Chapter 4 - Disks and Volumes - Do I know this already? Flashcards
Your Windows Server 2016 is working with Advanced Format disks. How many bytes exist per physical sector?
a. 512
b. 1024
c. 2048
d. 4096
d. 4096
What partition style lets you to use disk space beyond 2 TB?
a. EUFI
b. MBR
c. GPT
d. SMB
c. GPT
What type of share do you typically use with UNIX-based systems?
a. SMB
b. MBR
c. GPT
d. NFS
d. NFS
What PowerShell command permits the creation of a new SMB share?
a. Create-SmbShare
b. Get-SmbShare
c. New-SmbShare
d. Build-SmbShare
c. New-SmbShare
Which of the following is not a basic NTFS folder permission?
a. Full control
b. List folder contents
c. Modify
d. Write attributes
d. Write attributes
Which statement about file ownership in an NTFS permission system is not correct?
a. The owner can always change the permissions on a file.
b. By default, the creator of the file is the owner.
c. There is a special permission called Take Ownership.
d. No user accounts are granted Take Ownership by default.
d. No user accounts are granted Take Ownership by default.
How do you convert from MBR to GPT?
Step 1. Right-click the Start button.
Step 2. Choose Disk Management from the shortcut menu.
Step 3. Right-click the existing partition(s) and choose Delete Volume.
Step 4. Right-click the disk and choose Convert to GPT Disk.
Name some VHD and VHDX cmdlets?
New-VHD Mount-VHD Get-Disk Initialize-Disk New-Partition:
What does the New-VHD cmdlet do?
Creates a new VHD or VHDX
What does the Mount-VHD cmdlet do?
Mounts one or more virtual hard disks
What does the Get-Disk cmdlet do?
Gets one or more disks visible to the operating system
What does the Initialize-Disk cmdlet do?
Initializes a RAW disk for first time use, enabling the disk to be formatted and used to store data
What does the New-Partition cmdlet do?
Creates a new partition on an existing Disk object
What are some advantages of ReFS?
- ReFS gives Accelerated VHDX options in Hyper-V; these options permit massive performance increases when creating and extending a virtual hard disk, when merging checkpoints, and when performing backups.
- A block cloning approach is key to excellent checkpoint performance.
- Use of a 64 KB block size allows optimal performance in Hyper-V, with partition alignment handled automatically by Hyper-V.
- When your Storage Spaces pool uses ReFS as the underlying on-disk format, it leverages new features to greatly improve the repair process.
- ReFS v2 uses the concept of cluster “bands” to group multiple chunks of data together for efficient I/O; this really helps with your use of data tiering—specifically in moving data between tiers.
- Automatic integrity checking exists in ReFS.
- ReFS features new data scrubbing techniques.
- ReFS offers better protection against data degradation. - It features built-in drive recovery and redundancy. ReFS supports up to 1 trillion terabytes.
- You can create new volumes faster with ReFS.
What are some disadvantages of ReFS?
- It cannot replace NTFS in all scenarios.
- You cannot use it with Clustered Shared Volumes.
- There is no conversion capability between NTFS and ReFS.
- There is no file-based deduplication. There are no disk quotas.
- There are no object identifiers. There is no encryption support.
- You cannot use named streams. There is no transaction support.
- There are no hard links.
- There is no support for external attributes.
- There is no support for 8.3 filenames.
What are the basic NTFS file permissions?
- Full Control
- Modify
- Read & Execute Read
- Write
What are the special NTFS file permissions?
- Full Control
- Traverse Folder/Execute File List Folder/Read Data
- Read Attributes
- Read Extended Attributes Create Files/Write Data
- Create Folders/Append Data Write Attributes
- Write Extended Attributes Delete
- Read Permissions
- Change Permissions
- Take Ownership
What are the basic NTFS folder permissions?
- Full Control
- Modify
- Read & Execute List Folder Contents Read
- Write
What are the special NTFS folder permissions?
- Full Control
- Traverse Folder/Execute File List Folder/Read Data
- Read Attributes
- Read Extended Attributes Create Files/Write Data
- Create Folders/Append Data Write Attributes
- Write Extended Attributes Delete Subfolders and Files
- Delete
- Read Permissions
- Change Permissions
- Take Ownership
What are some additional considerations concerning permissions?
- File permissions always take precedence over folder permissions—that is, if a user can execute a program in a folder, this is possible even if such permissions do not exist at the folder level.
- Permissions are cumulative—that is, users obtain the cumulative effect of different permissions they might obtain through different group memberships.
- Deny permissions always override Allow permissions. Note that this is the one powerful exception to the preceding rule of permissions being cumulative.
- Permissions migrate from the top down in a process known as inheritance. Inheritance allows files and folders created within already existing folders to have a set of permissions automatically assigned to them.
- You enable or disable inheritance in the Advanced Security Settings window