discussing Redundant Array of Independent Disks (RAID) with a colleague. Microsoft Windows Server 2016 supports three types of RAID. What are they? (Choose three.)
are the network administrator for your company network.
A. RAID-0 B. RAID-1 C. RAID-2 D. RAID-3 E. RAID-4 F. RAID-5

A

A, B, and F. Windows Server 2016 supports three types of RAID technology: RAID-0, RAID-1, and RAID-5.

50
Q

You are the network administrator for your company network. You are discussing Redun- dant Array of Independent Disks (RAID) with a colleague. Of the three types of RAID sup- ported by Windows Server 2016, one is not fault tolerant. Which one is it?
A. RAID-0 B. RAID-1 C. RAID-2 D. RAID-3 E. RAID-4 F. RAID-5

A

A. RAID-0 (Disk Striping). Disk striping is using two or more volumes on independent disks created as a single striped set. RAID-0 does not offer the ability to maintain data integrity during a single disk failure. In other words, RAID-0 is not fault tolerant; a single disk event will cause the entire striped set to be lost, and it will have to be re-created through some type of recovery process, such as a tape backup

51
Q

You are the network administrator for your company network. You are discussing Redun- dant Array of Independent Disks (RAID) with a colleague. You are discussing the minimum number of disks needed to set up a RAID-1 (Disk Mirroring) volume set. What is the mini- mum number of disks needed?
A. 1 B. 2 C. 3 D. 4

A

B. Disk mirroring is two logical volumes on two separate identical disks created as a dupli- cate disk set. Data is written on two disks at the same time; that way, in the event of a disk failure, data integrity is maintained and available. So, two disks at minimum are needed.

52
Q

You are the network administrator for your company network. With the ever-increasing demands of storage, are used to surpass the limitation of 26 drive letters and to join two volumes into a folder on a separate physical disk drive. What is being discussed? (Fill in the blank.)
A. Data points
B. Dive points
C. Mount points D. Volume points

A

C. Mount points are used to surpass the limitation of 26 drive letters and to join two vol- umes into a folder on a separate physical disk drive. A mount point allows you to configure a volume to be accessed from a folder on another existing disk. A mount point folder can be assigned to a drive instead of using a drive letter, and it can be used on basic or dynamic volumes that are formatted with NTFS.

53
Q
You are the network administrator for your company network. You are discussing Micro- soft Multipath I/O (MPIO) with a colleague. Of all the supported load balancing policies
that Windows Server 2016 supports, which one provides no load balancing?
A. Failover
B. Failback
C. Round robin
D. Round robin with a subset of paths
E. Dynamic least queue depth
F. Weighted path
A

A. In a failover configuration, there is no load balancing. There is a primary path that is established for all requests and subsequent standby paths. If the primary path fails, one of the standby paths will be used.

54
Q
You are the network administrator for your company network. You are discussing Microsoft Multipath I/O (MPIO) with a colleague. Of all the supported load balancing policies that Windows Server 2016 supports, which one provides that all available paths will be active and will be used to distribute I/O in a balanced fashion?
A. Failover
B. Failback
C. Round robin
D. Round robin with a subset of paths
E. Dynamic least queue depth
F. Weighted path
A

C. In a round-robin configuration, all available paths will be active and will be used to dis- tribute I/O in a balanced round-robin fashion.

55
Q
You are the network administrator for your company network. You are discussing Micro- soft Multipath I/O (MPIO) with a colleague. Of all the supported load balancing policies that Windows Server 2016 supports, which one provides a configuration in which the I/O will route to the path with the least number of outstanding requests?
A. Failover
B. Failback
C. Round robin
D. Round robin with a subset of paths 
E. Dynamic least queue depth 
F. Weighted path
A

E. In a dynamic least queue depth configuration, I/O will route to the path with the fewest number of outstanding requests.

56
Q

You are the network administrator for your company network. You are discussing ______ which was developed to allow block-level access to a storage device over a network. What are you discussing? (Fill in the blank.)
A. Internet Small Computer System Interface (iSCSI) B. Network Attached Storage (NAS)
C. Common Internet File System (CIFS)
D. Network File System (NFS)

A

A. Internet Small Computer System Interface (iSCSI) is an interconnect protocol used to establish and manage a connection between a computer (initiator) and a storage device (tar- get). iSCSI was developed to allow block-level access to a storage device over a network.

57
Q
You are the network administrator for your company network. You are discussing with a colleague concepts of a storage solution that is a low-cost device for storing data and serv- ing files through the use of an Ethernet LAN connection. What are you discussing?
A. Fibre Channel
B. Network Attached Storage (NAS) 
C. Virtual Disk Service (VDS)
D. Data Center Bridging (DCB)
A

B. The concept of a Network Attached Storage (NAS) solution is that it is a low-cost device for storing data and serving files through the use of an Ethernet LAN connection. A NAS device accesses data at the file level via a communication protocol such as NFS, CIFS, or even HTTP, which is different from iSCSI or FC (Fibre Channel) storage devices that access the data at the block level. NAS devices are best used in file-storing applications, and they do not require a storage expert to install and maintain the device. In most cases, the only setup that is required is an IP address and an Ethernet connection.

58
Q
You are the administrator for your company network. You and a colleague are discussing Virtual Disk Service (VDS). Windows Server 2016 uses VDS, which was created to ease the administration involved in managing various types of storage devices. Windows Server 2016 supports which of the following storage management applications that use VDS? (Choose three.)
A. Disk Management snap-in
B. Partition Management snap-in
C. Diskpart
D. DiskRAID
A

A, C, and D. Windows Server 2016 uses the Disk Management snap-in, Diskpart, and DiskRAID. The Disk Management snap-in is an application that allows you to configure and manage the disk drives on the host computer. Diskpart is a command-line utility that configures and manages disks, volumes, and partitions on the host computer. DiskRAID is a scriptable command-line utility that configures and manages hardware RAID storage sys- tems. However, at least one VDS hardware provider must be installed for DiskRAID to be functional.

59
Q
You are the network administrator for your company network. You are using the Diskpart command-line utility. You want to use the switch that will allow you to reduce the physical size of the file. What switch command do you use?
A. Diskpart /assign 
B. Diskpart /compact 
C. Diskpart /convert 
D. Diskpart /reduce
A

B. Diskpart /compact attempts to reduce the physical size of the file.

60
Q

You are the administrator for your company network. You are planning on installing Data Center Bridging (DCB). DCB can be installed using Server Manager or using PowerShell. You have opted for using PowerShell. What command must you run to install DCB?
A. Install-WindowsFeature -name data-center-bridging
B. Install-WindowsFeature -name dcb
C. Install-WindowsFeature -name data center bridging
D. Install-WindowsFeature -name DCB

A

A. If you would like to install and use DCB through PowerShell, you need to complete the
following steps:
1. Click the Start button, then right-click Windows PowerShell ➢More ➢Run As Administrator.
2. In the Windows PowerShell console, type the following command and press the Enter key:
Install-WindowsFeature -name data-center-bridging

61
Q
You are the administrator for your company network. You are working with Windows PowerShell and Server Message Block (SMB), which is a network-sharing protocol that allows Windows machines that are running applications to read and write data to files. What PowerShell command would you use if you wanted to retrieve the connections estab- lished from the SMB client to the SMB servers?
A. Get-SmbDelegation
B. Get-SmbServerConfiguration 
C. Get-SmbSharedAccess
D. Get-SmbConnection
A

D. Get-SmbConnection retrieves the connections established from the SMB client to the
SMB servers.

62
Q
You are the administrator for your company network. You are working with Windows PowerShell and Server Message Block (SMB), which is a network-sharing protocol that allows Windows machines that are running applications to read and write data to files. What PowerShell command would you use if you wanted to modify the properties of the SMB share?
A. Set-SmbClientConfiguration 
B. Set-SmbShare
C. Set-SmbServerConfiguration 
D. Set-SmbShareAccess
A

B. Set-SmbShare modifies the properties of the SMB share.

63
Q

You are the administrator for your company network. You and a colleague are discussing Server Message Block (SMB). SMB is a network-sharing protocol that allows Windows machines (either client- or server-based operating systems) that are running applications to read and write data to files. It also allows systems to request services or resources that are running on remote servers. What is one advantage to using SMB?
A. SMB allows for the use of any network protocol, running on top of the protocol being used.
B. SMB allows for the use of any network protocol, running underneath the protocol being used.
C. SMB does not allow for the use of any network protocol, running on top of the proto-
col being used.
D. SMB does not allow for the use of any network protocol, running underneath the pro- tocol being used.

A

A. The one advantage of SMB is that it doesn’t matter what network protocol you are using (such as TCP/IP); SMB will run on top of the network protocol that is being used on your infrastructure.

64
Q

You are the administrator for your company network. An employee leaves unexpectedly and has encrypted files using EFS. There are two ways for you to unencrypt the files. What are two ways that an administrator can unencrypt the files? (Choose two.)
A. Log in using the user’s account and unencrypt the files.
B. Become a recovery agent and manually unencrypt the files.
C. Become a restore agent and manually unencrypt the files.
D. Log in as the administrator and unencrypt the files.

A

A and B. If files are encrypted using the Encrypting File System (EFS) and an administrator has to unencrypt the files, there are two ways to do this. First, the administrator can log in using the user’s account (the account that encrypted the files) and unencrypt the files. Sec- ond, the administrator can become a recovery agent and manually unencrypt the files.
Note: If EFS is used, it is best not to delete users immediately when they leave a company. Administrators have the ability to recover encrypted files, but it is much easier to gain access to the user’s encrypted files by logging in as the user who left the company and unchecking the encryption box.

65
Q

You are the administrator for your company network. You have decided to take advantage of the security provided by the NTFS filesystem. The default security permissions for Users
is on new folders and shares. (Fill in the blank.)
A. Read
B. Write
C. Full Control
D. Change

A

A. The default security permission for Users = Read on new folders or shares.

66
Q

You are the administrator for your company network
and R&D departments. Matt is a member of both the Sales and R&D department. There is a shared folder called Apps that everyone uses. Here are the current permissions on the Apps shared folder:
Group/User NTFS Shared
Sales Full Control Read
Marketing Modify Full Control
R&D Modify Change
HR Full Control Deny
IT Full Control Read
Matt is trying to make changes to a document in the Apps folder. He cannot make the changes necessary. What permission will need to change in order for him to make the nec- essary changes?
A. Sales folder shared permission needs to be changed to Change.
B. Sales folder shared permission needs to be changed to Modify.
C. R&D folder NTFS permission needs to be changed to Change.
D. Nothing. The Sales folder shared permission meets his requirements.

A

A. Permissions are additive among themselves. This means you get the highest level of per- missions. But when the two permissions meet, the most restrictive set of permission applies. In this question, the NTFS side would be Full Control (this would be the local permission) and the shared permission is Read. Therefore, the shared folder permission for Sales will need to be changed to Change so that Matt can modify the document.

67
Q
You are the administrator for your company network. Matt is a member of the Sales, R&D, and HR departments. There is a folder called Apps on the server. Here are the current per- missions on the Apps folder:
Group/User             NTFS
Sales                        Read
Marketing               Modify
R&D                         Modify
HR                        Full Control
IT                          Full Control
What is Matt’s effective NTFS permission? 
A. Read
B. Modify
C. Full Control
D. Deny
A

C. NTFS security is additive. In this question Matt is a member of Sales, R&D, and HR. Sales has Read permission, R&D has Modify permission, and HR has Full Control. Since NTFS security is additive, his overall effective NTFS permission will be Full Contro

68
Q

You are the administrator for your company network. Lisa is a member of the Sales, R&D, and HR departments. There is a folder called Apps on the server. Here are the current per- missions on the Apps folder:
Group/User NTFS
Sales Read
Marketing Modify
R&D Modify
HR Deny
IT Full Control
What is Lisa’s effective NTFS permission?
A. Read
B. Modify
C. Full Control
D. Deny

A

D. NTFS security is additive. In this question Lisa is a member of Sales, R&D, and HR. Sales has Read permission, R&D has Modify permission, and HR has Deny. Since NTFS security is additive, her overall effective NTFS permission will be Deny. Even though NTFS security is additive, the Deny permission overrides all other group settings.

69
Q
You are the administrator for your company network. You have decided to take advantage of the security provided by shared permissions. The default shared permission for Adminis- trators is on new folders. (Fill in the blank).
A. Read
B. Write
C. Full Control 
D. Change
A

C. The default shared permission for Administrators = Full Control. The shared permis- sions going from lowest to highest are Read, Change, Full Control, and Deny

70
Q
You are the administrator for your company network. Company policy states that you must set up disk quotas to limit how much storage space a user can use on the hard drive. What filesystem must you use in order to take advantage of disk quotas?
A. FAT 
B. FAT32 
C. NTFS 
D. exFAT
A

C. Disk quotas give administrators the ability to limit how much Storage Space a user can have on a hard drive. Disk quotas are an advantage of using NTFS over FAT32. If you decide to use FAT32 on a volume or partition, quotas will not be available. You can set up disk quotas based on volume or on users.

71
Q
You are the administrator for your company network. You are discussing disk quotas with a colleague. You know that there are a few options available when setting up disk quotas. Which of the following types of quota is a predefined way to set up quotas?
A. Quotas by volume
B. Quotas by user
C. Specifying quota entries 
D. Quota templates
A

D. Quota templates are predefined ways to set up quotas. Templates allow you to set up disk quotas without needing to create a disk quota from scratch.

72
Q
You are the administrator for your company network. You are discussing storage options with a colleague. You are discussing a feature in Windows Server 2016 that gives admin- istrators the ability to use both solid-state drives (SSDs) and conventional hard disk drives (HDDs) within the same storage pool. What type of storage is being discussed?
A. Tiered storage
B. Basic storage
C. Storage spaces direct 
D. Local storage
A

A. Tiered Storage is a feature in Windows Server 2016 that gives administrators the ability to use both solid state drives (SSDs) and conventional hard disk drives (HDDs) in the same storage pool

73
Q
You are the administrator for your company network. You are discussing the Boot Configu- ration Data (BCD) store with a colleague. What utility do you use to edit the boot options in the BCD store?
A. bcdboot utility
B. bcdedit utility
C. bootcfg utility
D. bootsect utility
A

B. To edit the boot options in the BCD store, use the bcdedit utility, which can be launched only from a command prompt.

74
Q
You are the administrator for your company network. You and a colleague are discussing a way of finding and removing duplicate data within the company network without compro- mising the integrity. What should you use?
A. Data chunking
B. Data redundancy 
C. Data deduplication 
D. Data replication
A

C. Data deduplication involves finding and removing duplicate data within the company network without compromising its integrity. Data deduplication allows redundant copies of data chunks and then it references those multiple copies into a single copy. The data is first compressed and then configured into a filesystem container in the System Volume Informa- tion folder.

75
Q
You are the administrator for your company network. You are thinking of enabling data deduplication. Where do you enable deduplication?
A. On files
B. On folders
C. On volumes 
D. On partitions
A

C. To enable data deduplication, you enable a volume for deduplication and then the data is automatically optimized.

76
Q
You are the administrator for your company network. You have enabled data deduplica- tion. Once you have enabled deduplication, the volume will contain which of the following? (Choose all that apply.)
A. Optimized files
B. Unoptimized files 
C. Chunk store
D. Free space
A

A, B, C, and D. The correct answer is all of them. With optimized files, the volume will contain files that are optimized, and that means that these files will have pointers to map the data to their respective areas of the chunk store. With unoptimized files, some files will not meet the standards for data duplication. These files will remain as unoptimized files. For example, encrypted files are not eligible to be optimized. The chunk store is the location where the data duplicated files will be stored and optimized. Finally, because data files are optimized and require less space, the volume will have additional free space that the admin- istrator can use.

77
Q
You are the network administrator for your company network. You have a computer that runs Windows Server 2016 and is used by 10 users. The computer is joined to an Active Directory domain. All of the users are members of the Administrators group. Each user has an Active Directory account. You have a Microsoft Word document that contains confi- dential information. What should you configure if you need to ensure that you are the only user who can open the document?
A. Account policies
B. NTFS permissions
C. Share permissions
D. Encrypting File System (EFS) settings
A

D. The Encrypting File System (EFS) is a component of the NTFS file system on Windows. EFS enables transparent encryption and decryption of files by using cryptographic algo- rithms. Any individual or program that doesn’t possess the appropriate cryptographic key cannot read the encrypted data.

78
Q
You are the administrator for your company network. You are trying to determine what the default TCP port for FTP is. Which one is it?
A. 21
B. 1433 
C. 3260 
D. 3389
A

A. FTP uses port 21. Port 1433 is used for Microsoft SQL. The iSCSI default port is TCP 3260. Port 3389 is used for RDP.

79
Q

You are the administrator for your company network. Matt is a member of both the R&D and Marketing departments. There is a shared folder called Apps that everyone uses. Here are the current permissions on the Apps shared folder:
Group/User NTFS Shared
Sales Read Deny
Marketing Modify Full Control
R&D Read Read
HR Full Control Deny
Admin Full Control Change

What will Matt’s local and remote permissions be when he logs into the Apps folder? A. Local = Full Control and Remote = Deny
B. Local = Read and Remote = Deny
C. Local = Modify and Remote = Full Control
D. Local = Read and Remote = Change

A

C. Permissions are additive among themselves. This means you get the highest level of per- missions. But when the two permissions meet, the most restrictive set of permission applies. In this question, the NTFS side would be Modify (this would be the local permission) and the shared permission would be Full Control. But when the two permissions meet, the most
restrictive, Modify, would apply.

80
Q
You are the network administrator for your company network. You are discussing manag- ing volumes with a colleague. When talking about volume sets, you are discussing a volume set that uses only one disk or a portion of a disk. What type of volume are you discussing?
A. Simple volume
B. Spanned volume
C. Striped volume
D. Mirrored volume
E. RAID-5 volume
A

A. A simple volume uses only one disk or a portion of a disk. When creating simple vol- umes, keep these points in mind:
■■ If you have only one dynamic disk, you can create only simple volumes.
■■ You can increase the size of a simple volume to include unallocated space on the same disk or on a different disk. The volume must be unformatted or formatted by using NTFS. You can increase the size of a simple volume in two ways:
■■ By extending the simple volume on the same disk. The volume remains a simple volume, and you can still mirror it.
■■ By extending a simple volume to include unallocated space on other disks on the same computer. This creates a spanned volume.
Note: If the simple volume is the system volume or the boot volume, you cannot extend it.

81
Q
You are the network administrator for your company network. You are discussing Microsoft Multipath I/O (MPIO) with a colleague. Of all the supported load balancing policies that Windows Server 2016 supports, which one designates a preferred path that will handle all process requests until it fails, after which the standby path will become active until the primary reestablishes a connection and automatically regains control?
A. Failover
B. Failback
C. Round robin
D. Round robin with a subset of paths
E. Dynamic least queue depth
F. Weighted path
A

B. Failback is similar to failover in that it has primary and standby paths. However, with failback you designate a preferred path that will handle all process requests until it fails, after which the standby path will become active until the primary reestablishes a connec- tion and automatically regains control

82
Q
You are the administrator of your company network. You are discussing the benefits of NTFS with a colleague. One of the benefits allows an administrator to map a local disk drive to an NTFS directory name. What is being discussed?
A. Dynamic volumes 
B. Remote storage 
C. Mounted drives 
D. Disk quotas
A

C. By using mounted drives, system administrators can map a local disk drive to an NTFS directory name. This helps them organize disk space on servers and increase manageability.

83
Q
You are the administrator of your company network. You want to see the logical and physical disks that are currently configured on your system. What tool should you use?
A. Disk Management 
B. Device Manager 
C. Task Manager
D. File Explorer
A

A. The Disk Management utility shows you the logical and physical disks that are currently configured on your system. Note that information about the size of each partition is also displayed in the Capacity column within Disk Management.

84
Q
You are the administrator of your company network. You are discussing adding disk drives to a server partition. Once you have physically installed the disk drive, it must be initial- ized. There are two different types of partition styles that are used to initialize disks. What are they? (Choose two.)
A. Master Boot Record (MBR) 
B. Hard Disk Drive (HDD)
C. Solid State Drive (SSD)
D. GUID Partition Table (GPT)
A

A and D. Once a disk drive has been physically installed, it must be initialized by selecting the type of partition. Different types of partition styles are used to initialize disks: Master Boot Record (MBR) and GUID Partition Table (GPT).

85
Q
You are the administrator of your company network. You are talking to a colleague about establishing a RAID-5 volume. What type of disk configuration should you use if you want to implement RAID?
A. Basic
B. Standard 
C. Dynamic 
D. Duplex
A

C. When a disk is initialized, it is automatically created as a basic disk, but when a new fault-tolerant (RAID) volume set is created, the disks in the set are converted to dynamic disks. Fault-tolerance features and the ability to modify disks without having to reboot the server are what distinguish dynamic disks from basic disks.