Lesson 7: Planning for high availability 70-646

¡Supera tus tareas y exámenes ahora con Quizwiz!

The application high availability method that uses redundant servers with only one active at any time is called a_____.

Failover Cluster.

In a pure failover cluster, you can have two instances of an application accessing the same data at the same time A. True B. False

False.

Shadow copies is a file based fault tolerance mechanism that provides protection against disk failures A. True B. False

False.

The servers that you intend to add to an nlb cluster must have dynamic IP addresses A. True B. False

False.

The role service that enables disconnected Terminal Services clients to reconnect to the same server is called ________.

TS Session Broker.

What is a witness disk?

A witness disk holds the cluster configuration database.

Which of the following features can be used to automate the shadow copy process? A. File redirection B. Print services C. Dns server D. Streaming media services

A. File Redirection.

4. Which of the following RAID levels yields the largest percentage of usable disk space? a. RAID-0 b. RAID-1 c. RAID-5 d. RAID-6

A. RAID-0.

A maximum of__________nodes can be added to a cluster if computers are running on the x86 or IA64 platform. A. 6 B. 8 C. 12 D. 16

B. 8

Which version of windows server 2008 must be running to create a failover cluster? A. Basic B. Enterprise C. Standard D. Web

B. Enterprise.

What is the term for the ability of entire servers to be redundant so that if anything goes wrong with one computer, another one can take its place almost immediately? A. NLB B. Failover C. NSCA D. Server

B. Failover.

To use shadow copies effectively, where must users store their files? A. Removable hard drive B. Server C. Local hard drive D. SCSI hard drive

B. Server.

Regardless of how much space you allocate to the storage area, windows server 2008 supports a maximum of______shadow copies for each volume. A. 32 B. 64 C. 96 D. 128

B.64

To protect workstation applications and ensure their continued availability, what feature should be used to run them? A. Server core B. Virtual private networking C. Terminal service D. Powershell

C. Terminal Services.

Which of the following holds the failover cluster configuration database? A. Mirrored disk B. Failover disk C. Witness disk D. None of the above

C. Witness Disk.

The process by which servers are automatically added to and removed from a network load balancing cluster is called ______.

Convergence.

Clients connecting to a terminal server farm must run the minimum version of remote desktop connection (RDC), which is__________ . A. 3.0 B. 4.0 C. 4.5 D. 5.2

D. 5.2

The network load balancing method that assigns multiple IP addresses to a single host name is called _____.

DNS Round Robin.

The servers in a network load balancing cluster continually exchange status messages called _______.

Heartbeats.

What is Shadow Copies specifically designed to do?

It is designed to prevent administrators from having to load backup media to restore individual files for users

The application high availability mechanism that uses redundant servers, with all running simultaneously, is called ______.

Network Load Balancing.

The Windows Server 2008 feature that enables end users to store copies of server-based documents on a local drive is called ______.

Offline files.

What mechanism can individual users employ to maintain access to their server files, even if the server becomes unavailable?

Offline files.

What mechanism automatically retains copies of files on a server volume in multiple versions from specific points in time?

Shadow Copies.

Windows Server 2008 servers can maintain multiple versions of a volume's files using a feature called _____.

Shadow copies.

What is the name of the specific role service in the Terminal Services role that maintains a database of client sessions and enables a disconnected client to reconnect to the same terminal server?

TS Session Broker.

What is the main disadvantage of DNS Round Robin?

The DNS server has no connection with the servers in the cluster.

What two parts constitute the process of deploying Terminal Services with network load balancing?

The two parts include creating a terminal server farm and creating a network load balancing cluster.

How do you access shadow copies once they have been created?

To access the shadow copies stored on a server, a computer must be running the Previous Versions Client.

In network load balancing, all servers in the cluster are operational and able to service clients A. True B. False

True.

You can implement shadow copies only for an entire volume; you cannot select specific shares, folders, or files A. True B.False B. False

True.

What is convergence, and what triggers it?

When a server fails to generate five consecutive heartbeats, the cluster initiates a process called convergence, which stops it from sending clients to the missing server.

The Windows Server 2008 feature that enables a computer to verify an application before launching it is called ________.

Windows Installer 4.0.

What component in Windows Server 2008 enables the system to install software packaged as files with a .msi extension?

Windows installer 4.0

A failover cluster stores its configuration database on a _______.

Witness disk.

8. Which of the following statements is true about DNS Round Robin load balancing? a. DNS Round Robin requires you to create multiple resource records containing the same host name. b. When one of the servers in the cluster fails, the Windows Server 2008 DNS server performs a convergence and disables the resource record for that server. c. To use DNS Round Robin, you must first create a cluster resource record specifying the cluster name. d. When the Windows Server 2008 DNS server receives a name resolution request for a cluster, it replies with all of the resource records for that cluster name.

a. DNS Round Robin requires you to create multiple resource records containing the same host name.

9. Which of the following statements best defines the function of the port rules in an NLB cluster? a. Port rules specify what types of application traffic are allowed through the cluster's firewall. b. Port rules specify the name of the servers that are to be members of the cluster. c. Port rules enable the cluster to detect server failures and initiate a convergence. d. Port rules specify what application traffic is to be distributed among the cluster servers.

a. Port rules specify what types of application traffic are allowed through the cluster's firewall.

10. Which of the following operating systems does not include the Previous Versions client needed to access Shadow Copies files? a. Windows XP b. Windows Server 2003 c. Windows Vista d. Windows Server 2008

a. Windows XP.

3. Which of the following server clustering solutions can make use of a storage area network? a. a failover cluster b. a terminal server farm c. a network load balancing cluster d. DNS Round Robin

a. a failover cluster.

What term refers to the ability of an application to maintain its own availability by detecting outdated, corrupted,or missing files and automatically correcting the problem?

application resilience

What term refers to the ability of an application to maintain its own availability by detecting outdated, corrupted, or missing files and automatically correcting the problem?

application resilience.

6. How many heartbeat messages must a server in an NLB cluster miss before it is removed from the cluster? a. 1 b. 5 c. 50 d. 500

b. 5

In addition to the application data, which of the following is stored on a failover cluster's shared storage? a. the Failover Cluster management console b. the witness disk c. the TS Session Broker database d. the Shadow Copies database

b. the witness disk.

7. Which of the following is not a requirement to use the TS Session Broker role service? a. All of the Terminal Services computers must be running Windows Server 2008. b. All of the Terminal Services computers must be configured identically. c. The TS Session Broker role service must be installed on one of the terminal servers. d. The Terminal Services computers must all be member of the same Active Directory domain

c. The TS Session Broker role service must be installed on one of the terminal servers.

5. To use Shadow Copies, you must enable the feature at which of the following levels? a. the file level b. the folder level c. the volume level d. the server level

c. the volume level

What tasks are involved in the process of implementing an NLB cluster?

creating the cluster, adding servers to the cluster, specifying a name and IP address for the cluster, and creating port rules

2. Which of the following Windows Server 2008 features enables users to access files that they have accidentally overwritten? a. Offline Files b. parity-based RAID c. Windows Installer 4.0 d. Shadow Copies

d.Shadow copies.

What is the simplest form of disk redundancy?

disk mirroring.

What collection of two or more servers performs the same role or runs the same application and appears on the network as a single entity?

failover cluster.

Which process allows you to automate the use of Shadow Copies?

file redirection.

You must install the network load balancing feature on each______before adding it to a cluster .

server

What must you create first before deploying Terminal Services with network load balancing?

terminal server farm.


Conjuntos de estudio relacionados

Module 6 - Comprehensive Exterior Financial Planning Skill Development Concept Quiz

View Set

Human Disease/Pathophysiology: Ch 1 Quiz

View Set

Professional Scrum Competencies 2 of 3

View Set

questions i keep freaking missing: final round part two

View Set

70-698 Installing and Configuring Windows 10

View Set