Windows Network Management - Unit 1 - Unit 8
Which two files are used for every VM?
.VMC (XML file) and the .VHD / .VHDX files for the guest OS and data.
Which of the following is the maximum size file supported by Windows Deduplication? 10 TB 256 MB 100 MB 10 GB 1 TB
1 TB
When using deduplication, which of the following ratios would be expected for general files? 3:1 4:1 2:1 1:1 20:1
2:1
When creating a storage space, how many disks are needed when setting up parity for resiliency settings in a storage pool? 5 4 2 3
3
Which port is used by iSCSI? 1080 8080 3260 4800
3260
Which type of backup would benefit from Windows deduplication? File-based backups Block-based backups Chunk store backups Reparse point backups
Block-based backups
In Windows Server 2016, by default, how is NUMA configured?
By default, the virtual NUMA topology is optimized to match the NUMA topology of the underlying host computer.
Which protocol can be used to require authentication to iSCSI virtual disks?
CHAP
Which protocol is used for authentication for iSCSI? SPAP MS-CHAPv2 CHAP PAP
CHAP
What enables and shares a single network infrastructure with storage, data, voice, video, cluster, and management traffic?
Converged Network
Which of the following options are available when selecting the Import Virtual Machine Wizard? (Choose two answers.)
Copy the virtual machine Register the virtual machine in place.
What is the name of the suite of IEEE standards that supports converged networks so network traffic can get sufficient bandwidth allocation, while maintaining reliability?
Data Center Bridging
You are the administrator for an organization that provides 70 sites in which users store their home and shared public folders. These sites use DFS to replicate files to four subsidiary servers. Which of the following can be used to significantly reduce the file size while maintaining performance? Disk Cleanup NTFS encryption Data deduplication EFS
Data deduplication
Which tool is used to estimate the deduplication capacity savings on Windows? Deduplication Estimation Tool Server Manager Repadmin Deduplication Evaluation Tool
Deduplication Evaluation Tool
In Windows Server 2016, which command-line tool is used to estimate capacity savings on Windows when using data deduplication?
Deduplication Evaluation Tool (DDPEval.exe)
What allows guest virtual machines to communicate directly with PCIe devices?
Discrete Device Assignment
In Hyper-V, which generation is needed to use Secure Boot or SCSI virtual hard disk?
Generation 2
In Windows Server 2016, which type of VM allows for UEFI boot and SCSI disks to boot the system?
Generation 2 VM
Which Windows PowerShell cmdlet returns the deduplication status for volumes that have data deduplication metadata?
Get-DedupStatus
Which command can be used to view the status of a volume that is configured to use Windows deduplication? Get-DedupStatus Get-DedupVolume Get-DedupJob Get-DedupVolumeStatus
Get-DedupStatus
Which PowerShell cmdlet should be used to view the iSCSI initiator connections? Get-IscsiTarget Get-IscsiSession Get-IscsiConnection Connect-IscsiTarget
Get-IscsiConnection
In some cases, certain Hyper-V guest operating system features do not function properly using the OS system's own device drivers. Which Hyper-V software package can help?
Guest Integration Services
What provides these services: heartbeat, time synchronization, and data exchange between parent and child partitions?
Guest integration services
Which of the following statements best describe the primary purpose of the software package offered by Hyper-V called Guest Integration Services?
Guest integration services resolves compatibility issues of certain guest OS experiencing non-functioning features.
A mirrored volume provides ________ of the storage space when compared to any of the other volume types.
Half
What is the primary purpose of the Hyper-V software package called guest integration services?
Helps compatibility issues between the guest and the host. Some are conveniences and some can impact functionality.
What advantages do SANS typically have over NAS devices?
Higher performance, fast I/O, scalability, networking uses iSCSI, block level storage.
Which protocol can be used to provide encryption of traffic between an iSCSI initiator and an iSCSI target?
IPsec
What term corresponds to a unique identifier in an iSCSI network?
IQN
Which of the following is a unique identifier that is used to identify iSCSI initiators and targets?
IQN
List 4 identifiers that can be used to restrict which servers can connect to an iSCSI target.
IQN DNS Name IP Address MAC Address
___________ is the process by which an existing set of VM files is used to re-create the exact same VM.
Import
What protocol is used to automatically discover, manage, and configure iSCSI devices on a TCP/IP network?
Internet Storage Name Service (iSNS)
When using the Create a Virtual Machine Wizard, how is the virtual hard disk created by default?
It starts small and dynamically expands to the max size you specify.
When importing a VM multiple times, what will be the name of the imported VM?
It would have the same name. To import a VM multiple times you need to use the Copy feature so that it will create a new unique id, that will allow you to import the virtual machine to the same host multiple times.
What term corresponds to a portion of a storage subsystem?
Logical Unit Number
Which technologies can help make iSCSI highly available? (Choose two answers.) MPIO MCS LUNX EFS
MPIO MCS
Measure-DedupFileMetadata
Measures potential disk space on volumes after files have been deduplicated.
What term refers to the percentage that Hyper-V uses to calculate how much memory to allocate to the VM, compared with its actual utilization as measured by performance counters?
Memory Buffer
For which operating systems does Windows Server 2016 provide iSCSI initiators?
Microsoft Windows and other operating systems that are compatible with iSCSI
Which of the following refers to the smallest amount of memory the VM can use at any time?
Minimum RAM
What is the name of the high-availability technology that establishes multiple sessions or connections to the Fibre Channel storage array by using redundant path components such as switches, adapters and cables?
Multipath I/O
What is the name of the high-availability technology that enables multiple TCP/IP connections from the initiator to the target for the same iSCSI session?
Multiple Connection Session
What is the name of a computer system architecture that is used with multiprocessor designs that organizes memory into regions, which are assigned access latencies based on how the processors and memory are interconnected?
Non-Uniform Memory Access (NUMA)
The Windows _______files cannot be stored on the drives that are part of a storage space.
Operating System
What is the name given to the mathematical algorithm that some disk storage technologies use to provide data redundancy in their disk write operations?
Parity
Which storage space resiliency type can be used to protect up to a single drive failure and requires at least three drives? Simple Three-way mirror Two-way mirror Parity
Parity
When enabling Dynamic Memory for virtual machines, what does the Memory weight setting specify?
Provides Hyper-V with a way to determine how to distribute memory among virtual machines if there is not enough physical memory available in the computer to give every virtual machine its requested amount of memory.
Which RAID level, implemented in Windows Server 2016, is a striped set with distributed parity?
RAID 5 - uses striping with distributed parity across the drives.
When using Windows Server 2016 data deduplication, which optimization ratio can be delivered for general file servers?
Ratio 2:1
When importing a VM in Windows Server 2016, what are the three available options that affect how the import is performed?
Register the VM in-place - use existing unique ID Restore the VM - use existing unique ID Copy the VM - create new unique ID
Which of the following is not an available task after completing the setup of a storage space? Removing drives from the pool Changing the sizee of storage spaces Adding more drives to the pool Renaming the pool
Removing drives from the pool
After attaching an iSCSI device to a server running Windows Server 2016, the disk does not show up in Windows Explorer. Which of the following methods is the best way to make the disk available to the server for usage? Rescan disks in Disk Management Reboot the iSCSI storage system Reboot the server Verify that the iSCSI Initiator ID is correct
Rescan disks in Disk Management
Get-DedupVolume
Returns the deduplication status for volumes that have data deduplication metadata
What protocol does a storage area network (SAN) typically use for communication between servers and storage arrays?
SCSI
Which of the following drives can be added to a storage pool? (Choose all that apply.) SCSI eSATA SATA USB
SCSI eSATA SATA USB
Update-DedupStatus
Scans volumes to compute new data deduplication info for updating the metadata
In Windows Server 2016 Hyper-V, what ensures that each component that is loaded during the boot process is digitally signed and validated?
Secure Boot
Which graphical tool in Windows Server 2016 can be used to manage storage pools and create virutal disks? DiskPart.exe The VHD wizard Server Manager Disk Management for MMC
Server Manager
Which operating systems are allowable as virtual machines?
Several Microsoft and non-Microsoft operating systems, such as CentOS, RedHat, Linux, and SUSE
Which storage space resiliency type offers no data protection when a drive fails? Parity Simple Two-way mirror Three-way mirror
Simple
When is smart paging used for virtual machines?
Smart Paging is used to bridge the memory gap between minimum memory and startup memory, and allow virtual machines to restart reliably.
Which of the following refers to the amount of memory that should be allocated to the VM when it starts.
Startup RAM
What statistics are gathered by the Resource Metering tool?
Statistics are specific to each VM, even if VMs are transferred between hosts. Average CPU usage, measured in megahertz over a period of time. Average physical memory usage, measured in megabytes. Minimum memory usage (lowest amount of physical memory). Maximum memory usage (highest amount of physical memory). Maximum amount of disk space allocated to a virtual machine. Total incoming network traffic, measured in megabytes, for a virtual network adapter. Total outgoing network traffic, measured in megabytes, for a virtual network adapter.
After installing physical disks and concatenating their spaces together, virtual disks of any size can be created. What term refers to the total combined space?
Storage Pool
In Windows Server 2016, what is used to synchronize data on a block level on two independent storage units?
Storage Replica
Which disk virtualization technology in Windows Server 2016 enables a server to concatenate storage space from individual physical disks? Storage Pool Storage Spaces Storage Volumes Storage Disks
Storage Spaces
What term refers to a Hyper-V cluster with nodes and storage in two locations?
Stretch Cluster
Which of the following statements are true of striped volumes? Striped volumes provide enhanced performance over simple volumes. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost. You can extend striped volumes after creation. Striped volumes provide greater fault tolerance than simple volumes.
Striped volumes provide enhanced performance over simple volumes. If a single physical disk in the striped volume fails, all of the data in the entire volume is lost.
Which of the following is the underlying network protocol used by an iSCSI storage network? TCP/IP BGP SCSI SMB
TCP/IP
What does the Resource Metering tool document?
The Resource Metering tool lets you track and gather data about physical processor, memory, storage, and network usage by specific virtual machines.
What is needed for Windows and Linux virtual machines to support Secure Boot?
The virtual machine must be Generation 2.
What is the name of the process that can be used to create a storage space that is larger than the available capacity of a Windows Server 2016 storage pool?
Thin Provisioning
Which of the following processes reserves space for future use when working with storage spaces / storage pools? Provisioned storage blocks Parititions SMB blocks Thin provisioning
Thin provisioning
What does Dynamic Memory do?
This technology allows hypervisors to handle RAM consumption by host VMs in a flexible way, if possible. For example, hypervisor can dynamically add more RAM from a shared memory pool to a VM when the guest-OS needs it, or to reclaim excess back when a VM goes idle.
When creating a storage space, which of the following resiliency settings requires at least five drives? Three-way mirror Parity Two-way mirror Simple
Three-way mirror
When creating storage spaces, which of the following types of resiliency works best for protection against two drives failing simultaneously while setting up storage spaces? Three-way mirror Simple Parity Two-way mirror
Three-way mirror
Which storage space resiliency type can be used to protect against two simultaneous drive failures? Two-way mirror Parity Three-way mirror Simple
Three-way mirror
Which storage space resiliency type can be used to protect up to a single drive failure and requires at least two drives? Parity Three-way mirror Two-way mirror Simple
Two-way mirror
Which of the following approaches is best when reserving at least 500 GB of space for a new storage space when there is only 100 GB of actual physical disk space? Purchase new drives before creating the space. Wait until there is enough physical disk capacity to create the 500-GB storage space. Use thin provisioning and create the larger space. Drives can be purchased later when needed. Configure one pool now and another when the drives are available.
Use thin provisioning and create the larger space. Drives can be purchased later when needed.
How are storage area network (SAN) devices typically accessed over the network? (Choose all that apply) Using Fibre Channel Using NFS Using iSCSI Using SMB
Using Fibre Channel Using iSCSI
How are network attached storage (NAS) devices typically access over a network (Choose all that apply) Using NFS Using Fibre Channel Using iSCSI Using SMB
Using NFS Using SMB
What is the correct scalability limit of Hyper-V in Windows Server 2016?
VM HOST 512 ProcessorsRAM : 24 TBRun maximum of 1024 virtual machines per server VM Guest Machines RAM : 12 TB for generation 2, 1 TB for generation 1Virtual hard disk capacity 64 TB for VHDX format; 2040 GB for VHD formatVirtual processors 240 for generation 2; 64 for generation 1; 320 available to the host OS (root partition)
When a virtual machine has Dynamic Memory enabled, when does smart paging actually trigger?
When a VM is low on startup RAM, Smart Paging to simulate additional RAM that it can use, this is usually very temporary.
Which of the following operating systems can be used in Hyper-V virtual machines for Windows Server 2016? (Choose all that apply)
Windows 10, FreeBSD, Windows Server 2016, SUSE Linux
In Hyper-V and Windows Server 2016, which operating systems support enhanced session mode?
Windows 10, Windows 8.1 64-bit, Windows Server 2016, Windows Server 2012 R28
List the Windows versions that support querying of the iSCSI Initiator computer for the iSCSI Initiator ID.
Windows Server 2012 and Windows 8 and newer. It is not supported by Windows Server 2008 R2 or 7 and earlier.
Which operating systems can be used with Generation 2 VMs?
Windows Server 2019 Windows Server 2016 Windows Server 2012 R2 Windows Server 2012 64-bit versions of Windows 10 64-bit versions of Windows 8.1 64-bit versions of Windows 8 Several non-Microsoft OS systems, like Linux7
As an administrator, you are configuring an iSCSI Target Server role and multiple volumes that will be assigned to multiple servers using iSCSI initiators. Because these servers contain confidential information, you want to make sure that they are not accessed by other servers using an iSCSI initiator. Which of the following statements best describes the recommended course of action? You should configure the iSCSI ACL list when he configures the iSCSI initiator. You should enable IPsec. You should specify the initiator ID that can connect when creating the iSCSI virtual disk. You should specify the initiator ID that can connect when creating the iSCSI target.
You should specify the initiator ID that can connect when creating the iSCSI target.
Which of the following can be used to save significant disk space by finding small chunks that are used multiple times on a disk and then maintaining a single copy of each chunk? deduplication SMB 3.0 tiered storage NTFS compression
deduplication
Which component of the Data Deduplication role service is used to monitor local or remote I/O and handle chuncks of data on the file system by interacting with the various jobs?
filter driver
Which protocol allows a server to connect to a SAN by sending SCSI commands over a TCP/IP network? MPIO Fibre Channel iSCSI SATA
iSCSI
What term corresponds to an entity that receives SCSI commands?
iSCSI Target
What role can you install in Windows Server 2016 to provide iSCSI storage to other clients?
iSCSI Target Server
Which component of the iSCSI Target Server role can also be installed to enable applications connected to an iSCSI target to perform volume shadow copies of data on iSCSI virtual disks?
iSCSI Target Storage Provider
What term corresponds to an entity that sends SCSI commands to iSCSI storage devices?
iSCSI initiator
Which client connects to an iSCSI SAN? iSCSI target iSCSI source iSCSI initiator iSCSI receiver
iSCSI initiator
Which of the following can be installed so that Windows Server 2016 can be used to present iSCSI volumes to Windows servers? iSCSI source iSCSI target iSCSI initiator iSCSI receiver
iSCSI target
A company uses nearly 30 servers, all running Windows Server 2016 and each using iSCSI storage. The small team of administrators is complaining that it is becoming difficult to locate the available iSCSI resources on the network. Which of the following can be used to help the administrators quickly locate iSCSI resources? (Choose all that apply) iSCSI target storage provider Windows Standard-Based Storage Management feature DNS iSNS
iSCSI target storage provider iSNS
Which of the following is used to automatically discover, manage, and configure iSCSI devices? LUN iSNS IQN MPIP
iSNS