chapter 26 27 Flashcards
What are the TWO default times that shadow copies are created?
12:00pm 7:30 AM
Third party software vendors can work with the VSS
True
What function of the FSRM allows administrators to block users from storing personal data such as music videos and photos?
File Screen Policies
Which of the following are BASIC NTFS permissions?
Modify, Write, Read, Read & Execute, Full Control, List Folder Contents.
FSRM can generate reports in real time
True
Which of the following are DFS replication topologies?
Full Mesh, Hub and Spoke, Bandwidth throttling, No Topology, Replication Schedule.
VSS was first introduced with which version of windows server?
2003
Shadow Copies eliminate the need for backups
False
The data deduplication service is not data duplication
true
ISCSI storage is accessed via an ____ connection
Ethernet
As discussed in the lecture which tab will allow you to review permissions to an object for an individual user or group.
Effective Access
Which of the following are DFS namespace types
Win Server 2008 mode
Standalone
Domain-Based
What does NFS stand for
Network File System
FTP is still in use today because its efficient.
True
NFS is commonly used with the ____ and ___ compatible operating systems.
Linux Unix
What does the acronym SMB stand for?
Server Message Block
Volume Shadow copies are set at the volume level.
true
What service performed replication for DFS prior to windows server 2003
File Replication Service.
You need to purchase a separate product to backup your windows server machine
false
Which of the following are SHARE permissions?
Full Control, Read, Change
A hard limit does not prevent a user from continuing to save files
false
(Match) A unified namespace that presents a centralized view of shared folder data in an organization.
DFS Namespace
(Match) The top level of the DFS tree that defines the namespace for DFS and the functionality available
DFS Namespace Root
(Match) The hierarchy of the namespace
DFS tree