Chapter 3 Advanced File Share

¡Supera tus tareas y exámenes ahora con Quizwiz!

b. 2

DFS replication configuration requires a minimum of how many targets? a. 1 b. 2 c. 3 d. 4

d. Server 2008 mode supports 50,000 folders and access-based enumeration, and Server 2000 mode supports 5000 folders.

In DFS, what are the differences between Windows Server 2008 mode and Windows Server 2000 mode? a. Server 2008 mode supports 15,000 folders and access-based enumeration, and Server 2000 mode supports 5000 folders. b. Server 2008 mode supports 75,000 folders, and Server 2000 mode supports 10,000 folders. c. Nothing a user can see. d. Server 2008 mode supports 50,000 folders and access-based enumeration, and Server 2000 mode supports 5000 folders

Replication

The process of creating redundant copies of files on multiple servers.

b. Domain-based namespaces remain regardless of the server status where the share resides.

Which of the following is true about the two types of namespaces? a. Stand-alone namespaces always use more bandwidth. b. Domain-based namespaces remain regardless of the server status where the share resides. c. Domain-based namespace includes the current server name for faster name resolution. d. Stand-alone namespace can't be replicated

b. File expiration task

Which of the following should you create if you want all files that haven't been accessed in more than six months moved to a special folder? a. File-screening action b. File expiration task c. File storage job d. Quota report

Namespace

A name given to a grouping of folders maintained on a DFS server that facilitate access to shares on multiple servers, using a single UNC path.

Digital Signature

A numeric string created by a hash algorithm that's used to validate a message or document's authenticity

Encryption Key

A numeric value that a cryptographic algorithm uses to change plaintext to ciphertext (encrypt) and ciphertext back to plaintext (decrypt).

Referral

A prioritized list of servers used to access files in a namespace.

NTFS

EFS is supported only on __________ volumes

Cryptography

The practice and study of methods used to protect information by encoding or encrypting it to an unreadable format, which can be decoded later to its original format.

90% 60%

When the Staging folder reaches _____________ of its defined size, the oldest staged files are deleted until it's at _____________?

Digital Certificate

e A digital document containing identifying information about a person or system.

Replication Topology

A DFS replication setting that describes the connections used to replicate files between servers.

Namespace Root

A folder that's the logical starting point for a namespace.

Ciphertext

Data that has been encrypted; it's the result you get when plaintext is transformed by an encryption algorithm.

Plaintext

Data that has been unaltered; as used in cryptography, it's the state of information before it's encrypted or after it has been decrypted.

True

Encrypted files are unencrypted when they're transferred across a network and remain unencrypted on the destination server unless they're saved to an encrypted folder. True or False

True - but the exception is if the file is copied or moved to a FAT or ReFS volume, in which case the file is decrypted because neither FAT nor ReFS support encryption.

Encrypted files that are copied or moved always stay encrypted, regardless of the destination folder's encryption attribute. True or False?

4 GB

The default size of the DFSRPrivate\ConflictandDeleted folder is __________?

70 million

The number of files to be replicated on a volume must be less than ____________________?

Decryption

The process of decoding data, usually with a decryption key

Soft Quota

a A type of quota that alerts users when they have exceeded the quota but doesn't prevent them from saving files.

Folder Target

A UNC path configured on a DFS namespace folder that points to a shared folder hosted on a server

a. Limit access to certain types of files. d. Send a notification about access to certain types of files.

A file screen is used to do which of the following? (Choose all that apply.) a. Limit access to certain types of files. b. Screen files for malware and viruses. c. Analyze file use and restrict use to maximize network bandwidth. d. Send a notification about access to certain types of files.

Passive Screening

A file-screening method that monitors and notifies when unauthorized files are saved but doesn't prevent users from saving unauthorized files on the server.

Active Screening

A file-screening method that prevents users from saving unauthorized files on the server.

Hash

A fixed-size value produced by running a string of data through a mathematical function called a hash algorithm.

Public Key

A key owned by a person or system that's available as part of a user's or system's digital certificate.

Private Key

A key that's held by a person or system and is unknown to anyone else.

Secret Key

A key used to both encrypt and decrypt data in a secure transaction.

Quota

A limit placed on the amount of storage on a server volume or share available to a user.

File Group

A list of the types of files that define a file screen.

Cryptographic Algorithm

A mathematical computation used to encrypt and decrypt data.

File Screen

A method of limiting the types of files a user can store on a server.

Trusted Platform Module (TPM)

A microchip built into some computer motherboards that's used to create and store cryptographic information for the purposes of securing a computer against unauthorized use.

Distributed File System (DFS)

A role service under the File and Storage Services role that enables you to group shares from different servers into a single logical share called a namespace.

File Server Resource Manager (FSRM)

A role service with services and management tools for monitoring storage space, managing quotas, controlling the types of files users can store on a server, creating storage reports, and classifying and managing files.

Namespace Server

A server with the DFS Namespaces role service installed.

250 GB

A single file to be replicated must be less than ______________?

Hard Quota

A type of quota that prevents users from saving files if their files in the target folder already meet or exceed the quota limit.

Remote Differential Compression (RDC)

An algorithm used to determine changes that have been made to a file and replicate only those changes.

Symmetric Encryption

An encryption/decryption process that uses a single key to encrypt and decrypt data (also called "private key cryptography" or "secret key cryptography").

Asymmetric Encryption

An encryption/decryption process that uses both a public key and a private key.

cipher

Another method of encrypting and decrypting is the _________ command.

Install-WindowsFeature BitLocker -IncludeManagementTools

Command that installs the BitLocker Drive Encryption feature.

Disable-BitLocker -MountPoint DriveLetter

Command to Disable BitLocker on a volume

Enable-BitLocker -MountPoint DriveLetter

Command to Enable BitLocker on a volume.

Enable-BitLockerAutoUnlock -MountPoint DriveLetter

Command to Enable the automatic unlocking feature on a non-Windows volume.

c. Pointers to existing shared folders

Folders added to a namespace can be described as which of the following? a. Copies of existing folders b. Copies of existing folders that are initially empty c. Pointers to existing shared folders d. Copied to a staging area automatically

c. Use the Override Referral Ordering option.

How can referral order be customized? a. There's no way to customize the referral order. b. Exclude targets in the client's site. c. Use the Override Referral Ordering option. d. Put in nonexistent targets, forcing the system to follow your custom order.

b. Always go to that target.

If a client is on the same site as a particular target, what will it do? a. Follow the referral ordering method. b. Always go to that target. c. Ignore the targets on the same site. d. Go to a target randomly.

a. File-screening violations b. Files by owner d. Quota use

Storage reports can show which of the following? (Choose all that apply.) a. File-screening violations b. Files by owner c. Files by permissions d. Quota use

a. Access to files across the network c. Copies of files created automatically for redundancy d. Fault-tolerant access to files

The Distributed File System role service provides which of the following? (Choose all that apply.) a. Access to files across the network b. Replacement for regular backups c. Copies of files created automatically for redundancy d. Fault-tolerant access to files

4 GB

The Staging folder's size acts as a quota, and its default size is _________________?

Encryption

The process of encoding data to a format unusable to anyone who doesn't have the decryption key.

100 TB

The total size of all replicated files on a server must be less than _________________?

Propagation test

This option conducts a ____________________ but doesn't actually produce a report. The test creates a test file in a replicated folder and then tests the replication of that file to other servers in the replication group.

Health report

This report describes the efficiency of replication and states whether there are any problems. It shows the number of backlogged files, bandwidth savings, and whether any servers in the group have reported errors or warnings.

Propagation report

This report, generated from the results of the propagation test, shows how long it took to replicate the test file to each server in the replication group.

Export-DfsrClone EX:Export-DfsrClone -Volume D: -Path D:\DFSRclone

To create a clone, use the ________________ command at a PowerShell Prompt

Replication Group

Two or more servers, known as members, that synchronize data in folders so that when a change occurs, all replication group members are updated at once.

False - Unencrypted files that are moved or copied to a folder with the encryption attribute set are always encrypted.

Unencrypted files that are moved or copied to a folder with the encryption attribute set are always unencrypted. True or False?

Import-DfsrClone EX:Import-DfsrClone -Volume D: -Path D:\DFSRclone

Use the following command at a PowerShell prompt to import the clone

b. Active and passive

What are the two types of file screens you can create with File Server Resource Manager? a. Hard and soft b. Active and passive c. Active and notify d. Restrict and notify

a. Hard and soft

What are the two types of quotas you can create with File Server Resource Manager? a. Hard and soft b. Hard and notify c. Limit and notify d. Final and minimum

c. Remote differential compression

What's the algorithm used to replicate only changes made in files? a. Remote replication connection b. Remote change comparison c. Remote differential compression d. Remote change compression

c. Lowest cost, selecting the closest server first.

What's the default ordering method for referrals? a. No default; you must choose an ordering method during initial configuration. b. Random order to ensure load balancing. c. Lowest cost, selecting the closest server first. d. The order in which the target servers were defined.

a. Last writer wins; losing file is cached.

What's the model used when there's an update conflict? a. Last writer wins; losing file is cached. b. First writer wins; losing file is cached. c. First writer wins; losing file is deleted. d. Last writer wins; losing file is deleted.

DFSRPrivate\ConflictandDeleted

When a conflict occurs, DFS replication uses a "last writer wins" model to make this determination. The losing file is cached in the Conflict and Deleted folder, a hidden folder in the replicated folder named ____________________________?

a. Before DFS configuration

When should share permissions be set? a. Before DFS configuration. b. During DFS configuration. c. After DFS configuration is finished. d. Never; DFS handles all permissions

d. The Staging folder for the folder being replicated.

Where are changed files cached until replication is finished? a. Caching folders in the C:\DFScache folder on the namespace server. b. The Staging folder on the target server. c. No caching is done. d. The Staging folder for the folder being replicated.

c. From the namespace server for a stand-alone type and from the domain controller for a domain-based type

Where does a referral originate when a client accesses a DFS namespace? a. From the namespace server b. From the domain controller c. From the namespace server for a stand-alone type and from the domain controller for a domain-based type d. From a cached copy of referrals on the server where the share is located

c. Classification Management

Which FSRM feature should you use if you want to set certain attributes of a file automatically based on its content? a. File Screening Management b. Quota Management c. Classification Management d. Storage Reports Management

b. Hub and spoke topology

Which is the best method of synchronization to reduce bandwidth with a DFS replication group made up of a main office and eight branch offices? a. Full mesh topology b. Hub and spoke topology c. Round robin topology d. Random synchronization

a. Filenames c. Folder names d. Filename patterns

Which of the following is a method for defining elements in a file group? (Choose all that apply.) a. Filenames b. Namespaces c. Folder names d. Filename patterns

b. Quotas can be changed in the template and applied to all volumes using that quota previously. c. The template can be named and have a description included for future reference. d. Properties can be copied from an existing template.

Which of the following is an advantage of using quota templates? (Choose all that apply.) a. They can't be applied to new volumes that come online later. b. Quotas can be changed in the template and applied to all volumes using that quota previously. c. The template can be named and have a description included for future reference. d. Properties can be copied from an existing template.

c. Network Unlock allows a system to boot without a PIN

Which of the following is true about BitLocker Drive Encryption? a. It can't be used to encrypt the Windows boot volume. b. Only computers with a TPM can use it. c. Network Unlock allows a system to boot without a PIN. d. A startup key is stored in the \Windows folder.

a. An EFS certificate is created automatically, if necessary.

Which of the following is true about EFS? a. An EFS certificate is created automatically, if necessary. b. It's supported only on NTFS and ReFS volumes. c. Encrypted files that are moved to another folder must be encrypted again. d. EFS can be configured only on files.


Conjuntos de estudio relacionados

Chapter 44: Nursing Care of the Child With an Alteration in Mobility/Neuromuscular or Musculoskeletal Disorder

View Set

fin 240 kaplowitz worksheet 8.2: patents, trade secrets, and international protections

View Set

Chapter 1 - Strategic Human Resource Management

View Set

Reaction to the Holocaust in the Americas

View Set