Chapter 2 Flashcards

(202 cards)

1
Q

What is a disk sector?

A

A subdivision of a track

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Can which subdivision size of a drive can be changed?

A

An allocation unit (a.k.a a block or a cluster), NOT a sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the smallest amount of disk space that can be used when storing a file?

A

An allocation unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the term for space wasted in allocation units that are large than the file stored?

A

Slack space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What technique can be used to increase disk performance on volumes with large files?

A

Increase the allocation unit size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the default allocation size for an NTFS volume under 16 TB?

A

4,096 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the size of IO operations that Hyper-V uses for VHD files?

A

512 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the size of IO operations that Hyper-V uses for VHDX files?

A

4,096 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What setting can adversely affect the performance of Hyper-V disks?

A

Setting the allocation unit size smaller than the size of Hyper-V’s IO operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does GPT stand for?

A

GUID partition table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some disadvantages of MBR partition tables?

A

The boot sector is stored only in place at the beginning of the disk
Only 4 partitions are supported
Partitions are limited to 2 TB in size, because partition entries are 32-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some improvements brought by GPT?

A

The partition info is stored in multiple locations with CRC info to detect corruption
Volume size support up to 18 exabytes
Supports unlimited numbers of partitions, though Windows limits to 128 per disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is required to boot from a GPT disk?

A

An EFI-based boot partition, UEFI firmware, and a 64-bit version of Windows (at least Server 2008 or Vista)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the default parition style created by Server Manager in Server 2016?

A

GPT, it has no controls supporting MBR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the default parition style created by the Disk Management MMC?

A

MBR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is Server 2016 available in 32-bit?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of boot sector does a Hyper-V Generation 1 VM require?

A

MBR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of boot sector does a Hyper-V Generation 2 VM require?

A

UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the maximum size of a VHD?

A

2 TB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What versions of Windows are VHDs compatible with?

A

Server 2008 or Windows 7 and above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the maximum size of a VHDX?

A

64 TB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What versions of Windows are VHDXs compatible with?

A

Server 2012 or Windows 8 and above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What tools can be used to create VHDs and VHDXs?

A

The Disk Management MMC or PowerShell’s New-VHD cmdlet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What PowerShell commands are used to create a VHD?

A

Install-WindowsFeature -Name Hyper-V-PowerShell

New-VHD -Path c:\disk.vhdx -SizeBytes 100GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the default size allocation type for VHD's created by PowerShell?
Dynamic
26
What PowerShell option is used to create a fixed-size VHD?
-Fixed
27
What options are used to create a differencing disk in PowerShell?
- ParentPath # Specifies the parent disk | - Differencing # Specifies that a differencing disk be created
28
What option is used in PowerShell to copy a physical disk to a VHD?
-SourceDisk
29
What tools can be used to mount a VHD?
Disk Management MMC or the Mount-DiskImage or Mount-VHD cmdlets in PowerShell
30
What module is the Mount-DiskImage cmdlet included with?
Storage
31
What module is the Mount-VHD cmdlet included with?
Hyper-V
32
What PowerShell commands are used to mount disk images?
Mount-DiskImage -ImagePath c:\image.vhdx | Mount-VHD -Path c:\image.vhdx
33
What features does NTFS provide that are improvements of FAT?
``` ACL security Long file names Volume sizes up to 16 TB (w/ default 4KB allocation) or 256 TB (w/ 64KB allocation) File compression Encrypting file System (EFS) Quotas Volume Shadow Copy Resizing ```
34
What is the maximum volume size supported by FAT?
4 GB
35
What is the maximum file size supported by FAT?
2 GB
36
What is the maximum volume size supported by FAT32?
While its theoretical maximum size is 2 TB, Windows will not apply this format to a drive larger than 32 GB
37
What is the maximum file size supported by FAT32?
4 GB
38
What two NTFS features are incompatible with each other?
File compression and EFS
39
What is the maximum volume size supported by ReFS?
1 yobibyte
40
What is the maximum file size supported by ReFS?
16 exabytes
41
What filesystem is recommended by Microsoft for data storage?
ReFS
42
What versions of Windows can read ReFS?
Server 2012 or Windows 8.1 and above
43
When is the Share With tab available in File Explorer?
If you are the Creater Owner of a folder
44
What sharing permissions are available in the Share With tab of File Explorer?
Users and Read or Read/Write permissions
45
What tool provides the most control for configuring file shares?
File And Storage Services in Server Manager
46
What two types of file sharing protocols are supported by Server 2016?
Server Message Block (SMB) and Network File System (NFS)
47
What storage role is installed by default in Server 2016?
Storage Services role
48
What storage role service must be installed to manage SMB shares in Server Manager?
File Server role service
49
What role service must be installed to create NFS shares?
Server for NFS role service
50
What PowerShell command is used to install SMB share management?
Install-WindowsFeature -Name FS-FileServer
51
What PowerShell command is used to install NFS share management?
Install-WindowsFeature -Name FS-NFS-Service
52
What is the "SMB Share - Quick" profile used for?
Basic sharing with full share and NTFS permissions
53
What is the "SMB Share - Advanced" profile used for?
Providing additional services, such as access-denied assistance, folder classification, and quotas
54
What role service is required to use "SMB Share - Advanced" profile?
File Server Resource Manager
55
What is the "SMB Share - Applications" profile used for?
Hyper-V, databases, and other applications that require special sharing settings
56
Which SMB sharing option prevents users from searching through folders they cannot access?
Enable Access-Based Enumeration
57
Which SMB sharing option allows clients to keep copies of files on their local drives?
Allow Caching Of Share
58
Which SMB sharing option allows for file access from clients at remote locations?
Enable BranchCache On The File Share
59
Which SMB sharing option makes the server encrypt files before transmitting to the client?
Encrypt Data Access
60
What is the "NFS Share - Quick" profile used for?
Basic NFS sharing with authentication and permissions
61
What is the "NFS Share - Advanced" profile used for?
Provides full share and NTFS permissions, plus access-denied assistance, folder classification, and quotas
62
What role service is required to use "NFS Share - Advanced" profile?
File Server Resource Manager
63
What are the default permissions of shares created with File Explorer?
Everyone - Allow Read
64
What are the default permissions of shares created with Server manager?
Everyone - Allow Full Control
65
What access is determined by share permissions vs. NTFS permissions?
Share permissions determine access from the network, whereas NTFS permissions determine access from both the network and the filesystem
66
What are the three types of share permissions available?
Full Control, Change, and Read
67
What extra permissions does Full Control have over Change permissions?
The ability to change file permissions and to take ownership of files
68
How are parent folder sharing permissions related to subfolder sharing permissions?
They are not related: a user principle's access is determined by each share they directly attempt to access
69
What PowerShell command is used to create a new SMB file share?
New-SmbShare -Name ShareName -Path c:\folder
70
What PowerShell options are used to delegate access to an SMB share?
- FullAccess [group] - ReadAccess [group] - ChangeAccess [group] - NoAccess [group]
71
What PowerShell option determines the number of users who can access an SMB share?
-ConcurentUserLimit | 0 means unlimited
72
What PowerShell options are available to determine caching for SMB shares?
``` None Manual # Select files Programs Documents BranchCache ```
73
What PowerShell option is used to create an SMB share that only persists to the next reboot?
-Temporary
74
What PowerShell cmdlet is used to view active SMB sessions?
Get-SmbSession
75
What PowerShell cmdlet is used to terminate an active SMB session?
Close-SmbSession
76
What variables can be used to determine which SMB sesssion to terminate?
Session ID, computer name, username, or the open file
77
What PowerShell cmdlet is used to delete an SMB share?
Remove-SmbShare -Name ShareName
78
What PowerShell cmdlet is used to view SMB share access?
Get-SmbShareAccess -Name ShareName
79
What PowerShell cmdlet is used to provide SMB share access?
Grant-SmbShareAccess -Name ShareName -AccountName [account] -AccessRight []
80
What PowerShell cmdlet is used to remove SMB share access?
Revoke-SmbShareAccess
81
What PowerShell cmdlet is used to add a Deny ACL to an SMB share?
Block-SmbShareAccess
82
What PowerShell cmdlet is used to remove all deny permissions to an SMB share for a security principal?
Unblock-SmbShareAccess
83
What PowerShell cmdlets are used to view and change SMB server settings?
Get-SmbServerConfiguration and Set-SmbServerConfiguration
84
What is the name of a specific permission assingment in an ACL?
Access Control Entry (ACE)
85
What is the name of a user, group, or computer granted permissions?
Security principal
86
How does Windows refer to a security principal?
With a security identifier (SID)
87
Are permissions stored in the protected element or the security principal?
The protected element
88
When sharing on a network, which type of permissions are preferred?
NTFS permissions are preferred over Share permissions
89
What kind of security principals does Microsoft recomend assigning permissions to?
Groups rather than users, because users can be removed from groups
90
What is the name of the simplified set of permissions NTFS provides?
Basic permissions (previously known as standard permissions)
91
What is the name of the more granular set of permissions NTFS profides?
Advanced permissions (previously known as special permissions)
92
How many advanced permissions are available on NTFS?
14
93
What are the two types of ACEs?
Allow and Deny
94
What are the two approaches to assigning permissions?
Additive: start with no permissions and grant as needed Subtractive: start with all possible Alllow permissions and Deny as needed
95
What is the recommended approach to assigning permissions?
Additive
96
What are two ways to prevent subordinate security elements from inhereting permissions?
Turn off inheritance | Use Deny permissions
97
Which method of preventing subordinate security elements from inheriting permissions is not recommended by Microsoft?
Turning off inheritance
98
What is the combination of permissions, both explicit and inherited, for a security element?
Effective access
99
What are the permissions precedence rules that determine effective access for a security element?
Allow permissions are cumulative Deny permissions override Allow permissions Explicit permissions override inherited permissions
100
Where can you view the effective permissions of a security element?
In the Effective Access tab in the Advanced Security Settings dialog
101
What are the basic permissions available in NTFS?
Full Control, Modify, Read and Execute, List Folder Contents, Read, and Write
102
What permissions does Write grant to a folder?
Create new file and subfolders Modify folder attributes View folder's ownership and permissions
103
What permissions does Write grant to a file?
Overwrite Modify attributes View file's ownership and permissions
104
What permissions does Read grant to a folder?
See files and subfolders in the folder | View folder's ownership, permissions, and attributes
105
What permissions does Read grant to a file?
Read file contents | View file's ownership, permissions, and attributes
106
What permissions does List Folder Contents grant to a folder?
View names of files and subfolders in the folder
107
What permissions does List Folder Contents grant to a file?
Not applicable
108
What permissions does Read and Execute grant to a folder?
All permissions granted by Read and List Folder Contents | Navigate through restricted folders to reach other files and folders
109
What permissions does Read and Execute grant to a file?
All permissions granted by Read | Run applications
110
What permissions does Modify grant to a folder?
All permissions granted by Write and Read & Execute | Delete the folder
111
What permissions does Modify grant to a file?
All permissions granted by Write and Read & Execute Modify file Delete file
112
What permissions does Full Control grant to a folder?
All permissions granted by other NTFS permissions Modify folder permissions Take ownership of folder Delete files and subfolders
113
What permissions does Full Control grant to a file?
All permissions granted by other NTFS permissions Modify file permissions Take ownership of file
114
What are the advanced permissions offered by NTFS?
``` Full Control Traverse Folder / Execute File List Folder / Read Data Read Attributes Read Extended Attributes Create Files / Write Data Create Folders / Append Data Write Attributes Write Extended Attributes Delete Subfolders and Files Delete Read Permissions Change Permissions Take Ownership Synchronize ```
115
What advanced permission allows for the deletion of files and subfolders, even if the Delete permission has not been granted to those items?
Delete Subfolders and Files
116
What permissions are granted by the Synchronize permission?
Allows or denies different threads to wait on a handle of a file/folder and synchronize with another thread that could signal it
117
How can an administrator regain access to a file that the file owner has set all deny permissions on?
By taking ownership of the file and reassigning the correct permissions
118
Who can always modify the permissions of a file or folder, even if they lack permissions?
The file owner and the Administrator
119
Can an Administrator take ownership of a file and then reassign the ownership?
No, since that would allow undetected access to files by the Administrator
120
What disk virtualization technology is used to allocate storage on disks?
Storage Spaces
121
What is the name of the unallocated space available to Storage Spaces?
Storage pools
122
What storage units are created from storage pools?
Virtual disks
123
What prerequisites are required for a physical disk to be eligible for a storage pool?
It must be online and initialized, but with no volumes on it, e.g. Unallocated Space in Disk Management
124
What noun differentiates virtual disks and VHDs in PowerShell?
"VirtualDisk" represents the term related to Storage Spaces, while "VHD" is for Hyper-V
125
What term is used to describe the allocation of more storage than the underlying disk?
Thin provisioning
126
What term is used to describe the allocation of all storage space at once?
Fixed
127
What are the three fault tolerance options available in Storage Spaces?
Simple: stripes across disks, best performance, no fault tolerance Mirror: Writes copies across 2 or 3 disks, no performance penalty, but wastes disk Parity: Stripes across 3 or more disks along with parity, slightly reduced performance, but less space expensive
128
What are the two mirror resilience types available in Storage Spaces?
Two-way mirror: stores two copies of data, protects against single disk failure, requires at least two disks Three-way mirror: stores three copies of data, protects against two-disk failure, requires at least five disks
129
How does disk parity work?
Takes a sum of the bits on each disk and determines if it's even or odd. If the disk is lost, the even or odd value changes, and the disk can be restored with the correct bit.
130
What is the term for a disk in Storage Spaces that is not used until a failure occurs?
Hot spare
131
When is a disk in a Storage Space marked as failed?
When it reports a write error to the OS (usually after recovering from several silent failures) If it encounters a read error, it will first try to recover by writing a copy from the mirror or parity, but if that fails it will default to the write error procedure
132
What Storage Spaces feature allows admins to use high-performance storage for frequently accessed files?
Tiered storage
133
What conditions are required to use tiered storage?
The storage pool must have both SSDs and HDDs (as recognized by Windows) The Create Storage Tiers On This Virtual Disk option must be checked when creating a virual disk There must be enough of each type of media to implement the layout, e.g. 2 SSDs and 2 HDDs in a two-way mirror
134
How can you correct the media type specification when Windows recognizes a disk incorrectly?
Use the Set-PhysicalDisk PowerShell cmdlet with the MediaType parameter
135
What PowerShell command is used to pin a specific file to a specific tier?
Set-FileStorageTier
136
What part of an iSCSI network initiates communication to the storage device?
The iSCSI initiator
137
What is the name for hardware adapters for iSCSI networks?
The host bus adapter (HBA)
138
What is the name for the software-based iSCSI initiator in Server 2016?
iSCSI Initiator
139
What is the name for the device receiving communication on an iSCSI network?
The iSCSI target
140
What address is used to identify a storage device on an iSCSI network?
A logical unit number (LUN)
141
What is the name for the iSCSI target software in Windows Server?
iSCSI Target Server
142
How is the iSCSI Target Server installed?
It is a role service under the File and Storage Services role, or fs-iscsitarget-server in PowerShell
143
How is the iSCSI Initiator installed?
It is included in Windows Server by default
144
What is the name of the service used to identify iSCSI targets on a network?
iSNS
145
What component of iSNS processes requests from clients?
The iSNS server
146
What component of iSNS stores data supplied by clients and retrieves data for queries?
iSNS database
147
What component of iSNS registers information about itself to an iSNS server and sends queries about other clients?
iSNS clients
148
What component of iSNS is the protocol used for communication?
iSNS Protocol (iSNSP)
149
What PowerShell command installs the iSNS server?
Install-WindowsFeature -Name iSNS
150
What is the name for a series of standards that allow for SAN communication to take place reliably on LAN networks?
Datacenter bridging (DCB)
151
How does datacenter bridging allow SANs to operate reliably on mixed networks?
By allocating bandwidth dedicated to the SAN so that it is not interfered with by LAN traffic
152
What is the name of a network that has multiple types of traffic, e.g. SAN and LAN?
Converged network
153
What components are required for a server to use DCB?
A converged network adapter (CNA) that supports DCB? Storage devices that support DCB Switches that support DCB
154
Which PowerShell module allows for configuration of DCB?
DcbQos
155
What setting controls the source of CNA configuration settings in DCB?
The DCBX Willing bit
156
What setting must be changed to allow for saving DCB configuration of a server without interference from other clients?
Set the DCBX Willing bit to false
157
Which PowerShell command sets the DCBX Willing bit to false?
Set-NetQosDcbxSetting -Willing 0
158
What are the units of separation for traffic on a DCB network?
Traffic Classes
159
Which PowerShell cmdlet is used to modify traffic classes on a DCB network?
New-NetQosTrafficClass
160
How many DCB traffic classes are supported by Windows Server?
8, though all other network boxes must support that number as well
161
Which PowerShell cmdlet defines the quality of service policy of a network?
New-NetQosPolicy
162
Which DCB technology regulates network traffic to provide lossless data transmissions?
Priority-based Flow Control (PFC)
163
Which PowerShell cmdlet enables PFC on a DCB network?
Enable-NetQosFlowControl
164
Which Windows Server technology allows for SAN devices to revert to alternate paths when a network connection fails?
Multipath I/O
165
What components are required to implement Multipath I/O?
The Multipath I/O Windows feature A Device Specific Module (DSM) on every network adapter or HBA on the server that is connected to the SAN Redundant network components, e.g. two network adapters connected to different network segments
166
What is the maximum number of paths supported by Multipath I/O?
32
167
How are devices identified in the MPIO properties sheet?
By a combination of an 8 character vendor ID (VID) and a 16 character product ID (PID), often called a VID/PID
168
What technology is used to make sure a device is not seen as a duplicate when using Multipath I/O?
Plug and Plan (PnP)
169
What load balancing policies are supported by Microsoft's DSM?
Failover: simply switches to secondary when primary fails Failback: switches to secondary when primary fails, but reverts to primary when connection restored Round Robin: all paths take turns, with optional reserved paths in case of failure Dynamic Least Queue Depth: chooses path with fewest outstanding requests Weighted Paths: chooses path with lowest "weight," indicating higher priority
170
What Windows Server feature enables replication of volumes for disaster recovery?
Storage Replica (SR)
171
Which two types of replication is possible in Storage Replica?
Synchronous replication: writes are coordinated immediately before confirmation, requires fast connection, guarantees consistency Asynchronous replication: writes are coordinated at their own pace, useful for slow connections, cannot guarantee replication
172
What are the three primary scenarios for Storage Replica?
Server-to-server: replication between standalone servers, manual failover Cluster-to-cluster: replication between clusters, manual failover Stretch cluster: replication between sites, automated failover
173
What is the process for synchronizing data in Storage Replica?
Replication is one-way, SR dismounts the destination volume and performs the synchronization
174
What must be done if SR synchronization is interrupted in order to access the destination volume?
The partnership must be removed
175
What protocol does Storage Replica rely on for communication?
SMB 3
176
What data units does Storage Replica use?
Blocks
177
What improvements does SR have over DFS Replication?
Not file-based or checkpoint-based, preventing data loss
178
Which PowerShell cmdlet is used to create an SR partnership?
New-SRPartnership
179
Which editions of Windows Server support Storage Replica?
Only Datacenter
180
What are the system requirements for running Storage Replica?
Windows Server Datacenter edition 4 GB of RAM Independent storage infrastructure on each side A separate log disk, at least 9GB in size Mirrored disks must both have the same physical size and sector size All disks must be GPT paritioned None of the disks may contain the OS Network must support ~5ms round-trip latency for synchronous replication All servers must be domain-bound Ports 445, 5445, and 5985 must be open to support SMB, SMB Direct, and WS-MAN, along with ICMP
181
Which PowerShell cmdlet is used to verify Storage Replica topology?
Test-SrTopology
182
Which PowerShell cmdlet grants full access to the mirrored Storage Replica units?
Grant-SrAccess
183
Which PowerShell cmdlet establishes the Storage Replica partnership?
New-SrPartnership
184
Which PowerShell cmdlet is used to view Storage Replica groups?
Get-SrGroup
185
Which PowerShell cmdlet can be used to trigger Storage Replica failover and how is it used?
Set-SrPartnership, used to reverse source and destination roles so that the destination is accessible
186
What is the name of the role service used to consolidate redundant files on NTFS?
Data deduplication
187
On what level does the data deduplication service operate?
Volume level (not file)
188
What PowerShell command installs the Data Deduplication feature?
Install-WindowsFeature -Name FS-Data-Deduplication
189
What are the Data Deduplication options available?
Disabled General Purpose File Server: typical fileserver, background, in-use files ignroed Virtual Desktop Infrastructure (VDI) Server: for Hyper-V functions, background, in-use and partial files optimized Virtualized Backup Server: priority, in-use files optimized
190
What option allows for running data deduplication at a normal priority with maximum performance?
Enable Throughput Optimization
191
Which PowerShell cmdlet is used to turn on Data Deduplication?
Enable-DedupVolume
192
Where are file chunks identified by Data Dedeuplication stored?
Chunk store
193
What technology is used to redirect files to deduplicated chunks?
Reparse points
194
What technology does data deduplication replace?
Single Instance Store (SIS)
195
What is the name for the accumulation of unoptimized files on a deduplicated volume?
Churn
196
What process is used by data deduplication to find chunks that no longer have reparse points attached to them?
Garbage collection
197
What process is used by Data Deduplication to find damage or corruption in the chunk store and replace it with mirror or parity data?
Integrity scrubbing
198
What process is used by Data Deduplication to restore files back to their original state?
Unoptimization
199
What factors should be considered before using Data Deduplication?
The server should have enough idle time to run the deduplication process The data should be susceptible to redundancy The data should not be encrypted The data should be read successively (e.g., not a database)
200
What tool can be used to determine the space savings that could be gained using Data Deduplication?
Data Deduplication Savings Evaluation Tool (Ddpeval.exe)
201
Which PowerShell cmdlet is used to monitor Data Deduplication?
Get-DedupStatus
202
What member of the results of Get-DedupStatus determines if the deduplication job has completed successfully?
LastOptimizationResult