ITN 200 Mod 7
The modern partition table is called the Master Boot Record (MBR) and uses storage devices that are larger than 2 TB. True False
False
Trimming erases sections of the volatile memory chips on an SSD that no longer contain data, consolidating the existing data into fewer memory locations. True False
False
Using a disk management tool, you can create a GPT on a disk that has an MBR when no partitions exist on a disk. True False
True
Which of the following is a requirement for using Storage Spaces Direct? a. A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must. b. More than 20 servers must be available. c. The number of SSDs used should not be more than one. d. The servers should be from different Active Directory domains.
a. A 10 GB Ethernet network interface with remote-direct memory access (RDMA) support is a must.
Tara, an administrator, has added storage devices to the storage pool and selected the RAID level for the virtual disk using Server Manager. She wishes to allocate more space than is required for the current amount of data such that the system only uses the actual space it needs, enabling the actual size to grow with data. What would you do to achieve Tara's wish? a. Create several thin-provisioned virtual disks b. Create several thick-provisioned virtual disks c. Create several fixed-provisioned virtual disks of combined capacity smaller than the storage pool d. Create several virtual disks of combined capacity smaller than the storage pool
a. Create several thin-provisioned virtual disks
Zuber is configuring Windows Server 2019 as an iSCSI SAN device. He has successfully created an iSCSI virtual disk and a new iSCSI target. He is trying to connect his system to the new iSCSI target but he is facing a connection issue. What must be the cause for the connection issue? a. IQN is not present in the access server list. b. CHAP authentication is not enabled. c. DSM is not be added to the system. d. JBOD is not enabled in the system.
a. IQN is not present in the access server list.
Madison is using the Backup Schedule Wizard from the Actions pane of the Windows Server Backup tool. He selects the backup configuration as Custom and specifies the items to be backed up. While adding the items to be backed up, he happens to select the System state option. What does this option create a backup of? a. Operating system settings b. The entire system c. Virtual hard disk files d. Boot and recovery volumes
a. Operating system settings
Rebecca is configuring a RAID with three storage devices. If she saves a file, the file will be divided into three sections, with each section written to separate storage devices concurrently, in a third of the amount of time it would take to save the entire file on one storage device. Which of the following RAID levels is Rebecca configuring? a. RAID level 0 b. RAID level 1 c. RAID level 2 d. RAID level 5
a. RAID level 0
How do you create a RAID level 1 volume with two disks in the Disk Management tool? a. Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks b. Right-click on the disk that you want to configure as a RAID volume and then click New Spanned Volume to create a RAID level 1 volume with two disks c. Right-click on the disk that you want to configure as a RAID volume and then click New Striped Volume to create a RAID level 1 volume with two disks d. Right-click on the disk that you want to configure as a RAID volume and then click Shrink Volume to create a RAID level 1 volume with two disks
a. Right-click on the disk that you want to configure as a RAID volume and then click New Mirrored Volume to create a RAID level 1 volume with two disks
Pablo is a system administrator in training. He is trying to manually defragment the F: volume in Becky's system. Help Pablo identify the correct method to perform manual defragmentation. a. Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button. b. Right-click the volume, click Properties, highlight the Tools tab, and click the Check button. c. Write the "Repair-Volume-DriveLetter F -Scan" command in Windows PowerShell. d. Write the "Optimize-Volume -DriveLetter" command in Windows PowerShell.
a. Right-click the volume, click Properties, highlight the Tools tab, and click the Optimize button.
Identify the option that can be used to create storage pools that include storage devices from different servers on a network. a. Storage Spaces Direct b. A combination of hard disks and SDDs c. A thin-provisioning virtual disk d. The primordial storage pool
a. Storage Spaces Direct
Shaw, a server administrator, uses an iSCSI SAN protocol to transfer data to and from SAN devices at a speed of up to 40 Gb/s. He configures one of the SAN devices to provide storage to Jasper's Windows Server 2019 system. What should Jasper configure in his system to be able to connect to the storage? a. The iSCSI target b. The iSCSI initiator c. HBA d. MPIO
a. The iSCSI target
Nadia uses the Disk Management tool to create a simple volume in one of the disks. She specifies the simple volume size and chooses a drive letter. While selecting the formatting options, she modifies the default allocation unit size. What will happen if the allocation unit size is large? a. The performance of file sharing applications will increase. b. The performance of database applications will increase. c. The performance of file sharing applications will decrease. d. The performance of database applications will decrease.
a. The performance of file sharing applications will increase.
Parker runs the net start svsvc command at a Command Prompt to scan volume errors. He finds a corrupted spot on a volume. How can Parker directly go to the corrupted spot identified by the Spot Verifier service? a. By using the /r option with the chkdsk command b. By using the /spotfix option with the chkdsk command c. By using the /c option with the chkdsk command d. By using the /x option with the chkdsk command
b. By using the /spotfix option with the chkdsk command
You are asked to create seven partitions in a storage device that uses an MBR. The device already has two partitions. However, you are also told that you cannot create more than a certain number of partitions on the storage device using an MBR. What would your next step be? a. Use the drive letters A and B to label the partitions b. Create the partitions and label one of the partitions as extended c. Use a storage device that is more than 7 TB in size and uses an MBR d. Convert the device to GPT
b. Create the partitions and label one of the partitions as extended
Merjem, a PhD student, is writing her thesis. She takes regular backup of her files and data. When taking backup, she chooses the Faster backup performance option in the Optimize Backup Performance window. Which of the following is true of the backup process in the given scenario? a. Every backup overwrites the previous backup. b. Every backup only backs up data that has been modified since the previous backup. c. The backup process will provide the fastest option at the time of restoring data. d. The backup process backs up the all the specified data every time.
b. Every backup only backs up data that has been modified since the previous backup.
One of the disks on your computer is running low on storage space. You notice that there is unallocated space in the spanned volume. How will you use the unallocated space to increase storage space? a. Right-click the volume, click Reactivate Volume once the storage device is available, and use the unallocated space b. Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space c. Right-click a RAID level 1 volume and click Remove Mirror to remove the volume while retaining the data from one disk you specify d. Right-click the system or boot partition in the Disk Management tool, click Add Mirror, and select the second storage device
b. Right-click the volume on that disk and click Extend Volume to increase the size of the volume using the unallocated space
Which of the following is a term given to the software component in the operating system that connects to the SAN device via iSCSI? a. iSCSI target b. iSCSI initiator c. HBA d. MPIO
b. iSCSI initiator
How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool? a. 1 KB b. 10 KB c. 1 MB d. 10 MB
c. 1 MB
Sonia is configuring a RAID level 5 array with five disks. Each disk has the capacity to store 3 TB of data. What is the total storage size that Sonia can use to store data? a. 3 TB b. 8 TB c. 12 TB d. 15 TB
c. 12 TB
Sam, an administrator, sends out an HR policy file to Vicky, Mohammad, Charle, and Reena. They save the HR policy file on their home directories under a shared folder of Windows Server 2019 with different file names. As a result, the same copies of the file are present multiple times with different names. Reena opens and saves the file after making minor changes. What will happen to the files when Sam enables the Data Deduplication Service on Windows Server 2019? a. A copy of Reena's file is created with a new file name. b. All the files get deleted when the Data Deduplication Service is enabled. c. A new copy of Reena's file is created and associated with the same file name. d. None of the files are deleted as they have different file names.
c. A new copy of Reena's file is created and associated with the same file name.
Rishab is looking for ways to manage duplicate file content on his organization's shared drive. He enables data deduplication for this purpose. To save computing resources, he wants to change the settings such that data deduplication occurs in the evening. What must Rishab do to make this change? a. Enter the file extensions to be excluded b. Click the Add button under Deduplication Settings c. Click Set Deduplication Schedule d. Select the Apply button under Deduplication Settings
c. Click Set Deduplication Schedule
Imran is associating a drive letter to a filesystem so that the drive letter can be accessed by the operating system. What is the term given to the process that Imran is carrying out? a. Journaling b. Formatting c. Mounting d. Spanning
c. Mounting
Which of the following RAID level configurations is not supported by Windows Server 2019? a. RAID level 0 b. RAID level 1 c. RAID level 2 d. RAID level 5
c. RAID level 2
Gabriela attempts to create a virtual disk on a storage pool using Server Manager. However, she is unable to select the Create storage tiers on this virtual disk option. Why do you think she is not able to use the option? a. She enters the wrong virtual disk name. b. She is not using the New Virtual Disk Wizard. c. The system uses an SSD and not an HDD. d. The storage spool does not have sufficient space.
c. The system uses an SSD and not an HDD.
While copying files between folders, it is possible to retrace and complete the transfer in case of a power failure if an NTFS-based filesystem is being used. The same cannot be said for a FAT32 filesystem. What do you think could be the reason for this difference? a. NTFS is a filesystem, while FAT32 is not. b. FAT32 keeps track of information being written, while NTFS does not. c. FAT32 is only used as a removable device, while NTFS is not. d. NTFS is a journaling filesystem, while FAT32 is not.
d. NTFS is a journaling filesystem, while FAT32 is not.
Which of the following statements is true of SAN devices? a. SAN devices are the same as network-attached storage. b. SAN devices use SAN protocols to manage and format filesystems. c. SAN devices use hardware RAID externally to provide fault tolerance for the storage device that they contain. d. SAN devices are functionally like an external USB drive.
d. SAN devices are functionally like an external USB drive.
A server rack containing data files, databases, web content, etc. is stored on an external SAN, which is connected to the Windows Server 2019 operating system via iSCSI. Which of the following is not likely to be achieved with this configuration? a. Connection to Fibre Channel SAN devices b. Accessing multiple SAN devices c. Providing storage to other servers d. Using hardware RAID externally to provide fault tolerance
d. Using hardware RAID externally to provide fault tolerance