Chapter 4 - Disks and Volumes - Do I know this already? Flashcards

1
Q

Your Windows Server 2016 is working with Advanced Format disks. How many bytes exist per physical sector?

a. 512
b. 1024
c. 2048
d. 4096

A

d. 4096

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What partition style lets you to use disk space beyond 2 TB?

a. EUFI
b. MBR
c. GPT
d. SMB

A

c. GPT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of share do you typically use with UNIX-based systems?

a. SMB
b. MBR
c. GPT
d. NFS

A

d. NFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What PowerShell command permits the creation of a new SMB share?

a. Create-SmbShare
b. Get-SmbShare
c. New-SmbShare
d. Build-SmbShare

A

c. New-SmbShare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is not a basic NTFS folder permission?

a. Full control
b. List folder contents
c. Modify
d. Write attributes

A

d. Write attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which statement about file ownership in an NTFS permission system is not correct?

a. The owner can always change the permissions on a file.
b. By default, the creator of the file is the owner.
c. There is a special permission called Take Ownership.
d. No user accounts are granted Take Ownership by default.

A

d. No user accounts are granted Take Ownership by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you convert from MBR to GPT?

A

Step 1. Right-click the Start button.
Step 2. Choose Disk Management from the shortcut menu.
Step 3. Right-click the existing partition(s) and choose Delete Volume.
Step 4. Right-click the disk and choose Convert to GPT Disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name some VHD and VHDX cmdlets?

A
New-VHD
Mount-VHD
Get-Disk
Initialize-Disk
New-Partition:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the New-VHD cmdlet do?

A

Creates a new VHD or VHDX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Mount-VHD cmdlet do?

A

Mounts one or more virtual hard disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the Get-Disk cmdlet do?

A

Gets one or more disks visible to the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Initialize-Disk cmdlet do?

A

Initializes a RAW disk for first time use, enabling the disk to be formatted and used to store data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the New-Partition cmdlet do?

A

Creates a new partition on an existing Disk object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some advantages of ReFS?

A
  • ReFS gives Accelerated VHDX options in Hyper-V; these options permit massive performance increases when creating and extending a virtual hard disk, when merging checkpoints, and when performing backups.
  • A block cloning approach is key to excellent checkpoint performance.
  • Use of a 64 KB block size allows optimal performance in Hyper-V, with partition alignment handled automatically by Hyper-V.
  • When your Storage Spaces pool uses ReFS as the underlying on-disk format, it leverages new features to greatly improve the repair process.
  • ReFS v2 uses the concept of cluster “bands” to group multiple chunks of data together for efficient I/O; this really helps with your use of data tiering—specifically in moving data between tiers.
  • Automatic integrity checking exists in ReFS.
  • ReFS features new data scrubbing techniques.
  • ReFS offers better protection against data degradation. - It features built-in drive recovery and redundancy. ReFS supports up to 1 trillion terabytes.
  • You can create new volumes faster with ReFS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some disadvantages of ReFS?

A
  • It cannot replace NTFS in all scenarios.
  • You cannot use it with Clustered Shared Volumes.
  • There is no conversion capability between NTFS and ReFS.
  • There is no file-based deduplication. There are no disk quotas.
  • There are no object identifiers. There is no encryption support.
  • You cannot use named streams. There is no transaction support.
  • There are no hard links.
  • There is no support for external attributes.
  • There is no support for 8.3 filenames.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the basic NTFS file permissions?

A
  • Full Control
  • Modify
  • Read & Execute Read
  • Write
17
Q

What are the special NTFS file permissions?

A
  • Full Control
  • Traverse Folder/Execute File List Folder/Read Data
  • Read Attributes
  • Read Extended Attributes Create Files/Write Data
  • Create Folders/Append Data Write Attributes
  • Write Extended Attributes Delete
  • Read Permissions
  • Change Permissions
  • Take Ownership
18
Q

What are the basic NTFS folder permissions?

A
  • Full Control
  • Modify
  • Read & Execute List Folder Contents Read
  • Write
19
Q

What are the special NTFS folder permissions?

A
  • Full Control
  • Traverse Folder/Execute File List Folder/Read Data
  • Read Attributes
  • Read Extended Attributes Create Files/Write Data
  • Create Folders/Append Data Write Attributes
  • Write Extended Attributes Delete Subfolders and Files
  • Delete
  • Read Permissions
  • Change Permissions
  • Take Ownership
20
Q

What are some additional considerations concerning permissions?

A
  • File permissions always take precedence over folder permissions—that is, if a user can execute a program in a folder, this is possible even if such permissions do not exist at the folder level.
  • Permissions are cumulative—that is, users obtain the cumulative effect of different permissions they might obtain through different group memberships.
  • Deny permissions always override Allow permissions. Note that this is the one powerful exception to the preceding rule of permissions being cumulative.
  • Permissions migrate from the top down in a process known as inheritance. Inheritance allows files and folders created within already existing folders to have a set of permissions automatically assigned to them.
  • You enable or disable inheritance in the Advanced Security Settings window