2. Implement Storage Solutions Flashcards

1
Q

Allocation unit

A

The smallest amount of disk space that a computer can allocate when storing a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Slack Space

A

Wasted space on a disk caused by misused allocation units. the slack space per file is usually equivalent to half of the allocation unit size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MBR (Master Boot Record)

A

supports volumes up to 2tb in size.

supports 4 primary partitions

can have more than 4 partitions by using extended partitions. these volumes are considered logical volumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

GPT (guid partition table)

A

128 partitions per disk

volume sizes up to 18 exabytes.

self heals corruption using a cyclical redundancy check

requires UEFI to boot from a GPT

Gen 2 VMs can boot from gpt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VHD

A

Limited to 2tb and are compatible with servers running windows 2008 or later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VHDX

A

Can be as large as 64 tb support for a 4kb logical sector size and are compatible with windows 2012 and newer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fixed size

A

Allocates all of the disk space upfront

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dynamically expanding

A

Allocates the disk space as you add data to the virtual disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Create a vhd or vhdx using PowerShell

A

the hyper-v role must be installed

new-vhd -path <path.vhdx> -sizebytes 10gb</path.vhdx>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

-differencing

A

creates a differencing disk for the parent specified in the parentpath parameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

-parentpath

A

specifies the location and file name of the parent disk to be copied to the new vhd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

-sourcedisk

A

specifies the location and filename of a physical disk to be copied to the new vhd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mount a vhd or vhdx with powershell

A

mount-diskimage -imagepath filename

dismount-diskimage -imagepath filename

Mount-vhd -path <path></path>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NTFS

A

Windows NT file system

16-256 TB depending on the allocation unit size

file compression is supported

EFS - an encrypting file system for files and folders

Quotas - impose quotas on users

Volume Shadow Copy

Resizing - can resize volumes other than the system volumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

REFS

A

Resilient File System

volume size 1 yobibyte

max file size 1 exabyte

protects data using checksums to thwart and repair corruption

does not support EFS encryption

Does not support compression

Does not support disk quotas

uses the same permissions system as NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMB (Server Message Block)

A

protocol that has long been the standard for file and printer sharing on Windows networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NFS (Network File System)

A

A standard file system protocol typically used by unix and linux distros.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Install file-sharing roles with Powershell

A

Install-Windowsfeature -name fs-fileserver

Install-windowsfeature -name fs-nfs-service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SMB Quick

A

Provides basic sharing with full share and NTFS permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SMB Advanced

A

quick + additional services like access-denied assistance, folder classifications, and quotas. in order to make an advanced share, the file server resource manager role must be installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SMB Applications

A

smb sharing for services like hyper-v and other applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Access-based Enumeration

A

Applies a filter to the share and if a user does not have access to a particular file or folder they will not be able to see it in the share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Share Caching

A

Allows clients to maintain local copies of files they access from the server share in case the share was to become unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
BranchCache
Allows users to cache the file share and allows them to share the cached files and folders with other users.
26
NFS Advanced
Full NFS sharing and NTFS permissions and additional services like access-denied, folder classifications and quotas.
27
FSRM (File Server Resource Manager)
Provides more in depth management of features like quota management, file classifications, file management tasks, file screening, and storage reports.
28
Quota management
Allows you to limit the space that is allowed for a volume or folder
29
File Classification Infrastructure
Provides insight into your data by automating classification processes for policies like dynamic access, file encryption, and file expiration.
30
File screening
allows you to classify the types of files that are allowed to be stored on a share. you can deny file extensions like mp3 for instance.
31
storage report
identify trends in disk usage and how your data is classified. allows you to monitor groups and see what kinds of actions they perform on a share or even monitor what types of files are opened during specific times.
32
Create an SMB share with Powershell
New-smbshare -name data -path -fullaccess everyone
33
Grant-smbshareaccess
Adds an allow access control entry to the acl for a named share
34
revoke-smbshareaccess
removes all allow permissions for a specified security principal
35
Block-smbshareaccess
adds a deny access control entry to the acl
36
unblock-smbshareaccess
removes all deny permissions for a specified user from a named share.
37
ACL (access control list)
A collection of individual permission assignments for a particular object like a file or a directory. An ACL is full of ACEs access control entries that are made up of security principals.
38
Security Identifiers
every security principal is assigned a token that contains their identifier and determines what kind of privileges they have over a file.
39
Additive
Start with no permissions and slowly grant permissions to individual security principals or groups.
40
Subtractive
start by granting everyone permission then slowly release their permissions to what they need.
41
Permission inheritance
parent elements pass their permissions down to subordinate elements like subfolders and files created within the folders.
42
Storage Pool
a storage space that can span multiple drives invisibly providing resources that can expand or reduce as needed by adding disks to or removing them from the pool.
43
Simple
Data is striped across your disks to allow for quicker access to information but provides no fault tolerance.
44
Mirror
Your data is mirrored across disks and allows one drive to fail.
45
Parity
Data is striped across disks and parity data is created allowing for the drives to repair data.
46
Hot spare
an extra disk that is not in use until a disk failure occurs.
47
Tiered storage
Allows you to use faster disks for more commonly used files. set-filestroragetier - allows you to pin files to specific storage tiers
48
SAN (Storage Area Network)
Storage dedicated soley to highspeed connections between servers and storage devices.
49
Iscsi Initiator
Initiates the scsi communication process, it is a computer or application that accesses the storage devices.
50
iSCSI Target
receives SCSI commands from the initiator and passes them to a storage device
51
LUN
Logical unit number - an address the scsi device uses to identify a specifit storage resource.
52
ISNS
Register the presence of initiators and targets on the network so they can be more easily accessed by new storage devices and servers.
53
Datacenter bridging
define the mechanisms for flow control and bandwidth management on a network with multiple traffic types. requires network adapters that support converged networking aka a converged network adapter.
54
converged network
a network with multiple types of traffic flowing on it
55
DCBX
the mechanism by which dcb devices on the network share their configuration settings to other devices. the dcbx willing bit must be set to false for you to create a dcb configuration set-netqosdcbxsetting -willing 0
56
Traffic classes
How you separate types of traffic on a converged network to establish quality of service. net-qostrafficclass
57
SMB PORT
PORT 445
58
iSCSI PORT
PORT 3260
59
NFS PORT
PORT 2049
60
LIVE MIGRATION PORT
6600
61
Priority-based flow control
a method of regulating network traffic to provide lossless data transmissions. enable-netqosflowcontrol -priority #
62
Multipath i/o
provides multiple paths for traffic to increase redundancy
63
Synchronous replication
Data is written to two locations at the same time providing no data loss if a failure occurs.
64
Asynchronous replication
data is written to a single location and replicated to a second destination at a later date there is no guarantee that the data will be identical in the event of a failure.
65
Server to Server
Provides synchronous or asynchronous replication between local or shared storage volumes on two standalone servers.
66
Cluster to Cluster
Provides synchronous or asynchronous replication between two clusters the clusters can be using storage spaces with san storage or shared SAS, or storage spaces direct.
67
Stretch Cluster
Provides synchronous or asynchronous replication between the storage devices in an asymmetric cluster. the stretch cluster is the only configuration that supports automatic failover
68
Install data deduplication with PowerShell
install-windowsfeature -name fs-data-deduplication
69
Places you can utilize deduplication
General-purpose file servers hyper-v (vdi specifically) backup servers
70
Chunk store
where unique bits of data are stored after a file has been optimized.
71
reparse point
replaces the unique data as a pointer to a place in the chunk store where the data can be found.
72
data deduplication
the processes of optimizing storage by deleting redundant data and replacing it with pointers. Microsoft data deduplication works on a volume basis rather than individual files. you cannot deduplicate encrypted files
73
churn
the accumulation of unoptimized files
74
Garbage collection
a deduplication job that searches the chunk store for chunks that no longer have reparse points associated with them likely due to the file being deleted.
75
integrity scrubbing
a deduplication job that searches the chunk store for damaged or corrupted chunks and replaces them with mirror or parity data.
76
unoptimization
a deduplication job that restores all of the optimized files on a volume to their original state.